18fae3551SRodney W. Grimes.\" Copyright (c) 1980, 1989, 1991, 1993 28fae3551SRodney W. Grimes.\" The Regents of the University of California. All rights reserved. 38fae3551SRodney W. Grimes.\" 48fae3551SRodney W. Grimes.\" Redistribution and use in source and binary forms, with or without 58fae3551SRodney W. Grimes.\" modification, are permitted provided that the following conditions 68fae3551SRodney W. Grimes.\" are met: 78fae3551SRodney W. Grimes.\" 1. Redistributions of source code must retain the above copyright 88fae3551SRodney W. Grimes.\" notice, this list of conditions and the following disclaimer. 98fae3551SRodney W. Grimes.\" 2. Redistributions in binary form must reproduce the above copyright 108fae3551SRodney W. Grimes.\" notice, this list of conditions and the following disclaimer in the 118fae3551SRodney W. Grimes.\" documentation and/or other materials provided with the distribution. 128fae3551SRodney W. Grimes.\" 3. All advertising materials mentioning features or use of this software 138fae3551SRodney W. Grimes.\" must display the following acknowledgement: 148fae3551SRodney W. Grimes.\" This product includes software developed by the University of 158fae3551SRodney W. Grimes.\" California, Berkeley and its contributors. 168fae3551SRodney W. Grimes.\" 4. Neither the name of the University nor the names of its contributors 178fae3551SRodney W. Grimes.\" may be used to endorse or promote products derived from this software 188fae3551SRodney W. Grimes.\" without specific prior written permission. 198fae3551SRodney W. Grimes.\" 208fae3551SRodney W. Grimes.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 218fae3551SRodney W. Grimes.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 228fae3551SRodney W. Grimes.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 238fae3551SRodney W. Grimes.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 248fae3551SRodney W. Grimes.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 258fae3551SRodney W. Grimes.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 268fae3551SRodney W. Grimes.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 278fae3551SRodney W. Grimes.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 288fae3551SRodney W. Grimes.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 298fae3551SRodney W. Grimes.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 308fae3551SRodney W. Grimes.\" SUCH DAMAGE. 318fae3551SRodney W. Grimes.\" 32c06fe0a0SPeter Wemm.\" @(#)mount.8 8.8 (Berkeley) 6/16/94 337f3dea24SPeter Wemm.\" $FreeBSD$ 348fae3551SRodney W. Grimes.\" 35c06fe0a0SPeter Wemm.Dd June 16, 1994 368fae3551SRodney W. Grimes.Dt MOUNT 8 378fae3551SRodney W. Grimes.Os BSD 4 388fae3551SRodney W. Grimes.Sh NAME 398fae3551SRodney W. Grimes.Nm mount 408fae3551SRodney W. Grimes.Nd mount file systems 418fae3551SRodney W. Grimes.Sh SYNOPSIS 428fae3551SRodney W. Grimes.Nm mount 43a257a45eSJordan K. Hubbard.Op Fl adfpruvw 448fae3551SRodney W. Grimes.Op Fl t Ar ufs | lfs | external_type 458fae3551SRodney W. Grimes.Nm mount 46a257a45eSJordan K. Hubbard.Op Fl dfpruvw 478fae3551SRodney W. Grimes.Ar special | node 488fae3551SRodney W. Grimes.Nm mount 49a257a45eSJordan K. Hubbard.Op Fl dfpruvw 508fae3551SRodney W. Grimes.Op Fl o Ar options 518fae3551SRodney W. Grimes.Op Fl t Ar ufs | lfs | external_type 528fae3551SRodney W. Grimes.Ar special node 538fae3551SRodney W. Grimes.Sh DESCRIPTION 548fae3551SRodney W. GrimesThe 55951122deSSteve Price.Nm 568fae3551SRodney W. Grimescommand 578fae3551SRodney W. Grimescalls the 588fae3551SRodney W. Grimes.Xr mount 2 598fae3551SRodney W. Grimessystem call to prepare and graft a 608fae3551SRodney W. Grimes.Ar "special device" 618fae3551SRodney W. Grimesor the remote node (rhost:path) on to the file system tree at the point 628fae3551SRodney W. Grimes.Ar node . 638fae3551SRodney W. GrimesIf either 648fae3551SRodney W. Grimes.Ar special 658fae3551SRodney W. Grimesor 668fae3551SRodney W. Grimes.Ar node 678fae3551SRodney W. Grimesare not provided, the appropriate information is taken from the 688fae3551SRodney W. Grimes.Xr fstab 5 698fae3551SRodney W. Grimesfile. 708fae3551SRodney W. Grimes.Pp 718fae3551SRodney W. GrimesThe system maintains a list of currently mounted file systems. 728fae3551SRodney W. GrimesIf no arguments are given to 738fae3551SRodney W. Grimes.Nm mount , 748fae3551SRodney W. Grimesthis list is printed. 758fae3551SRodney W. Grimes.Pp 768fae3551SRodney W. GrimesThe options are as follows: 778fae3551SRodney W. Grimes.Bl -tag -width indent 78c4e95187SDavid Greenman.It Fl a 79c06fe0a0SPeter WemmAll the filesystems described in 80c06fe0a0SPeter Wemm.Xr fstab 5 81c06fe0a0SPeter Wemmare mounted. 82fba1c154SSteve PriceExceptions are those marked as ``noauto'', excluded by the 83c06fe0a0SPeter Wemm.Fl t 84fba1c154SSteve Priceflag (see below), or if they are already mounted (except the 85fba1c154SSteve Priceroot filesystem which is always remounted to preserve 86fba1c154SSteve Pricetraditional single user mode behavior). 878fae3551SRodney W. Grimes.It Fl d 888fae3551SRodney W. GrimesCauses everything to be done except for the actual system call. 898fae3551SRodney W. GrimesThis option is useful in conjunction with the 908fae3551SRodney W. Grimes.Fl v 918fae3551SRodney W. Grimesflag to 928fae3551SRodney W. Grimesdetermine what the 93951122deSSteve Price.Nm 948fae3551SRodney W. Grimescommand is trying to do. 958fae3551SRodney W. Grimes.It Fl f 968fae3551SRodney W. GrimesForces the revocation of write access when trying to downgrade 97ef8f7ac9SSheldon Hearna filesystem mount status from read-write to read-only. 98ef8f7ac9SSheldon HearnAlso 991469eec8SDavid Greenmanforces the R/W mount of an unclean filesystem (dangerous; use with 1001469eec8SDavid Greenmancaution). 1018fae3551SRodney W. Grimes.It Fl o 1028fae3551SRodney W. GrimesOptions are specified with a 1038fae3551SRodney W. Grimes.Fl o 1048fae3551SRodney W. Grimesflag followed by a comma separated string of options. 10518af6044SJoseph KoshyIn case of conflicting options being specified, the rightmost option 10618af6044SJoseph Koshytakes effect. 1078fae3551SRodney W. GrimesThe following options are available: 1088fae3551SRodney W. Grimes.Bl -tag -width indent 1098fae3551SRodney W. Grimes.It async 1108fae3551SRodney W. GrimesAll 1118fae3551SRodney W. Grimes.Tn I/O 1128fae3551SRodney W. Grimesto the file system should be done asynchronously. 1138fae3551SRodney W. GrimesThis is a 1148fae3551SRodney W. Grimes.Em dangerous 1158fae3551SRodney W. Grimesflag to set, 1168fae3551SRodney W. Grimesand should not be used unless you are prepared to recreate the file 1178fae3551SRodney W. Grimessystem should your system crash. 11818af6044SJoseph Koshy.It current 11918af6044SJoseph KoshyWhen used with the 12018af6044SJoseph Koshy.Fl u 12118af6044SJoseph Koshyflag, this is the same as specifying the options currently in effect for 12218af6044SJoseph Koshythe mounted filesystem. 1238fae3551SRodney W. Grimes.It force 1248fae3551SRodney W. GrimesThe same as 1258fae3551SRodney W. Grimes.Fl f ; 1268fae3551SRodney W. Grimesforces the revocation of write access when trying to downgrade 127ef8f7ac9SSheldon Hearna filesystem mount status from read-write to read-only. 128ef8f7ac9SSheldon HearnAlso 1291469eec8SDavid Greenmanforces the R/W mount of an unclean filesystem (dangerous; use with caution). 13018af6044SJoseph Koshy.It fstab 13118af6044SJoseph KoshyWhen used with the 13218af6044SJoseph Koshy.Fl u 13318af6044SJoseph Koshyflag, this is the same as specifying all the options listed in the 13418af6044SJoseph Koshy.Xr fstab 5 13518af6044SJoseph Koshyfile for the filesystem. 136534e0080SDavid E. O'Brien.It noasync 137534e0080SDavid E. O'BrienMetadata I/O should be done synchronously, while data I/O should be done 138534e0080SDavid E. O'Brienasynchronously. This is the default. 139fa947154SDavid Greenman.It noatime 140ef8f7ac9SSheldon HearnDo not update the file access time when reading from a file. 141ef8f7ac9SSheldon HearnThis option 142fa947154SDavid Greenmanis useful on filesystems where there are large numbers of files and 143fa947154SDavid Greenmanperformance is more critical than updating the file access time (which is 144fa947154SDavid Greenmanrarely ever important). This option is currently only supported on local 145fa947154SDavid Greenmanfilesystems. 146c06fe0a0SPeter Wemm.It noauto 147c06fe0a0SPeter WemmThis filesystem should be skipped when mount is run with the 148c06fe0a0SPeter Wemm.Fl a 149c06fe0a0SPeter Wemmflag. 15075b714acSKATO Takenori.It noclusterr 15175b714acSKATO TakenoriDisable read clustering. 15275b714acSKATO Takenori.It noclusterw 15375b714acSKATO TakenoriDisable write clustering. 1548fae3551SRodney W. Grimes.It nodev 1558fae3551SRodney W. GrimesDo not interpret character or block special devices on the file system. 1568fae3551SRodney W. GrimesThis option is useful for a server that has file systems containing 1578fae3551SRodney W. Grimesspecial devices for architectures other than its own. 1588fae3551SRodney W. Grimes.It noexec 1598fae3551SRodney W. GrimesDo not allow execution of any binaries on the mounted file system. 1608fae3551SRodney W. GrimesThis option is useful for a server that has file systems containing 1618fae3551SRodney W. Grimesbinaries for architectures other than its own. 1628fae3551SRodney W. Grimes.It nosuid 1638fae3551SRodney W. GrimesDo not allow set-user-identifier or set-group-identifier bits to take effect. 164b23472acSWolfram SchneiderNote: this option is worthless if a public available suid or sgid 165b23472acSWolfram Schneiderwrapper like 166951122deSSteve Price.Xr suidperl 1 167b23472acSWolfram Schneideris installed on your system. 1685ddc8dedSWolfram Schneider.It nosymfollow 1695ddc8dedSWolfram SchneiderDo not follow symlinks 1705ddc8dedSWolfram Schneideron the mounted file system. 1718fae3551SRodney W. Grimes.It rdonly 1728fae3551SRodney W. GrimesThe same as 1738fae3551SRodney W. Grimes.Fl r ; 1748fae3551SRodney W. Grimesmount the file system read-only (even the super-user may not write it). 1758fae3551SRodney W. Grimes.It sync 1768fae3551SRodney W. GrimesAll 1778fae3551SRodney W. Grimes.Tn I/O 1788fae3551SRodney W. Grimesto the file system should be done synchronously. 17952bf64c7SJulian Elischer.It suiddir 18052bf64c7SJulian ElischerA directory on the mounted filesystem will respond to the SUID bit 18152bf64c7SJulian Elischerbeing set, by setting the owner of any new files to be the same 18252bf64c7SJulian Elischeras the owner of the directory. 18352bf64c7SJulian ElischerNew directories will inherit the bit from their parents. 18452bf64c7SJulian ElischerExecute bits are removed from 18552bf64c7SJulian Elischerthe file, and it will not be given to root. 18652bf64c7SJulian Elischer.Pp 18752bf64c7SJulian ElischerThis feature is designed for use on fileservers serving PC users via 188ef8f7ac9SSheldon Hearnftp, SAMBA, or netatalk. 189ef8f7ac9SSheldon HearnIt provides security holes for shell users and as 19052bf64c7SJulian Elischersuch should not be used on shell machines, especially on home directories. 19152bf64c7SJulian ElischerThis option requires the SUIDDIR 192ef8f7ac9SSheldon Hearnoption in the kernel to work. 193ef8f7ac9SSheldon HearnOnly UFS filesystems support this option. 19452bf64c7SJulian ElischerSee 19552bf64c7SJulian Elischer.Xr chmod 2 19652bf64c7SJulian Elischerfor more information. 1978fae3551SRodney W. Grimes.It update 1988fae3551SRodney W. GrimesThe same as 1998fae3551SRodney W. Grimes.Fl u ; 2008fae3551SRodney W. Grimesindicate that the status of an already mounted file system should be changed. 2018fae3551SRodney W. Grimes.It union 2028fae3551SRodney W. GrimesCauses the namespace at the mount point to appear as the union 2038fae3551SRodney W. Grimesof the mounted filesystem root and the existing directory. 2048fae3551SRodney W. GrimesLookups will be done in the mounted filesystem first. 2058fae3551SRodney W. GrimesIf those operations fail due to a non-existent file the underlying 2068fae3551SRodney W. Grimesdirectory is then accessed. 2078fae3551SRodney W. GrimesAll creates are done in the mounted filesystem. 2088fae3551SRodney W. Grimes.El 2098fae3551SRodney W. Grimes.Pp 2108fae3551SRodney W. GrimesAny additional options specific to a filesystem type that is not 2118fae3551SRodney W. Grimesone of the internally known types (see the 2128fae3551SRodney W. Grimes.Fl t 2138fae3551SRodney W. Grimesoption) may be passed as a comma separated list; these options are 2148fae3551SRodney W. Grimesdistinguished by a leading 2158fae3551SRodney W. Grimes.Dq \&- 2168fae3551SRodney W. Grimes(dash). 2178fae3551SRodney W. GrimesOptions that take a value are specified using the syntax -option=value. 218951122deSSteve PriceFor example, the 219951122deSSteve Price.Nm 220951122deSSteve Pricecommand: 2218fae3551SRodney W. Grimes.Bd -literal -offset indent 2228fae3551SRodney W. Grimesmount -t mfs -o nosuid,-N,-s=4000 /dev/dk0b /tmp 2238fae3551SRodney W. Grimes.Ed 2248fae3551SRodney W. Grimes.Pp 2258fae3551SRodney W. Grimescauses 226951122deSSteve Price.Nm 2278fae3551SRodney W. Grimesto execute the equivalent of: 2288fae3551SRodney W. Grimes.Bd -literal -offset indent 2298fae3551SRodney W. Grimes/sbin/mount_mfs -o nosuid -N -s 4000 /dev/dk0b /tmp 2308fae3551SRodney W. Grimes.Ed 231e4bc2e34SSheldon Hearn.Pp 232e4bc2e34SSheldon HearnAdditional options specific to filesystem types 233e4bc2e34SSheldon Hearnwhich are not internally known 234e4bc2e34SSheldon Hearn(see the description of the 235e4bc2e34SSheldon Hearn.Fl t 236e4bc2e34SSheldon Hearnoption below) 237e4bc2e34SSheldon Hearnmay be described in the manual pages for the associated 238e4bc2e34SSheldon Hearn.Pa /sbin/mount_ Ns Sy XXX 239e4bc2e34SSheldon Hearnutilities. 240a257a45eSJordan K. Hubbard.It Fl p 241ef8f7ac9SSheldon HearnPrint mount information in fstab format. 242ef8f7ac9SSheldon HearnImplies also the 243a257a45eSJordan K. Hubbard.Fl v 244a257a45eSJordan K. Hubbardoption. 2458fae3551SRodney W. Grimes.It Fl r 2468fae3551SRodney W. GrimesThe file system is to be mounted read-only. 2478fae3551SRodney W. GrimesMount the file system read-only (even the super-user may not write it). 2488fae3551SRodney W. GrimesThe same as the 2498fae3551SRodney W. Grimes.Dq rdonly 2508fae3551SRodney W. Grimesargument to the 2518fae3551SRodney W. Grimes.Fl o 2528fae3551SRodney W. Grimesoption. 2538fae3551SRodney W. Grimes.It Fl t Ar "ufs \\*(Ba lfs \\*(Ba external type" 2548fae3551SRodney W. GrimesThe argument following the 2558fae3551SRodney W. Grimes.Fl t 2568fae3551SRodney W. Grimesis used to indicate the file system type. 2578fae3551SRodney W. GrimesThe type 2588fae3551SRodney W. Grimes.Ar ufs 2598fae3551SRodney W. Grimesis the default. 26093eb5567SGarrett WollmanThe 26193eb5567SGarrett Wollman.Fl t 26293eb5567SGarrett Wollmanoption can be used 2638fae3551SRodney W. Grimesto indicate that the actions should only be taken on 2648fae3551SRodney W. Grimesfilesystems of the specified type. 2658fae3551SRodney W. GrimesMore than one type may be specified in a comma separated list. 2668fae3551SRodney W. GrimesThe list of filesystem types can be prefixed with 2678fae3551SRodney W. Grimes.Dq no 2688fae3551SRodney W. Grimesto specify the filesystem types for which action should 2698fae3551SRodney W. Grimes.Em not 2708fae3551SRodney W. Grimesbe taken. 2718fae3551SRodney W. GrimesFor example, the 272951122deSSteve Price.Nm 2738fae3551SRodney W. Grimescommand: 2748fae3551SRodney W. Grimes.Bd -literal -offset indent 2758fae3551SRodney W. Grimesmount -a -t nonfs,mfs 2768fae3551SRodney W. Grimes.Ed 2778fae3551SRodney W. Grimes.Pp 2788fae3551SRodney W. Grimesmounts all filesystems except those of type 2798fae3551SRodney W. Grimes.Tn NFS 2808fae3551SRodney W. Grimesand 2818fae3551SRodney W. Grimes.Tn MFS . 2828fae3551SRodney W. Grimes.Pp 2838fae3551SRodney W. GrimesIf the type is not one of the internally known types, 284951122deSSteve Price.Nm 285951122deSSteve Pricewill attempt to execute a program in 286e4bc2e34SSheldon Hearn.Pa /sbin/mount_ Ns Sy XXX 2878fae3551SRodney W. Grimeswhere 288e4bc2e34SSheldon Hearn.Sy XXX 2898fae3551SRodney W. Grimesis replaced by the type name. 2908fae3551SRodney W. GrimesFor example, nfs filesystems are mounted by the program 2918fae3551SRodney W. Grimes.Pa /sbin/mount_nfs . 29293eb5567SGarrett Wollman.Pp 29393eb5567SGarrett WollmanMost filesystems will be dynamically loaded by their mount programs 29493eb5567SGarrett Wollmanif not already present in the kernel, using the 29593eb5567SGarrett Wollman.Xr vfsload 3 29693eb5567SGarrett Wollmansubroutine. Because this mechanism requires writable temporary space, 29793eb5567SGarrett Wollmanthe filesystem type containing 29893eb5567SGarrett Wollman.Pa /tmp 29993eb5567SGarrett Wollmanmust be compiled into the kernel, and the filesystems containing 30093eb5567SGarrett Wollman.Pa /tmp 30193eb5567SGarrett Wollmanand 30293eb5567SGarrett Wollman.Pa /usr/bin/ld 30393eb5567SGarrett Wollmanmust be listed in 30493eb5567SGarrett Wollman.Pa /etc/fstab 30593eb5567SGarrett Wollmanbefore any filesystems which might be dynamically loaded. 3068fae3551SRodney W. Grimes.It Fl u 3078fae3551SRodney W. GrimesThe 3088fae3551SRodney W. Grimes.Fl u 3098fae3551SRodney W. Grimesflag indicates that the status of an already mounted file 3108fae3551SRodney W. Grimessystem should be changed. 3118fae3551SRodney W. GrimesAny of the options discussed above (the 3128fae3551SRodney W. Grimes.Fl o 3138fae3551SRodney W. Grimesoption) 3148fae3551SRodney W. Grimesmay be changed; 3158fae3551SRodney W. Grimesalso a file system can be changed from read-only to read-write 3168fae3551SRodney W. Grimesor vice versa. 3178fae3551SRodney W. GrimesAn attempt to change from read-write to read-only will fail if any 3188fae3551SRodney W. Grimesfiles on the filesystem are currently open for writing unless the 3198fae3551SRodney W. Grimes.Fl f 3208fae3551SRodney W. Grimesflag is also specified. 32118af6044SJoseph KoshyThe set of options is determined by applying the options specified 32218af6044SJoseph Koshyin the argument to 3238fae3551SRodney W. Grimes.Fl o 3248fae3551SRodney W. Grimesand finally applying the 3258fae3551SRodney W. Grimes.Fl r 3268fae3551SRodney W. Grimesor 3278fae3551SRodney W. Grimes.Fl w 3288fae3551SRodney W. Grimesoption. 3298fae3551SRodney W. Grimes.It Fl v 3308fae3551SRodney W. GrimesVerbose mode. 3318fae3551SRodney W. Grimes.It Fl w 3328fae3551SRodney W. GrimesThe file system object is to be read and write. 3336caa839dSJoerg Wunsch.Sh DIAGNOSTICS 3346caa839dSJoerg WunschVarious, most of them are self-explanatory. 3356caa839dSJoerg Wunsch.Pp 3366caa839dSJoerg Wunsch.Dl XXXXX filesystem is not available 3376caa839dSJoerg Wunsch.Pp 3386caa839dSJoerg WunschThe kernel doesn't support the respective filesystem type. Note that 3396caa839dSJoerg Wunschsupport for a particular filesystem might be provided either on a static 3406caa839dSJoerg Wunsch(kernel compile-time), or dynamic basis (loaded as a kernel module by 341a7efcd4bSGuy Helmer.Xr kldload 8 ). 3426caa839dSJoerg WunschNormally, 3436caa839dSJoerg Wunsch.Nm 3446caa839dSJoerg Wunschor its subprocesses attempt to dynamically load a filesystem module if 3456caa839dSJoerg Wunschit hasn't been configured statically, using 3466caa839dSJoerg Wunsch.Xr vfsload 3 . 3476caa839dSJoerg WunschIn this case, the above error message can also mean that you didn't 3486caa839dSJoerg Wunschhave permission to load the module. 3498fae3551SRodney W. Grimes.Sh FILES 3508fae3551SRodney W. Grimes.Bl -tag -width /etc/fstab -compact 3518fae3551SRodney W. Grimes.It Pa /etc/fstab 3528fae3551SRodney W. Grimesfile system table 3538fae3551SRodney W. Grimes.El 3548fae3551SRodney W. Grimes.Sh SEE ALSO 3558fae3551SRodney W. Grimes.Xr mount 2 , 35693eb5567SGarrett Wollman.Xr vfsload 3 , 3578fae3551SRodney W. Grimes.Xr fstab 5 , 358a7efcd4bSGuy Helmer.Xr kldload 8 , 3598fae3551SRodney W. Grimes.Xr mount_cd9660 8 , 3608546f807SSteve Price.Xr mount_devfs 8 , 3611ce9f317SNik Clayton.Xr mount_ext2fs 8 , 3628fae3551SRodney W. Grimes.Xr mount_fdesc 8 , 3631ce9f317SNik Clayton.Xr mount_hpfs 8 , 3648fae3551SRodney W. Grimes.Xr mount_kernfs 8 , 3651ce9f317SNik Clayton.Xr mount_linprocfs 8 , 3668fae3551SRodney W. Grimes.Xr mount_mfs 8 , 367677ab445SAndrey A. Chernov.Xr mount_msdos 8 , 3688fae3551SRodney W. Grimes.Xr mount_nfs 8 , 3698fae3551SRodney W. Grimes.Xr mount_null 8 , 3701ce9f317SNik Clayton.Xr mount_nwfs 8 , 3718fae3551SRodney W. Grimes.Xr mount_portal 8 , 3728fae3551SRodney W. Grimes.Xr mount_procfs 8 , 3731ce9f317SNik Clayton.Xr mount_std 8 , 3748fae3551SRodney W. Grimes.Xr mount_umap 8 , 3758fae3551SRodney W. Grimes.Xr mount_union 8 , 3768fae3551SRodney W. Grimes.Xr umount 8 3778fae3551SRodney W. Grimes.Sh BUGS 3788fae3551SRodney W. GrimesIt is possible for a corrupted file system to cause a crash. 379ce602323SJoseph Koshy.Sh CAVEATS 380ce602323SJoseph KoshyAfter a successful mount, the permissions on the original mount point 381ce602323SJoseph Koshydetermine if 382ce602323SJoseph Koshy.Pa ".." 383ce602323SJoseph Koshyis accessible from the mounted file system. The minimum permissions for 384ce602323SJoseph Koshythe mount point for traversal across the mount point in both 385ce602323SJoseph Koshydirections to be possible for all users is 0111 (execute for all). 3868fae3551SRodney W. Grimes.Sh HISTORY 3878fae3551SRodney W. GrimesA 388951122deSSteve Price.Nm 3898fae3551SRodney W. Grimescommand appeared in 390b8923d4cSWolfram Schneider.At v1 . 391