xref: /freebsd/sbin/mount/mount.8 (revision 1ce9f3171cdc2e6016e832d756b02d9d71e3c48f)
18fae3551SRodney W. Grimes.\" Copyright (c) 1980, 1989, 1991, 1993
28fae3551SRodney W. Grimes.\"	The Regents of the University of California.  All rights reserved.
38fae3551SRodney W. Grimes.\"
48fae3551SRodney W. Grimes.\" Redistribution and use in source and binary forms, with or without
58fae3551SRodney W. Grimes.\" modification, are permitted provided that the following conditions
68fae3551SRodney W. Grimes.\" are met:
78fae3551SRodney W. Grimes.\" 1. Redistributions of source code must retain the above copyright
88fae3551SRodney W. Grimes.\"    notice, this list of conditions and the following disclaimer.
98fae3551SRodney W. Grimes.\" 2. Redistributions in binary form must reproduce the above copyright
108fae3551SRodney W. Grimes.\"    notice, this list of conditions and the following disclaimer in the
118fae3551SRodney W. Grimes.\"    documentation and/or other materials provided with the distribution.
128fae3551SRodney W. Grimes.\" 3. All advertising materials mentioning features or use of this software
138fae3551SRodney W. Grimes.\"    must display the following acknowledgement:
148fae3551SRodney W. Grimes.\"	This product includes software developed by the University of
158fae3551SRodney W. Grimes.\"	California, Berkeley and its contributors.
168fae3551SRodney W. Grimes.\" 4. Neither the name of the University nor the names of its contributors
178fae3551SRodney W. Grimes.\"    may be used to endorse or promote products derived from this software
188fae3551SRodney W. Grimes.\"    without specific prior written permission.
198fae3551SRodney W. Grimes.\"
208fae3551SRodney W. Grimes.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
218fae3551SRodney W. Grimes.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
228fae3551SRodney W. Grimes.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
238fae3551SRodney W. Grimes.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
248fae3551SRodney W. Grimes.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
258fae3551SRodney W. Grimes.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
268fae3551SRodney W. Grimes.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
278fae3551SRodney W. Grimes.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
288fae3551SRodney W. Grimes.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
298fae3551SRodney W. Grimes.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
308fae3551SRodney W. Grimes.\" SUCH DAMAGE.
318fae3551SRodney W. Grimes.\"
32c06fe0a0SPeter Wemm.\"     @(#)mount.8	8.8 (Berkeley) 6/16/94
337f3dea24SPeter Wemm.\" $FreeBSD$
348fae3551SRodney W. Grimes.\"
35c06fe0a0SPeter Wemm.Dd June 16, 1994
368fae3551SRodney W. Grimes.Dt MOUNT 8
378fae3551SRodney W. Grimes.Os BSD 4
388fae3551SRodney W. Grimes.Sh NAME
398fae3551SRodney W. Grimes.Nm mount
408fae3551SRodney W. Grimes.Nd mount file systems
418fae3551SRodney W. Grimes.Sh SYNOPSIS
428fae3551SRodney W. Grimes.Nm mount
43a257a45eSJordan K. Hubbard.Op Fl adfpruvw
448fae3551SRodney W. Grimes.Op Fl t Ar ufs | lfs | external_type
458fae3551SRodney W. Grimes.Nm mount
46a257a45eSJordan K. Hubbard.Op Fl dfpruvw
478fae3551SRodney W. Grimes.Ar special | node
488fae3551SRodney W. Grimes.Nm mount
49a257a45eSJordan K. Hubbard.Op Fl dfpruvw
508fae3551SRodney W. Grimes.Op Fl o Ar options
518fae3551SRodney W. Grimes.Op Fl t Ar ufs | lfs | external_type
528fae3551SRodney W. Grimes.Ar special node
538fae3551SRodney W. Grimes.Sh DESCRIPTION
548fae3551SRodney W. GrimesThe
55951122deSSteve Price.Nm
568fae3551SRodney W. Grimescommand
578fae3551SRodney W. Grimescalls the
588fae3551SRodney W. Grimes.Xr mount 2
598fae3551SRodney W. Grimessystem call to prepare and graft a
608fae3551SRodney W. Grimes.Ar "special device"
618fae3551SRodney W. Grimesor the remote node (rhost:path) on to the file system tree at the point
628fae3551SRodney W. Grimes.Ar node .
638fae3551SRodney W. GrimesIf either
648fae3551SRodney W. Grimes.Ar special
658fae3551SRodney W. Grimesor
668fae3551SRodney W. Grimes.Ar node
678fae3551SRodney W. Grimesare not provided, the appropriate information is taken from the
688fae3551SRodney W. Grimes.Xr fstab 5
698fae3551SRodney W. Grimesfile.
708fae3551SRodney W. Grimes.Pp
718fae3551SRodney W. GrimesThe system maintains a list of currently mounted file systems.
728fae3551SRodney W. GrimesIf no arguments are given to
738fae3551SRodney W. Grimes.Nm mount ,
748fae3551SRodney W. Grimesthis list is printed.
758fae3551SRodney W. Grimes.Pp
768fae3551SRodney W. GrimesThe options are as follows:
778fae3551SRodney W. Grimes.Bl -tag -width indent
78c4e95187SDavid Greenman.It Fl a
79c06fe0a0SPeter WemmAll the filesystems described in
80c06fe0a0SPeter Wemm.Xr fstab 5
81c06fe0a0SPeter Wemmare mounted.
82fba1c154SSteve PriceExceptions are those marked as ``noauto'', excluded by the
83c06fe0a0SPeter Wemm.Fl t
84fba1c154SSteve Priceflag (see below), or if they are already mounted (except the
85fba1c154SSteve Priceroot filesystem which is always remounted to preserve
86fba1c154SSteve Pricetraditional single user mode behavior).
878fae3551SRodney W. Grimes.It Fl d
888fae3551SRodney W. GrimesCauses everything to be done except for the actual system call.
898fae3551SRodney W. GrimesThis option is useful in conjunction with the
908fae3551SRodney W. Grimes.Fl v
918fae3551SRodney W. Grimesflag to
928fae3551SRodney W. Grimesdetermine what the
93951122deSSteve Price.Nm
948fae3551SRodney W. Grimescommand is trying to do.
958fae3551SRodney W. Grimes.It Fl f
968fae3551SRodney W. GrimesForces the revocation of write access when trying to downgrade
97ef8f7ac9SSheldon Hearna filesystem mount status from read-write to read-only.
98ef8f7ac9SSheldon HearnAlso
991469eec8SDavid Greenmanforces the R/W mount of an unclean filesystem (dangerous; use with
1001469eec8SDavid Greenmancaution).
1018fae3551SRodney W. Grimes.It Fl o
1028fae3551SRodney W. GrimesOptions are specified with a
1038fae3551SRodney W. Grimes.Fl o
1048fae3551SRodney W. Grimesflag followed by a comma separated string of options.
10518af6044SJoseph KoshyIn case of conflicting options being specified, the rightmost option
10618af6044SJoseph Koshytakes effect.
1078fae3551SRodney W. GrimesThe following options are available:
1088fae3551SRodney W. Grimes.Bl -tag -width indent
1098fae3551SRodney W. Grimes.It async
1108fae3551SRodney W. GrimesAll
1118fae3551SRodney W. Grimes.Tn I/O
1128fae3551SRodney W. Grimesto the file system should be done asynchronously.
1138fae3551SRodney W. GrimesThis is a
1148fae3551SRodney W. Grimes.Em dangerous
1158fae3551SRodney W. Grimesflag to set,
1168fae3551SRodney W. Grimesand should not be used unless you are prepared to recreate the file
1178fae3551SRodney W. Grimessystem should your system crash.
11818af6044SJoseph Koshy.It current
11918af6044SJoseph KoshyWhen used with the
12018af6044SJoseph Koshy.Fl u
12118af6044SJoseph Koshyflag, this is the same as specifying the options currently in effect for
12218af6044SJoseph Koshythe mounted filesystem.
1238fae3551SRodney W. Grimes.It force
1248fae3551SRodney W. GrimesThe same as
1258fae3551SRodney W. Grimes.Fl f ;
1268fae3551SRodney W. Grimesforces the revocation of write access when trying to downgrade
127ef8f7ac9SSheldon Hearna filesystem mount status from read-write to read-only.
128ef8f7ac9SSheldon HearnAlso
1291469eec8SDavid Greenmanforces the R/W mount of an unclean filesystem (dangerous; use with caution).
13018af6044SJoseph Koshy.It fstab
13118af6044SJoseph KoshyWhen used with the
13218af6044SJoseph Koshy.Fl u
13318af6044SJoseph Koshyflag, this is the same as specifying all the options listed in the
13418af6044SJoseph Koshy.Xr fstab 5
13518af6044SJoseph Koshyfile for the filesystem.
136534e0080SDavid E. O'Brien.It noasync
137534e0080SDavid E. O'BrienMetadata I/O should be done synchronously, while data I/O should be done
138534e0080SDavid E. O'Brienasynchronously.  This is the default.
139fa947154SDavid Greenman.It noatime
140ef8f7ac9SSheldon HearnDo not update the file access time when reading from a file.
141ef8f7ac9SSheldon HearnThis option
142fa947154SDavid Greenmanis useful on filesystems where there are large numbers of files and
143fa947154SDavid Greenmanperformance is more critical than updating the file access time (which is
144fa947154SDavid Greenmanrarely ever important). This option is currently only supported on local
145fa947154SDavid Greenmanfilesystems.
146c06fe0a0SPeter Wemm.It noauto
147c06fe0a0SPeter WemmThis filesystem should be skipped when mount is run with the
148c06fe0a0SPeter Wemm.Fl a
149c06fe0a0SPeter Wemmflag.
15075b714acSKATO Takenori.It noclusterr
15175b714acSKATO TakenoriDisable read clustering.
15275b714acSKATO Takenori.It noclusterw
15375b714acSKATO TakenoriDisable write clustering.
1548fae3551SRodney W. Grimes.It nodev
1558fae3551SRodney W. GrimesDo not interpret character or block special devices on the file system.
1568fae3551SRodney W. GrimesThis option is useful for a server that has file systems containing
1578fae3551SRodney W. Grimesspecial devices for architectures other than its own.
1588fae3551SRodney W. Grimes.It noexec
1598fae3551SRodney W. GrimesDo not allow execution of any binaries on the mounted file system.
1608fae3551SRodney W. GrimesThis option is useful for a server that has file systems containing
1618fae3551SRodney W. Grimesbinaries for architectures other than its own.
1628fae3551SRodney W. Grimes.It nosuid
1638fae3551SRodney W. GrimesDo not allow set-user-identifier or set-group-identifier bits to take effect.
164b23472acSWolfram SchneiderNote: this option is worthless if a public available suid or sgid
165b23472acSWolfram Schneiderwrapper like
166951122deSSteve Price.Xr suidperl 1
167b23472acSWolfram Schneideris installed on your system.
1685ddc8dedSWolfram Schneider.It nosymfollow
1695ddc8dedSWolfram SchneiderDo not follow symlinks
1705ddc8dedSWolfram Schneideron the mounted file system.
1718fae3551SRodney W. Grimes.It rdonly
1728fae3551SRodney W. GrimesThe same as
1738fae3551SRodney W. Grimes.Fl r ;
1748fae3551SRodney W. Grimesmount the file system read-only (even the super-user may not write it).
1758fae3551SRodney W. Grimes.It sync
1768fae3551SRodney W. GrimesAll
1778fae3551SRodney W. Grimes.Tn I/O
1788fae3551SRodney W. Grimesto the file system should be done synchronously.
17952bf64c7SJulian Elischer.It suiddir
18052bf64c7SJulian ElischerA directory on the mounted filesystem will respond to the SUID bit
18152bf64c7SJulian Elischerbeing set, by setting the owner of any new files to be the same
18252bf64c7SJulian Elischeras the owner of the directory.
18352bf64c7SJulian ElischerNew directories will inherit the bit from their parents.
18452bf64c7SJulian ElischerExecute bits are removed from
18552bf64c7SJulian Elischerthe file, and it will not be given to root.
18652bf64c7SJulian Elischer.Pp
18752bf64c7SJulian ElischerThis feature is designed for use on fileservers serving PC users via
188ef8f7ac9SSheldon Hearnftp, SAMBA, or netatalk.
189ef8f7ac9SSheldon HearnIt provides security holes for shell users and as
19052bf64c7SJulian Elischersuch should not be used on shell machines, especially on home directories.
19152bf64c7SJulian ElischerThis option requires the SUIDDIR
192ef8f7ac9SSheldon Hearnoption in the kernel to work.
193ef8f7ac9SSheldon HearnOnly UFS filesystems support this option.
19452bf64c7SJulian ElischerSee
19552bf64c7SJulian Elischer.Xr chmod 2
19652bf64c7SJulian Elischerfor more information.
1978fae3551SRodney W. Grimes.It update
1988fae3551SRodney W. GrimesThe same as
1998fae3551SRodney W. Grimes.Fl u ;
2008fae3551SRodney W. Grimesindicate that the status of an already mounted file system should be changed.
2018fae3551SRodney W. Grimes.It union
2028fae3551SRodney W. GrimesCauses the namespace at the mount point to appear as the union
2038fae3551SRodney W. Grimesof the mounted filesystem root and the existing directory.
2048fae3551SRodney W. GrimesLookups will be done in the mounted filesystem first.
2058fae3551SRodney W. GrimesIf those operations fail due to a non-existent file the underlying
2068fae3551SRodney W. Grimesdirectory is then accessed.
2078fae3551SRodney W. GrimesAll creates are done in the mounted filesystem.
2088fae3551SRodney W. Grimes.El
2098fae3551SRodney W. Grimes.Pp
2108fae3551SRodney W. GrimesAny additional options specific to a filesystem type that is not
2118fae3551SRodney W. Grimesone of the internally known types (see the
2128fae3551SRodney W. Grimes.Fl t
2138fae3551SRodney W. Grimesoption) may be passed as a comma separated list; these options are
2148fae3551SRodney W. Grimesdistinguished by a leading
2158fae3551SRodney W. Grimes.Dq \&-
2168fae3551SRodney W. Grimes(dash).
2178fae3551SRodney W. GrimesOptions that take a value are specified using the syntax -option=value.
218951122deSSteve PriceFor example, the
219951122deSSteve Price.Nm
220951122deSSteve Pricecommand:
2218fae3551SRodney W. Grimes.Bd -literal -offset indent
2228fae3551SRodney W. Grimesmount -t mfs -o nosuid,-N,-s=4000 /dev/dk0b /tmp
2238fae3551SRodney W. Grimes.Ed
2248fae3551SRodney W. Grimes.Pp
2258fae3551SRodney W. Grimescauses
226951122deSSteve Price.Nm
2278fae3551SRodney W. Grimesto execute the equivalent of:
2288fae3551SRodney W. Grimes.Bd -literal -offset indent
2298fae3551SRodney W. Grimes/sbin/mount_mfs -o nosuid -N -s 4000 /dev/dk0b /tmp
2308fae3551SRodney W. Grimes.Ed
231e4bc2e34SSheldon Hearn.Pp
232e4bc2e34SSheldon HearnAdditional options specific to filesystem types
233e4bc2e34SSheldon Hearnwhich are not internally known
234e4bc2e34SSheldon Hearn(see the description of the
235e4bc2e34SSheldon Hearn.Fl t
236e4bc2e34SSheldon Hearnoption below)
237e4bc2e34SSheldon Hearnmay be described in the manual pages for the associated
238e4bc2e34SSheldon Hearn.Pa /sbin/mount_ Ns Sy XXX
239e4bc2e34SSheldon Hearnutilities.
240a257a45eSJordan K. Hubbard.It Fl p
241ef8f7ac9SSheldon HearnPrint mount information in fstab format.
242ef8f7ac9SSheldon HearnImplies also the
243a257a45eSJordan K. Hubbard.Fl v
244a257a45eSJordan K. Hubbardoption.
2458fae3551SRodney W. Grimes.It Fl r
2468fae3551SRodney W. GrimesThe file system is to be mounted read-only.
2478fae3551SRodney W. GrimesMount the file system read-only (even the super-user may not write it).
2488fae3551SRodney W. GrimesThe same as the
2498fae3551SRodney W. Grimes.Dq rdonly
2508fae3551SRodney W. Grimesargument to the
2518fae3551SRodney W. Grimes.Fl o
2528fae3551SRodney W. Grimesoption.
2538fae3551SRodney W. Grimes.It Fl t Ar "ufs \\*(Ba lfs \\*(Ba external type"
2548fae3551SRodney W. GrimesThe argument following the
2558fae3551SRodney W. Grimes.Fl t
2568fae3551SRodney W. Grimesis used to indicate the file system type.
2578fae3551SRodney W. GrimesThe type
2588fae3551SRodney W. Grimes.Ar ufs
2598fae3551SRodney W. Grimesis the default.
26093eb5567SGarrett WollmanThe
26193eb5567SGarrett Wollman.Fl t
26293eb5567SGarrett Wollmanoption can be used
2638fae3551SRodney W. Grimesto indicate that the actions should only be taken on
2648fae3551SRodney W. Grimesfilesystems of the specified type.
2658fae3551SRodney W. GrimesMore than one type may be specified in a comma separated list.
2668fae3551SRodney W. GrimesThe list of filesystem types can be prefixed with
2678fae3551SRodney W. Grimes.Dq no
2688fae3551SRodney W. Grimesto specify the filesystem types for which action should
2698fae3551SRodney W. Grimes.Em not
2708fae3551SRodney W. Grimesbe taken.
2718fae3551SRodney W. GrimesFor example, the
272951122deSSteve Price.Nm
2738fae3551SRodney W. Grimescommand:
2748fae3551SRodney W. Grimes.Bd -literal -offset indent
2758fae3551SRodney W. Grimesmount -a -t nonfs,mfs
2768fae3551SRodney W. Grimes.Ed
2778fae3551SRodney W. Grimes.Pp
2788fae3551SRodney W. Grimesmounts all filesystems except those of type
2798fae3551SRodney W. Grimes.Tn NFS
2808fae3551SRodney W. Grimesand
2818fae3551SRodney W. Grimes.Tn MFS .
2828fae3551SRodney W. Grimes.Pp
2838fae3551SRodney W. GrimesIf the type is not one of the internally known types,
284951122deSSteve Price.Nm
285951122deSSteve Pricewill attempt to execute a program in
286e4bc2e34SSheldon Hearn.Pa /sbin/mount_ Ns Sy XXX
2878fae3551SRodney W. Grimeswhere
288e4bc2e34SSheldon Hearn.Sy XXX
2898fae3551SRodney W. Grimesis replaced by the type name.
2908fae3551SRodney W. GrimesFor example, nfs filesystems are mounted by the program
2918fae3551SRodney W. Grimes.Pa /sbin/mount_nfs .
29293eb5567SGarrett Wollman.Pp
29393eb5567SGarrett WollmanMost filesystems will be dynamically loaded by their mount programs
29493eb5567SGarrett Wollmanif not already present in the kernel, using the
29593eb5567SGarrett Wollman.Xr vfsload 3
29693eb5567SGarrett Wollmansubroutine.  Because this mechanism requires writable temporary space,
29793eb5567SGarrett Wollmanthe filesystem type containing
29893eb5567SGarrett Wollman.Pa /tmp
29993eb5567SGarrett Wollmanmust be compiled into the kernel, and the filesystems containing
30093eb5567SGarrett Wollman.Pa /tmp
30193eb5567SGarrett Wollmanand
30293eb5567SGarrett Wollman.Pa /usr/bin/ld
30393eb5567SGarrett Wollmanmust be listed in
30493eb5567SGarrett Wollman.Pa /etc/fstab
30593eb5567SGarrett Wollmanbefore any filesystems which might be dynamically loaded.
3068fae3551SRodney W. Grimes.It Fl u
3078fae3551SRodney W. GrimesThe
3088fae3551SRodney W. Grimes.Fl u
3098fae3551SRodney W. Grimesflag indicates that the status of an already mounted file
3108fae3551SRodney W. Grimessystem should be changed.
3118fae3551SRodney W. GrimesAny of the options discussed above (the
3128fae3551SRodney W. Grimes.Fl o
3138fae3551SRodney W. Grimesoption)
3148fae3551SRodney W. Grimesmay be changed;
3158fae3551SRodney W. Grimesalso a file system can be changed from read-only to read-write
3168fae3551SRodney W. Grimesor vice versa.
3178fae3551SRodney W. GrimesAn attempt to change from read-write to read-only will fail if any
3188fae3551SRodney W. Grimesfiles on the filesystem are currently open for writing unless the
3198fae3551SRodney W. Grimes.Fl f
3208fae3551SRodney W. Grimesflag is also specified.
32118af6044SJoseph KoshyThe set of options is determined by applying the options specified
32218af6044SJoseph Koshyin the argument to
3238fae3551SRodney W. Grimes.Fl o
3248fae3551SRodney W. Grimesand finally applying the
3258fae3551SRodney W. Grimes.Fl r
3268fae3551SRodney W. Grimesor
3278fae3551SRodney W. Grimes.Fl w
3288fae3551SRodney W. Grimesoption.
3298fae3551SRodney W. Grimes.It Fl v
3308fae3551SRodney W. GrimesVerbose mode.
3318fae3551SRodney W. Grimes.It Fl w
3328fae3551SRodney W. GrimesThe file system object is to be read and write.
3336caa839dSJoerg Wunsch.Sh DIAGNOSTICS
3346caa839dSJoerg WunschVarious, most of them are self-explanatory.
3356caa839dSJoerg Wunsch.Pp
3366caa839dSJoerg Wunsch.Dl XXXXX filesystem is not available
3376caa839dSJoerg Wunsch.Pp
3386caa839dSJoerg WunschThe kernel doesn't support the respective filesystem type.  Note that
3396caa839dSJoerg Wunschsupport for a particular filesystem might be provided either on a static
3406caa839dSJoerg Wunsch(kernel compile-time), or dynamic basis (loaded as a kernel module by
341a7efcd4bSGuy Helmer.Xr kldload 8 ).
3426caa839dSJoerg WunschNormally,
3436caa839dSJoerg Wunsch.Nm
3446caa839dSJoerg Wunschor its subprocesses attempt to dynamically load a filesystem module if
3456caa839dSJoerg Wunschit hasn't been configured statically, using
3466caa839dSJoerg Wunsch.Xr vfsload 3 .
3476caa839dSJoerg WunschIn this case, the above error message can also mean that you didn't
3486caa839dSJoerg Wunschhave permission to load the module.
3498fae3551SRodney W. Grimes.Sh FILES
3508fae3551SRodney W. Grimes.Bl -tag -width /etc/fstab -compact
3518fae3551SRodney W. Grimes.It Pa /etc/fstab
3528fae3551SRodney W. Grimesfile system table
3538fae3551SRodney W. Grimes.El
3548fae3551SRodney W. Grimes.Sh SEE ALSO
3558fae3551SRodney W. Grimes.Xr mount 2 ,
35693eb5567SGarrett Wollman.Xr vfsload 3 ,
3578fae3551SRodney W. Grimes.Xr fstab 5 ,
358a7efcd4bSGuy Helmer.Xr kldload 8 ,
3598fae3551SRodney W. Grimes.Xr mount_cd9660 8 ,
3608546f807SSteve Price.Xr mount_devfs 8 ,
3611ce9f317SNik Clayton.Xr mount_ext2fs 8 ,
3628fae3551SRodney W. Grimes.Xr mount_fdesc 8 ,
3631ce9f317SNik Clayton.Xr mount_hpfs 8 ,
3648fae3551SRodney W. Grimes.Xr mount_kernfs 8 ,
3651ce9f317SNik Clayton.Xr mount_linprocfs 8 ,
3668fae3551SRodney W. Grimes.Xr mount_mfs 8 ,
367677ab445SAndrey A. Chernov.Xr mount_msdos 8 ,
3688fae3551SRodney W. Grimes.Xr mount_nfs 8 ,
3698fae3551SRodney W. Grimes.Xr mount_null 8 ,
3701ce9f317SNik Clayton.Xr mount_nwfs 8 ,
3718fae3551SRodney W. Grimes.Xr mount_portal 8 ,
3728fae3551SRodney W. Grimes.Xr mount_procfs 8 ,
3731ce9f317SNik Clayton.Xr mount_std 8 ,
3748fae3551SRodney W. Grimes.Xr mount_umap 8 ,
3758fae3551SRodney W. Grimes.Xr mount_union 8 ,
3768fae3551SRodney W. Grimes.Xr umount 8
3778fae3551SRodney W. Grimes.Sh BUGS
3788fae3551SRodney W. GrimesIt is possible for a corrupted file system to cause a crash.
379ce602323SJoseph Koshy.Sh CAVEATS
380ce602323SJoseph KoshyAfter a successful mount, the permissions on the original mount point
381ce602323SJoseph Koshydetermine if
382ce602323SJoseph Koshy.Pa ".."
383ce602323SJoseph Koshyis accessible from the mounted file system.  The minimum permissions for
384ce602323SJoseph Koshythe mount point for traversal across the mount point in both
385ce602323SJoseph Koshydirections to be possible for all users is 0111 (execute for all).
3868fae3551SRodney W. Grimes.Sh HISTORY
3878fae3551SRodney W. GrimesA
388951122deSSteve Price.Nm
3898fae3551SRodney W. Grimescommand appeared in
390b8923d4cSWolfram Schneider.At v1 .
391