1.\" Copyright (c) 1980, 1989, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. 9.\" 2. Redistributions in binary form must reproduce the above copyright 10.\" notice, this list of conditions and the following disclaimer in the 11.\" documentation and/or other materials provided with the distribution. 12.\" 4. Neither the name of the University nor the names of its contributors 13.\" may be used to endorse or promote products derived from this software 14.\" without specific prior written permission. 15.\" 16.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 17.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 18.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 19.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 20.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26.\" SUCH DAMAGE. 27.\" 28.\" @(#)mount.8 8.8 (Berkeley) 6/16/94 29.\" $FreeBSD$ 30.\" 31.Dd November 26, 2004 32.Dt MOUNT 8 33.Os 34.Sh NAME 35.Nm mount 36.Nd mount file systems 37.Sh SYNOPSIS 38.Nm 39.Op Fl adfpruvw 40.Op Fl F Ar fstab 41.Op Fl o Ar options 42.Op Fl t Ar ufs | external_type 43.Nm 44.Op Fl dfpruvw 45.Ar special | node 46.Nm 47.Op Fl dfpruvw 48.Op Fl o Ar options 49.Op Fl t Ar ufs | external_type 50.Ar special node 51.Sh DESCRIPTION 52The 53.Nm 54utility calls the 55.Xr mount 2 56system call to prepare and graft a 57.Ar "special device" 58or the remote node (rhost:path) on to the file system tree at the point 59.Ar node . 60If either 61.Ar special 62or 63.Ar node 64are not provided, the appropriate information is taken from the 65.Xr fstab 5 66file. 67.Pp 68The system maintains a list of currently mounted file systems. 69If no arguments are given to 70.Nm , 71this list is printed. 72.Pp 73The options are as follows: 74.Bl -tag -width indent 75.It Fl a 76All the file systems described in 77.Xr fstab 5 78are mounted. 79Exceptions are those marked as 80.Dq noauto , 81excluded by the 82.Fl t 83flag (see below), or if they are already mounted (except the 84root file system which is always remounted to preserve 85traditional single user mode behavior). 86.It Fl d 87Causes everything to be done except for the actual system call. 88This option is useful in conjunction with the 89.Fl v 90flag to 91determine what the 92.Nm 93command is trying to do. 94.It Fl F Ar fstab 95Specify the 96.Pa fstab 97file to use. 98.It Fl f 99Forces the revocation of write access when trying to downgrade 100a file system mount status from read-write to read-only. 101Also 102forces the R/W mount of an unclean file system (dangerous; use with 103caution). 104.It Fl o 105Options are specified with a 106.Fl o 107flag followed by a comma separated string of options. 108In case of conflicting options being specified, the rightmost option 109takes effect. 110The following options are available: 111.Bl -tag -width indent 112.It Cm acls 113Enable Access Control Lists, or ACLS, which can be customized via the 114.Xr setfacl 1 115and 116.Xr getfacl 1 117commands. 118.It Cm async 119All 120.Tn I/O 121to the file system should be done asynchronously. 122This is a 123.Em dangerous 124flag to set, 125and should not be used unless you are prepared to recreate the file 126system should your system crash. 127.It Cm current 128When used with the 129.Fl u 130flag, this is the same as specifying the options currently in effect for 131the mounted file system. 132.It Cm force 133The same as 134.Fl f ; 135forces the revocation of write access when trying to downgrade 136a file system mount status from read-write to read-only. 137Also 138forces the R/W mount of an unclean file system (dangerous; use with caution). 139.It Cm fstab 140When used with the 141.Fl u 142flag, this is the same as specifying all the options listed in the 143.Xr fstab 5 144file for the file system. 145.It Cm multilabel 146Enable multi-label Mandatory Access Control, or MAC, on the specified file 147system. 148If the file system supports multilabel operation, individual labels will 149be maintained for each object in the file system, rather than using a 150single label for all objects. 151An alternative to the 152.Fl l 153flag in 154.Xr tunefs 8 . 155See 156.Xr mac 4 157for more information, which cause the multilabel mount flag to be set 158automatically at mount-time. 159.It Cm noasync 160Metadata I/O should be done synchronously, while data I/O should be done 161asynchronously. 162This is the default. 163.It Cm noatime 164Do not update the file access time when reading from a file. 165This option 166is useful on file systems where there are large numbers of files and 167performance is more critical than updating the file access time (which is 168rarely ever important). 169This option is currently only supported on local file systems. 170.It Cm noauto 171This file system should be skipped when 172.Nm 173is run with the 174.Fl a 175flag. 176.It Cm noclusterr 177Disable read clustering. 178.It Cm noclusterw 179Disable write clustering. 180.It Cm noexec 181Do not allow execution of any binaries on the mounted file system. 182This option is useful for a server that has file systems containing 183binaries for architectures other than its own. 184.It Cm nosuid 185Do not allow set-user-identifier or set-group-identifier bits to take effect. 186Note: this option is worthless if a public available suid or sgid 187wrapper like 188.Xr suidperl 1 189is installed on your system. 190It is set automatically when the user does not have super-user privileges. 191.It Cm nosymfollow 192Do not follow symlinks 193on the mounted file system. 194.It Cm ro 195The same as 196.Fl r ; 197mount the file system read-only (even the super-user may not write it). 198.It Cm sync 199All 200.Tn I/O 201to the file system should be done synchronously. 202.It Cm snapshot 203This option allows a snapshot of the specified file system to be taken. 204The 205.Fl u 206flag is required with this option. 207Note that snapshot files must be created in the file system that is being 208snapshotted. 209You may create up to 20 snapshots per file system. 210Active snapshots are recorded in the superblock, so they persist across unmount 211and remount operations and across system reboots. 212When you are done with a snapshot, it can be removed with the 213.Xr rm 1 214command. 215Snapshots may be removed in any order, however you may not get back all the 216space contained in the snapshot as another snapshot may claim some of the blocks 217that it is releasing. 218Note that the schg flag is set on snapshots to ensure that not even the root 219user can write to them. 220The unlink command makes an exception for snapshot files in that it allows them 221to be removed even though they have the schg flag set, so it is not necessary to 222clear the schg flag before removing a snapshot file. 223.Pp 224Once you have taken a snapshot, there are three interesting things that you can 225do with it: 226.Pp 227.Bl -enum -compact 228.It 229Run 230.Xr fsck 8 231on the snapshot file. 232Assuming that the file system was clean when it was mounted, you should always 233get a clean (and unchanging) result from running fsck on the snapshot. 234This is essentially what the background fsck process does. 235.Pp 236.It 237Run 238.Xr dump 8 239on the snapshot. 240You will get a dump that is consistent with the file system as of the timestamp 241of the snapshot. 242.Pp 243.It 244Mount the snapshot as a frozen image of the file system. 245To mount the snapshot 246.Pa /var/snapshot/snap1 : 247.Bd -literal 248mdconfig -a -t vnode -f /var/snapshot/snap1 -u 4 249mount -r /dev/md4 /mnt 250.Ed 251.Pp 252You can now cruise around your frozen 253.Pa /var 254file system at 255.Pa /mnt . 256Everything will be in the same state that it was at the time the snapshot was 257taken. 258The one exception is that any earlier snapshots will appear as zero length 259files. 260When you are done with the mounted snapshot: 261.Bd -literal 262umount /mnt 263mdconfig -d -u 4 264.Ed 265.Pp 266Further details can be found in the file at 267.Pa /usr/src/sys/ufs/ffs/README.snapshot . 268.El 269.It Cm suiddir 270A directory on the mounted file system will respond to the SUID bit 271being set, by setting the owner of any new files to be the same 272as the owner of the directory. 273New directories will inherit the bit from their parents. 274Execute bits are removed from 275the file, and it will not be given to root. 276.Pp 277This feature is designed for use on fileservers serving PC users via 278ftp, SAMBA, or netatalk. 279It provides security holes for shell users and as 280such should not be used on shell machines, especially on home directories. 281This option requires the SUIDDIR 282option in the kernel to work. 283Only UFS file systems support this option. 284See 285.Xr chmod 2 286for more information. 287.It Cm update 288The same as 289.Fl u ; 290indicate that the status of an already mounted file system should be changed. 291.It Cm union 292Causes the namespace at the mount point to appear as the union 293of the mounted file system root and the existing directory. 294Lookups will be done in the mounted file system first. 295If those operations fail due to a non-existent file the underlying 296directory is then accessed. 297All creates are done in the mounted file system. 298.El 299.Pp 300Any additional options specific to a file system type that is not 301one of the internally known types (see the 302.Fl t 303option) may be passed as a comma separated list; these options are 304distinguished by a leading 305.Dq \&- 306(dash). 307Options that take a value are specified using the syntax -option=value. 308For example, the 309.Nm 310command: 311.Bd -literal -offset indent 312mount -t unionfs -o -b /sys $HOME/sys 313.Ed 314.Pp 315causes 316.Nm 317to execute the equivalent of: 318.Bd -literal -offset indent 319/sbin/mount_unionfs -b /sys $HOME/sys 320.Ed 321.Pp 322Additional options specific to file system types 323which are not internally known 324(see the description of the 325.Fl t 326option below) 327may be described in the manual pages for the associated 328.Pa /sbin/mount_ Ns Sy XXX 329utilities. 330.It Fl p 331Print mount information in 332.Xr fstab 5 333format. 334Implies also the 335.Fl v 336option. 337.It Fl r 338The file system is to be mounted read-only. 339Mount the file system read-only (even the super-user may not write it). 340The same as the 341.Cm ro 342argument to the 343.Fl o 344option. 345.It Fl t Ar ufs | external_type 346The argument following the 347.Fl t 348is used to indicate the file system type. 349The type 350.Ar ufs 351is the default. 352The 353.Fl t 354option can be used 355to indicate that the actions should only be taken on 356file systems of the specified type. 357More than one type may be specified in a comma separated list. 358The list of file system types can be prefixed with 359.Dq no 360to specify the file system types for which action should 361.Em not 362be taken. 363For example, the 364.Nm 365command: 366.Bd -literal -offset indent 367mount -a -t nonfs,nullfs 368.Ed 369.Pp 370mounts all file systems except those of type 371.Tn NFS 372and 373.Tn NULLFS . 374.Pp 375If the type is not one of the internally known types, 376.Nm 377will attempt to execute a program in 378.Pa /sbin/mount_ Ns Sy XXX 379where 380.Sy XXX 381is replaced by the type name. 382For example, nfs file systems are mounted by the program 383.Pa /sbin/mount_nfs . 384.Pp 385Most file systems will be dynamically loaded by the kernel 386if not already present, and if the kernel module is available. 387.It Fl u 388The 389.Fl u 390flag indicates that the status of an already mounted file 391system should be changed. 392Any of the options discussed above (the 393.Fl o 394option) 395may be changed; 396also a file system can be changed from read-only to read-write 397or vice versa. 398An attempt to change from read-write to read-only will fail if any 399files on the file system are currently open for writing unless the 400.Fl f 401flag is also specified. 402The set of options is determined by applying the options specified 403in the argument to 404.Fl o 405and finally applying the 406.Fl r 407or 408.Fl w 409option. 410.It Fl v 411Verbose mode. 412.It Fl w 413The file system object is to be read and write. 414.El 415.Sh ENVIRONMENT 416.Bl -tag -width ".Ev PATH_FSTAB" 417.It Ev PATH_FSTAB 418If the environment variable 419.Ev PATH_FSTAB 420is set, all operations are performed against the specified file. 421.Ev PATH_FSTAB 422will not be honored if the process environment or memory address space is 423considered 424.Dq tainted . 425(See 426.Xr issetugid 2 427for more information.) 428.El 429.Sh FILES 430.Bl -tag -width /etc/fstab -compact 431.It Pa /etc/fstab 432file system table 433.El 434.Sh DIAGNOSTICS 435Various, most of them are self-explanatory. 436.Pp 437.Dl XXXXX file system is not available 438.Pp 439The kernel does not support the respective file system type. 440Note that 441support for a particular file system might be provided either on a static 442(kernel compile-time), or dynamic basis (loaded as a kernel module by 443.Xr kldload 8 ) . 444.Sh SEE ALSO 445.Xr getfacl 1 , 446.Xr setfacl 1 , 447.Xr mount 2 , 448.Xr acl 3 , 449.Xr mac 4 , 450.Xr fstab 5 , 451.Xr kldload 8 , 452.Xr mount_cd9660 8 , 453.Xr mount_devfs 8 , 454.Xr mount_ext2fs 8 , 455.Xr mount_fdescfs 8 , 456.Xr mount_hpfs 8 , 457.Xr mount_linprocfs 8 , 458.Xr mount_msdosfs 8 , 459.Xr mount_nfs 8 , 460.Xr mount_ntfs 8 , 461.Xr mount_nullfs 8 , 462.Xr mount_nwfs 8 , 463.Xr mount_portalfs 8 , 464.Xr mount_procfs 8 , 465.Xr mount_smbfs 8 , 466.Xr mount_std 8 , 467.Xr mount_udf 8 , 468.Xr mount_umapfs 8 , 469.Xr mount_unionfs 8 , 470.Xr umount 8 471.Sh CAVEATS 472After a successful 473.Nm , 474the permissions on the original mount point determine if 475.Pa ..\& 476is accessible from the mounted file system. 477The minimum permissions for 478the mount point for traversal across the mount point in both 479directions to be possible for all users is 0111 (execute for all). 480.Sh HISTORY 481A 482.Nm 483utility appeared in 484.At v1 . 485.Sh BUGS 486It is possible for a corrupted file system to cause a crash. 487