1.\" Copyright (c) 1980, 1989, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. 9.\" 2. Redistributions in binary form must reproduce the above copyright 10.\" notice, this list of conditions and the following disclaimer in the 11.\" documentation and/or other materials provided with the distribution. 12.\" 4. Neither the name of the University nor the names of its contributors 13.\" may be used to endorse or promote products derived from this software 14.\" without specific prior written permission. 15.\" 16.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 17.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 18.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 19.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 20.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26.\" SUCH DAMAGE. 27.\" 28.\" @(#)mount.8 8.8 (Berkeley) 6/16/94 29.\" $FreeBSD$ 30.\" 31.Dd April 7, 2003 32.Dt MOUNT 8 33.Os 34.Sh NAME 35.Nm mount 36.Nd mount file systems 37.Sh SYNOPSIS 38.Nm 39.Op Fl adfpruvw 40.Op Fl F Ar fstab 41.Op Fl o Ar options 42.Op Fl t Ar ufs | external_type 43.Nm 44.Op Fl dfpruvw 45.Ar special | node 46.Nm 47.Op Fl dfpruvw 48.Op Fl o Ar options 49.Op Fl t Ar ufs | external_type 50.Ar special node 51.Sh DESCRIPTION 52The 53.Nm 54utility calls the 55.Xr mount 2 56system call to prepare and graft a 57.Ar "special device" 58or the remote node (rhost:path) on to the file system tree at the point 59.Ar node . 60If either 61.Ar special 62or 63.Ar node 64are not provided, the appropriate information is taken from the 65.Xr fstab 5 66file. 67.Pp 68The system maintains a list of currently mounted file systems. 69If no arguments are given to 70.Nm , 71this list is printed. 72.Pp 73The options are as follows: 74.Bl -tag -width indent 75.It Fl a 76All the file systems described in 77.Xr fstab 5 78are mounted. 79Exceptions are those marked as 80.Dq noauto , 81excluded by the 82.Fl t 83flag (see below), or if they are already mounted (except the 84root file system which is always remounted to preserve 85traditional single user mode behavior). 86.It Fl d 87Causes everything to be done except for the actual system call. 88This option is useful in conjunction with the 89.Fl v 90flag to 91determine what the 92.Nm 93command is trying to do. 94.It Fl F Ar fstab 95Specify the 96.Pa fstab 97file to use. 98.It Fl f 99Forces the revocation of write access when trying to downgrade 100a file system mount status from read-write to read-only. 101Also 102forces the R/W mount of an unclean file system (dangerous; use with 103caution). 104.It Fl o 105Options are specified with a 106.Fl o 107flag followed by a comma separated string of options. 108In case of conflicting options being specified, the rightmost option 109takes effect. 110The following options are available: 111.Bl -tag -width indent 112.It Cm acls 113Enable Access Control Lists, or ACLS, which can be customized via the 114.Xr setfacl 1 115and 116.Xr getfacl 1 117commands. 118.It Cm async 119All 120.Tn I/O 121to the file system should be done asynchronously. 122This is a 123.Em dangerous 124flag to set, 125and should not be used unless you are prepared to recreate the file 126system should your system crash. 127.It Cm current 128When used with the 129.Fl u 130flag, this is the same as specifying the options currently in effect for 131the mounted file system. 132.It Cm force 133The same as 134.Fl f ; 135forces the revocation of write access when trying to downgrade 136a file system mount status from read-write to read-only. 137Also 138forces the R/W mount of an unclean file system (dangerous; use with caution). 139.It Cm fstab 140When used with the 141.Fl u 142flag, this is the same as specifying all the options listed in the 143.Xr fstab 5 144file for the file system. 145.It Cm multilabel 146Enable multi-label Mandatory Access Control, or MAC, on the specified file 147system. 148If the file system supports multilabel operation, individual labels will 149be maintained for each object in the file system, rather than using a 150single label for all obejcts. 151An alternative to the 152.Fl l 153flag in 154.Xr tunefs 8 . 155See 156.Xr mac 4 157for more information, which cause the multilabel mount flag to be set 158automatically at mount-time. 159.It Cm noasync 160Metadata I/O should be done synchronously, while data I/O should be done 161asynchronously. 162This is the default. 163.It Cm noatime 164Do not update the file access time when reading from a file. 165This option 166is useful on file systems where there are large numbers of files and 167performance is more critical than updating the file access time (which is 168rarely ever important). 169This option is currently only supported on local file systems. 170.It Cm noauto 171This file system should be skipped when 172.Nm 173is run with the 174.Fl a 175flag. 176.It Cm noclusterr 177Disable read clustering. 178.It Cm noclusterw 179Disable write clustering. 180.It Cm nodev 181Do not interpret character or block special devices on the file system. 182This option is useful for a server that has file systems containing 183special devices for architectures other than its own. 184This option is set automatically when the user does not have super-user 185privileges. 186.It Cm noexec 187Do not allow execution of any binaries on the mounted file system. 188This option is useful for a server that has file systems containing 189binaries for architectures other than its own. 190.It Cm nosuid 191Do not allow set-user-identifier or set-group-identifier bits to take effect. 192Note: this option is worthless if a public available suid or sgid 193wrapper like 194.Xr suidperl 1 195is installed on your system. 196It is set automatically when the user does not have super-user privileges. 197.It Cm nosymfollow 198Do not follow symlinks 199on the mounted file system. 200.It Cm ro 201The same as 202.Fl r ; 203mount the file system read-only (even the super-user may not write it). 204.It Cm sync 205All 206.Tn I/O 207to the file system should be done synchronously. 208.It Cm snapshot 209This option allows a snapshot of the specified file system to be taken. 210The 211.Fl u 212flag is required with this option. 213Note that snapshot files must be created in the file system that is being 214snapshotted. 215You may create up to 20 snapshots per file system. 216Active snapshots are recorded in the superblock, so they persist across unmount 217and remount operations and across system reboots. 218When you are done with a snapshot, it can be removed with the 219.Xr rm 1 220command. 221Snapshots may be removed in any order, however you may not get back all the 222space contained in the snapshot as another snapshot may claim some of the blocks 223that it is releasing. 224Note that the schg flag is set on snapshots to ensure that not even the root 225user can write to them. 226The unlink command makes an exception for snapshot files in that it allows them 227to be removed even though they have the schg flag set, so it is not necessary to 228clear the schg flag before removing a snapshot file. 229.Pp 230Once you have taken a snapshot, there are three interesting things that you can 231do with it: 232.Pp 233.Bl -enum -compact 234.It 235Run 236.Xr fsck 8 237on the snapshot file. 238Assuming that the file system was clean when it was mounted, you should always 239get a clean (and unchanging) result from running fsck on the snapshot. 240This is essentially what the background fsck process does. 241.Pp 242.It 243Run 244.Xr dump 8 245on the snapshot. 246You will get a dump that is consistent with the file system as of the timestamp 247of the snapshot. 248.Pp 249.It 250Mount the snapshot as a frozen image of the file system. 251To mount the snapshot 252.Pa /var/snapshot/snap1 : 253.Bd -literal 254mdconfig -a -t vnode -f /var/snapshot/snap1 -u 4 255mount -r /dev/md4 /mnt 256.Ed 257.Pp 258You can now cruise around your frozen 259.Pa /var 260file system at 261.Pa /mnt . 262Everything will be in the same state that it was at the time the snapshot was 263taken. 264The one exception is that any earlier snapshots will appear as zero length 265files. 266When you are done with the mounted snapshot: 267.Bd -literal 268umount /mnt 269mdconfig -d -u 4 270.Ed 271.Pp 272Further details can be found in the file at 273.Pa /usr/src/sys/ufs/ffs/README.snapshot . 274.El 275.It Cm suiddir 276A directory on the mounted file system will respond to the SUID bit 277being set, by setting the owner of any new files to be the same 278as the owner of the directory. 279New directories will inherit the bit from their parents. 280Execute bits are removed from 281the file, and it will not be given to root. 282.Pp 283This feature is designed for use on fileservers serving PC users via 284ftp, SAMBA, or netatalk. 285It provides security holes for shell users and as 286such should not be used on shell machines, especially on home directories. 287This option requires the SUIDDIR 288option in the kernel to work. 289Only UFS file systems support this option. 290See 291.Xr chmod 2 292for more information. 293.It Cm update 294The same as 295.Fl u ; 296indicate that the status of an already mounted file system should be changed. 297.It Cm union 298Causes the namespace at the mount point to appear as the union 299of the mounted file system root and the existing directory. 300Lookups will be done in the mounted file system first. 301If those operations fail due to a non-existent file the underlying 302directory is then accessed. 303All creates are done in the mounted file system. 304.El 305.Pp 306Any additional options specific to a file system type that is not 307one of the internally known types (see the 308.Fl t 309option) may be passed as a comma separated list; these options are 310distinguished by a leading 311.Dq \&- 312(dash). 313Options that take a value are specified using the syntax -option=value. 314For example, the 315.Nm 316command: 317.Bd -literal -offset indent 318mount -t unionfs -o -b /sys $HOME/sys 319.Ed 320.Pp 321causes 322.Nm 323to execute the equivalent of: 324.Bd -literal -offset indent 325/sbin/mount_unionfs -b /sys $HOME/sys 326.Ed 327.Pp 328Additional options specific to file system types 329which are not internally known 330(see the description of the 331.Fl t 332option below) 333may be described in the manual pages for the associated 334.Pa /sbin/mount_ Ns Sy XXX 335utilities. 336.It Fl p 337Print mount information in 338.Xr fstab 5 339format. 340Implies also the 341.Fl v 342option. 343.It Fl r 344The file system is to be mounted read-only. 345Mount the file system read-only (even the super-user may not write it). 346The same as the 347.Cm ro 348argument to the 349.Fl o 350option. 351.It Fl t Ar ufs | external_type 352The argument following the 353.Fl t 354is used to indicate the file system type. 355The type 356.Ar ufs 357is the default. 358The 359.Fl t 360option can be used 361to indicate that the actions should only be taken on 362file systems of the specified type. 363More than one type may be specified in a comma separated list. 364The list of file system types can be prefixed with 365.Dq no 366to specify the file system types for which action should 367.Em not 368be taken. 369For example, the 370.Nm 371command: 372.Bd -literal -offset indent 373mount -a -t nonfs,nullfs 374.Ed 375.Pp 376mounts all file systems except those of type 377.Tn NFS 378and 379.Tn NULLFS . 380.Pp 381If the type is not one of the internally known types, 382.Nm 383will attempt to execute a program in 384.Pa /sbin/mount_ Ns Sy XXX 385where 386.Sy XXX 387is replaced by the type name. 388For example, nfs file systems are mounted by the program 389.Pa /sbin/mount_nfs . 390.Pp 391Most file systems will be dynamically loaded by the kernel 392if not already present, and if the kernel module is available. 393.It Fl u 394The 395.Fl u 396flag indicates that the status of an already mounted file 397system should be changed. 398Any of the options discussed above (the 399.Fl o 400option) 401may be changed; 402also a file system can be changed from read-only to read-write 403or vice versa. 404An attempt to change from read-write to read-only will fail if any 405files on the file system are currently open for writing unless the 406.Fl f 407flag is also specified. 408The set of options is determined by applying the options specified 409in the argument to 410.Fl o 411and finally applying the 412.Fl r 413or 414.Fl w 415option. 416.It Fl v 417Verbose mode. 418.It Fl w 419The file system object is to be read and write. 420.El 421.Sh DIAGNOSTICS 422Various, most of them are self-explanatory. 423.Pp 424.Dl XXXXX file system is not available 425.Pp 426The kernel does not support the respective file system type. 427Note that 428support for a particular file system might be provided either on a static 429(kernel compile-time), or dynamic basis (loaded as a kernel module by 430.Xr kldload 8 ) . 431.Sh ENVIRONMENT 432.Bl -tag -width ".Ev PATH_FSTAB" 433.It Ev PATH_FSTAB 434If the environment variable 435.Ev PATH_FSTAB 436is set, all operations are performed against the specified file. 437.Ev PATH_FSTAB 438will not be honored if the process environment or memory address space is 439considered 440.Dq tainted . 441(See 442.Xr issetugid 2 443for more information.) 444.El 445.Sh FILES 446.Bl -tag -width /etc/fstab -compact 447.It Pa /etc/fstab 448file system table 449.El 450.Sh SEE ALSO 451.Xr getfacl 1 , 452.Xr setfacl 1 , 453.Xr mount 2 , 454.Xr acl 3 , 455.Xr mac 4 , 456.Xr fstab 5 , 457.Xr kldload 8 , 458.Xr mount_cd9660 8 , 459.Xr mount_devfs 8 , 460.Xr mount_ext2fs 8 , 461.Xr mount_fdescfs 8 , 462.Xr mount_hpfs 8 , 463.Xr mount_linprocfs 8 , 464.Xr mount_msdosfs 8 , 465.Xr mount_nfs 8 , 466.Xr mount_ntfs 8 , 467.Xr mount_nullfs 8 , 468.Xr mount_nwfs 8 , 469.Xr mount_portalfs 8 , 470.Xr mount_procfs 8 , 471.Xr mount_smbfs 8 , 472.Xr mount_std 8 , 473.Xr mount_udf 8 , 474.Xr mount_umapfs 8 , 475.Xr mount_unionfs 8 , 476.Xr umount 8 477.Sh BUGS 478It is possible for a corrupted file system to cause a crash. 479.Sh CAVEATS 480After a successful 481.Nm , 482the permissions on the original mount point determine if 483.Pa ..\& 484is accessible from the mounted file system. 485The minimum permissions for 486the mount point for traversal across the mount point in both 487directions to be possible for all users is 0111 (execute for all). 488.Sh HISTORY 489A 490.Nm 491utility appeared in 492.At v1 . 493