mount.8 (31468) | mount.8 (35105) |
---|---|
1.\" Copyright (c) 1980, 1989, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 16 unchanged lines hidden (view full) --- 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)mount.8 8.8 (Berkeley) 6/16/94 | 1.\" Copyright (c) 1980, 1989, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 16 unchanged lines hidden (view full) --- 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)mount.8 8.8 (Berkeley) 6/16/94 |
33.\" $Id: mount.8,v 1.20 1997/11/13 00:28:49 julian Exp $ | 33.\" $Id: mount.8,v 1.21 1997/12/01 00:44:16 steve Exp $ |
34.\" 35.Dd June 16, 1994 36.Dt MOUNT 8 37.Os BSD 4 38.Sh NAME 39.Nm mount 40.Nd mount file systems 41.Sh SYNOPSIS --- 99 unchanged lines hidden (view full) --- 141This option is useful for a server that has file systems containing 142binaries for architectures other than its own. 143.It nosuid 144Do not allow set-user-identifier or set-group-identifier bits to take effect. 145Note: this option is worthless if a public available suid or sgid 146wrapper like 147.Xr suidperl 1 148is installed on your system. | 34.\" 35.Dd June 16, 1994 36.Dt MOUNT 8 37.Os BSD 4 38.Sh NAME 39.Nm mount 40.Nd mount file systems 41.Sh SYNOPSIS --- 99 unchanged lines hidden (view full) --- 141This option is useful for a server that has file systems containing 142binaries for architectures other than its own. 143.It nosuid 144Do not allow set-user-identifier or set-group-identifier bits to take effect. 145Note: this option is worthless if a public available suid or sgid 146wrapper like 147.Xr suidperl 1 148is installed on your system. |
149.It nosymfollow 150Do not follow symlinks 151on the mounted file system. |
|
149.It rdonly 150The same as 151.Fl r ; 152mount the file system read-only (even the super-user may not write it). 153.It sync 154All 155.Tn I/O 156to the file system should be done synchronously. --- 196 unchanged lines hidden --- | 152.It rdonly 153The same as 154.Fl r ; 155mount the file system read-only (even the super-user may not write it). 156.It sync 157All 158.Tn I/O 159to the file system should be done synchronously. --- 196 unchanged lines hidden --- |