diff options
author | Steve French <sfrench@samba.org> | 2005-04-27 03:22:00 +0000 |
---|---|---|
committer | Gerald W. Carter <jerry@samba.org> | 2008-04-23 08:46:31 -0500 |
commit | 6166a09f90aef31f8d0df6ea060768661f6f89c3 (patch) | |
tree | b84a09f9785a78f816829588009675efc2ea290c | |
parent | dc3fae13bbe5611430d61931d5930ce1e3e89806 (diff) | |
download | samba-6166a09f90aef31f8d0df6ea060768661f6f89c3.tar.gz samba-6166a09f90aef31f8d0df6ea060768661f6f89c3.tar.bz2 samba-6166a09f90aef31f8d0df6ea060768661f6f89c3.zip |
Updated mount.cifs man page with current syntax
(This used to be commit b62987c33f5d14c4c50fe556767c0ea0529a2200)
-rw-r--r-- | docs/manpages/mount.cifs.8.xml | 165 |
1 files changed, 158 insertions, 7 deletions
diff --git a/docs/manpages/mount.cifs.8.xml b/docs/manpages/mount.cifs.8.xml index d397d88544..f74b71d818 100644 --- a/docs/manpages/mount.cifs.8.xml +++ b/docs/manpages/mount.cifs.8.xml @@ -68,8 +68,8 @@ kernel log. <listitem><para>specifies the username to connect as. If this is not given, then the environment variable <emphasis>USER</emphasis> is used. This option can also take the -form "user%password" or "user/workgroup" or -"user/workgroup%password" to allow the password and workgroup +form "user%password" or "workgroup/user" or +"workgroup/user%password" to allow the password and workgroup to be specified as part of the username. </para> @@ -149,6 +149,15 @@ port 445 is tried and if no response then port 139 is tried. </para></listitem> </varlistentry> + <varlistentry> + <term>netbiosname=<replaceable>arg</replaceable></term> + + <listitem><para>When mounting to servers via port 139, specifies the RFC1001 + source name to use to represent the client netbios machine + name when doing the RFC1001 netbios session initialize. + </para></listitem> + </varlistentry> + <varlistentry> <term>file_mode=<replaceable>arg</replaceable></term> @@ -207,6 +216,146 @@ port 445 is tried and if no response then port 139 is tried. <listitem><para>mount read-write</para></listitem> </varlistentry> + <varlistentry> + <term>setuids</term> + <listitem><para>If the CIFS Unix extensions are negotiated with the server + the client will attempt to set the effective uid and gid of + the local process on newly created files, directories, and + devices (create, mkdir, mknod).</para></listitem> + </varlistentry> + + <varlistentry> + <term>nosetuids</term> + <listitem><para>The client will not attempt to set the uid and gid on + on newly created files, directories, and devices (create, + mkdir, mknod) which will result in the server setting the + uid and gid to the default (usually the server uid of the + usern who mounted the share). Letting the server (rather than + the client) set the uid and gid is the default. This + parameter has no effect if the CIFS Unix Extensions are not + negotiated.</para></listitem> + </varlistentry> + + <varlistentry> + <term>perm</term> + <listitem><para>Client does permission checks (vfs_permission check of uid + and gid of the file against the mode and desired operation), + Note that this is in addition to the normal ACL check on the + target machine done by the server software. + Client permission checking is enabled by default.</para></listitem> + </varlistentry> + + <varlistentry> + <term>noperm</term> + <listitem><para>Client does not do permission checks. This can expose + files on this mount to access by other users on the local + client system. It is typically only needed when the server + supports the CIFS Unix Extensions but the UIDs/GIDs on the + client and server system do not match closely enough to allow + access by the user doing the mount. + Note that this does not affect the normal ACL check on the + target machine done by the server software (of the server + ACL against the user name provided at mount time).</para></listitem> + </varlistentry> + + <varlistentry> + <term>directio</term> + <listitem><para>Do not do inode data caching on files opened on this mount. + This precludes mmaping files on this mount. In some cases + with fast networks and little or no caching benefits on the + client (e.g. when the application is doing large sequential + reads bigger than page size without rereading the same data) + this can provide better performance than the default + behavior which caches reads (reaadahead) and writes + (writebehind) through the local Linux client pagecache + if oplock (caching token) is granted and held. Note that + direct allows write operations larger than page size + to be sent to the server. On some kernels this requires the cifs.ko module + to be built with the CIFS_EXPERIMENTAL configure option.</para></listitem> + </varlistentry> + + <varlistentry> + <term>mapchars</term> + <listitem><para>Translate six of the seven reserved characters (not backslash) + *?<>|: + to the remap range (above 0xF000), which also + allows the CIFS client to recognize files created with + such characters by Windows's POSIX emulation. This can + also be useful when mounting to most versions of Samba + (which also forbids creating and opening files + whose names contain any of these seven characters). + This has no effect if the server does not support + Unicode on the wire.<para></listitem> + </varlistentry> + + <varlistentry> + <term>nomapchars</term> + <listitem><para>Do not translate any of these seven characters (default)</para></listitem> + </varlistentry> + + <varlistentry> + <term>intr</term> + <listitem><para>currently unimplemented</para></listitem> + </varlistentry> + + <varlistentry> + <term>nointr</term> + <listitem><para>(default) currently unimplemented </para></listitem> + </varlistentry> + + <varlistentry> + <term>hard</term> + <listitem><para>The program accessing a file on the cifs mounted file system will hang when the + server crashes.</para></listitem> + </varlistentry> + + <varlistentry> + <term>soft</term> + <listitem><para>(default) The program accessing a file on the cifs mounted file system will not hang when the server crashes and will return errors to the user application.</para></listitem> + </varlistentry> + + + <varlisstentry> + <term>noacl</term> + <listitem><para>Do not allow POSIX ACL operations even if server would support them.</para><para> + The CIFS client can get and set POSIX ACLs (getfacl, setfacl) to Samba servers + version 3.10 and later. Setting POSIX ACLs requires enabling both XATTR and + then POSIX support in the CIFS configuration options when building the cifs + module. POSIX ACL support can be disabled on a per mount basic by specifying + "noacl" on mount.</para> + </listitem> + </varlistentry> + + <varlistentry> + <term>serverino</term> + <listitem><para>Use servers inode numbers instead of generating automatically + incrementing inode numbers on the client. Although this will + make it easier to spot hardlinked files (as they will have + the same inode numbers) and inode numbers may be persistent, + note that the server does not guarantee that the inode numbers + are unique if multiple server side mounts are exported under a + single share (since inode numbers on the servers might not + be unique if multiple filesystems are mounted under the same + shared higher level directory). Note that this requires that + the server support the CIFS Unix Extensions as other servers + do not return a unique IndexNumber on SMB FindFirst (most + servers return zero as the IndexNumber). Parameter has no + effect to Windows servers and others which do not support the + CIFS Unix Extensions. + </para></listitem> + </varlistentry> + + <varlistentry> + <term>noserverino</term> + <listitem><para>client generates inode numbers (rather than using the actual one + from the server) by default. + </varlistentry> + + <varlistentry> + <term>nouser_xattr</term> + <listitem><para>(default) Do not allow getfattr/setfattr to get/set xattrs, even if server would support it otherwise. </para></listitem> + </varlistentry> + <varlistentry> <term>rsize</term> <listitem><para>default network read size</para></listitem> @@ -264,9 +413,8 @@ For more information see the kernel file <filename>fs/cifs/README</filename>. <refsect1> <title>BUGS</title> - <para>Passwords and other options containing , can not be handled. -For passwords an alternative way of passing them is in a credentials -file or in the PASSWD environment.</para> + <para>Mounting using the CIFS URL specification is currently not supported. + </para> <para>The credentials file does not handle usernames or passwords with leading space.</para> @@ -285,8 +433,8 @@ server type you are trying to contact. <refsect1> <title>VERSION</title> - <para>This man page is correct for version 1.0.6 of - the cifs vfs filesystem (roughly Linux kernel 2.6.6).</para> + <para>This man page is correct for version 1.34 of + the cifs vfs filesystem (roughly Linux kernel 2.6.12).</para> </refsect1> <refsect1> @@ -295,6 +443,9 @@ server type you are trying to contact. Documentation/filesystems/cifs.txt and fs/cifs/README in the linux kernel source tree may contain additional options and information. </para> + <para><citerefentry><refentrytitle>umount.cifs</refentrytitle> + <manvolnum>8</manvolnum></citerefentry></para> + </refsect1> <refsect1> |