Add a reference to secmodel_extensions(9), to make it a little easier to

figure out how to enable mounts for unprivileged users.  (Why don't we
just explain vfs.generic.usermount in the mount(8) man page?)

Also add another example of different ways in which the "special"
argument is interpreted by different file systems: mount_tmpfs(8)
ignores it.
This commit is contained in:
apb 2013-10-31 07:37:06 +00:00
parent 263db65164
commit c2ebc84464

View File

@ -1,4 +1,4 @@
.\" $NetBSD: mount.8,v 1.78 2012/10/19 17:09:07 drochner Exp $
.\" $NetBSD: mount.8,v 1.79 2013/10/31 07:37:06 apb Exp $
.\"
.\" Copyright (c) 1980, 1989, 1991, 1993
.\" The Regents of the University of California. All rights reserved.
@ -29,7 +29,7 @@
.\"
.\" @(#)mount.8 8.8 (Berkeley) 6/16/94
.\"
.Dd June 23, 2012
.Dd October 31, 2013
.Dt MOUNT 8
.Os
.Sh NAME
@ -69,9 +69,11 @@ for example,
interprets it as a device node,
.Xr mount_null 8
interprets it as a directory name,
and
.Xr mount_nfs 8
interprets it as reference to a remote host and a directory on that host.
interprets it as reference to a remote host and a directory on that host,
and
.Xr mount_tmpfs 8
ignores it.
.Pp
The system maintains a list of currently mounted file systems.
This list is printed if
@ -136,6 +138,8 @@ In
the file-system mounting policy is dictated by the running security models.
The default security model may allow unprivileged mounting; see
.Xr secmodel_suser 9
and
.Xr secmodel_extensions 9
for details.
.Pp
The options are as follows: