2 .\" Copyright (c) 1997-1999 Erez Zadok
3 .\" Copyright (c) 1990 Jan-Simon Pendry
4 .\" Copyright (c) 1990 Imperial College of Science, Technology & Medicine
5 .\" Copyright (c) 1990 The Regents of the University of California.
6 .\" All rights reserved.
8 .\" This code is derived from software contributed to Berkeley by
9 .\" Jan-Simon Pendry at Imperial College, London.
11 .\" Redistribution and use in source and binary forms, with or without
12 .\" modification, are permitted provided that the following conditions
14 .\" 1. Redistributions of source code must retain the above copyright
15 .\" notice, this list of conditions and the following disclaimer.
16 .\" 2. Redistributions in binary form must reproduce the above copyright
17 .\" notice, this list of conditions and the following disclaimer in the
18 .\" documentation and/or other materials provided with the distribution.
19 .\" 3. All advertising materials mentioning features or use of this software
20 .\" must display the following acknowledgment:
21 .\" This product includes software developed by the University of
22 .\" California, Berkeley and its contributors.
23 .\" 4. Neither the name of the University nor the names of its contributors
24 .\" may be used to endorse or promote products derived from this software
25 .\" without specific prior written permission.
27 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
28 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
29 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
30 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
31 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
32 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
33 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
34 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
35 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
36 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
39 .\" %W% (Berkeley) %G%
41 .\" $Id: fixmount.8,v 1.2 1999/01/10 21:54:26 ezk Exp $
42 .\" $FreeBSD: src/contrib/amd/fixmount/fixmount.8,v 1.5.2.2 2001/03/06 16:54:05 ru Exp $
43 .\" $DragonFly: src/contrib/amd/fixmount/fixmount.8,v 1.2 2003/06/17 04:23:57 dillon Exp $
50 .Nd fix remote mount entries
61 that can delete bogus mount entries in remote
63 daemons. The actions specified by the options are performed for each
69 These options work as in
71 except that only entries pertaining to the local host are printed.
73 Removes those remote mount entries on
75 that do not correspond to current mounts, i.e., which are left-over
76 from a crash or are the result of improper mount protocol.
77 The actuality of mounts is verified using the entries in
80 Verify remote mounts. Similar to
82 except that only a notification message is printed for each bogus entry
83 found. The remote mount table is not changed.
85 Issues a command to the remote mountd declaring that
87 of its filesystems have been unmounted. This should be used with caution, as
88 it removes all remote mount entries pertaining to the local system, whether or
89 not any filesystems are still mounted locally.
91 Be quiet. Suppresses error messages due to timeouts and
92 .Dq Program not Registered ,
93 i.e., due to remote hosts not supporting RPC or not running
96 Pretend the local hostname is
98 This is useful after the local hostname has been changed and rmtab entries
99 using the old name remain on a remote machine.
100 Unfortunately, most mountd's won't be able to successfully handle removal
101 of such entries, so this option is useful in combination with
105 This option also saves time as comparisons of remotely recorded and local
106 hostnames by address are avoided.
111 List of current mounts.
113 Backup file for remote mount entries on
123 No attempt is made to verify the information in
127 Since swap file mounts are not recorded in
129 a heuristic specific to SunOS is used to determine whether such a mount
130 is actual (replacing the string
134 and verifying the resulting path).
136 Symbolic links on the server will cause the path in the remote entry to differ
139 To catch those cases, a filesystem is also deemed mounted if its
141 mount point is identical to the remote entry.
142 I.e., on a SunOS diskless client,
143 .Pa server:/export/share/sunos.4.1.1
146 Since the local mount point is
148 as well this will be handled correctly.
150 There is no way to clear a stale entry in a remote
152 after the local hostname (or whatever reverse name resolution
153 returns for it) has been changed. To take care of these cases,
156 file has to be edited and
162 calls can only be changed by recompiling. The defaults are 2 seconds
163 for client handle creation and 5 seconds for RPC calls.
165 .An Jan-Simon Pendry Aq jsp@doc.ic.ac.uk ,
166 Department of Computing, Imperial College, London, UK.
168 .An Erez Zadok Aq ezk@cs.columbia.edu ,
169 Department of Computer Science, Columbia University, New York, USA.
171 .An Other authors and contributors to
175 file distributed with