Main index | Section 8 | Options |
However, the procedure of spawning a daemon will usually be automated so that it is performed by mount_fusefs. If the command invoking a given fuse_daemon is appended to the list of arguments, mount_fusefs will call the fuse_daemon via that command. In that way the fuse_daemon will be instructed to attach itself to special. From that on mounting goes as in the simple case. (See DAEMON MOUNTS.)
The special argument will normally be treated as the path of the special file to mount.
However, if auto is passed as special, then mount_fusefs will look for a suitable free fuse device by itself.
Finally, if special is an integer it will be interpreted as the number of the file descriptor of an already open fuse device (used when the Fuse library invokes mount_fusefs. See DAEMON MOUNTS).
The options are as follows:
| |
Prohibit the allow_other mount flag. Intended for use in scripts and the sudoers(5) file. | |
| |
Run in safe mode (i.e., reject invoking a filesystem daemon). | |
| |
Be verbose. | |
| |
Call the specified daemon. | |
| |
Add opts to the daemon's command line. | |
| |
Use special as special. | |
| |
Mount on node. | |
| |
Show help. | |
| |
Show version information. | |
| |
Mount options are specified via
| |
allow_other | |
Do not apply STRICT ACCESS POLICY. Only root can use this option. | |
async | I/O to the file system may be done asynchronously. Writes may be delayed and/or reordered. |
default_permissions | |
Enable traditional (file mode based) permission checking in kernel. | |
intr | Allow signals to interrupt operations that are blocked waiting for a reply from the server. When this option is in use, system calls may fail with EINTR whenever a signal is received. |
max_read=n | |
Limit size of read requests to n. | |
neglect_shares | |
Do not refuse unmounting if there are secondary mounts. | |
private | |
Refuse shared mounting of the daemon.
This is the default behaviour, to allow sharing, explicitly use
| |
push_symlinks_in | |
Prefix absolute symlinks with the mountpoint. | |
subtype=fsname | |
Suffix fsname to the file system name as reported by statfs(2). This option can be used to identify the file system implemented by fuse_daemon. | |
Besides the above mount options, there is a set of pseudo-mount options which
are supported by the Fuse library.
One can list these by passing
direct_io | |
Bypass the buffer cache system. | |
kernel_cache | |
By default cached buffers of a given file are flushed at each open(2). This option disables this behaviour. | |
fuse_daemon device mountpoint
has the same effect as
mount_fusefs auto mountpoint fuse_daemon
This is the recommended usage when you want basic usage (eg, run the daemon at a low privilege level but mount it as root).
This is applied for Fuse mounts by default and only root can mount without the strict access policy (i.e., the allow_other mount option).
This is to shield users from the daemon "spying" on their I/O activities.
Users might opt to willingly relax strict access policy (as far as they are concerned) by doing their own secondary mount (See SHARED MOUNTS).
After the primary mount is in place, secondary mounts can be done by anyone unless this feature is disabled by private. The behaviour of a secondary mount is analogous to that of symbolic links: they redirect all filesystem operations to the primary mount.
Doing a secondary mount is like signing an agreement: by this action, the mounter agrees that the Fuse daemon can trace her I/O activities. From then on she is not banned from using the filesystem (either via her own mount or via the primary mount), regardless whether allow_other is used or not.
The device name of a secondary mount is the device name of the corresponding primary mount, followed by a '#' character and the index of the secondary mount; e.g., /dev/fuse0#3.
In general, to be as scripting / sudoers(5) friendly as possible, no information has a fixed position in the command line, but once a given piece of information is provided, subsequent arguments/options cannot override it (with the exception of some non-critical ones).
MOUNT_FUSEFS_SAFE | |
This has the same effect as the
| |
MOUNT_FUSEFS_VERBOSE | |
This has the same effect as the
| |
MOUNT_FUSEFS_IGNORE_UNKNOWN | |
If set, mount_fusefs will ignore unknown mount options. | |
MOUNT_FUSEFS_CALL_BY_LIB | |
Adjust behavior to the needs of the FUSE library. Currently it effects help output. | |
Although the following variables do not have any effect on mount_fusefs itself, they affect the behaviour of fuse daemons:
FUSE_DEV_NAME | |
Device to attach. If not set, the multiplexer path /dev/fuse is used. | |
FUSE_DEV_FD | File descriptor of an opened Fuse device to use. Overrides FUSE_DEV_NAME. |
FUSE_NO_MOUNT | |
If set, the library will not attempt to mount the filesystem, even if a mountpoint argument is supplied. | |
/dev/fuse | |
Fuse device with which the kernel and Fuse daemons can communicate. | |
/dev/fuse | |
The multiplexer path. An open(2) performed on it automatically is passed to a free Fuse device by the kernel (which might be created just for this puprose). | |
./fusexmp /mnt/fuse
or
mount_fusefs auto /mnt/fuse ./fusexmp
Doing the same in two steps, using /dev/fuse0:
FUSE_DEV_NAME=/dev/fuse ./fusexmp &&
mount_fusefs /dev/fuse /mnt/fuse
A script wrapper for fusexmp which ensures that mount_fusefs does not call any external utility and also provides a hacky (non race-free) automatic device selection:
#!/bin/sh -e
FUSE_DEV_NAME=/dev/fuse fusexmp
mount_fusefs -S /dev/fuse /mnt/fuse “$@”
If the daemon is specified via the
MOUNT_FUSEFS (8) | October 9, 2021 |
Main index | Section 8 | Options |
Please direct any comments about this manual page service to Ben Bullock. Privacy policy.