If i wish to make a mount permanent, is it /etc/vfstab that i have to the entry add to? If so does anybody know the syntax, ie. is it tab or space delimited ? etc etc
any help would be greatly appreciated (3 Replies)
Hi, guys !
Could someone clarify one thing for me:
I start machine from disk0, and want to check the /etc/vfstab on disk1. How do i do it ?
Tried to write:
cd /
mount /dev/dsk/c0t1d0s0 /mnt
But if I do cd /mnt, it is empty. I expected to see disk1 there ? Or am I wrong ?
How do I... (3 Replies)
Hello.
When I use format command - It shows:
/dev/dsk/c0d0s4 is normally mounted on /u02 according to /etc/vfstab. Please remove this entry to use this device.
What does it mean? (4 Replies)
In the end of /etc/vfstab file :
/dev/md/dsk/d30 /dev/md/dsk/d30 /odb0 ufs no no -
/dev/md/dsk/d40 /dev/md/dsk/d40 /odb1 ufs no no -
After boot filesystems /odb0 and /odb1 don't mount.
Also they don't mount after comand mount -a
But if i'm enter... (1 Reply)
Hi all,
I have been trying to figure out a way to mount swap on /tmp at a stage early than the default script that does it...
If anyone knows how it can be done pls pls help me!!!!!
I have been struggling a lot for it
Secondly, continuing with the same issue...
I wanted to know if the... (4 Replies)
How can I specify and the -O (overlay option) in the vfstab ?
Also can you specify the overlay option to the mount options for a Vertias cluster NFS service group ? (0 Replies)
Hi Guys
i need your help quite urgently
I am setting up a vfstab but need some help, here is the file systems
0. c0t0d0 <SUN36G cyl 24620 alt 2 hd 27 sec 107> drmlc-00
Part Tag Flag Cylinders Size Blocks Mounted/used by
0 root wm 0 - ... (1 Reply)
We are regularly using for our testing, where we are manually filling up the mount with desired size with following command
dd if=/dev/zero of=file_2GB bs=2048000 count=2000
We are planning to automate the task where taking input for % of size as one input and the name of the file system... (8 Replies)
Heyas
At home i have 1 nas with 3 shares, of which i used to mount 2 of them using a script with hardcoded password and username in it.
EDIT: Turns out, its not the script, but 'how i access' the nas share.. (-o user=XY,password=... VS. -o credentials=...).
Figured about credential files,... (0 Replies)
Discussion started by: sea
0 Replies
LEARN ABOUT DEBIAN
mount.crypto_luks
mount.crypt(8) pam_mount mount.crypt(8)Name
mount.crypt - mount a dm-crypt encrypted volume
Syntax
mount.crypt [-nrv] [-o options] device directory
Options-o options
Set further mount options. mount.crypt will take out its own options it recognizes and passes any remaining options on to the under-
lying mount program. See below for possible options.
-n Do not update /etc/mtab. Note that this makes it impossible to unmount the volume by naming the container - you will have to pass
the mountpoint to umount.crypt.
-r Set up the loop device (if necessary) and crypto device in read-only mode. (The mount itself will necessarily also be read-only.)
Note that doing a remount using `mount /mnt -o remount,rw` will not make the mount readwrite. The crypto and loop devices will have
to be disassociated first.
-v Turn on debugging and be a bit more verbose.
Mount options
cipher The cryptsetup cipher used for the encrypted volume. This option is mandatory for PLAIN (non-LUKS) volumes. pmt-ehd(8) defaults to
creating volumes with "aes-cbc-essiv:sha256" as a cipher.
crypto_name
Select the name for the crypto device (optional). This option is currently only usable with dm-crypt systems.
fsck Run fsck on the container before mounting it.
fsk_cipher
The OpenSSL cipher used for the filesystem key. The special keyword "none" can be used to bypass decryption and pass the file con-
tents directly to libcryptsetup.
fsk_hash
The OpenSSL hash used for producing key and IV.
fstype The exact type of filesystem in the encrypted container. The default is to let the kernel autodetect.
hash The cryptsetup hash used for the encrypted volume. This defaults to no hashing, because pam_mount assumes EHD volumes with strong
and simple fskey generation.
keyfile
The path to the key file. This option is mandatory for "normal" crypto volumes and should not be used for LUKS volumes.
remount
Causes the filesystem to be remounted with new options. Note that mount.crypt cannot switch the underlying loop device (if applies)
or the crypto device between read-only and read-write once it is created; only the actual filesystem mount can be changed, with lim-
its. If the loop device is read-only, the crypto device will be read-only, and changing the mount to read-write is impossible. Sim-
ilarly, going from rw to ro will only mark the mount read-only, but not the crypto or loop device, thus making it impossible to set
the filesystem the crypto container is located on to read-only.
ro Same as the -r option.
verbose
Same as the -v option.
Obsolete mount options
This section is provided for reference.
loop This option used to set up a loop device, because cryptsetup(8) expects a block device. The option is ignored because mount.crypt
can figure this out on its own.
pam_mount 2011-12-15 mount.crypt(8)