⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 readme

📁 Linux内核自带的cifs模块
💻
📖 第 1 页 / 共 3 页
字号:
mechanisms, instead of specifying it after -o using the normal "pass=" syntaxon the command line:1) By including it in a credential file. Specify credentials=filename as oneof the mount options. Credential files contain two lines        username=someuser        password=your_password2) By specifying the password in the PASSWD environment variable (similarlythe user name can be taken from the USER environment variable).3) By specifying the password in a file by name via PASSWD_FILE4) By specifying the password in a file by file descriptor via PASSWD_FDIf no password is provided, mount.cifs will prompt for password entryRestrictions============Servers must support the NTLM SMB dialect (which is the most recent, supported by Samba and Windows NT version 4, 2000 and XP and many other SMB/CIFS servers) Servers must support either "pure-TCP" (port 445 TCP/IP CIFS connections) or RFC 1001/1002 support for "Netbios-Over-TCP/IP." Neither of these is likely to be a problem as most servers support this.  IPv6 support is planned for the future,and is almost complete.Valid filenames differ between Windows and Linux.  Windows typically restrictsfilenames which contain certain reserved characters (e.g.the character : which is used to delimit the beginning of a stream name by Windows), whileLinux allows a slightly wider set of valid characters in filenames. Windowsservers can remap such characters when an explicit mapping is specified inthe Server's registry.  Samba starting with version 3.10 will allow such filenames (ie those which contain valid Linux characters, which normallywould be forbidden for Windows/CIFS semantics) as long as the server isconfigured for Unix Extensions (and the client has not disabled/proc/fs/cifs/LinuxExtensionsEnabled).  CIFS VFS Mount Options======================A partial list of the supported mount options follows:  user		The user name to use when trying to establish		the CIFS session.  password	The user password.  If the mount helper is		installed, the user will be prompted for password		if it is not supplied.  ip		The ip address of the target server  unc		The target server Universal Network Name (export) to 		mount.	  domain	Set the SMB/CIFS workgroup name prepended to the		username during CIFS session establishment  uid		Set the default uid for inodes. For mounts to servers		which do support the CIFS Unix extensions, such as a		properly configured Samba server, the server provides		the uid, gid and mode so this parameter should  not be		specified unless the server and clients uid and gid		numbering differ.  If the server and client are in the		same domain (e.g. running winbind or nss_ldap) and		the server supports the Unix Extensions then the uid		and gid can be retrieved from the server (and uid		and gid would not have to be specifed on the mount. 		For servers which do not support the CIFS Unix		extensions, the default uid (and gid) returned on lookup		of existing files will be the uid (gid) of the person		who executed the mount (root, except when mount.cifs		is configured setuid for user mounts) unless the "uid=" 		(gid) mount option is specified.  For the uid (gid) of newly		created files and directories, ie files created since 		the last mount of the server share, the expected uid 		(gid) is cached as long as the inode remains in 		memory on the client.   Also note that permission		checks (authorization checks) on accesses to a file occur		at the server, but there are cases in which an administrator		may want to restrict at the client as well.  For those		servers which do not report a uid/gid owner		(such as Windows), permissions can also be checked at the		client, and a crude form of client side permission checking 		can be enabled by specifying file_mode and dir_mode on 		the client.  Note that the mount.cifs helper must be		at version 1.10 or higher to support specifying the uid		(or gid) in non-numberic form.  gid		Set the default gid for inodes (similar to above).  file_mode     If CIFS Unix extensions are not supported by the server		this overrides the default mode for file inodes.  dir_mode      If CIFS Unix extensions are not supported by the server 		this overrides the default mode for directory inodes.  port		attempt to contact the server on this tcp port, before		trying the usual ports (port 445, then 139).  iocharset     Codepage used to convert local path names to and from		Unicode. Unicode is used by default for network path		names if the server supports it.  If iocharset is		not specified then the nls_default specified		during the local client kernel build will be used.		If server does not support Unicode, this parameter is		unused.  rsize		default read size (usually 16K). The client currently		can not use rsize larger than CIFSMaxBufSize. CIFSMaxBufSize		defaults to 16K and may be changed (from 8K to the maximum		kmalloc size allowed by your kernel) at module install time		for cifs.ko. Setting CIFSMaxBufSize to a very large value		will cause cifs to use more memory and may reduce performance		in some cases.  To use rsize greater than 127K (the original		cifs protocol maximum) also requires that the server support		a new Unix Capability flag (for very large read) which some		newer servers (e.g. Samba 3.0.26 or later) do. rsize can be		set from a minimum of 2048 to a maximum of 130048 (127K or		CIFSMaxBufSize, whichever is smaller)  wsize		default write size (default 57344)		maximum wsize currently allowed by CIFS is 57344 (fourteen		4096 byte pages)  rw		mount the network share read-write (note that the		server may still consider the share read-only)  ro		mount network share read-only  version	used to distinguish different versions of the		mount helper utility (not typically needed)  sep		if first mount option (after the -o), overrides		the comma as the separator between the mount		parms. e.g.			-o user=myname,password=mypassword,domain=mydom		could be passed instead with period as the separator by			-o sep=.user=myname.password=mypassword.domain=mydom		this might be useful when comma is contained within username		or password or domain. This option is less important		when the cifs mount helper cifs.mount (version 1.1 or later)		is used.  nosuid        Do not allow remote executables with the suid bit 		program to be executed.  This is only meaningful for mounts		to servers such as Samba which support the CIFS Unix Extensions.		If you do not trust the servers in your network (your mount		targets) it is recommended that you specify this option for		greater security.  exec		Permit execution of binaries on the mount.  noexec	Do not permit execution of binaries on the mount.  dev		Recognize block devices on the remote mount.  nodev		Do not recognize devices on the remote mount.  suid          Allow remote files on this mountpoint with suid enabled to 		be executed (default for mounts when executed as root,		nosuid is default for user mounts).  credentials   Although ignored by the cifs kernel component, it is used by 		the mount helper, mount.cifs. When mount.cifs is installed it		opens and reads the credential file specified in order  		to obtain the userid and password arguments which are passed to		the cifs vfs.  guest         Although ignored by the kernel component, the mount.cifs		mount helper will not prompt the user for a password		if guest is specified on the mount options.  If no		password is specified a null password will be used.  perm          Client does permission checks (vfs_permission check of uid		and gid of the file against the mode and desired operation),		Note that this is in addition to the normal ACL check on the		target machine done by the server software. 		Client permission checking is enabled by default.  noperm        Client does not do permission checks.  This can expose		files on this mount to access by other users on the local		client system. It is typically only needed when the server		supports the CIFS Unix Extensions but the UIDs/GIDs on the		client and server system do not match closely enough to allow		access by the user doing the mount, but it may be useful with		non CIFS Unix Extension mounts for cases in which the default		mode is specified on the mount but is not to be enforced on the		client (e.g. perhaps when MultiUserMount is enabled)		Note that this does not affect the normal ACL check on the		target machine done by the server software (of the server		ACL against the user name provided at mount time).  serverino	Use server's inode numbers instead of generating automatically		incrementing inode numbers on the client.  Although this will		make it easier to spot hardlinked files (as they will have		the same inode numbers) and inode numbers may be persistent,		note that the server does not guarantee that the inode numbers		are unique if multiple server side mounts are exported under a		single share (since inode numbers on the servers might not		be unique if multiple filesystems are mounted under the same		shared higher level directory).  Note that some older		(e.g. pre-Windows 2000) do not support returning UniqueIDs		or the CIFS Unix Extensions equivalent and for those		this mount option will have no effect.  Exporting cifs mounts		under nfsd requires this mount option on the cifs mount.  noserverino   Client generates inode numbers (rather than using the actual one		from the server) by default.  setuids       If the CIFS Unix extensions are negotiated with the server		the client will attempt to set the effective uid and gid of		the local process on newly created files, directories, and		devices (create, mkdir, mknod).  If the CIFS Unix Extensions		are not negotiated, for newly created files and directories		instead of using the default uid and gid specified on		the mount, cache the new file's uid and gid locally which means		that the uid for the file can change when the inode is	        reloaded (or the user remounts the share).  nosetuids     The client will not attempt to set the uid and gid on		on newly created files, directories, and devices (create, 		mkdir, mknod) which will result in the server setting the		uid and gid to the default (usually the server uid of the		user who mounted the share).  Letting the server (rather than		the client) set the uid and gid is the default. If the CIFS		Unix Extensions are not negotiated then the uid and gid for		new files will appear to be the uid (gid) of the mounter or the		uid (gid) parameter specified on the mount.  netbiosname   When mounting to servers via port 139, specifies the RFC1001		source name to use to represent the client netbios machine 		name when doing the RFC1001 netbios session initialize.  direct        Do not do inode data caching on files opened on this mount.		This precludes mmaping files on this mount. In some cases		with fast networks and little or no caching benefits on the		client (e.g. when the application is doing large sequential		reads bigger than page size without rereading the same data) 		this can provide better performance than the default		behavior which caches reads (readahead) and writes 		(writebehind) through the local Linux client pagecache 		if oplock (caching token) is granted and held. Note that		direct allows write operations larger than page size		to be sent to the server.  acl   	Allow setfacl and getfacl to manage posix ACLs if server		supports them.  (default)  noacl 	Do not allow setfacl and getfacl calls on this mount  user_xattr    Allow getting and setting user xattrs as OS/2 EAs (extended		attributes) to the server (default) e.g. via setfattr 

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -