mounts a Linux SMB filesystem. It is usually invoked as
command when using the "-t smbfs" option. This command only works in Linux, and the kernel must support the smbfs filesystem.
is deprecated and not maintained any longer.
(mount -t cifs) should be used instead of
are specified as a comma-separated list of key=value pairs. It is possible to send options other than those listed here, assuming that smbfs supports them. If you get mount failures, check your kernel log for errors on unknown options.
is a daemon. After mounting it keeps running until the mounted smbfs is umounted. It will log things that happen when in daemon mode using the "machine name" smbmount, so typically this output will end up in
process may also be called mount.smbfs.
to do the actual mount. You must make sure that
is in the path so that it can be found.
specifies the username to connect as. If this is not given, then the environment variable
USERis used. This option can also take the form "user%password" or "user/workgroup" or "user/workgroup%password" to allow the password and workgroup to be specified as part of the username.
specifies the SMB password. If this option is not given then the environment variable
is used. If it can find no password
will prompt for a password, unless the guest option is given.
Note that passwords which contain the argument delimiter character (i.e. a comma ',') will failed to be parsed correctly on the command line. However, the same password defined in the PASSWD environment variable or a credentials file (see below) will be read correctly.
specifies a file that contains a username and/or password. The format of the file is:
username = <value>
password = <value>
This is preferred over having passwords in plaintext in a shared file, such as
/etc/fstab. Be sure to protect any credentials file properly.
Use kerberos (Active Directory).
sets the source NetBIOS name. It defaults to the local hostname.
sets the uid that will own all files on the mounted filesystem. It may be specified as either a username or a numeric uid.
sets the gid that will own all files on the mounted filesystem. It may be specified as either a groupname or a numeric gid.
sets the remote SMB port number. The default is 445, fallback is 139.
sets the file mask. This determines the permissions that remote files have in the local filesystem. This is not a umask, but the actual permissions for the files. The default is based on the current umask.
Sets the directory mask. This determines the permissions that remote directories have in the local filesystem. This is not a umask, but the actual permissions for the directories. The default is based on the current umask.
Sets the debug level. This is useful for tracking down SMB connection problems. A suggested value to start with is 4. If set too high there will be a lot of output, possibly hiding the useful output.
Sets the destination host or IP address.
Sets the workgroup on the destination
Sets the TCP socket options. See the
Sets the NetBIOS scope
Don't prompt for a password
sets the charset used by the Linux side for codepage to charset translations (NLS). Argument should be the name of a charset, like iso8859-1. (Note: only kernel 2.4.0 or later)
sets the codepage the server uses. See the iocharset option. Example value cp850. (Note: only kernel 2.4.0 or later)
sets how long a directory listing is cached in milliseconds (also affects visibility of file size and date changes). A higher value means that changes on the server take longer to be noticed but it can give better performance on large directories, especially over long distances. Default is 1000ms but something like 10000ms (10 seconds) is probably more reasonable in many cases. (Note: only kernel 2.4.2 or later)
USERmay contain the username of the person using the client. This information is used only if the protocol level is high enough to support session-level passwords. The variable can be used to set both username and password by using the format username%password.
PASSWDmay contain the password of the person using the client. This information is used only if the protocol level is high enough to support session-level passwords.
PASSWD_FILEmay contain the pathname of a file to read the password from. A single line of input is read and used as the password.
File systems that have been mounted using the
can be unmounted using the
or the UNIX system
Passwords and other options containing , can not be handled. For passwords an alternative way of passing them is in a credentials file or in the PASSWD environment.
The credentials file does not handle usernames or passwords with leading space.
One smbfs bug is important enough to mention here, even if it is a bit misplaced:
Mounts sometimes stop working. This is usually caused by smbmount terminating. Since smbfs needs smbmount to reconnect when the server disconnects, the mount will eventually go dead. An umount/mount normally fixes this. At least 2 ways to trigger this bug are known.
Note that the typical response to a bug report is suggestion to try the latest version first. So please try doing that first, and always include which versions you use of relevant software when reporting bugs (minimum: samba, kernel, distribution)
Documentation/filesystems/smbfs.txt in the linux kernel source tree may contain additional options and information.
FreeBSD also has a smbfs, but it is not related to smbmount
For Solaris, HP-UX and others you may want to look at
or at other solutions, such as Sharity or perhaps replacing the SMB server with a NFS server.
Volker Lendecke, Andrew Tridgell, Michael H. Warfield and others.
The current maintainer of smbfs and the userspace tools
Urban Widmark. The
SAMBA Mailing list
is the preferred place to ask questions regarding these programs.
The conversion of this manpage for Samba 2.2 was performed by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 was done by Alexander Bokovoy.