1 .\" $NetBSD: mount_overlay.8,v 1.8 2003/08/07 10:04:30 agc Exp $
3 .\" Copyright (c) 1992, 1993, 1994
4 .\" The Regents of the University of California. All rights reserved.
6 .\" This code is derived from software donated to Berkeley by
7 .\" John Heidemann of the UCLA Ficus project.
9 .\" Redistribution and use in source and binary forms, with or without
10 .\" modification, are permitted provided that the following conditions
12 .\" 1. Redistributions of source code must retain the above copyright
13 .\" notice, this list of conditions and the following disclaimer.
14 .\" 2. Redistributions in binary form must reproduce the above copyright
15 .\" notice, this list of conditions and the following disclaimer in the
16 .\" documentation and/or other materials provided with the distribution.
17 .\" 3. Neither the name of the University nor the names of its contributors
18 .\" may be used to endorse or promote products derived from this software
19 .\" without specific prior written permission.
21 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 .\" @(#)mount_null.8 8.6 (Berkeley) 5/1/95
41 .Nd mount an overlay filesystem;
42 demonstrate the use of an overlay file system layer
52 overlay layer, interposing the overlay filesystem between the over-mounted
53 file store and future pathname lookups.
55 A different device number for the virtual copy is returned by
57 but in other respects it is indistinguishable from the original.
61 filesystem differs from the null filesystem in that the
63 filesystem does not replicate the sub-tree, it places itself between
64 the sub-tree and all future access.
66 The overlay layer has two purposes.
67 First, it serves as a demonstration of layering by providing a layer
68 which does nothing other than insert itself over the over-mounted
70 Second, the overlay layer can serve as a prototype layer.
71 Since it provides all necessary layer framework,
72 new file system layers which need to block access to the overlayed
73 file system can be created very easily by starting
74 with an overlay layer.
76 The internal operation of the overlay layer is identical to that of the
78 See its documentation for details.
83 UCLA Technical Report CSD-910056,
84 .Em "Stackable Layers: an Architecture for File System Development" .
88 utility first appeared in