15.3. Mounting, Unmounting and Ejecting


In virtual file systems, particular resources are set to be mounted automatically, but a most common way is to trigger mounts manually.

Procedure 15.1. Manual Mounting

  1. Open a file in Nautilus (that is, the Files application).
  2. In the location bar at the top of your screen, enter a well-formed URI string. If the location bar does not display, press Ctrl+L.
    Alternatively, Nautilus provides Connect to server dialog, which you find by going into Files Connect to server.
  3. When asked for login credentials, type your name and password into the relevant entry boxes.
  4. Once the mounting process is finished, your are allowed to work with files.
When you need to unmount the resource, follow the simple procedure below.

Procedure 15.2. Unmounting

  1. Click the eject icon on the chosen mount.
  2. Wait until the mount disappears or notification about safe removal is displayed.

Important

Data may be cached or being slowly written in the background for performance reasons. To deliver the data safely on the device or remote resource, never unplug or disconnect the device or remote resource.
Mounts are shared between applications and are tracked globally within the running desktop session, which means that even if you quit an application that triggered the mount, it continues to be available for any other application. The same way multiple applications may access the mount at the same time, unless it was limited by a back end (some protocols permit only single channel due to their design).

Important

GVFS mounts, (and physical volumes as well, are restricted to their owner only, no other user is permitted to exploit your privacy.
Red Hat logoGithubRedditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.