Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Sat, 26 Oct 2002 14:47:31 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Sat, 26 Oct 2002 14:47:31 -0400 Received: from hermes.domdv.de ([193.102.202.1]:264 "EHLO zeus.domdv.de") by vger.kernel.org with ESMTP id ; Sat, 26 Oct 2002 14:47:30 -0400 Message-ID: <3DBAE4A0.4090802@domdv.de> Date: Sat, 26 Oct 2002 20:53:20 +0200 From: Andreas Steinmetz User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.1) Gecko/20021020 X-Accept-Language: en-us, en MIME-Version: 1.0 To: linux-kernel@vger.kernel.org Subject: rootfs exposure in /proc/mounts X-Enigmail-Version: 0.65.2.0 X-Enigmail-Supports: pgp-inline, pgp-mime Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 467 Lines: 14 Maybe I do oversee the obious but: can somebody please explain why rootfs is exposed in /proc/mounts (I do mean the "rootfs / rootfs rw 0 0" entry) and if there is a good reason for the exposure? -- Andreas Steinmetz - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/