Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Sat, 26 Oct 2002 14:53:24 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Sat, 26 Oct 2002 14:53:23 -0400 Received: from leibniz.math.psu.edu ([146.186.130.2]:23700 "EHLO math.psu.edu") by vger.kernel.org with ESMTP id ; Sat, 26 Oct 2002 14:53:23 -0400 Date: Sat, 26 Oct 2002 14:59:39 -0400 (EDT) From: Alexander Viro To: Andreas Steinmetz cc: linux-kernel@vger.kernel.org Subject: Re: rootfs exposure in /proc/mounts In-Reply-To: <3DBAE4A0.4090802@domdv.de> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 620 Lines: 18 On Sat, 26 Oct 2002, Andreas Steinmetz wrote: > Maybe I do oversee the obious but: > > can somebody please explain why rootfs is exposed in /proc/mounts (I do > mean the "rootfs / rootfs rw 0 0" entry) and if there is a good reason > for the exposure? Mostly the fact that it _is_ mounted and special-casing its removal from /proc/mounts is more PITA than it's worth. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/