And then one addition:
initrd files includes system root for boot
process before real partition is mounted. initrd includes some
subset of modules from /lib/modules/{kernel-version}. It is probably generated
with command mkinitrd.
> Looking at the following:
> =
#x27;.
For _following_ symlink, permissions of symlink are not checked
(at least not checked 'traditiomally' on unix -- I do not know about Linux.)
On some systems for reading value of symlink if symlink is on NFS server,
permissions of symlink are checked.
I actually do not know
;
(or I looked wrong function)
> So why can't I follow the link of 'exe' to see what image the process
> is executing? Programs like 'ps' and 'top' seem to not have this
> difficulty.
Are you sure that 'top' uses that 'exe