The procfs not being mounted is intentional, and is made to prevent malicious user to access systems informations.
Not having procfs mounted is not the only possible way to achieve that.
You can mount procfs with hidepid=2
option to make unprivileged user see their own processes only, which hides a lot of information about the system. See proc(5)
for details about this function.
To limit access to procfs further (as it contains information not about processes only, but also files like cpuinfo
, modules
etc, and hidepid
doesn't hide these parts), you can specify restricted mode for a mountpoint, like 0711 or even 0700. Given that /proc
owner is root, only root would be allowed to access procfs in the latter case. This means that you can use ps
, top
, htop
etc, inspect /proc/mdstat
for example but only when you logged in as root, and other users can't - they would face "permission denied" error when trying to access /proc
.
Also I don't recommend leaving your system without procfs at all, as a lot of programs rely on it being mounted (not only ps
).