On Sat, 15 Jun 2002, Robinson Maureira Castillo wrote:
> diff -Nrua linux/kernel/module.c linux-info/kernel/module.c
> --- linux/kernel/module.c Sat Jun 15 01:00:24 2002
> +++ linux-info/kernel/module.c Sat Jun 15 01:02:37 2002
> @@ -560,6 +560,7 @@
>
> /* And set it running. */
> mod->flags = (mod->flags | MOD_RUNNING) & ~MOD_INITIALIZING;
> + printk(KERN_INFO "module: %s loaded\n", mod->name);
> error = 0;
> goto err0;
And when this gets to mainline, what stops your hacker from removing the
printk from displaying? The way i see it, if the person is loading modules
you're screwed beyond help.
Regards,
Zwane Mwaikambo
-- http://function.linuxpower.ca- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Sat Jun 15 2002 - 22:00:33 EST