Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S262258AbTELQVl (ORCPT ); Mon, 12 May 2003 12:21:41 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S262270AbTELQVl (ORCPT ); Mon, 12 May 2003 12:21:41 -0400 Received: from siaab1aa.compuserve.com ([149.174.40.1]:13300 "EHLO siaab1aa.compuserve.com") by vger.kernel.org with ESMTP id S262258AbTELQVk (ORCPT ); Mon, 12 May 2003 12:21:40 -0400 Date: Mon, 12 May 2003 12:32:15 -0400 From: Chuck Ebbert <76306.1226@compuserve.com> Subject: Re: The disappearing sys_call_table export. To: Alan Cox Cc: Linux Kernel Mailing List Message-ID: <200305121234_MC3-1-3882-CFEC@compuserve.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 902 Lines: 22 Alan Cox wrote: > You knocked down my military server - who cares. You stole my > list of secret command centres - Im deeply upset. Or even worse: you stole my list of command centers and I don't even know it happened. At least with an audit trail you have a chance of knowing your secrets have been compromised. Banks also seem to like the idea of a server that will crash rather than transfer funds without leaving a trail. So how long till Linux gets decent auditing? Is the SNARE code going to get into the kernel? ...and on a related topic, if someone wrote a patch to optionally clear the swap area at swapoff would it ever be accepted? - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/