Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Sat, 15 Jun 2002 04:38:06 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Sat, 15 Jun 2002 04:38:05 -0400 Received: from swazi.realnet.co.sz ([196.28.7.2]:5272 "HELO netfinity.realnet.co.sz") by vger.kernel.org with SMTP id ; Sat, 15 Jun 2002 04:38:04 -0400 Date: Sat, 15 Jun 2002 10:09:24 +0200 (SAST) From: Zwane Mwaikambo X-X-Sender: zwane@netfinity.realnet.co.sz To: Robinson Maureira Castillo Cc: linux-kernel@vger.kernel.org Subject: Re: [RFC][TRIVIAL] Print a KERN_INFO after a module gets loaded In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 15 Jun 2002, Robinson Maureira Castillo wrote: > diff -Nrua linux/kernel/module.c linux-info/kernel/module.c > --- linux/kernel/module.c Sat Jun 15 01:00:24 2002 > +++ linux-info/kernel/module.c Sat Jun 15 01:02:37 2002 > @@ -560,6 +560,7 @@ > > /* And set it running. */ > mod->flags = (mod->flags | MOD_RUNNING) & ~MOD_INITIALIZING; > + printk(KERN_INFO "module: %s loaded\n", mod->name); > error = 0; > goto err0; And when this gets to mainline, what stops your hacker from removing the printk from displaying? The way i see it, if the person is loading modules you're screwed beyond help. Regards, Zwane Mwaikambo -- http://function.linuxpower.ca - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/