Hi, I wanted to place a file watch on a file, but with an auid filter, i.e., I didn't want to log accesses done by a particular user. That is not possible with -w, so we have to use a syscall rule.
The manpage has many examples of such conversions, so here is what I would use: -a always,exit -F auid!=andreas -F path=/etc/myfile -F perm=wa -F key=myfile-changed No syscall, because the manpage also says this for the perm filter: "You can use this without specifying a syscall and the kernel will select the syscalls that satisfy the permissions being requested." Right after loading that rule, though, auditctl shows it with "-S all": -a always,exit -S all -F auid!=1000 -F path=/etc/myfile -F perm=wa -F key=myfile-changed That had me a bit worried, in terms of performance impact, if "-S all" is true and all syscalls will be checked. Is this a terrible rule? -- Linux-audit mailing list [email protected] https://listman.redhat.com/mailman/listinfo/linux-audit
