From Bugzilla Helper: User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; T312461; LM-MS; .NET CLR 1.0.3705; .NET CLR 1.1.4322) Description of problem: The system calls pread() and pwrite() currently can not be audited. Unlike other related calls such as read(), readv(), write(), and writev(), these calls are not included in the list of auditable calls in drivers/audit/syscall.c. This is a significant hole in the auditing support, because it allows a way to write to sensitive files without the write access being logged. Version-Release number of selected component (if applicable): How reproducible: Always Steps to Reproduce: 1. create rules to enable auditing of pwrite and pread in /etc/audit/filter.conf 2. enable auditing 3. run a program that uses pread or pwrite Actual Results: Access using pread or pwrite is not logged, and a kernel error message is generated for each time the syscall is used: "Filter target 0x0 not known or not supported in this context" Expected Results: The accesses should be logged Additional info:
*** This bug has been marked as a duplicate of 130823 ***
Changed to 'CLOSED' state since 'RESOLVED' has been deprecated.