-
Notifications
You must be signed in to change notification settings - Fork 169
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[TRACKING] Parse more syscalls args, e.g. fallocate
, ftruncate
, fsopen
, fsmount
, kexec_load
etc
#1951
Comments
/milestone TBD |
CC @ericsage here is a previous PR showing how to add new fillers https://github.com/falcosecurity/libs/pull/1242/files. |
Issues go stale after 90d of inactivity. Mark the issue as fresh with Stale issues rot after an additional 30d of inactivity and eventually close. If this issue is safe to close now please do so with Provide feedback via https://github.com/falcosecurity/community. /lifecycle stale |
/remove-lifecycle stale |
Issues go stale after 90d of inactivity. Mark the issue as fresh with Stale issues rot after an additional 30d of inactivity and eventually close. If this issue is safe to close now please do so with Provide feedback via https://github.com/falcosecurity/community. /lifecycle stale |
/remove-lifecycle stale |
Motivation
For specialized detections we could benefit from fully supporting and parsing the following syscalls.
fallocate
CC @Molter73ftruncate
CC @Molter73fsopen
fsmount
kexec_load
They are currently yellow / generic syscalls https://falcosecurity.github.io/libs/report/
The text was updated successfully, but these errors were encountered: