[TRACKING] Parse more syscalls args, e.g. fallocate
, ftruncate
, fsopen
, fsmount
, kexec_load
etc
#1951
Labels
kind/feature
New feature or request
Milestone
Motivation
For specialized detections we could benefit from fully supporting and parsing the following syscalls.
fallocate
CC @Molter73ftruncate
CC @Molter73fsopen
fsmount
kexec_load
They are currently yellow / generic syscalls https://falcosecurity.github.io/libs/report/
The text was updated successfully, but these errors were encountered: