-
Notifications
You must be signed in to change notification settings - Fork 940
Description
Motivation
The hardware landscape is evolving towards models with 96, 128, or more CPUs. However, Falco currently faces usability challenges on such machines, particularly those dealing with heavy traffic, especially in network and file-related activities.
One potential solution could involve allowing end users to specify a subset of enter or exit syscall events they want to drop on the kernel side. This feature would be flagged as very risky to use, similar to the existing base_syscalls
feature.
For instance, users might opt to drop enter syscall events for open*
and connect
syscalls, even though they are aware that doing so could expose them to TOCTOU attacks (mitigated by default via this PR). Nevertheless, this trade-off might be preferable to completely disabling Falco.
Feature
Introduce a new config base_syscalls.exclude_enter_exit_set
, allowing exclusion of specific enter or exit events that are part of the custom_set
syscalls. This exclusion is limited to scenarios where it makes sense for enter or exit events. Ensure good documentation.
Additional context
CC @falcosecurity/libs-maintainers