Skip to content

Commit 342b20d

Browse files
LucaGuerrapoiana
authored andcommitted
update(rule): update description
Signed-off-by: Luca Guerra <[email protected]>
1 parent 1d3cd24 commit 342b20d

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

rules/falco-incubating_rules.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1296,7 +1296,7 @@
12961296
BPF is a kernel technology that can be misused for malicious purposes, like "Linux Kernel Module Injection". This
12971297
rule should be considered an auditing rule to notify you of any unprofiled BPF tools running in your environment.
12981298
However, it requires customization after profiling your environment. BPF-powered agents make bpf syscalls all the
1299-
time, so this rule only sends logs for BPF_PROG_LOAD calls (bpf cmd=BPF_PROG_LOAD) in the enter event. If you also want to log
1299+
time, so this rule only sends logs for BPF_PROG_LOAD calls (bpf cmd=5) in the enter event. If you also want to log
13001300
whether the syscall failed or succeeded, remove the direction filter and add the evt.arg.res_or_fd output field.
13011301
condition: >
13021302
evt.type=bpf and evt.dir=>

0 commit comments

Comments
 (0)