| supportportal.crowdstrike.com
| supportportal.crowdstrike.com
The community hub for the Rocky Linux project.| Rocky Linux Forum
Sysadmin for 25+ years. Using Linux everyday for last 15+ years. RHCSA + RHCE.| Rocky Linux Forum
The community hub for the Rocky Linux project.| Rocky Linux Forum
The community hub for the Rocky Linux project.| Rocky Linux Forum
This post should also help: switching Crowdstrike to kernel backend means you can leave it enabled.| Rocky Linux Forum
Yes, see here:| Rocky Linux Forum
Note:| access.redhat.com
eBPF program causes kernel panic on kernels 5.14.0-410+ . Below is an example of a kernel panic on the falcon-sensor process, observed after booting on kernel version 5.14.0-427.13.1.el9_4.x86_64. [ 462.396258] BUG: unable to handle page fault for address: ffff9a4bdb0f2d88 [ 462.396291] #PF: supervisor write access in kernel mode [ 462.396309] #PF: error_code(0x0002) - not-present page [ 462.396327] PGD 14e203067 P4D 14e203067 PUD 0 [ 462.396345] Oops: 0002 [#1] PREEMPT SMP NOPTI [ 462.397204...| Red Hat Customer Portal