Andrea Terzolo
                                            Andrea Terzolo
                                        
                                    Thank you @sumitd2, we will take a look at it. As @FedeDP said right now only x86_64 is officially supported, but we will try to fix this kind of issue...
Yeah probably enabling BPF raw tracepoint when available breaks the compilation in not supported architectures, it would be great to have the build error just to be sure of it...
@sumitd2 yes raw_tracepoint causes these problems on unsupported architectures, hoping the conditional compilation will be enough, I will try to fix it ASAP :)
Ei @sumitd2 this one should solve your problem https://github.com/falcosecurity/libs/pull/505
Hey @araujof thank you for pointing this out! For what concern the `execveat` exit event, this is the normal kernel behavior, since `execveat` is a wrapper of `execve`, when the...
Ei @araujof this PR https://github.com/falcosecurity/libs/pull/552 should solve the issue, I have added some [test cases](https://github.com/falcosecurity/libs/pull/552/files#diff-001a02eb8d9e55cabad4f56e61bfefb1bdbcdfadd740d76cfe9a23ab87dc2f4eR59-R108) and it seems to work smooth :)
> Hi Andrea, like always, good catch! :D > > I agree with you; i'd phrase it in a different way actually: "if we today are able to push to...
I have slightly changed the issue format with `Generic event issues` and `Specific event issues` in this way it should be more maintainable, thank you to @hbrueckner @Molter73 @FedeDP for...
Hi @alban thank you for this PR! If I understand well, you have compiled our bpf probe from the source on this machine `Ubuntu 20.04.4 LTS with Linux 5.13.0-1023-azure` and...
It's always a pleasure to work with you @FedeDP :rocket: