Bug 2170283

Summary: Rebase to the latest upstream crash-utility(crash-8)
Product: Red Hat Enterprise Linux 9 Reporter: lijiang
Component: crashAssignee: lijiang
Status: CLOSED ERRATA QA Contact: xiaoying yan <yiyan>
Severity: unspecified Docs Contact: Sujata Kurup <skurup>
Priority: unspecified    
Version: 9.3CC: gfialova, jieli, ruyang, skurup
Target Milestone: rcKeywords: Rebase, Triaged
Target Release: 9.3   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: crash-8.0.3-1.el9 Doc Type: Enhancement
Doc Text:
.`crash` rebased to version 8.0.3 `crash` is an interactive utility to analyze a running system and a core dump file created by `kdump` if a kernel crash occurs. The `crash` utility has been rebased to version 8.0.3 that includes many bug fixes and enhancements. The most notable enhancement is the added IPv6 support. For network interfaces that support IPv6, `crash` prints IPv6 addresses with the `net` or `net -s` command. * The `net` command displays the list of network devices, names, and the IP address. * The `net -s` command displays the following information: ** The open network socket and sock addresses ** The family and the type of sockets and sock addresses ** The source and destination address and ports for `INET` and `INET6` families
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-11-07 08:30:17 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2152897, 2156543, 2156740, 2157038, 2160464, 2166269, 2170851, 2173896    

Description lijiang 2023-02-16 02:34:34 UTC
Description of problem:

Rebase to the latest upstream crash-utility(crash-8).

Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:

Comment 13 errata-xmlrpc 2023-11-07 08:30:17 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (crash bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2023:6391