How to Install and Uninstall retsnoop.x86_64 Package on Red Hat Enterprise Linux 8 (RHEL 8)
Last updated: January 13,2025
1. Install "retsnoop.x86_64" package
This guide covers the steps necessary to install retsnoop.x86_64 on Red Hat Enterprise Linux 8 (RHEL 8)
$
sudo dnf update
Copied
$
sudo dnf install
retsnoop.x86_64
Copied
2. Uninstall "retsnoop.x86_64" package
Please follow the step by step instructions below to uninstall retsnoop.x86_64 on Red Hat Enterprise Linux 8 (RHEL 8):
$
sudo dnf remove
retsnoop.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the retsnoop.x86_64 package on Red Hat Enterprise Linux 8 (RHEL 8)
Last metadata expiration check: 0:54:47 ago on Mon Feb 26 15:59:38 2024.
Available Packages
Name : retsnoop
Version : 0.9.8
Release : 1.el8
Architecture : x86_64
Size : 952 k
Source : retsnoop-0.9.8-1.el8.src.rpm
Repository : epel
Summary : A tool for investigating kernel error call stacks
URL : https://github.com/anakryiko/retsnoop
License : BSD-2-Clause AND (LGPL-2.1-only OR BSD-2-Clause) AND (Apache-2.0 OR MIT) AND MIT AND (0BSD OR Apache-2.0 OR MIT) AND (MIT OR Unlicense) AND (Apache-2.0 OR MIT OR Zlib)
Description : retsnoop is BPF-based tool that is meant to help debugging kernel issues. It
: allows to capture call stacks of kernel functions that return errors (NULL or
: -Exxx) and emits every such detected call stack, along with the captured
: results.
Available Packages
Name : retsnoop
Version : 0.9.8
Release : 1.el8
Architecture : x86_64
Size : 952 k
Source : retsnoop-0.9.8-1.el8.src.rpm
Repository : epel
Summary : A tool for investigating kernel error call stacks
URL : https://github.com/anakryiko/retsnoop
License : BSD-2-Clause AND (LGPL-2.1-only OR BSD-2-Clause) AND (Apache-2.0 OR MIT) AND MIT AND (0BSD OR Apache-2.0 OR MIT) AND (MIT OR Unlicense) AND (Apache-2.0 OR MIT OR Zlib)
Description : retsnoop is BPF-based tool that is meant to help debugging kernel issues. It
: allows to capture call stacks of kernel functions that return errors (NULL or
: -Exxx) and emits every such detected call stack, along with the captured
: results.