_systemtap_ rebased to version 3.3
The _systemtap_ packages have been upgraded to upstream version 3.3, which provides a number of bug fixes and enhancements:
* Limited support for the extended Berkeley Packet Filter (eBPF) tracing on the Intel64 and AMD64 architectures has been added. Use the `--runtime=bpf` option to use eBPF as a backend. Due to numerous limitations of `eBPF` and its SystemTap interface, only simple scripts work. For more information, see the Knowledge article https://access.redhat.com/articles/3550581 and the stapbpf(8) manual page.
* The `--sysroot` option has been optimized for cross-compiled environments.
* A new `--example` option allows you to search the example scripts distributed with SystemTap without providing the whole path of the file.
* The SystemTap runtime and tapsets are compatible with kernel versions up to 4.17.
* Usage of SystemTap on systems with real time kernel or machines with a high number of CPUs has been improved.
* Handling of code used for Spectre and Meltdown attack mitigation has been improved.
We plan to incorporate soon to be released upstream systemtap into RHEL 7.6.
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.
For information on the advisory, and where to find the updated
files, follow the link below.
If the solution does not work for you, open a new bug report.