Hello: This patch was applied to bpf/bpf-next.git (master) by Andrii Nakryiko <andrii@xxxxxxxxxx>: On Fri, 22 Mar 2024 14:49:36 +0100 you wrote: > Some distros seem to enable the -fcf-protection=branch by default, > which breaks our setup on first instruction of uprobe trigger > functions and place there endbr64 instruction. > > Marking them with nocf_check attribute to skip that. > > Ignoring unknown attribute warning in gcc for bench objects, because > nocf_check can be used only when -fcf-protection=branch is enabled, > otherwise we get a warning and break compilation. > > [...] Here is the summary with links: - [PATCHv2,bpf-next] selftests/bpf: Mark uprobe trigger functions with nocf_check attribute https://git.kernel.org/bpf/bpf-next/c/af8d27bf15c8 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html