Hello: This series was applied to bpf/bpf-next.git (master) by Alexei Starovoitov <ast@xxxxxxxxxx>: On Wed, 2 Jul 2025 00:36:19 -0700 you wrote: > Commit f2362a57aeff ("bpf: allow void* cast using bpf_rdonly_cast()") > added a notion of PTR_TO_MEM | MEM_RDONLY | PTR_UNTRUSTED type. > This simultaneously introduced a bug in jump prediction logic for > situations like below: > > p = bpf_rdonly_cast(..., 0); > if (p) a(); else b(); > > [...] Here is the summary with links: - [bpf-next,v1,1/2] bpf: avoid jump misprediction for PTR_TO_MEM | PTR_UNTRUSTED https://git.kernel.org/bpf/bpf-next/c/c8313bad6d24 - [bpf-next,v1,2/2] selftests/bpf: null checks for rdonly_untrusted_mem should be preserved https://git.kernel.org/bpf/bpf-next/c/621af1928153 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html