Hello: This series was applied to bpf/bpf-next.git (master) by Alexei Starovoitov <ast@xxxxxxxxxx>: On Tue, 19 Sep 2023 12:09:02 +0200 you wrote: > v1: https://lore.kernel.org/bpf/20230830011128.1415752-1-iii@xxxxxxxxxxxxx/ > v1 -> v2: > - Redo Disable zero-extension for BPF_MEMSX as Puranjay and Alexei > suggested. > - Drop the bpf_ct_insert_entry() patch, it went in via the bpf tree. > - Rebase, don't apply A-bs because there were fixed conflicts. > > [...] Here is the summary with links: - [bpf-next,v2,01/10] bpf: Disable zero-extension for BPF_MEMSX https://git.kernel.org/bpf/bpf-next/c/577c06af8188 - [bpf-next,v2,02/10] selftests/bpf: Unmount the cgroup2 work directory https://git.kernel.org/bpf/bpf-next/c/6cb66eca36f3 - [bpf-next,v2,03/10] selftests/bpf: Add big-endian support to the ldsx test https://git.kernel.org/bpf/bpf-next/c/9873ce2e9c68 - [bpf-next,v2,04/10] s390/bpf: Implement BPF_MOV | BPF_X with sign-extension https://git.kernel.org/bpf/bpf-next/c/3de55893f648 - [bpf-next,v2,05/10] s390/bpf: Implement BPF_MEMSX https://git.kernel.org/bpf/bpf-next/c/738476a079bd - [bpf-next,v2,06/10] s390/bpf: Implement unconditional byte swap https://git.kernel.org/bpf/bpf-next/c/90f426d35e01 - [bpf-next,v2,07/10] s390/bpf: Implement unconditional jump with 32-bit offset https://git.kernel.org/bpf/bpf-next/c/c690191e23d8 - [bpf-next,v2,08/10] s390/bpf: Implement signed division https://git.kernel.org/bpf/bpf-next/c/91d2ad78e90c - [bpf-next,v2,09/10] selftests/bpf: Enable the cpuv4 tests for s390x https://git.kernel.org/bpf/bpf-next/c/48c432382dd4 - [bpf-next,v2,10/10] selftests/bpf: Trim DENYLIST.s390x https://git.kernel.org/bpf/bpf-next/c/c29913bbf4ec You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html