Hello: This patch was applied to bpf/bpf-next.git (master) by Andrii Nakryiko <andrii@xxxxxxxxxx>: On Mon, 11 Aug 2025 14:08:04 +0200 you wrote: > In the past %pK was preferable to %p as it would not leak raw pointer > values into the kernel log. > Since commit ad67b74d2469 ("printk: hash addresses printed with %p") > the regular %p has been improved to avoid this issue. > Furthermore, restricted pointers ("%pK") were never meant to be used > through printk(). They can still unintentionally leak raw pointers or > acquire sleeping locks in atomic contexts. > > [...] Here is the summary with links: - bpf: Don't use %pK through printk https://git.kernel.org/bpf/bpf-next/c/2caa6b88e0ba You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html