Restricted pointers ("%pK") are only meant to be used when directly printing to a file from task context. Otherwise it can unintentionally expose security sensitive, raw pointer values. Use regular pointer formatting instead. Link: https://lore.kernel.org/lkml/20250113171731-dc10e3c1-da64-4af0-b767-7c7070468023@xxxxxxxxxxxxx/ Signed-off-by: Thomas Weißschuh <thomas.weissschuh@xxxxxxxxxxxxx> --- Thomas Weißschuh (2): KVM: s390: Don't use %pK through tracepoints KVM: s390: Don't use %pK through debug printing arch/s390/kvm/intercept.c | 2 +- arch/s390/kvm/interrupt.c | 8 ++++---- arch/s390/kvm/kvm-s390.c | 10 +++++----- arch/s390/kvm/trace-s390.h | 4 ++-- 4 files changed, 12 insertions(+), 12 deletions(-) --- base-commit: 0ad2507d5d93f39619fc42372c347d6006b64319 change-id: 20250217-restricted-pointers-s390-3e93b67a9996 Best regards, -- Thomas Weißschuh <thomas.weissschuh@xxxxxxxxxxxxx>