The patch titled Subject: mm, mempool: use '%zu' for printing 'size_t' variable has been removed from the -mm tree. Its filename was mm-mempool-poison-elements-backed-by-page-allocator-fix.patch This patch was dropped because it was folded into mm-mempool-poison-elements-backed-by-slab-allocator.patch ------------------------------------------------------ From: Fabio Estevam <fabio.estevam@xxxxxxxxxxxxx> Subject: mm, mempool: use '%zu' for printing 'size_t' variable fix printk warning Commit 8b65aaa9c53404 ("mm, mempool: poison elements backed by page allocator") caused the following build warning on ARM: mm/mempool.c:31:2: warning: format '%ld' expects argument of type 'long int', but argument 3 has type 'size_t' [-Wformat] Use '%zu' for printing 'size_t' variable. Signed-off-by: Fabio Estevam <fabio.estevam@xxxxxxxxxxxxx> Cc: David Rientjes <rientjes@xxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- mm/mempool.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff -puN mm/mempool.c~mm-mempool-poison-elements-backed-by-page-allocator-fix mm/mempool.c --- a/mm/mempool.c~mm-mempool-poison-elements-backed-by-page-allocator-fix +++ a/mm/mempool.c @@ -28,7 +28,7 @@ static void poison_error(mempool_t *pool int i; pr_err("BUG: mempool element poison mismatch\n"); - pr_err("Mempool %p size %ld\n", pool, size); + pr_err("Mempool %p size %zu\n", pool, size); pr_err(" nr=%d @ %p: %s0x", nr, element, start > 0 ? "... " : ""); for (i = start; i < end; i++) pr_cont("%x ", *(u8 *)(element + i)); _ Patches currently in -mm which might be from fabio.estevam@xxxxxxxxxxxxx are origin.patch mm-mempool-poison-elements-backed-by-slab-allocator.patch -- To unsubscribe from this list: send the line "unsubscribe mm-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html