--- /dev/null
+From b1a384d2cbccb1eb3f84765020d25e2c1929706e Mon Sep 17 00:00:00 2001
+From: "Russell King (Oracle)" <rmk+kernel@armlinux.org.uk>
+Date: Thu, 10 Mar 2022 10:22:14 +0000
+Subject: ARM: fix build warning in proc-v7-bugs.c
+
+From: Russell King (Oracle) <rmk+kernel@armlinux.org.uk>
+
+commit b1a384d2cbccb1eb3f84765020d25e2c1929706e upstream.
+
+The kernel test robot discovered that building without
+HARDEN_BRANCH_PREDICTOR issues a warning due to a missing
+argument to pr_info().
+
+Add the missing argument.
+
+Reported-by: kernel test robot <lkp@intel.com>
+Fixes: 9dd78194a372 ("ARM: report Spectre v2 status through sysfs")
+Signed-off-by: Russell King (Oracle) <rmk+kernel@armlinux.org.uk>
+Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ arch/arm/mm/proc-v7-bugs.c | 3 ++-
+ 1 file changed, 2 insertions(+), 1 deletion(-)
+
+--- a/arch/arm/mm/proc-v7-bugs.c
++++ b/arch/arm/mm/proc-v7-bugs.c
+@@ -110,7 +110,8 @@ static unsigned int spectre_v2_install_w
+ #else
+ static unsigned int spectre_v2_install_workaround(unsigned int method)
+ {
+- pr_info("CPU%u: Spectre V2: workarounds disabled by configuration\n");
++ pr_info("CPU%u: Spectre V2: workarounds disabled by configuration\n",
++ smp_processor_id());
+
+ return SPECTRE_VULNERABLE;
+ }
arm-do-not-use-nocrossrefs-directive-with-ld.lld.patch
x86-build-fix-compiler-support-check-for-config_retpoline.patch
x86-modpost-replace-last-remnants-of-retpoline-with-config_retpoline.patch
+arm-fix-build-warning-in-proc-v7-bugs.c.patch