diff options
| author | Alexey Dobriyan <adobriyan@gmail.com> | 2019-03-05 15:50:35 -0800 | 
|---|---|---|
| committer | Linus Torvalds <torvalds@linux-foundation.org> | 2019-03-05 21:07:22 -0800 | 
| commit | 08b55775133b77acc9975ad772b41813cbfea674 (patch) | |
| tree | dff7ed19a175cbe8c8cf2d0e3bf17285c9ccec06 /fs/proc/array.c | |
| parent | 5713f35c0575a1137b705e13d10f8ee58f2ec7e8 (diff) | |
proc: use seq_puts() everywhere
seq_printf() without format specifiers == faster seq_puts()
Link: http://lkml.kernel.org/r/20190114200545.GC9680@avx2
Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'fs/proc/array.c')
| -rw-r--r-- | fs/proc/array.c | 16 | 
1 files changed, 8 insertions, 8 deletions
| diff --git a/fs/proc/array.c b/fs/proc/array.c index 9d428d5a0ac8..2edbb657f859 100644 --- a/fs/proc/array.c +++ b/fs/proc/array.c @@ -343,28 +343,28 @@ static inline void task_seccomp(struct seq_file *m, struct task_struct *p)  #ifdef CONFIG_SECCOMP  	seq_put_decimal_ull(m, "\nSeccomp:\t", p->seccomp.mode);  #endif -	seq_printf(m, "\nSpeculation_Store_Bypass:\t"); +	seq_puts(m, "\nSpeculation_Store_Bypass:\t");  	switch (arch_prctl_spec_ctrl_get(p, PR_SPEC_STORE_BYPASS)) {  	case -EINVAL: -		seq_printf(m, "unknown"); +		seq_puts(m, "unknown");  		break;  	case PR_SPEC_NOT_AFFECTED: -		seq_printf(m, "not vulnerable"); +		seq_puts(m, "not vulnerable");  		break;  	case PR_SPEC_PRCTL | PR_SPEC_FORCE_DISABLE: -		seq_printf(m, "thread force mitigated"); +		seq_puts(m, "thread force mitigated");  		break;  	case PR_SPEC_PRCTL | PR_SPEC_DISABLE: -		seq_printf(m, "thread mitigated"); +		seq_puts(m, "thread mitigated");  		break;  	case PR_SPEC_PRCTL | PR_SPEC_ENABLE: -		seq_printf(m, "thread vulnerable"); +		seq_puts(m, "thread vulnerable");  		break;  	case PR_SPEC_DISABLE: -		seq_printf(m, "globally mitigated"); +		seq_puts(m, "globally mitigated");  		break;  	default: -		seq_printf(m, "vulnerable"); +		seq_puts(m, "vulnerable");  		break;  	}  	seq_putc(m, '\n'); | 
