diff options
author | Alexey Dobriyan <adobriyan@gmail.com> | 2019-03-05 18:50:35 -0500 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2019-03-06 00:07:22 -0500 |
commit | 08b55775133b77acc9975ad772b41813cbfea674 (patch) | |
tree | dff7ed19a175cbe8c8cf2d0e3bf17285c9ccec06 /fs/proc | |
parent | 5713f35c0575a1137b705e13d10f8ee58f2ec7e8 (diff) |
proc: use seq_puts() everywhere
seq_printf() without format specifiers == faster seq_puts()
Link: http://lkml.kernel.org/r/20190114200545.GC9680@avx2
Signed-off-by: Alexey Dobriyan <adobriyan@gmail.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'fs/proc')
-rw-r--r-- | fs/proc/array.c | 16 | ||||
-rw-r--r-- | fs/proc/base.c | 2 | ||||
-rw-r--r-- | fs/proc/task_nommu.c | 2 |
3 files changed, 10 insertions, 10 deletions
diff --git a/fs/proc/array.c b/fs/proc/array.c index 9d428d5a0ac8..2edbb657f859 100644 --- a/fs/proc/array.c +++ b/fs/proc/array.c | |||
@@ -343,28 +343,28 @@ static inline void task_seccomp(struct seq_file *m, struct task_struct *p) | |||
343 | #ifdef CONFIG_SECCOMP | 343 | #ifdef CONFIG_SECCOMP |
344 | seq_put_decimal_ull(m, "\nSeccomp:\t", p->seccomp.mode); | 344 | seq_put_decimal_ull(m, "\nSeccomp:\t", p->seccomp.mode); |
345 | #endif | 345 | #endif |
346 | seq_printf(m, "\nSpeculation_Store_Bypass:\t"); | 346 | seq_puts(m, "\nSpeculation_Store_Bypass:\t"); |
347 | switch (arch_prctl_spec_ctrl_get(p, PR_SPEC_STORE_BYPASS)) { | 347 | switch (arch_prctl_spec_ctrl_get(p, PR_SPEC_STORE_BYPASS)) { |
348 | case -EINVAL: | 348 | case -EINVAL: |
349 | seq_printf(m, "unknown"); | 349 | seq_puts(m, "unknown"); |
350 | break; | 350 | break; |
351 | case PR_SPEC_NOT_AFFECTED: | 351 | case PR_SPEC_NOT_AFFECTED: |
352 | seq_printf(m, "not vulnerable"); | 352 | seq_puts(m, "not vulnerable"); |
353 | break; | 353 | break; |
354 | case PR_SPEC_PRCTL | PR_SPEC_FORCE_DISABLE: | 354 | case PR_SPEC_PRCTL | PR_SPEC_FORCE_DISABLE: |
355 | seq_printf(m, "thread force mitigated"); | 355 | seq_puts(m, "thread force mitigated"); |
356 | break; | 356 | break; |
357 | case PR_SPEC_PRCTL | PR_SPEC_DISABLE: | 357 | case PR_SPEC_PRCTL | PR_SPEC_DISABLE: |
358 | seq_printf(m, "thread mitigated"); | 358 | seq_puts(m, "thread mitigated"); |
359 | break; | 359 | break; |
360 | case PR_SPEC_PRCTL | PR_SPEC_ENABLE: | 360 | case PR_SPEC_PRCTL | PR_SPEC_ENABLE: |
361 | seq_printf(m, "thread vulnerable"); | 361 | seq_puts(m, "thread vulnerable"); |
362 | break; | 362 | break; |
363 | case PR_SPEC_DISABLE: | 363 | case PR_SPEC_DISABLE: |
364 | seq_printf(m, "globally mitigated"); | 364 | seq_puts(m, "globally mitigated"); |
365 | break; | 365 | break; |
366 | default: | 366 | default: |
367 | seq_printf(m, "vulnerable"); | 367 | seq_puts(m, "vulnerable"); |
368 | break; | 368 | break; |
369 | } | 369 | } |
370 | seq_putc(m, '\n'); | 370 | seq_putc(m, '\n'); |
diff --git a/fs/proc/base.c b/fs/proc/base.c index fcb0180d3988..511b279ec69c 100644 --- a/fs/proc/base.c +++ b/fs/proc/base.c | |||
@@ -456,7 +456,7 @@ static int proc_pid_schedstat(struct seq_file *m, struct pid_namespace *ns, | |||
456 | struct pid *pid, struct task_struct *task) | 456 | struct pid *pid, struct task_struct *task) |
457 | { | 457 | { |
458 | if (unlikely(!sched_info_on())) | 458 | if (unlikely(!sched_info_on())) |
459 | seq_printf(m, "0 0 0\n"); | 459 | seq_puts(m, "0 0 0\n"); |
460 | else | 460 | else |
461 | seq_printf(m, "%llu %llu %lu\n", | 461 | seq_printf(m, "%llu %llu %lu\n", |
462 | (unsigned long long)task->se.sum_exec_runtime, | 462 | (unsigned long long)task->se.sum_exec_runtime, |
diff --git a/fs/proc/task_nommu.c b/fs/proc/task_nommu.c index 0b63d68dedb2..3b7e310297d2 100644 --- a/fs/proc/task_nommu.c +++ b/fs/proc/task_nommu.c | |||
@@ -178,7 +178,7 @@ static int nommu_vma_show(struct seq_file *m, struct vm_area_struct *vma) | |||
178 | seq_file_path(m, file, ""); | 178 | seq_file_path(m, file, ""); |
179 | } else if (mm && is_stack(vma)) { | 179 | } else if (mm && is_stack(vma)) { |
180 | seq_pad(m, ' '); | 180 | seq_pad(m, ' '); |
181 | seq_printf(m, "[stack]"); | 181 | seq_puts(m, "[stack]"); |
182 | } | 182 | } |
183 | 183 | ||
184 | seq_putc(m, '\n'); | 184 | seq_putc(m, '\n'); |