| /arch/alpha/kernel/ |
| A D | bugs.c | 24 return sprintf(buf, "Vulnerable\n"); in cpu_show_meltdown() 26 return sprintf(buf, "Not affected\n"); in cpu_show_meltdown() 33 return sprintf(buf, "Vulnerable\n"); in cpu_show_spectre_v1() 35 return sprintf(buf, "Not affected\n"); in cpu_show_spectre_v1() 42 return sprintf(buf, "Vulnerable\n"); in cpu_show_spectre_v2() 44 return sprintf(buf, "Not affected\n"); in cpu_show_spectre_v2()
|
| A D | err_marvel.c | 260 sprintf(starvation_message, in marvel_print_po7_uncrr_sym() 264 sprintf(starvation_message, in marvel_print_po7_uncrr_sym() 296 sprintf(opcode_str, "Wr32"); in marvel_print_po7_ugbge_sym() 299 sprintf(opcode_str, "WrQW"); in marvel_print_po7_ugbge_sym() 302 sprintf(opcode_str, "WrIPR"); in marvel_print_po7_ugbge_sym() 305 sprintf(opcode_str, "Victim"); in marvel_print_po7_ugbge_sym() 308 sprintf(opcode_str, "BlkIO"); in marvel_print_po7_ugbge_sym() 311 sprintf(opcode_str, "0x%llx\n", in marvel_print_po7_ugbge_sym() 565 sprintf(message, "Normal completion"); in marvel_print_pox_spl_cmplt() 568 sprintf(message, "Bridge - Master Abort"); in marvel_print_pox_spl_cmplt() [all …]
|
| /arch/arm/kernel/ |
| A D | spectre.c | 20 return sprintf(buf, "Mitigation: __user pointer sanitization\n"); in cpu_show_spectre_v1() 39 return sprintf(buf, "%s\n", "Not affected"); in cpu_show_spectre_v2() 42 return sprintf(buf, "%s\n", "Vulnerable"); in cpu_show_spectre_v2() 45 return sprintf(buf, "Vulnerable: Unprivileged eBPF enabled\n"); in cpu_show_spectre_v2() 70 return sprintf(buf, "Mitigation: %s\n", method); in cpu_show_spectre_v2()
|
| /arch/mips/kernel/ |
| A D | segment.c | 25 str += sprintf(str, "%-5s", am_str[am]); in build_segment_config() 33 str += sprintf(str, " %03lx", in build_segment_config() 36 str += sprintf(str, " UND"); in build_segment_config() 39 str += sprintf(str, " %01ld", in build_segment_config() 42 str += sprintf(str, " U"); in build_segment_config() 45 str += sprintf(str, " %01ld\n", in build_segment_config()
|
| /arch/riscv/kernel/ |
| A D | bugs.c | 49 return sprintf(buf, "Not affected\n"); in cpu_show_ghostwrite() 51 return sprintf(buf, "Mitigation: xtheadvector disabled\n"); in cpu_show_ghostwrite() 55 return sprintf(buf, "Vulnerable\n"); in cpu_show_ghostwrite() 58 return sprintf(buf, "Not affected\n"); in cpu_show_ghostwrite()
|
| /arch/sparc/kernel/ |
| A D | prom_64.c | 79 sprintf(tmp_buf, "%s@%x,%x", in sun4v_path_component() 98 sprintf(tmp_buf, "%s@%s%x", in sun4v_path_component() 103 sprintf(tmp_buf, "%s@%x", in sun4v_path_component() 120 sprintf(tmp_buf, "%s@%x,%x", in sun4u_path_component() 136 sprintf(tmp_buf, "%s@%x,%x", in sun4u_path_component() 155 sprintf(tmp_buf, "%s@%x,%x", in sbus_path_component() 181 sprintf(tmp_buf, "%s@%x", in pci_path_component() 204 sprintf(tmp_buf, "%s@%x,%x", in upa_path_component() 239 sprintf(tmp_buf, "%s@%x,%x", in ebus_path_component() 261 sprintf(tmp_buf, "%s@%x,%x", in i2c_path_component() [all …]
|
| A D | prom_32.c | 66 sprintf(tmp_buf, "%s@%x,%x", in sparc32_path_component() 83 sprintf(tmp_buf, "%s@%x,%x", in sbus_path_component() 104 sprintf(tmp_buf, "%s@%x,%x", in pci_path_component() 109 sprintf(tmp_buf, "%s@%x", in pci_path_component() 128 sprintf(tmp_buf, "%s@%x,%x", in ebus_path_component() 161 sprintf(tmp_buf, "%s@%x,%x", name, *intr, reg0); in ambapp_path_component() 248 sprintf(of_console_path, "%pOF", dp); in of_console_init() 282 sprintf(of_console_path, "%pOF", dp); in of_console_init()
|
| A D | sysfs.c | 24 return sprintf(buf, "%lu\n", p->NAME); \ 128 return sprintf(buf, "%lx\n", val); in show_mmustat_enable() 177 return sprintf(buf, "%lu\n", c->MEMBER); \ 185 return sprintf(buf, "%u\n", c->MEMBER); \
|
| /arch/s390/kernel/ |
| A D | dis.c | 441 ptr += sprintf(ptr, "%.7s\t", in print_insn() 461 ptr += sprintf(ptr, "%%r%u", value); in print_insn() 463 ptr += sprintf(ptr, "%%f%u", value); in print_insn() 465 ptr += sprintf(ptr, "%%a%u", value); in print_insn() 473 ptr += sprintf(ptr, "%px", pcrel); in print_insn() 477 ptr += sprintf(ptr, "%u", value); in print_insn() 481 ptr += sprintf(ptr, ")"); in print_insn() 487 ptr += sprintf(ptr, "unknown"); in print_insn() 541 ptr += sprintf(ptr, "%s Code:", mode); in show_code() 564 ptr += sprintf(ptr, "\n "); in show_code() [all …]
|
| A D | early.c | 122 sprintf(mstr, "%-16.16s %-4.4s %-16.16s %-16.16s", in setup_arch_string() 128 sprintf(hvstr, "%-16.16s", vm->vm[0].cpi); in setup_arch_string() 131 sprintf(hvstr, "%s", in setup_arch_string() 136 sprintf(arch_hw_string, "HW: %s (%s)", mstr, hvstr); in setup_arch_string()
|
| /arch/arm/mach-omap2/ |
| A D | id.c | 194 sprintf(soc_name, "OMAP%04x", omap_rev() >> 16); in omap2xxx_check_revision() 195 sprintf(soc_rev, "ES%x", (omap_rev() >> 12) & 0xf); in omap2xxx_check_revision() 521 sprintf(soc_rev, "ES%s", cpu_rev); in omap3xxx_check_revision() 596 sprintf(soc_name, "OMAP%04x", omap_rev() >> 16); in omap4xxx_check_revision() 597 sprintf(soc_rev, "ES%d.%d", (omap_rev() >> 12) & 0xf, in omap4xxx_check_revision() 639 sprintf(soc_name, "OMAP%04x", omap_rev() >> 16); in omap5xxx_check_revision() 640 sprintf(soc_rev, "ES%d.0", (omap_rev() >> 12) & 0xf); in omap5xxx_check_revision() 714 sprintf(soc_name, "DRA%03x", omap_rev() >> 16); in dra7xxx_check_revision() 715 sprintf(soc_rev, "ES%d.%d", (omap_rev() >> 12) & 0xf, in dra7xxx_check_revision() 773 return sprintf(buf, "%s\n", omap_types[omap_type()]); in type_show()
|
| /arch/mips/alchemy/devboards/ |
| A D | pm.c | 125 return sprintf(buf, "%lu\n", db1x_pm_sleep_secs); in db1x_pmattr_show() 128 return sprintf(buf, "%u\n", in db1x_pmattr_show() 132 return sprintf(buf, "%lu\n", db1x_pm_last_wakesrc); in db1x_pmattr_show() 138 return sprintf(buf, "%d\n", in db1x_pmattr_show() 142 return sprintf(buf, "%08lx\n", db1x_pm_wakemsk); in db1x_pmattr_show()
|
| /arch/sh/drivers/dma/ |
| A D | dma-sysfs.c | 36 len += sprintf(buf + len, "%2d: %14s %s\n", in dma_show_devices() 68 return sprintf(buf, "%s\n", channel->dev_id); in dma_show_dev_id() 101 return sprintf(buf, "0x%08x\n", channel->mode); in dma_show_mode() 120 return sprintf(buf, fmt, channel->field); \
|
| /arch/mips/cavium-octeon/executive/ |
| A D | octeon-model.c | 115 sprintf(pass, "%d.%d", (int)((chip_id >> 3) & 7) + 1, (int)chip_id & 7); in octeon_model_get_string_buffer() 475 sprintf(fuse_model, "%d%c", model, 'A' + suffix - 1); in octeon_model_get_string_buffer() 480 sprintf(fuse_model, "%s%c", core_model, 'A' + suffix - 1); in octeon_model_get_string_buffer() 484 sprintf(fuse_model, "%d", model); in octeon_model_get_string_buffer() 490 sprintf(buffer, "CN%s%sp%s-%d-%s", family, core_model, pass, clock_mhz, suffix); in octeon_model_get_string_buffer()
|
| /arch/riscv/mm/ |
| A D | ptdump.c | 216 sprintf(s, pte_bits[i].set, val >> 8); in dump_prot() 220 sprintf(s, pte_bits[i].set, "NC"); in dump_prot() 222 sprintf(s, pte_bits[i].set, "IO"); in dump_prot() 224 sprintf(s, pte_bits[i].set, "??"); in dump_prot() 228 sprintf(s, "%s", pte_bits[i].set); in dump_prot() 230 sprintf(s, "%s", pte_bits[i].clear); in dump_prot()
|
| /arch/mips/ath79/ |
| A D | setup.c | 191 sprintf(ath79_sys_type, "Qualcomm Atheros QCA%s ver %u rev %u", in ath79_detect_sys_type() 194 sprintf(ath79_sys_type, "Qualcomm Atheros TP%s rev %u", in ath79_detect_sys_type() 197 sprintf(ath79_sys_type, "Atheros AR%s rev %u", chip, rev); in ath79_detect_sys_type()
|
| /arch/powerpc/kernel/ |
| A D | eeh_sysfs.c | 34 return sprintf(buf, _format "\n", edev->_memb); \ 52 return sprintf(buf, "0x%08x 0x%08x\n", in eeh_pe_state_show() 90 return sprintf(buf, "%d\n", pdn->last_allow_rc); in eeh_notify_resume_show()
|
| A D | security.c | 166 return sprintf(buf, "Vulnerable: L1D private per thread\n"); in cpu_show_meltdown() 170 return sprintf(buf, "Not affected\n"); in cpu_show_meltdown() 172 return sprintf(buf, "Vulnerable\n"); in cpu_show_meltdown() 355 return sprintf(buf, "Mitigation: Kernel entry/exit barrier (%s)\n", type); in cpu_show_spec_store_bypass() 360 return sprintf(buf, "Not affected\n"); in cpu_show_spec_store_bypass() 362 return sprintf(buf, "Vulnerable\n"); in cpu_show_spec_store_bypass()
|
| A D | sysfs.c | 66 return sprintf(buf, "100\n"); in show_smt_snooze_delay() 103 return sprintf(buf, "%lx\n", val); \ 186 return sprintf(buf, "%lx\n", dscr_default); in show_dscr_default() 275 return sprintf(buf, "%u\n", value ? 1 : 0); in show_pw20_state() 340 return sprintf(buf, "%llu\n", time > 0 ? time : 0); in show_pw20_wait_time() 397 return sprintf(buf, "%u\n", value ? 1 : 0); in show_altivec_idle() 462 return sprintf(buf, "%llu\n", time > 0 ? time : 0); in show_altivec_idle_wait_time() 749 return sprintf(buf, "%u\n", is_secure_guest()); in show_svm() 783 return sprintf(buf, "%llx\n", val); in idle_purr_show() 813 return sprintf(buf, "%llx\n", val); in idle_spurr_show() [all …]
|
| /arch/x86/platform/ts5500/ |
| A D | ts5500.c | 155 return sprintf(buf, "%s\n", sbc->name); in name_show() 164 return sprintf(buf, "0x%.2x\n", sbc->id); in id_show() 173 return sprintf(buf, "0x%.2x\n", sbc->jumpers >> 1); in jumpers_show() 183 return sprintf(buf, "%d\n", sbc->_field); \
|
| /arch/powerpc/perf/ |
| A D | hv-gpci.c | 88 return sprintf(page, _format, caps._name); \ 96 return sprintf(page, "0x%x\n", COUNTER_INFO_VERSION_CURRENT); in kernel_version_show() 180 *n += sprintf(buf + *n, "%02x", (u8)arg->bytes[j]); in systeminfo_gpci_request() 181 *n += sprintf(buf + *n, "\n"); in systeminfo_gpci_request() 487 *n += sprintf(buf + *n, "%02x", (u8)arg->bytes[k]); in affinity_domain_via_partition_result_parse() 488 *n += sprintf(buf + *n, "\n"); in affinity_domain_via_partition_result_parse() 495 *n += sprintf(buf + *n, "%02x", (u8)arg->bytes[k]); in affinity_domain_via_partition_result_parse() 498 *n += sprintf(buf + *n, "\n"); in affinity_domain_via_partition_result_parse() 501 *n += sprintf(buf + *n, "\n"); in affinity_domain_via_partition_result_parse()
|
| /arch/powerpc/platforms/powernv/ |
| A D | opal-dump.c | 43 return sprintf(buf, "0x%x\n", dump_obj->id); in dump_id_show() 61 return sprintf(buf, "0x%x %s\n", dump_obj->type, in dump_type_show() 69 return sprintf(buf, "ack - acknowledge dump\n"); in dump_ack_show() 117 return sprintf(buf, "1 - initiate Service Processor(FSP) dump\n"); in init_dump_show() 400 sprintf(name, "0x%x-0x%x", dump_type, dump_id); in process_dump()
|
| A D | opal-elog.c | 43 return sprintf(buf, "0x%llx\n", elog_obj->id); in elog_id_show() 58 return sprintf(buf, "0x%llx %s\n", in elog_type_show() 67 return sprintf(buf, "ack - acknowledge log message\n"); in elog_ack_show() 288 sprintf(name, "0x%llx", log_id); in elog_event()
|
| /arch/arm64/kernel/ |
| A D | proton-pack.c | 64 return sprintf(buf, "Mitigation: __user pointer sanitization\n"); in cpu_show_spectre_v1() 134 return sprintf(buf, "Not affected\n"); in cpu_show_spectre_v2() 144 return sprintf(buf, "Vulnerable: Unprivileged eBPF enabled\n"); in cpu_show_spectre_v2() 146 return sprintf(buf, "Mitigation: %s%s\n", v2_str, bhb_str); in cpu_show_spectre_v2() 150 return sprintf(buf, "Vulnerable\n"); in cpu_show_spectre_v2() 451 return sprintf(buf, "Not affected\n"); in cpu_show_spec_store_bypass() 453 return sprintf(buf, "Mitigation: Speculative Store Bypass disabled via prctl\n"); in cpu_show_spec_store_bypass() 457 return sprintf(buf, "Vulnerable\n"); in cpu_show_spec_store_bypass()
|
| /arch/mips/sni/ |
| A D | pcimt.c | 60 p += sprintf(p, "%s PCI", (csmsr & 0x80) ? "RM200" : "RM300"); in sni_pcimt_detect() 62 p += sprintf(p, ", board revision %s", in sni_pcimt_detect() 66 p += sprintf(p, ", ASIC PCI Rev %s", asic ? "1.0" : "1.1"); in sni_pcimt_detect()
|