Lines Matching refs:sysfs_emit

2524 		return sysfs_emit(buf, "%s\n", L1TF_DEFAULT_MSG);  in l1tf_show_state()
2529 return sysfs_emit(buf, "%s; VMX: %s\n", L1TF_DEFAULT_MSG, in l1tf_show_state()
2533 return sysfs_emit(buf, "%s; VMX: %s, SMT %s\n", L1TF_DEFAULT_MSG, in l1tf_show_state()
2542 return sysfs_emit(buf, "KVM: Mitigation: VMX unsupported\n"); in itlb_multihit_show_state()
2544 return sysfs_emit(buf, "KVM: Mitigation: VMX disabled\n"); in itlb_multihit_show_state()
2546 return sysfs_emit(buf, "KVM: Mitigation: Split huge pages\n"); in itlb_multihit_show_state()
2548 return sysfs_emit(buf, "KVM: Vulnerable\n"); in itlb_multihit_show_state()
2553 return sysfs_emit(buf, "%s\n", L1TF_DEFAULT_MSG); in l1tf_show_state()
2558 return sysfs_emit(buf, "Processor vulnerable\n"); in itlb_multihit_show_state()
2565 return sysfs_emit(buf, "%s; SMT Host state unknown\n", in mds_show_state()
2570 return sysfs_emit(buf, "%s; SMT %s\n", mds_strings[mds_mitigation], in mds_show_state()
2575 return sysfs_emit(buf, "%s; SMT %s\n", mds_strings[mds_mitigation], in mds_show_state()
2583 return sysfs_emit(buf, "%s\n", taa_strings[taa_mitigation]); in tsx_async_abort_show_state()
2586 return sysfs_emit(buf, "%s; SMT Host state unknown\n", in tsx_async_abort_show_state()
2590 return sysfs_emit(buf, "%s; SMT %s\n", taa_strings[taa_mitigation], in tsx_async_abort_show_state()
2597 return sysfs_emit(buf, "Unknown: No mitigations\n"); in mmio_stale_data_show_state()
2600 return sysfs_emit(buf, "%s\n", mmio_strings[mmio_mitigation]); in mmio_stale_data_show_state()
2603 return sysfs_emit(buf, "%s; SMT Host state unknown\n", in mmio_stale_data_show_state()
2607 return sysfs_emit(buf, "%s; SMT %s\n", mmio_strings[mmio_mitigation], in mmio_stale_data_show_state()
2660 return sysfs_emit(buf, "Vulnerable: LFENCE\n"); in spectre_v2_show_state()
2663 return sysfs_emit(buf, "Vulnerable: eIBRS with unprivileged eBPF\n"); in spectre_v2_show_state()
2667 return sysfs_emit(buf, "Vulnerable: eIBRS+LFENCE with unprivileged eBPF and SMT\n"); in spectre_v2_show_state()
2669 return sysfs_emit(buf, "%s%s%s%s%s%s%s\n", in spectre_v2_show_state()
2681 return sysfs_emit(buf, "%s\n", srbds_strings[srbds_mitigation]); in srbds_show_state()
2690 return sysfs_emit(buf, "Vulnerable: untrained return thunk / IBPB on non-AMD based uarch\n"); in retbleed_show_state()
2692 return sysfs_emit(buf, "%s; SMT %s\n", retbleed_strings[retbleed_mitigation], in retbleed_show_state()
2699 return sysfs_emit(buf, "%s\n", retbleed_strings[retbleed_mitigation]); in retbleed_show_state()
2705 return sysfs_emit(buf, "Mitigation: SMT disabled\n"); in srso_show_state()
2707 return sysfs_emit(buf, "%s%s\n", in srso_show_state()
2714 return sysfs_emit(buf, "%s\n", gds_strings[gds_mitigation]); in gds_show_state()
2721 return sysfs_emit(buf, "Not affected\n"); in cpu_show_common()
2726 return sysfs_emit(buf, "Mitigation: PTI\n"); in cpu_show_common()
2729 return sysfs_emit(buf, "Unknown (XEN PV detected, hypervisor mitigation required)\n"); in cpu_show_common()
2734 return sysfs_emit(buf, "%s\n", spectre_v1_strings[spectre_v1_mitigation]); in cpu_show_common()
2740 return sysfs_emit(buf, "%s\n", ssb_strings[ssb_mode]); in cpu_show_common()
2776 return sysfs_emit(buf, "Vulnerable\n"); in cpu_show_common()