From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4816F313E1B for ; Thu, 26 Mar 2026 21:57:32 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1774562252; cv=none; b=p0mU42emHzTx6Ga2s6TgyDEeG+1WJCWoGGXHu1SfHpC0W3TyuFMF7gQI4YtfeZWOfGr0IGot4dBJ/Q5R+Bmbsvop+euwi3KEAPH1DfXOZBXEFmqWxDn7VVqicn5yrrR6+ZgpdS2RGnlKoJ06B5fdg0TPaIONV/LbIzUZ6cBEeXc= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1774562252; c=relaxed/simple; bh=LI5jaZ3hipnDoAfgAxqsczmv0eI1T0aCP2GNcfOcbEo=; h=Date:Message-ID:From:To:Cc:Subject:References:MIME-Version: Content-Type; b=alvI4LOzXkHesd9vIreyqMXpHApzF77hAIq1wWESPt7UX29rt4wL+rfi7kSYw6VbY3NUKBkcN08SSC7+hFZWORR38o/CUfkuc+Pc2CqxVLSIOK8D77Snb2rzYgxUT0a4NaEq7Uv1SK5GwOeNd91lrAv0fvM6GW3L77PlhHyAGcs= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=TuT+2Cff; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="TuT+2Cff" Received: by smtp.kernel.org (Postfix) with ESMTPSA id CA9A7C116C6; Thu, 26 Mar 2026 21:57:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1774562251; bh=LI5jaZ3hipnDoAfgAxqsczmv0eI1T0aCP2GNcfOcbEo=; h=Date:From:To:Cc:Subject:References:From; b=TuT+2CffiJynUSnCjRZi2zal4mPn/5WQD83GP1Y6wpQ8Fc4QvtEwqT7ElNxWOU6QD tnYDm0FcvIannIpU+Mnok8WakM5G15U8WP3eh0KjLnOc7VLYYPWUba+Pe7SAI6bA6E lPDnl863w1ex5icgfLrA/ZwXMIVkK79FQXsKYDyIjVEIYtqwf2pbOp0+oaC2FoRViC nOst2MvHlsSx6ULyUNLKeffsdBmpXn2MCBI/DrkQRVVOT346toYJ3civ4d5u9kmYo0 3/A5zn70X9K3TvrGNSUqYOx7r4DZ0FBgedmPuaTEzFu5+Ut00qw3IviHL3pTvChdkm YUZhKgxIwadiA== Date: Thu, 26 Mar 2026 22:57:22 +0100 Message-ID: <20260326215036.851172872@kernel.org> User-Agent: quilt/0.68 From: Thomas Gleixner To: LKML Cc: x86@kernel.org, Michael Kelley , Dmitry Ilvokhin , Radu Rendec , Jan Kiszka , Kieran Bingham , Florian Fainelli Subject: [patch V3 09/14] genirq: Cache the condition for /proc/interrupts exposure References: <20260326214345.019130211@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 show_interrupts() evaluates a boatload of conditions to establish whether it should expose an interrupt in /proc/interrupts or not. That can be simplified by caching the condition in an internal status flag, which is updated when one of the relevant inputs changes. The irq_desc::kstat_irq check is dropped because visible interrupt descriptors always have a valid pointer. As a result the number of instructions and branches for reading /proc/interrupts is reduced significantly. Signed-off-by: Thomas Gleixner Reviewed-by: Dmitry Ilvokhin --- V3: Remove the historical kstat_irq check - Radu V2: s/IRQF_/IRQ/ and fixup the enum treatment - Dmitry --- include/linux/irq.h | 1 + kernel/irq/chip.c | 2 ++ kernel/irq/internals.h | 2 ++ kernel/irq/manage.c | 2 ++ kernel/irq/proc.c | 15 +++++++++++---- kernel/irq/settings.h | 13 +++++++++++++ 6 files changed, 31 insertions(+), 4 deletions(-) --- a/include/linux/irq.h +++ b/include/linux/irq.h @@ -99,6 +99,7 @@ enum { IRQ_DISABLE_UNLAZY = (1 << 19), IRQ_HIDDEN = (1 << 20), IRQ_NO_DEBUG = (1 << 21), + IRQ_RESERVED = (1 << 22), }; #define IRQF_MODIFY_MASK \ --- a/kernel/irq/chip.c +++ b/kernel/irq/chip.c @@ -1004,6 +1004,7 @@ static void WARN_ON(irq_chip_pm_get(irq_desc_get_irq_data(desc))); irq_activate_and_startup(desc, IRQ_RESEND); } + irq_proc_update_valid(desc); } void __irq_set_handler(unsigned int irq, irq_flow_handler_t handle, int is_chained, @@ -1064,6 +1065,7 @@ void irq_modify_status(unsigned int irq, trigger = tmp; irqd_set(&desc->irq_data, trigger); + irq_proc_update_valid(desc); } } EXPORT_SYMBOL_GPL(irq_modify_status); --- a/kernel/irq/internals.h +++ b/kernel/irq/internals.h @@ -123,6 +123,7 @@ extern void register_irq_proc(unsigned i extern void unregister_irq_proc(unsigned int irq, struct irq_desc *desc); extern void register_handler_proc(unsigned int irq, struct irqaction *action); extern void unregister_handler_proc(unsigned int irq, struct irqaction *action); +void irq_proc_update_valid(struct irq_desc *desc); #else static inline void register_irq_proc(unsigned int irq, struct irq_desc *desc) { } static inline void unregister_irq_proc(unsigned int irq, struct irq_desc *desc) { } @@ -130,6 +131,7 @@ static inline void register_handler_proc struct irqaction *action) { } static inline void unregister_handler_proc(unsigned int irq, struct irqaction *action) { } +static inline void irq_proc_update_valid(struct irq_desc *desc) { } #endif extern bool irq_can_set_affinity_usr(unsigned int irq); --- a/kernel/irq/manage.c +++ b/kernel/irq/manage.c @@ -1802,6 +1802,7 @@ static int __enable_irq(desc); } + irq_proc_update_valid(desc); raw_spin_unlock_irqrestore(&desc->lock, flags); chip_bus_sync_unlock(desc); mutex_unlock(&desc->request_mutex); @@ -1906,6 +1907,7 @@ static struct irqaction *__free_irq(stru desc->affinity_hint = NULL; #endif + irq_proc_update_valid(desc); raw_spin_unlock_irqrestore(&desc->lock, flags); /* * Drop bus_lock here so the changes which were done in the chip --- a/kernel/irq/proc.c +++ b/kernel/irq/proc.c @@ -439,6 +439,16 @@ void init_irq_proc(void) register_irq_proc(irq, desc); } +void irq_proc_update_valid(struct irq_desc *desc) +{ + u32 set = _IRQ_PROC_VALID; + + if (irq_settings_is_hidden(desc) || irq_desc_is_chained(desc) || !desc->action) + set = 0; + + irq_settings_update_proc_valid(desc, set); +} + #ifdef CONFIG_GENERIC_IRQ_SHOW int __weak arch_show_interrupts(struct seq_file *p, int prec) @@ -514,10 +524,7 @@ int show_interrupts(struct seq_file *p, guard(rcu)(); desc = irq_to_desc(i); - if (!desc || irq_settings_is_hidden(desc)) - return 0; - - if (!desc->action || irq_desc_is_chained(desc) || !desc->kstat_irqs) + if (!desc || !irq_settings_proc_valid(desc)) return 0; seq_printf(p, "%*d:", prec, i); --- a/kernel/irq/settings.h +++ b/kernel/irq/settings.h @@ -18,6 +18,7 @@ enum { _IRQ_DISABLE_UNLAZY = IRQ_DISABLE_UNLAZY, _IRQ_HIDDEN = IRQ_HIDDEN, _IRQ_NO_DEBUG = IRQ_NO_DEBUG, + _IRQ_PROC_VALID = IRQ_RESERVED, _IRQF_MODIFY_MASK = IRQF_MODIFY_MASK, }; @@ -34,6 +35,7 @@ enum { #define IRQ_DISABLE_UNLAZY GOT_YOU_MORON #define IRQ_HIDDEN GOT_YOU_MORON #define IRQ_NO_DEBUG GOT_YOU_MORON +#define IRQ_RESERVED GOT_YOU_MORON #undef IRQF_MODIFY_MASK #define IRQF_MODIFY_MASK GOT_YOU_MORON @@ -180,3 +182,14 @@ static inline bool irq_settings_no_debug { return desc->status_use_accessors & _IRQ_NO_DEBUG; } + +static inline bool irq_settings_proc_valid(struct irq_desc *desc) +{ + return desc->status_use_accessors & _IRQ_PROC_VALID; +} + +static inline void irq_settings_update_proc_valid(struct irq_desc *desc, u32 set) +{ + desc->status_use_accessors &= ~_IRQ_PROC_VALID; + desc->status_use_accessors |= (set & _IRQ_PROC_VALID); +}