]> git.ipfire.org Git - thirdparty/kernel/linux.git/commit
iommu/riscv: Disable SADE
authorJason Gunthorpe <jgg@nvidia.com>
Fri, 27 Feb 2026 15:25:37 +0000 (11:25 -0400)
committerJoerg Roedel <joerg.roedel@amd.com>
Tue, 17 Mar 2026 12:14:23 +0000 (13:14 +0100)
commite93e4a6363b8f812cb89f2b2d97cbaf017a3d7f8
treeb6109444f0ac348024a22d4d4a4fcfef4a90f620
parente71e00127110dedc6a9e746178282b4dac97ed96
iommu/riscv: Disable SADE

In terms of the iommu subystem the SADE/GADE feature "3.4. IOMMU updating
of PTE accessed (A) and dirty (D) updates" is called dirty tracking.

There is no reason to enable HW support for this, and the HW cost
associated with it, unless dirty tracking is actually enabled through
iommufd. It should be a dynamic feature linked to user request.

Further, without implementing the read dirty ops the whole thing is
pointless.

Do not set DC.tc.SADE just because the HW has support for dirty tracking.

Tested-by: Vincent Chen <vincent.chen@sifive.com>
Acked-by: Paul Walmsley <pjw@kernel.org> # arch/riscv
Reviewed-by: Tomasz Jeznach <tjeznach@rivosinc.com>
Tested-by: Tomasz Jeznach <tjeznach@rivosinc.com>
Signed-off-by: Jason Gunthorpe <jgg@nvidia.com>
Signed-off-by: Joerg Roedel <joerg.roedel@amd.com>
drivers/iommu/riscv/iommu.c