On 7/23/2025 7:04 PM, Raag Jadav wrote:
On Tue, Jul 15, 2025 at 04:17:26PM +0530, Riana Tauro wrote:
Add documentation for vendor specific device wedged recovery method
and runtime survivability.
...
diff --git a/drivers/gpu/drm/xe/xe_device.c b/drivers/gpu/drm/xe/xe_device.c
index bd81ebd370cb..d28c92f8b80c 100644
--- a/drivers/gpu/drm/xe/xe_device.c
+++ b/drivers/gpu/drm/xe/xe_device.c
@@ -1133,6 +1133,28 @@ static void xe_device_wedged_fini(struct drm_device
*drm, void *arg)
}
/**
+ * DOC: Device Wedging
Xe Device Wedging?
The document title is Xe Device Wedging.
This is just the tag
+ * Xe driver uses device wedged uevent as documented in
Documentation/gpu/drm-uapi.rst.
+ *
+ * When device is in wedged state, every IOCTL will be blocked and GT cannot be
+ * used. Certain critical errors like gt reset failure, firmware failures can
cause
+ * the device to be wedged. The default recovery mechanism for a wedged state
method
+ * is re-probe (unbind + bind)
Let's use uapi naming for consistency.
+ * Another recovery method is ``WEDGED=vendor-specific`. Below are the usecases
If we mean method, it's just ``vendor-specific`` with correct quoting.
+ * that trigger vendor-specific drm wedged uevent and actions to be performed
+ * to recover the device.
+ *
+ * Case 1: CSC firmware errors require a firmware flash to restore normal
device
+ * operation. Since firmware flash is a vendor-specific action
+ * `WEDGED=vendor-specific`` recovery method along with
+ * :ref:`runtime survivability mode <xe-survivability-mode>` is used to
+ * notify userspace. User can then initiate a firmware flash using
userspace tools
+ * like fwupd to restore device to normal situation.
+ */
+
+/*
* xe_device_set_wedged_method - Set wedged recovery method
* @xe: xe device instance
* @method: recovery method to set
diff --git a/drivers/gpu/drm/xe/xe_survivability_mode.c
b/drivers/gpu/drm/xe/xe_survivability_mode.c
index 267d0e3fd85a..9f770db116f4 100644
--- a/drivers/gpu/drm/xe/xe_survivability_mode.c
+++ b/drivers/gpu/drm/xe/xe_survivability_mode.c
@@ -22,15 +22,18 @@
#define MAX_SCRATCH_MMIO 8
/**
- * DOC: Xe Boot Survivability
+ * DOC: Survivability Mode
*
- * Boot Survivability is a software based workflow for recovering a system in
a failed boot state
+ * Survivability Mode is a software based workflow for recovering a system in
a failed boot state
* Here system recoverability is concerned with recovering the firmware
responsible for boot.
*
- * This is implemented by loading the driver with bare minimum (no drm card)
to allow the firmware
- * to be flashed through mei and collect telemetry. The driver's probe flow is
modified
- * such that it enters survivability mode when pcode initialization is
incomplete and boot status
- * denotes a failure.
+ * Boot Survivability
+ * ===================
+ *
+ * Boot Survivability is implemented by loading the driver with bare minimum
(no drm card) to allow
+ * the firmware to be flashed through mei and collect telemetry. The driver's
probe flow is
'mei driver' or it gives the impression of a tool. Also, what telemetry?
Okay will fix this.
vsec is initialized for any telemetry collection
+ * modified such that it enters survivability mode when pcode initialization
is incomplete and boot
+ * status denotes a failure.
*
* Survivability mode can also be entered manually using the survivability
mode attribute available
* through configfs which is beneficial in several usecases. It can be used
to address scenarios
@@ -46,7 +49,7 @@
* Survivability mode is indicated by the below admin-only readable sysfs
which provides additional
If it's sensitive, does it make sense to also log it?
* debug information::
*
- * /sys/bus/pci/devices/<device>/surivability_mode
+ * /sys/bus/pci/devices/<device>/survivability_mode
*
* Capability Information:
* Provides boot status
@@ -56,6 +59,22 @@
* Provides history of previous failures
* Auxiliary Information
* Certain failures may have information in addition to postcode
information
+ *
+ * Runtime Survivability
+ * =====================
+ *
+ * Certain runtime firmware errors can cause the device to enter a wedged state
+ * (:ref:`xe-device-wedging`) requiring a firmware flash to restore normal
operation.
+ * Runtime Survivability Mode indicates that a firmware flash is necessary to
recover the device and
+ * is indicated by the presence of survivability mode sysfs::
+ *
+ * /sys/bus/pci/devices/<device>/survivability_mode
+ *
+ * Survivability mode sysfs provides information about the type of
survivability mode.
+ *
+ * When such errors occur, userspace is notified with the drm device wedged
uevent and runtime
+ * survivability mode. User can then initiate a firmware update using
userspace tools like fwupd
+ * to restore device to normal operation.
*/
Overall looks good and gets the point across, but I think consistent
termiologies would make it more easy to follow and understand.
method/mechanism/actions
wedged uevent/drm wedged uevent/drm device wedged uevent
firmware flash/firmware update
operation/situation
Sure will fix this
Thanks,
Riana
... and so on.
Raag