From nobody Fri Apr 17 08:44:21 2026 Received: from BL2PR02CU003.outbound.protection.outlook.com (mail-eastusazon11011023.outbound.protection.outlook.com [52.101.52.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A126F369234; Mon, 23 Feb 2026 18:50:25 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=52.101.52.23 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771872627; cv=fail; b=YCpGI1amPG3eNZktBEa1yJokoyWiMWk8m5X08bwQZop9qcQ8sKZW9UAy37JXd0iXEUFwBS1s01bXKdU4j90tP9Arkjr13kTc6wJzwJpFLL0knfjAXOtxEcZK+oBrlS2sK21HDmrpACSgV5J3Srhsct0CLrDFvL4TMPZwAn83ZvQ= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771872627; c=relaxed/simple; bh=/d+hGa3upiPMJDCM17+STxmzs82oa5UmLjATpIsBrFA=; h=From:To:CC:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=I0EA73AcXICyLq0kU22nrLNUC8YB+Hw+AYw0+3xenmzNvXbUUQ+Y0j4jV85eNaXnHdJmMtcRKU/xQXFmczwiqUtb13qJ8PZWwpefSt83TfDi6rA7nXVMkaUhypLCnObGY5BaxJ/HQCplrw0CpwPsm48IfO8eNKzk6xYxNjcwJ8Y= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com; spf=fail smtp.mailfrom=amd.com; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b=iyuSDyvq; arc=fail smtp.client-ip=52.101.52.23 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=amd.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b="iyuSDyvq" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=ArL2KrAWtoH0FY4ypTvf4wzRQO6N7oYsNcK9BLKKTjfMW1bOHqvSthyMqyxMilFW94gujjIN9M80clju7CfCimLROt/4BBQBHKgMe8QaH9F8ZQ0/n6Hw9fj0KRxpBzqswrL06Bz+3JdJ10aJru/iUZcM4lDhJ+md1xJKX5yXQREQEuUv9Y8Y8vbMvqJSiXIti73eDbysOG6wD62kH2G2FOm8JfCuV7h9RvYh3y/hpZdEdT3nunkR+NL0spC/OwSLm3cnGb9RLSOPOcq0ohMZz/yjJHgR/P0mbASpGFt4xFLxYpAFo1GCcXfJrTPsEdb7fQIMqXtAneEFsGS69Kxwzw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=S/fEv+ovz7eTKzvBMX1jJPQcDnEXExCMz7gQ42DbCF0=; b=mklyz6cXjO1bfvsXiPcATLOBbNYTXoglj/OlVi6N+OvFNNAEIb2ka2v/mcL7vE2Eur+q1+N08xcGqcNYWklQ9YzDWvOgxRR0J+SKOcxUpa15jPcSkv7z+diVid47jxzvucpbpAv0umi4hQvEAGhuh/vniZUYYdU5ocVdb8VdovNz2RcEePq82inRZe1yWHeoFx7RMxvDK44H8tiuxQYYjL38k4P7tK3IUeullurhZMOVSx0tmEiPzhPjrwh9n+P3VdC7coVuMvJ5xQWWSKjgwRggRH9tQAZjplWXQUM6g7JQF2b9Ku+/ciW5eUDXqyZaudoiAAPo1TAYnizkLP1xQQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=S/fEv+ovz7eTKzvBMX1jJPQcDnEXExCMz7gQ42DbCF0=; b=iyuSDyvqxMeLmXJWhMG4E/15o9gzg3+L9XJrQtRVx8QYQ9kq3qMbxJ2+nTj4WBdG+0HuulvzXdWO89Jd2tW64GXQtJ2lJTDgrCykgpznYcY5v6kLGH4rwf7D+Ys6qnge1Yq0UXdAKeVoTHUqB79p0pY2/FcterMFrWKJn3mrP7M= Received: from BL1PR13CA0437.namprd13.prod.outlook.com (2603:10b6:208:2c3::22) by IA0PR12MB8350.namprd12.prod.outlook.com (2603:10b6:208:40d::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9632.21; Mon, 23 Feb 2026 18:50:23 +0000 Received: from BL02EPF0001A101.namprd05.prod.outlook.com (2603:10b6:208:2c3:cafe::77) by BL1PR13CA0437.outlook.office365.com (2603:10b6:208:2c3::22) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9632.21 via Frontend Transport; Mon, 23 Feb 2026 18:50:22 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C Received: from satlexmb07.amd.com (165.204.84.17) by BL02EPF0001A101.mail.protection.outlook.com (10.167.241.132) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9632.12 via Frontend Transport; Mon, 23 Feb 2026 18:50:22 +0000 Received: from satlexmb08.amd.com (10.181.42.217) by satlexmb07.amd.com (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Mon, 23 Feb 2026 12:50:21 -0600 Received: from xsjtanmays50.xilinx.com (10.180.168.240) by satlexmb08.amd.com (10.181.42.217) with Microsoft SMTP Server id 15.2.2562.17 via Frontend Transport; Mon, 23 Feb 2026 12:50:20 -0600 From: Tanmay Shah To: , CC: , , "Tanmay Shah" Subject: [PATCH v3 1/2] remoteproc: core: full attach detach during recovery Date: Mon, 23 Feb 2026 10:50:05 -0800 Message-ID: <20260223185006.1278518-2-tanmay.shah@amd.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20260223185006.1278518-1-tanmay.shah@amd.com> References: <20260223185006.1278518-1-tanmay.shah@amd.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL02EPF0001A101:EE_|IA0PR12MB8350:EE_ X-MS-Office365-Filtering-Correlation-Id: 317f1f8e-3944-49d6-fa31-08de730c6681 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|82310400026|36860700013|376014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?/KpBpvMmVw7N2DS6u1fylp4drkUvfZyoTYXXQpZTCb4VxN09rRbf5PXm1X6N?= =?us-ascii?Q?0jaeG3W3w4oFNJIJjakpEo5Up1NUyhWp4irr6eNaEevCyFDZEg0ch7zihLJN?= =?us-ascii?Q?ctaiifiEdnC0DVKX5E8qJWL0K91cL4TndAJe1uGiI82F0splnJE5DVeox26r?= =?us-ascii?Q?VxXV/BbkioriaKP70EeAg/D+/pTcomOJghYxrOM1WpA+u6mjCYXLs0xPF9TM?= =?us-ascii?Q?+7KDUUCwuHYBQTlaojDfgPjJ09u82dOU0auhakSvR1nO4OSYcC+ia7XP/z61?= =?us-ascii?Q?paG6QT2k/0TDquzy8HE8Mn/y+RX/OcTW9PuEaRbGEFcAhZxLlNYsYlBsX9aM?= =?us-ascii?Q?3jojRU6LuT0kZO0jQqfRtPZ6WbuK2ugroN6uYJplOV5ybaHtb8LvfRqsHzdk?= =?us-ascii?Q?ohmnJd+CJ/PPl0sI2QHP9g7cCGQGQ8V5SCkdkP2iZmo5IggkZi6oYOHSlTjL?= =?us-ascii?Q?+uiGDvUWPu2Nh4qtBbqzVYXgsdnrwGKaePx0XTbubt6X9niiiR5l6Kocvpse?= =?us-ascii?Q?RTQ8BqAFLXE//YYf1i8ZL86Nn1nOQSeJjKuBIIXLtHpcnUxSRCjnsJWJhrx+?= =?us-ascii?Q?JykPceu+wwGBySmG8+LyLxWKjXuo1bYwWwkX+VYzr6RvTqYNcsnSex0TSr3H?= =?us-ascii?Q?kkyrWYmcxCK+pdx9JXWjOWtbOJ5OXBJv8/6JZMJrBsM2gCOXdUWwX6jxSaaO?= =?us-ascii?Q?yK1qnW20Spl4ouT4mhWCAifBTQYJkUB8a4/oDw/tmLY5lLiEvQh5s1/fL7bQ?= =?us-ascii?Q?bR+FqxjU/F8f01nz8JD9qcCcFs8We3IyET/9d2GUS2P9Z95G+zUTKnTNzvNu?= =?us-ascii?Q?lLz1aPPie0zuWfHY9ntZdwqrYn6D3lJhCYAcxgLH0cRp/dLfUy9V80ie4U4e?= =?us-ascii?Q?3E0qbbnF93g9n7yPEU6uMuTBfFLddYdbl0uZYxn3y/8kJy54nZH+cDFZDlQN?= =?us-ascii?Q?kz08YeFCbgcV6aZOd9/Pj+6+w2Yb7u0DnA3HZUgCjxQvBl7ZjdKDMc5/rW37?= =?us-ascii?Q?MZdGF/aiQCRf6voHCDbaVOgb3qoP1R1/cuVTMBiPA6iR426pbI08V4marced?= =?us-ascii?Q?tGAR60caJTUvrhepNcY+XPNX2Foq01hgGy/cMpYN24bbDLZU9NOlxYXC3oxM?= =?us-ascii?Q?N9+zcfKMLUhwVP3vzQvGfxDCJrGoACJpE2t8iKLVp7g8OjMQd9AaFWxzljYL?= =?us-ascii?Q?nMLyHwUG7e1qvYA/tn00wirY2KZIlVkExaTOGoGZhn9C5GGgxErU5gc0U1+C?= =?us-ascii?Q?4xdxYkJe8tK5WiaEMepvWsCreMlg+9bBKBZkJ9LXtoeY4eZeafR/6Lyaw3S9?= =?us-ascii?Q?/Gove9pnsEJizCjQG0KxkDcy1bju+yrgZABZzLksSmoGngdIMSlfjgQX5goF?= =?us-ascii?Q?Y3V1hRU8lE7fbSfM3Wqy+oqPdfPSyW8ISZ2svtPTkOzDDccMNrh0HgSwWaat?= =?us-ascii?Q?iq+x2eub7q7L+vwKrz8I5zm01Fd0CnvhuuPSnYmX4rdZVPyCMK2MnJXJsRFE?= =?us-ascii?Q?tnIDxjntmRM/yF3c8BDZ9U7fVLgOp0R5NVf6y1zQQ2Tm/8re6IStLosTmG85?= =?us-ascii?Q?oQowiqbKIOlEWk8kUE4b2UtXLWMPzKZwtmeuacKl65hX85/ifRG62mHmEAsA?= =?us-ascii?Q?2D4lXN/wXmSITelno6ls8MruoJuZN8MFi3S4ZG/q/BeXHL54r1FqjKLro1xX?= =?us-ascii?Q?qOomoA=3D=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:satlexmb07.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1800799024)(82310400026)(36860700013)(376014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: j2rc9kEdZ/vqiMO6mj+1AbLPb+IPJ2H7m9rQ2PVJhHxmGOqWl+iZpiMKEsluS8AIHBX0fTB9u6O/gyNgBSzzNKka51hr6KPSxztLtgusGmUusTXMqiFSJLV03TuPwC8jdOvP4jIBRva0sBlnXNeeTNDfFP4BytJ33OgZtcn3c6AE83me14Z3LwqyiK9I3WRqhHUr31FheSExqshFsA07UcOM/dyeAzCMikjs5Xa7xUbC7c38eyVo0toEhCPBI8DO6etIJ63zIbyJR8cIa6v389TcmWs7iRn43RXEHLFTOT2wp3vcvmjS/3Ys7m+xvQ4a8t7CqggQRYReWmDUwMppnxifYgPooKmzdmpptzcUpXLguFS9TK0/BJEMEJVLMHZaqNEZ9N0d2Gn8fMCrNHMmcARGv1jquTqHMh4jN1Kzto6lLVq7zONYN88XugrVRwKA X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Feb 2026 18:50:22.9344 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 317f1f8e-3944-49d6-fa31-08de730c6681 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[satlexmb07.amd.com] X-MS-Exchange-CrossTenant-AuthSource: BL02EPF0001A101.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA0PR12MB8350 Content-Type: text/plain; charset="utf-8" Current attach on recovery mechanism loads the clean resource table during recovery, but doesn't re-allocate the resources. RPMsg communication will fail after recovery due to this. Fix this incorrect behavior by doing the full detach and attach of remote processor during the recovery. This will load the clean resource table and re-allocate all the resources, which will set up correct vring information in the resource table. Signed-off-by: Tanmay Shah --- Changes in v3: - both rproc_attach_recovery() and rproc_boot_recovery() are called the same way. - remove unrelated changes Changes in v2: - use rproc_boot instead of rproc_attach - move debug message early in the function drivers/remoteproc/remoteproc_core.c | 33 +++++++++++----------------- 1 file changed, 13 insertions(+), 20 deletions(-) diff --git a/drivers/remoteproc/remoteproc_core.c b/drivers/remoteproc/remo= teproc_core.c index aada2780b343..790ad7c6d12e 100644 --- a/drivers/remoteproc/remoteproc_core.c +++ b/drivers/remoteproc/remoteproc_core.c @@ -1777,11 +1777,11 @@ static int rproc_attach_recovery(struct rproc *rpro= c) { int ret; =20 - ret =3D __rproc_detach(rproc); + ret =3D rproc_detach(rproc); if (ret) return ret; =20 - return __rproc_attach(rproc); + return rproc_boot(rproc); } =20 static int rproc_boot_recovery(struct rproc *rproc) @@ -1790,10 +1790,14 @@ static int rproc_boot_recovery(struct rproc *rproc) struct device *dev =3D &rproc->dev; int ret; =20 - ret =3D rproc_stop(rproc, true); + ret =3D mutex_lock_interruptible(&rproc->lock); if (ret) return ret; =20 + ret =3D rproc_stop(rproc, true); + if (ret) + goto unlock_mutex; + /* generate coredump */ rproc->ops->coredump(rproc); =20 @@ -1801,7 +1805,7 @@ static int rproc_boot_recovery(struct rproc *rproc) ret =3D request_firmware(&firmware_p, rproc->firmware, dev); if (ret < 0) { dev_err(dev, "request_firmware failed: %d\n", ret); - return ret; + goto unlock_mutex; } =20 /* boot the remote processor up again */ @@ -1809,6 +1813,8 @@ static int rproc_boot_recovery(struct rproc *rproc) =20 release_firmware(firmware_p); =20 +unlock_mutex: + mutex_unlock(&rproc->lock); return ret; } =20 @@ -1827,26 +1833,13 @@ static int rproc_boot_recovery(struct rproc *rproc) int rproc_trigger_recovery(struct rproc *rproc) { struct device *dev =3D &rproc->dev; - int ret; - - ret =3D mutex_lock_interruptible(&rproc->lock); - if (ret) - return ret; - - /* State could have changed before we got the mutex */ - if (rproc->state !=3D RPROC_CRASHED) - goto unlock_mutex; =20 dev_err(dev, "recovering %s\n", rproc->name); =20 if (rproc_has_feature(rproc, RPROC_FEAT_ATTACH_ON_RECOVERY)) - ret =3D rproc_attach_recovery(rproc); + return rproc_attach_recovery(rproc); else - ret =3D rproc_boot_recovery(rproc); - -unlock_mutex: - mutex_unlock(&rproc->lock); - return ret; + return rproc_boot_recovery(rproc); } =20 /** @@ -2057,7 +2050,7 @@ int rproc_detach(struct rproc *rproc) return ret; } =20 - if (rproc->state !=3D RPROC_ATTACHED) { + if (rproc->state !=3D RPROC_ATTACHED && rproc->state !=3D RPROC_CRASHED) { ret =3D -EINVAL; goto out; } --=20 2.34.1 From nobody Fri Apr 17 08:44:21 2026 Received: from PH7PR06CU001.outbound.protection.outlook.com (mail-westus3azon11010002.outbound.protection.outlook.com [52.101.201.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9C8F236923C; Mon, 23 Feb 2026 18:50:31 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=52.101.201.2 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771872633; cv=fail; b=CM0w5oNIFkqUm2sUywJ3txfHQjyev/gHKXqt5/wb4bzbLBOCy334wUVUimTJFBB0n7N3++iVxbxB6vWWwqny2Pl66aMbhA9Ng5McbzOv1dB+EdL01xQ3hzNZGK1TOhGpdZ3jAK6T4VIa38fjkubUK/MaJXzfTD7bLy6MTWLdnvM= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771872633; c=relaxed/simple; bh=ysoYowNKQASt9NsAsa2FDVrSWSuzNwVe5xi5ECpk6Bs=; h=From:To:CC:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=UqqjHtr5WIxb1+6VPZJfpNkHlG51V5GKqKnLTdV3zjsjSHS/3L9V2L9OmzPDost3zZkE7l/3QWVpzCBnplzvwXmtQ0TK/NhAiRKHeunDcn5Ka30Zlfb0PT8WjDpOH42LVLGjhDph6Z6wS/0Vx7PSCQfpBPBrbbQPJMozNnesbA0= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com; spf=fail smtp.mailfrom=amd.com; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b=aLot30ON; arc=fail smtp.client-ip=52.101.201.2 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=amd.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b="aLot30ON" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=fUOYE73yFFNGXmiU5g9PIWaFAtrL8Ro3GgYZY1yDMNZlgHmRgL/2oZ8M0agCJuv86niG9ZYy6XKsdokORNgpvyAojlzjZuh3lCl1916AFqTwe3/0QHVPNPkrME1O8BQ5OTiGfXitkkk13IlSVTO87Pdnt0Iu358BRbMF8gvbrZ70pLAuqKdm7z7SOXCIldxW+codpP/xBs9UrDmteDxR43gfxR5z0K2nFPCP0HLmKDbEv8WqKsOOBKIjte5WsP0ciNgeHD6fVZlAal9kVfAkPbku7ITFPiE0CJpxeFzj/CATbr4z85FYguW5XNgG7iSBEOjXFXfU1E+NiuxsCmfSqQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=aFju7223h1O7E+pO2ugXyUuQcq0c3Q0q97kwAYxt2+w=; b=AQ57eTLtnHiszCV3GPC0C6N6Sw/icTEE3SrdRMtDbAFQREgFuon9OFlPkFG40r+MpEnEp7nGr6oRagEGtwkTg1yGwnoI9nwHBznU9l9KDwnmLhb8tD3iclZDAmc+WMyjfZmKNFKn1c93PjIBAZ9emcSEGXqIY2QR1Aztf0S37bDGem/kL6AuG2HPD8QcZfqnD0vWGNyDaim9PJ8kTM6MIjIoKhNv8Wbp7F7T0jVG8WUALxAeqh7GxZn53QFdEb4Hw5kMzKLp5dRM0A9wVtORDYV7F115LmcSckUM9HfW0SevVn0Bu0Cz52tg6yseS6Fe+zyeeeW1fQmJlZeHGaER4Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=aFju7223h1O7E+pO2ugXyUuQcq0c3Q0q97kwAYxt2+w=; b=aLot30ON4Kn67mlVrnX4kdrll4GG1th4RSheRVsC0e7mZhnlbnim+tDEKwJSW1qwv0KaE8WSC0RTrTWwz28azhiysdjJ9xokbxy3CG5AdneI7CTD7gvFacXF+fZ1FZ1ZxbVHQwsWAZJgck1wT3YbpaNMQhBG0DS2rJGF79Gd5+M= Received: from BL1PR13CA0429.namprd13.prod.outlook.com (2603:10b6:208:2c3::14) by PH7PR12MB7425.namprd12.prod.outlook.com (2603:10b6:510:200::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9632.21; Mon, 23 Feb 2026 18:50:23 +0000 Received: from BL02EPF0001A101.namprd05.prod.outlook.com (2603:10b6:208:2c3:cafe::95) by BL1PR13CA0429.outlook.office365.com (2603:10b6:208:2c3::14) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9632.21 via Frontend Transport; Mon, 23 Feb 2026 18:50:14 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C Received: from satlexmb07.amd.com (165.204.84.17) by BL02EPF0001A101.mail.protection.outlook.com (10.167.241.132) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9632.12 via Frontend Transport; Mon, 23 Feb 2026 18:50:23 +0000 Received: from satlexmb08.amd.com (10.181.42.217) by satlexmb07.amd.com (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Mon, 23 Feb 2026 12:50:21 -0600 Received: from xsjtanmays50.xilinx.com (10.180.168.240) by satlexmb08.amd.com (10.181.42.217) with Microsoft SMTP Server id 15.2.2562.17 via Frontend Transport; Mon, 23 Feb 2026 12:50:21 -0600 From: Tanmay Shah To: , CC: , , "Tanmay Shah" Subject: [PATCH v3 2/2] remoteproc: xlnx: add crash detection mechanism Date: Mon, 23 Feb 2026 10:50:06 -0800 Message-ID: <20260223185006.1278518-3-tanmay.shah@amd.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20260223185006.1278518-1-tanmay.shah@amd.com> References: <20260223185006.1278518-1-tanmay.shah@amd.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL02EPF0001A101:EE_|PH7PR12MB7425:EE_ X-MS-Office365-Filtering-Correlation-Id: 35368673-06c1-46ec-86b8-08de730c66b5 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|36860700013|82310400026|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?6GVWcR1M8fTaDciIXT3ESjZN7stzPdciYY1xTMNi1vpV6aJahcBnSHXc5+Ay?= =?us-ascii?Q?ZqdW1NUPuV7xXDW1scZvhijUSj6tDV2bpNK8j464lPYmaWflixwchdncJZTC?= =?us-ascii?Q?YnlfrRiRPvVZNHPcK8K3Qnf32wz1l/rejj8AjsrTQ23b9nzyeFZnoHdicN7c?= =?us-ascii?Q?3emZg+xt3oapqxXzirkoq+I++E43ypD2ldah6h8Zg0eTwlPHWMCC55XdEpJb?= =?us-ascii?Q?VBwA805oqa8Y39riPFTkMKmfvf3okqBGgFjnN/hHbUix+WzGd33Y1y3OmLqe?= =?us-ascii?Q?fP/DzBWfDNGhhL/xlvrX3O8vW+nlLLxGmZidVSX1omyKysQx4YjFb+/uQYWM?= =?us-ascii?Q?jOA42vX6HSd+83Exdyv532O0Tz30NfTspM3IP1FRrwsyRdxD+IEftuFIfUMD?= =?us-ascii?Q?iWgZpG23e72DcxXpkPzeErcf++jYnyhuZZzA4gohyN6bPD3fDqQlXSccCt7v?= =?us-ascii?Q?aGZ0QhGjdr+pYjuCJs1GJlmX50HRX3i0HW3gZ6hs1udmx2iYrjQ3fXcuvL/J?= =?us-ascii?Q?j4IQjAEhne9QrlYgTVX5qHwdWAlTw9aUK8f1HeWMeoYN9pSUSw8VTDSzJ/wW?= =?us-ascii?Q?+R9SSF+IQ/03A6MLJIER+ciAtUC+a18RtUqc3ESQWhL7xVKUg+UWvSvGbFZG?= =?us-ascii?Q?5meABiUYe2TBJFM+NjrKdt6WhOuIIM8xrXCVKpjUdlO0bEU0iItKeLAMqHWM?= =?us-ascii?Q?LG5c2l4r80dI1AFiwKl5jqaPUIyPOR/Geh/alD29f3+ROGVncmrpmR+pb4qS?= =?us-ascii?Q?EV1YLPSRfBN/dGoP5xRL4kMhblSa0xGtlM/JNFOE8NR0uNMc48XPqUmKiv51?= =?us-ascii?Q?Jj7qPOF8S7pLJKiI0W0Zbw9Zokgpe9CArH6rtwlHxQzghsU6lj6teBDoS4OQ?= =?us-ascii?Q?YteaIdWOboBHwE5HJxaRAEkCi4Y72mpqSvjn77wjuarlJib9WCIdwuUPg78R?= =?us-ascii?Q?BE48aGyScviQIKnzlgiN2SvQjU01Ww8VVddcBxnO1TULKdewhmPmGU2nQRQy?= =?us-ascii?Q?Zoo9UPX9JsmPNE2pjVyo2POAI5Ojj7zR2p5MYxsYyXtcmWENzWCsxxiulzfi?= =?us-ascii?Q?0EjGbWcwgEzKeQQ1f8/yAEuAsOuS1RqrBoW9nQ1yasGPBMtrq3qUS9MPGWMf?= =?us-ascii?Q?9D+Vr5kLp7G+l9DTBlPJjA9L+b+g1kOft4NbxJKs9362dggBaasLhvJ5q/tJ?= =?us-ascii?Q?taxCeDos/8BVGr6qi4yStoVwroQVlP7cAG+9/2bkXNs/02W2SXvenQ3NEnFI?= =?us-ascii?Q?raknX+MRMXIxgJwYUBdRjHiECXtT2hE1YTpm68KlsTaQ9puNX2+UcKZVHrW2?= =?us-ascii?Q?tG8XN90b84sI41lkghF/vWW1pjBYmJTUM4x0SC6Abj24bafO4M4yOCR+/E+r?= =?us-ascii?Q?+1DeQU5PGbZ8JwaVMXjSonViFeJL2r/7r8bA1/zUWYzDYiTIXfNrWNEFMGaT?= =?us-ascii?Q?gJdKjYmHlQt3KQ5dPavt5qch3988wx/NJU/OLip4fRcn31eS6bU+EnC8WGLH?= =?us-ascii?Q?ENZ/0WUgpzeBnDM5eT9VJBhcgeWtinh4imKyxHlyuzWlnHMCjNvsLrenjTw2?= =?us-ascii?Q?Cn87PWMah1hgfEC90pUSxqZVr5NZl6HCb+k3jEJogIM9ko4fBobqCKq/sgd3?= =?us-ascii?Q?ShLfaSxwYcd3xkI0mERliWDxLRNVd3CavNmZh2St3LuEprEk0X4KE1L5C77H?= =?us-ascii?Q?GeSKhw=3D=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:satlexmb07.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(376014)(36860700013)(82310400026)(1800799024);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: yPBazzzhfUR36yz5TbTDNGecL8WV729y09zkLMOeZiaEuU+xwT836Jtl2j/cF4AkLMnUm21PV2oHUcyoE3fN7kf9EuVd+R/nbHgV08CQhOTwpJ5BDgbiG2aa64KalN92LMI17txNtHLzDILTs6fN8/SxFek45BCFWFyZNLZVo8LUt/0JUhb9pvGs8IaJiaS3LhIt+eUi9A0EYP4xrHM7C7egAXSwJD942I78SAyqcqNaZtutP28uFQjKc9zxGqVWS1NrPEdC5xL2TrZs+FqvD+68SWRoGjXQzdl54NdnvR9SOYEsj4ObZALJKGlhnqhrPylQs+ZG6mRUKo9Ep5CKqK/LRoQq/LmeEeE5bRjwUyYJTU3u4YSp/On5KSZWVcc9NGjLOfeo57mggRQs2VgjTsxyWk9h/HguFm87cV1gkKwlTBFkrfPIOYyhVo6IMgtm X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Feb 2026 18:50:23.2806 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 35368673-06c1-46ec-86b8-08de730c66b5 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[satlexmb07.amd.com] X-MS-Exchange-CrossTenant-AuthSource: BL02EPF0001A101.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR12MB7425 Content-Type: text/plain; charset="utf-8" Remote processor will report the crash reason via the resource table and notify the host via mailbox notification. The host checks this crash reason on every mailbox notification from the remote and report to the rproc core framework. Then the rproc core framework will start the recovery process. Signed-off-by: Tanmay Shah --- Changes in v3: - %s/kick/mailbox notification/ - %s/core framework/rproc core framework/ - fold simple function within zynqmp_r5_handle_rsc(). - remove spurious change - reset crash state after reporting the crash - document set and reset of ATTACH_ON_RECOVERY flag - set recovery_disabled flag to false - check condition rproc->crash_reason !=3D NULL Changes in v2: - clear attach recovery boot flag during detach and stop ops drivers/remoteproc/xlnx_r5_remoteproc.c | 60 ++++++++++++++++++++++++- 1 file changed, 59 insertions(+), 1 deletion(-) diff --git a/drivers/remoteproc/xlnx_r5_remoteproc.c b/drivers/remoteproc/x= lnx_r5_remoteproc.c index bd619a6c42aa..0d831330ea90 100644 --- a/drivers/remoteproc/xlnx_r5_remoteproc.c +++ b/drivers/remoteproc/xlnx_r5_remoteproc.c @@ -108,6 +108,10 @@ struct rsc_tbl_data { const uintptr_t rsc_tbl; } __packed; =20 +enum fw_vendor_rsc { + FW_RSC_VENDOR_CRASH_REASON =3D RSC_VENDOR_START, +}; + /* * Hardcoded TCM bank values. This will stay in driver to maintain backward * compatibility with device-tree that does not have TCM information. @@ -127,9 +131,21 @@ static const struct mem_bank_data zynqmp_tcm_banks_loc= kstep[] =3D { {0xffe30000UL, 0x30000, 0x10000UL, PD_R5_1_BTCM, "btcm1"}, }; =20 +/** + * struct xlnx_rproc_crash_report - resource to know crash status and reas= on + * + * @crash_state: if true, the rproc is notifying crash, time to recover + * @crash_reason: reason of crash + */ +struct xlnx_rproc_crash_report { + u32 crash_state; + u32 crash_reason; +} __packed; + /** * struct zynqmp_r5_core - remoteproc core's internal data * + * @crash_report: rproc crash state and reason * @rsc_tbl_va: resource table virtual address * @sram: Array of sram memories assigned to this core * @num_sram: number of sram for this core @@ -143,6 +159,7 @@ static const struct mem_bank_data zynqmp_tcm_banks_lock= step[] =3D { * @ipi: pointer to mailbox information */ struct zynqmp_r5_core { + struct xlnx_rproc_crash_report *crash_report; void __iomem *rsc_tbl_va; struct zynqmp_sram_bank *sram; int num_sram; @@ -227,10 +244,14 @@ static void handle_event_notified(struct work_struct = *work) static void zynqmp_r5_mb_rx_cb(struct mbox_client *cl, void *msg) { struct zynqmp_ipi_message *ipi_msg, *buf_msg; + struct zynqmp_r5_core *r5_core; + struct rproc *rproc; struct mbox_info *ipi; size_t len; =20 ipi =3D container_of(cl, struct mbox_info, mbox_cl); + r5_core =3D ipi->r5_core; + rproc =3D r5_core->rproc; =20 /* copy data from ipi buffer to r5_core */ ipi_msg =3D (struct zynqmp_ipi_message *)msg; @@ -244,6 +265,16 @@ static void zynqmp_r5_mb_rx_cb(struct mbox_client *cl,= void *msg) buf_msg->len =3D len; memcpy(buf_msg->data, ipi_msg->data, len); =20 + /* Check for crash only if rproc crash is expected */ + if (rproc->state =3D=3D RPROC_ATTACHED || rproc->state =3D=3D RPROC_RUNNI= NG) { + if (r5_core->crash_report && r5_core->crash_report->crash_state) { + rproc_report_crash(rproc, + r5_core->crash_report->crash_reason); + r5_core->crash_report->crash_state =3D 0; + r5_core->crash_report->crash_reason =3D 0; + } + } + /* received and processed interrupt ack */ if (mbox_send_message(ipi->rx_chan, NULL) < 0) dev_err(cl->dev, "ack failed to mbox rx_chan\n"); @@ -438,6 +469,13 @@ static int zynqmp_r5_rproc_stop(struct rproc *rproc) if (ret) dev_err(r5_core->dev, "core force power down failed\n"); =20 + /* + * Clear attach on recovery flag during stop operation. The next state + * of the remote processor is expected to be "Running" state. In this + * state boot recovery method must take place over attach on recovery. + */ + test_and_clear_bit(RPROC_FEAT_ATTACH_ON_RECOVERY, rproc->features); + return ret; } =20 @@ -859,6 +897,9 @@ static int zynqmp_r5_get_rsc_table_va(struct zynqmp_r5_= core *r5_core) =20 static int zynqmp_r5_attach(struct rproc *rproc) { + /* Enable attach on recovery method. Clear it during rproc stop. */ + rproc_set_feature(rproc, RPROC_FEAT_ATTACH_ON_RECOVERY); + dev_dbg(&rproc->dev, "rproc %d attached\n", rproc->index); =20 return 0; @@ -873,9 +914,25 @@ static int zynqmp_r5_detach(struct rproc *rproc) */ zynqmp_r5_rproc_kick(rproc, 0); =20 + clear_bit(RPROC_FEAT_ATTACH_ON_RECOVERY, rproc->features); + return 0; } =20 +static int zynqmp_r5_handle_rsc(struct rproc *rproc, u32 rsc_type, void *r= sc, + int offset, int avail) +{ + struct zynqmp_r5_core *r5_core =3D rproc->priv; + void *rsc_offset =3D (r5_core->rsc_tbl_va + offset); + + if (rsc_type =3D=3D FW_RSC_VENDOR_CRASH_REASON) + r5_core->crash_report =3D (struct xlnx_rproc_crash_report *)(rsc_offset); + else + return RSC_IGNORED; + + return RSC_HANDLED; +} + static const struct rproc_ops zynqmp_r5_rproc_ops =3D { .prepare =3D zynqmp_r5_rproc_prepare, .unprepare =3D zynqmp_r5_rproc_unprepare, @@ -890,6 +947,7 @@ static const struct rproc_ops zynqmp_r5_rproc_ops =3D { .get_loaded_rsc_table =3D zynqmp_r5_get_loaded_rsc_table, .attach =3D zynqmp_r5_attach, .detach =3D zynqmp_r5_detach, + .handle_rsc =3D zynqmp_r5_handle_rsc, }; =20 /** @@ -923,7 +981,7 @@ static struct zynqmp_r5_core *zynqmp_r5_add_rproc_core(= struct device *cdev) =20 rproc_coredump_set_elf_info(r5_rproc, ELFCLASS32, EM_ARM); =20 - r5_rproc->recovery_disabled =3D true; + r5_rproc->recovery_disabled =3D false; r5_rproc->has_iommu =3D false; r5_rproc->auto_boot =3D false; r5_core =3D r5_rproc->priv; --=20 2.34.1