Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp4314557ybc; Fri, 22 Nov 2019 00:27:39 -0800 (PST) X-Google-Smtp-Source: APXvYqwZSxM8FGHj9B3vp3AiKCRqWwJQPkRzAvi5Fc/M4lsIwLgph/pSjB9aJ1VXwx6VK4Gs6/HV X-Received: by 2002:a1c:21c4:: with SMTP id h187mr15378673wmh.46.1574411259206; Fri, 22 Nov 2019 00:27:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574411259; cv=none; d=google.com; s=arc-20160816; b=WuaW7dYY3n0DYKdIUmjuTK1yTNWPTEW4NzbM7tuyPZvGgv9LuhhbxBkYcbF6wFF+/d xOSr4Got+2i3W+2uLd8vvm/z21OW7pmwZdun551qr3oliv345MmZqXaPk1vV2YJ60zWS O6GK87F5Z5d6U6ag0pMs/Qu0lpvn5DFZeYuiWdMZUx6u50DYUmoiGZ3dreTa5YhTwhdC 3Ql4qA+dUqpl5KvOjajjedn5m/5GjnXrasDr8DgggGW10I7rQEypbGX0Bxq30qnvqD94 9r65HB0SdjE92wpmkGVyH+rmDdssFNNAtbYnU9ojLe3ypkvlStYl1k9FeStDbrl/6tkZ KY3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from:dkim-signature; bh=7YG8hMLBlcZH9okyAWH+GnK29WW6bCIlSdmP8Pj50xc=; b=QyJUf2K7ohJihbHjTsBLSbCqmlrNa0tPsnpGxivitzo63PgClqab1ezt1wAXVnu82g O6EuNKmKkhFLtGQ3UvkHgOVZkfP7Vg9dxk06wAVc+uUWhLDqFfeO8NfSIalHyWnjfl3d 1Df5SCgWJ5RldSWlaj99uwfivXb65I7mUbpvdDb/Da7iQXxfSsuBnO9BTyFiJU/SlxT7 a2WTSnONYN5+ajsAU62lccaejAig1CbwROsLvxW4YWj8j8+4EK+63zwO0LjwyFUsMIJl Te5FbQrLCPI/NasskzLWt5uYqstupnd5dTep4up/nu8hh7BrI5HRYpMSaOmglYfbnBBw v/5w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@st.com header.s=STMicroelectronics header.b=uY2pBRUE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=st.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b41si4450644eda.1.2019.11.22.00.27.15; Fri, 22 Nov 2019 00:27:39 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@st.com header.s=STMicroelectronics header.b=uY2pBRUE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=st.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727468AbfKVIZ3 (ORCPT + 99 others); Fri, 22 Nov 2019 03:25:29 -0500 Received: from mx07-00178001.pphosted.com ([62.209.51.94]:35050 "EHLO mx07-00178001.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727422AbfKVIZX (ORCPT ); Fri, 22 Nov 2019 03:25:23 -0500 Received: from pps.filterd (m0046668.ppops.net [127.0.0.1]) by mx07-00178001.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id xAM8Ca4X024404; Fri, 22 Nov 2019 09:24:48 +0100 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=st.com; h=from : to : cc : subject : date : message-id : mime-version : content-type; s=STMicroelectronics; bh=7YG8hMLBlcZH9okyAWH+GnK29WW6bCIlSdmP8Pj50xc=; b=uY2pBRUENT6U808IvNJJEG1i+oGTu0K6UkQAwayp/bbNLUqHRt9u83Jqvaf1v6+JQ1wX ZzasUcvdG1WuL2QXjKyxjm4ZHPunMVyUzigvdsys15VzAg1s+wEXi79EcXcey5j4w8kZ kRZlk3OFfdvyix+IwF9Q2LP1kuMrqpbkfeBH8vesx0GA4qf+apH7eBthFt/oEkb0Jepd S3uGBnUyRC1OBGWU1fXyLh84+FanVB/Fads5+NlEGbvQH+OqHO6LNcfI1zE+g3/qNqXE uTvLcGCdf1FyCHLE848tYP3K0BzCoMkFGw9DYq6zcyOtc9ZinZl1a09RUBSnEmVNuHqA tQ== Received: from beta.dmz-eu.st.com (beta.dmz-eu.st.com [164.129.1.35]) by mx07-00178001.pphosted.com with ESMTP id 2wa9ujfmpv-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 22 Nov 2019 09:24:48 +0100 Received: from euls16034.sgp.st.com (euls16034.sgp.st.com [10.75.44.20]) by beta.dmz-eu.st.com (STMicroelectronics) with ESMTP id 9B356100034; Fri, 22 Nov 2019 09:24:47 +0100 (CET) Received: from Webmail-eu.st.com (sfhdag5node3.st.com [10.75.127.15]) by euls16034.sgp.st.com (STMicroelectronics) with ESMTP id 8B3552AD9F3; Fri, 22 Nov 2019 09:24:47 +0100 (CET) Received: from localhost (10.75.127.45) by SFHDAG5NODE3.st.com (10.75.127.15) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 22 Nov 2019 09:24:46 +0100 From: Christophe Roullier To: , , , CC: , , , , Subject: [PATCH v2 1/1] drivers: watchdog: stm32_iwdg: set WDOG_HW_RUNNING at probe Date: Fri, 22 Nov 2019 09:24:42 +0100 Message-ID: <20191122082442.21695-1-christophe.roullier@st.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.75.127.45] X-ClientProxiedBy: SFHDAG1NODE1.st.com (10.75.127.1) To SFHDAG5NODE3.st.com (10.75.127.15) X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.95,18.0.572 definitions=2019-11-21_07:2019-11-21,2019-11-21 signatures=0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org If the watchdog hardware is already enabled during the boot process, when the Linux watchdog driver loads, it should start/reset the watchdog and tell the watchdog framework. As a result, ping can be generated from the watchdog framework (if CONFIG_WATCHDOG_HANDLE_BOOT_ENABLED is set), until the userspace watchdog daemon takes over control Fixes:4332d113c66a ("watchdog: Add STM32 IWDG driver") Signed-off-by: Christophe Roullier --- Changes since v1: According to Guenter I follow the guidance from intel-mid_wdt.c and I added test to check if CONFIG_WATCHDOG_HANDLE_BOOT_ENABLED is set because we need to be flexible (depends on customer config, but watchdog not always start by bootloader (Uboot, ..)) I've tested some config and it is working as expected: Watchdog enable in Uboot + HANDLE_BOOT_ENABLE is not set + daemon watchdog in userland ON ==> No reset IWDG2 Watchdog enable in Uboot + HANDLE_BOOT_ENABLE is not set ==> Reset IWDG2 Watchdog enable in Uboot + HANDLE_BOOT_ENABLE=y ==> No reset IWDG2 Watchdog enable in Uboot + HANDLE_BOOT_ENABLE=y + daemon watchdog in userland ON puis OFF ==> Reset IWDG2 Watchdog disable in Uboot + HANDLE_BOOT_ENABLE is not set ==> No reset IWDG2 Watchdog disable in Uboot + HANDLE_BOOT_ENABLE=y ==> No reset IWDG2 Watchdog disable in Uboot + HANDLE_BOOT_ENABLE=y + daemon watchdog in userland ON ==> No reset IWDG2 Watchdog disable in Uboot + HANDLE_BOOT_ENABLE=y + daemon watchdog in userland ON puis OFF ==> Reset IWDG2 Thanks, Christophe drivers/watchdog/stm32_iwdg.c | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) diff --git a/drivers/watchdog/stm32_iwdg.c b/drivers/watchdog/stm32_iwdg.c index a3a329011a06..7f454a6e17ba 100644 --- a/drivers/watchdog/stm32_iwdg.c +++ b/drivers/watchdog/stm32_iwdg.c @@ -50,6 +50,9 @@ #define TIMEOUT_US 100000 #define SLEEP_US 1000 +static bool handle_boot_enabled = + IS_ENABLED(CONFIG_WATCHDOG_HANDLE_BOOT_ENABLED); + struct stm32_iwdg_data { bool has_pclk; u32 max_prescaler; @@ -262,6 +265,24 @@ static int stm32_iwdg_probe(struct platform_device *pdev) watchdog_set_nowayout(wdd, WATCHDOG_NOWAYOUT); watchdog_init_timeout(wdd, 0, dev); + /* + * In case of CONFIG_WATCHDOG_HANDLE_BOOT_ENABLED is set + * (Means U-Boot/bootloaders leaves the watchdog running) + * When we get here we should make a decision to prevent + * any side effects before user space daemon will take care of it. + * The best option, taking into consideration that there is no + * way to read values back from hardware, is to enforce watchdog + * being run with deterministic values. + */ + if (handle_boot_enabled) { + ret = stm32_iwdg_start(wdd); + if (ret) + return ret; + + /* Make sure the watchdog is serviced */ + set_bit(WDOG_HW_RUNNING, &wdd->status); + } + ret = devm_watchdog_register_device(dev, wdd); if (ret) return ret; -- 2.17.1