Received: by 2002:a17:90a:88:0:0:0:0 with SMTP id a8csp203847pja; Fri, 22 Nov 2019 05:26:01 -0800 (PST) X-Google-Smtp-Source: APXvYqywkbS/A4Y69WYZcUs2t/q/1o9pp5ojvmkVIK0/cncrpAqdMpDITE3BivUocGi/AB2HnxXP X-Received: by 2002:a17:906:52c3:: with SMTP id w3mr22701817ejn.122.1574429160846; Fri, 22 Nov 2019 05:26:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574429160; cv=none; d=google.com; s=arc-20160816; b=YAA6usJ3G5pdNt+/7RswENxgLhV62vnYBQaXlnye336J/vNR7kcb9/IA6wFHTXAapF SvQWgOgZR15M+aJvBYrXMmB+XDFD4nclcVUO4UJZdGS3b4Njw+7OGvZ8XCbd8iM6cKTt GrtkdxGZ8OwWLrsKYHHRsbmPiHlqCLU54DAYRDXz8ZEqIbyrUsC9yEV5DQszYhRkdWQU 3gMhX5lhvKCFQbUtlVyhCJESKnr+gcZvM6mJDALBXjG8JCT/7VlRF9oUGj1zT1N5EPDR UeXz4MLftZabpQ8if3x8b+AjQeAxwlOudFszT1isiIr5Nor7M5pnmKWTf4oJUHn4//Xc RyCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from:dkim-signature; bh=yQtLtgP4SshXnHOsAHP1arx+i7HyYqVIpwa3Jnqm8ds=; b=tM9f+3WojKu/GbdRB41t5GFP0P6UUEvR8V5mYlHNoZtSZpoHW4uR5vQ54ZyP7YIye+ 3ui7ruqR78ltgtYX3Kgfea6QJDRrigepa3l54X6ylz1DeSk6uffnffYgKmQBpvQYjgRw lvx7oIuA25xG1w21wOaNKFCZZE3ZgFJSh/h+s6olenWAucj/JJTI/P8Q9j5xCofFUecw 1RuOsdVykPDLIYdFpWpXdU8/tzlx1HcraN6GNWZytbVY4Dlz2PINdO4H3qQ2pWmcyPDY /0jJpy/KJ2wPWCur497GkzE/rjPPk7c7NmG6JV207f99VncOAvWX6lCK451UQqGBLlkB N2cQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@st.com header.s=STMicroelectronics header.b=X1aI59PJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=st.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e8si5205882edk.444.2019.11.22.05.25.35; Fri, 22 Nov 2019 05:26:00 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@st.com header.s=STMicroelectronics header.b=X1aI59PJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=st.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727809AbfKVNXV (ORCPT + 99 others); Fri, 22 Nov 2019 08:23:21 -0500 Received: from mx07-00178001.pphosted.com ([62.209.51.94]:38326 "EHLO mx07-00178001.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726548AbfKVNXV (ORCPT ); Fri, 22 Nov 2019 08:23:21 -0500 Received: from pps.filterd (m0046668.ppops.net [127.0.0.1]) by mx07-00178001.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id xAMDH5K5020334; Fri, 22 Nov 2019 14:22:54 +0100 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=st.com; h=from : to : cc : subject : date : message-id : mime-version : content-type; s=STMicroelectronics; bh=yQtLtgP4SshXnHOsAHP1arx+i7HyYqVIpwa3Jnqm8ds=; b=X1aI59PJrQVIw5W4jTHEYGmyufOTJ7KCbqVgkGEe0P2YPDG8EUF5xGo3EkmynhXISSBK 1SOwXAIb0gpuvQ5V+AuJQ3XO1Ep3a1vTpG2MHjiUvxe59qDUrtAssceNU90ECTB2tpdO htPIq9Y/tyH+Pu5yWqMXUDvxkPFGX51SUFH/cHsKegF0+W3gL7b18OIaxzQKJfbmcM+u gqEtM92PDH5tkDHTOkSTn4iXiqBOjTEevrS8ZhuRMuyGma/E8f+C9hzS4ubq7zNy1YRP Dn5ph4x2k+M5YmL6kzu0ZZbWageJzR6KsuhqyjDazDSw60YJ2NizcpOW4T9DLhzIQ1wb +A== Received: from beta.dmz-eu.st.com (beta.dmz-eu.st.com [164.129.1.35]) by mx07-00178001.pphosted.com with ESMTP id 2wa9ujgy24-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 22 Nov 2019 14:22:54 +0100 Received: from euls16034.sgp.st.com (euls16034.sgp.st.com [10.75.44.20]) by beta.dmz-eu.st.com (STMicroelectronics) with ESMTP id 1830F100034; Fri, 22 Nov 2019 14:22:49 +0100 (CET) Received: from Webmail-eu.st.com (sfhdag5node3.st.com [10.75.127.15]) by euls16034.sgp.st.com (STMicroelectronics) with ESMTP id 9E3652BE25A; Fri, 22 Nov 2019 14:22:48 +0100 (CET) Received: from localhost (10.75.127.46) by SFHDAG5NODE3.st.com (10.75.127.15) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 22 Nov 2019 14:22:48 +0100 From: Christophe Roullier To: , , , CC: , , , , Subject: [PATCH v3 1/1] drivers: watchdog: stm32_iwdg: set WDOG_HW_RUNNING at probe Date: Fri, 22 Nov 2019 14:22:46 +0100 Message-ID: <20191122132246.8473-1-christophe.roullier@st.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.75.127.46] X-ClientProxiedBy: SFHDAG1NODE3.st.com (10.75.127.3) To SFHDAG5NODE3.st.com (10.75.127.15) X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.95,18.0.572 definitions=2019-11-22_02:2019-11-21,2019-11-22 signatures=0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org If the watchdog hardware is already enabled during the boot process, when the Linux watchdog driver loads, it should start/reset the watchdog and tell the watchdog framework. As a result, ping can be generated from the watchdog framework (if CONFIG_WATCHDOG_HANDLE_BOOT_ENABLED is set), until the userspace watchdog daemon takes over control Fixes:4332d113c66a ("watchdog: Add STM32 IWDG driver") Signed-off-by: Christophe Roullier --- Changes since v2: According to Guenter removed intermediate variable I've tested some config and it is working as expected: Watchdog enable in Uboot + HANDLE_BOOT_ENABLE is not set + daemon watchdog in userland ON ==> No reset IWDG2 Watchdog enable in Uboot + HANDLE_BOOT_ENABLE is not set ==> Reset IWDG2 Watchdog enable in Uboot + HANDLE_BOOT_ENABLE=y ==> No reset IWDG2 Watchdog enable in Uboot + HANDLE_BOOT_ENABLE=y + daemon watchdog in userland ON puis OFF ==> Reset IWDG2 Watchdog disable in Uboot + HANDLE_BOOT_ENABLE is not set ==> No reset IWDG2 Watchdog disable in Uboot + HANDLE_BOOT_ENABLE=y ==> No reset IWDG2 Watchdog disable in Uboot + HANDLE_BOOT_ENABLE=y + daemon watchdog in userland ON ==> No reset IWDG2 Watchdog disable in Uboot + HANDLE_BOOT_ENABLE=y + daemon watchdog in userland ON puis OFF ==> Reset IWDG2 Thanks, Christophe drivers/watchdog/stm32_iwdg.c | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) diff --git a/drivers/watchdog/stm32_iwdg.c b/drivers/watchdog/stm32_iwdg.c index a3a329011a06..25188d6bbe15 100644 --- a/drivers/watchdog/stm32_iwdg.c +++ b/drivers/watchdog/stm32_iwdg.c @@ -262,6 +262,24 @@ static int stm32_iwdg_probe(struct platform_device *pdev) watchdog_set_nowayout(wdd, WATCHDOG_NOWAYOUT); watchdog_init_timeout(wdd, 0, dev); + /* + * In case of CONFIG_WATCHDOG_HANDLE_BOOT_ENABLED is set + * (Means U-Boot/bootloaders leaves the watchdog running) + * When we get here we should make a decision to prevent + * any side effects before user space daemon will take care of it. + * The best option, taking into consideration that there is no + * way to read values back from hardware, is to enforce watchdog + * being run with deterministic values. + */ + if (IS_ENABLED(CONFIG_WATCHDOG_HANDLE_BOOT_ENABLED)) { + ret = stm32_iwdg_start(wdd); + if (ret) + return ret; + + /* Make sure the watchdog is serviced */ + set_bit(WDOG_HW_RUNNING, &wdd->status); + } + ret = devm_watchdog_register_device(dev, wdd); if (ret) return ret; -- 2.17.1