Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp7469279pxb; Thu, 18 Feb 2021 10:49:58 -0800 (PST) X-Google-Smtp-Source: ABdhPJwPo2PvjnhBy+A30k3hLwISu6VWun2Sm6bwthe12VkrUZmJD8JezPz35S0+LLztL8e3aQEJ X-Received: by 2002:a17:907:7691:: with SMTP id jv17mr5204107ejc.75.1613674198063; Thu, 18 Feb 2021 10:49:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613674198; cv=none; d=google.com; s=arc-20160816; b=0BXaVSZ3H3NumsgDspHMvLnhATU1n2vSnBZsjv7FAmX7y+zWGw8x/YxqTLZW03I7TC lAT1BqzT31MvXW/c1UJZ8HuvvOr9juicVkKypVE5kO7cpU05pHVraJaHMXuMQ6KTQvLg Z5DbO0EDNU88mpoLAwZJVGj82aK6JDyjKCG9IDMin1ytcloCnUmZQ5ss3Q0JvL3fbvdp 5B7UIHI5gPWYjC2OnFZrQK4FthpVm5hgxL8E35cK5tX/SXb90KaTXJ6vo9Jp9etgfosA HQEQvy8SvaaAFKFa+cDks3C5nh/wDuVgihohTQ8ghvnwbLtBNeNOPzlL9k/zYoLzK96j dq+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=QOlt0zwrsSum6PpeuXt5uZKMW790rq8dsURb69gQyU0=; b=YjCFPH4GcY/GSx6gw2NFuCmFJnnrx55c/nT9HmMA6pHuTQKaxjJDwPjQnaTMpMx3Vl 99FlFzLJWV5Kz0a3bO6nTQKvKauwDHlpHrrUb/Lc5Ft9LYpF+aEo4QjVR2AFlpGPWjX+ ohDyDKFel1HKdL7lZYUOPsE5u7xrNeHGdzJi93tJkm1NTuzoAoNWSPtrREWU+VY9Whaq YRpASmYCj/BqACXVL61urL03cAGm33JRWW60TLZGMezp5xbpj4irsYR4LexZRCPle8Pe 7lO54ZaPGrcotryt5GxGMk+a+EtbGnN/9NCCcrhO+opy9RCrW57DQviTS0poGMXq2H2K 7uww== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=asem.it Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d15si3967794edq.404.2021.02.18.10.49.34; Thu, 18 Feb 2021 10:49:58 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=asem.it Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232904AbhBRSrX (ORCPT + 99 others); Thu, 18 Feb 2021 13:47:23 -0500 Received: from smtp.asem.it ([151.1.184.197]:61030 "EHLO smtp.asem.it" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233644AbhBRQdW (ORCPT ); Thu, 18 Feb 2021 11:33:22 -0500 Received: from webmail.asem.it by asem.it (smtp.asem.it) (SecurityGateway 6.5.2) with ESMTP id SG000816795.MSG for ; Thu, 18 Feb 2021 17:32:08 +0100S Received: from ASAS044.asem.intra (172.16.16.44) by ASAS044.asem.intra (172.16.16.44) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1979.3; Thu, 18 Feb 2021 17:32:06 +0100 Received: from flavio-x.asem.intra (172.16.17.208) by ASAS044.asem.intra (172.16.16.44) with Microsoft SMTP Server id 15.1.1979.3 via Frontend Transport; Thu, 18 Feb 2021 17:32:06 +0100 From: Flavio Suligoi To: Wim Van Sebroeck , Guenter Roeck , Mika Westerberg CC: , , Flavio Suligoi Subject: [PATCH v1] watchdog: wdat: add param. to start wdog on module insertion Date: Thu, 18 Feb 2021 17:32:00 +0100 Message-ID: <20210218163200.1154812-1-f.suligoi@asem.it> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-SGHeloLookup-Result: pass smtp.helo=webmail.asem.it (ip=172.16.16.44) X-SGSPF-Result: none (smtp.asem.it) X-SGOP-RefID: str=0001.0A782F17.602E9687.0048,ss=1,re=0.000,recu=0.000,reip=0.000,cl=1,cld=1,fgs=0 (_st=1 _vt=0 _iwf=0) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add the parameter "start_enable" to start the watchdog directly on module insertion. In an embedded system, for some applications, the watchdog must be activated as soon as possible. In some embedded x86 boards the watchdog can be activated directly by the BIOS (with an appropriate setting of the BIOS setup). In other cases, when this BIOS feature is not present, the possibility to start the watchdog immediately after the module loading can be very useful. Signed-off-by: Flavio Suligoi --- drivers/watchdog/wdat_wdt.c | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/drivers/watchdog/wdat_wdt.c b/drivers/watchdog/wdat_wdt.c index cec7917790e5..b990d0197d2e 100644 --- a/drivers/watchdog/wdat_wdt.c +++ b/drivers/watchdog/wdat_wdt.c @@ -61,6 +61,12 @@ module_param(timeout, int, 0); MODULE_PARM_DESC(timeout, "Watchdog timeout in seconds (default=" __MODULE_STRING(WDAT_DEFAULT_TIMEOUT) ")"); +#define START_DEFAULT 0 +static int start_enabled = START_DEFAULT; +module_param(start_enabled, int, 0); +MODULE_PARM_DESC(start_enabled, "Watchdog is started on module insertion " + "(default=" __MODULE_STRING(START_DEFAULT) ")"); + static int wdat_wdt_read(struct wdat_wdt *wdat, const struct wdat_instruction *instr, u32 *value) { @@ -437,6 +443,8 @@ static int wdat_wdt_probe(struct platform_device *pdev) } wdat_wdt_boot_status(wdat); + if (start_enabled) + wdat_wdt_start(&wdat->wdd); wdat_wdt_set_running(wdat); ret = wdat_wdt_enable_reboot(wdat); -- 2.25.1