2 * intel TCO Watchdog Driver
4 * (c) Copyright 2006-2009 Wim Van Sebroeck <wim@iguana.be>.
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
11 * Neither Wim Van Sebroeck nor Iguana vzw. admit liability nor
12 * provide warranty for any of this software. This material is
13 * provided "AS-IS" and at no charge.
15 * The TCO watchdog is implemented in the following I/O controller hubs:
16 * (See the intel documentation on http://developer.intel.com.)
17 * document number 290655-003, 290677-014: 82801AA (ICH), 82801AB (ICHO)
18 * document number 290687-002, 298242-027: 82801BA (ICH2)
19 * document number 290733-003, 290739-013: 82801CA (ICH3-S)
20 * document number 290716-001, 290718-007: 82801CAM (ICH3-M)
21 * document number 290744-001, 290745-025: 82801DB (ICH4)
22 * document number 252337-001, 252663-008: 82801DBM (ICH4-M)
23 * document number 273599-001, 273645-002: 82801E (C-ICH)
24 * document number 252516-001, 252517-028: 82801EB (ICH5), 82801ER (ICH5R)
25 * document number 300641-004, 300884-013: 6300ESB
26 * document number 301473-002, 301474-026: 82801F (ICH6)
27 * document number 313082-001, 313075-006: 631xESB, 632xESB
28 * document number 307013-003, 307014-024: 82801G (ICH7)
29 * document number 313056-003, 313057-017: 82801H (ICH8)
30 * document number 316972-004, 316973-012: 82801I (ICH9)
31 * document number 319973-002, 319974-002: 82801J (ICH10)
32 * document number 322169-001, 322170-003: 5 Series, 3400 Series (PCH)
33 * document number 320066-003, 320257-008: EP80597 (IICH)
34 * document number TBD : Cougar Point (CPT)
35 * document number TBD : Patsburg (PBG)
39 * Includes, defines, variables, module parameters, ...
42 /* Module and version information */
43 #define DRV_NAME "iTCO_wdt"
44 #define DRV_VERSION "1.06"
45 #define PFX DRV_NAME ": "
48 #include <linux/module.h> /* For module specific items */
49 #include <linux/moduleparam.h> /* For new moduleparam's */
50 #include <linux/types.h> /* For standard types (like size_t) */
51 #include <linux/errno.h> /* For the -ENODEV/... values */
52 #include <linux/kernel.h> /* For printk/panic/... */
53 #include <linux/miscdevice.h> /* For MODULE_ALIAS_MISCDEV
55 #include <linux/watchdog.h> /* For the watchdog specific items */
56 #include <linux/init.h> /* For __init/__exit/... */
57 #include <linux/fs.h> /* For file operations */
58 #include <linux/platform_device.h> /* For platform_driver framework */
59 #include <linux/pci.h> /* For pci functions */
60 #include <linux/ioport.h> /* For io-port access */
61 #include <linux/spinlock.h> /* For spin_lock/spin_unlock/... */
62 #include <linux/uaccess.h> /* For copy_to_user/put_user/... */
63 #include <linux/io.h> /* For inb/outb/... */
65 #include "iTCO_vendor.h"
67 /* TCO related info */
69 TCO_ICH
= 0, /* ICH */
72 TCO_ICH2M
, /* ICH2-M */
73 TCO_ICH3
, /* ICH3-S */
74 TCO_ICH3M
, /* ICH3-M */
76 TCO_ICH4M
, /* ICH4-M */
78 TCO_ICH5
, /* ICH5 & ICH5R */
79 TCO_6300ESB
, /* 6300ESB */
80 TCO_ICH6
, /* ICH6 & ICH6R */
81 TCO_ICH6M
, /* ICH6-M */
82 TCO_ICH6W
, /* ICH6W & ICH6RW */
83 TCO_631XESB
, /* 631xESB/632xESB */
84 TCO_ICH7
, /* ICH7 & ICH7R */
85 TCO_ICH7DH
, /* ICH7DH */
86 TCO_ICH7M
, /* ICH7-M & ICH7-U */
87 TCO_ICH7MDH
, /* ICH7-M DH */
88 TCO_ICH8
, /* ICH8 & ICH8R */
89 TCO_ICH8DH
, /* ICH8DH */
90 TCO_ICH8DO
, /* ICH8DO */
91 TCO_ICH8M
, /* ICH8M */
92 TCO_ICH8ME
, /* ICH8M-E */
94 TCO_ICH9R
, /* ICH9R */
95 TCO_ICH9DH
, /* ICH9DH */
96 TCO_ICH9DO
, /* ICH9DO */
97 TCO_ICH9M
, /* ICH9M */
98 TCO_ICH9ME
, /* ICH9M-E */
99 TCO_ICH10
, /* ICH10 */
100 TCO_ICH10R
, /* ICH10R */
101 TCO_ICH10D
, /* ICH10D */
102 TCO_ICH10DO
, /* ICH10DO */
103 TCO_PCH
, /* PCH Desktop Full Featured */
104 TCO_PCHM
, /* PCH Mobile Full Featured */
113 TCO_PCHMSFF
, /* PCH Mobile SFF Full Featured */
118 TCO_EP80579
, /* EP80579 */
119 TCO_CPT1
, /* Cougar Point */
120 TCO_CPT2
, /* Cougar Point Desktop */
121 TCO_CPT3
, /* Cougar Point Mobile */
122 TCO_CPT4
, /* Cougar Point */
123 TCO_CPT5
, /* Cougar Point */
124 TCO_CPT6
, /* Cougar Point */
125 TCO_CPT7
, /* Cougar Point */
126 TCO_CPT8
, /* Cougar Point */
127 TCO_CPT9
, /* Cougar Point */
128 TCO_CPT10
, /* Cougar Point */
129 TCO_CPT11
, /* Cougar Point */
130 TCO_CPT12
, /* Cougar Point */
131 TCO_CPT13
, /* Cougar Point */
132 TCO_CPT14
, /* Cougar Point */
133 TCO_CPT15
, /* Cougar Point */
134 TCO_CPT16
, /* Cougar Point */
135 TCO_CPT17
, /* Cougar Point */
136 TCO_CPT18
, /* Cougar Point */
137 TCO_CPT19
, /* Cougar Point */
138 TCO_CPT20
, /* Cougar Point */
139 TCO_CPT21
, /* Cougar Point */
140 TCO_CPT22
, /* Cougar Point */
141 TCO_CPT23
, /* Cougar Point */
142 TCO_CPT24
, /* Cougar Point */
143 TCO_CPT25
, /* Cougar Point */
144 TCO_CPT26
, /* Cougar Point */
145 TCO_CPT27
, /* Cougar Point */
146 TCO_CPT28
, /* Cougar Point */
147 TCO_CPT29
, /* Cougar Point */
148 TCO_CPT30
, /* Cougar Point */
149 TCO_CPT31
, /* Cougar Point */
150 TCO_PBG1
, /* Patsburg */
151 TCO_PBG2
, /* Patsburg */
156 unsigned int iTCO_version
;
157 } iTCO_chipset_info
[] __devinitdata
= {
167 {"ICH5 or ICH5R", 1},
169 {"ICH6 or ICH6R", 2},
171 {"ICH6W or ICH6RW", 2},
172 {"631xESB/632xESB", 2},
173 {"ICH7 or ICH7R", 2},
175 {"ICH7-M or ICH7-U", 2},
177 {"ICH8 or ICH8R", 2},
192 {"PCH Desktop Full Featured", 2},
193 {"PCH Mobile Full Featured", 2},
202 {"PCH Mobile SFF Full Featured", 2},
244 #define ITCO_PCI_DEVICE(dev, data) \
245 .vendor = PCI_VENDOR_ID_INTEL, \
247 .subvendor = PCI_ANY_ID, \
248 .subdevice = PCI_ANY_ID, \
254 * This data only exists for exporting the supported PCI ids
255 * via MODULE_DEVICE_TABLE. We do not actually register a
256 * pci_driver, because the I/O Controller Hub has also other
257 * functions that probably will be registered by other drivers.
259 static struct pci_device_id iTCO_wdt_pci_tbl
[] = {
260 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_82801AA_0
, TCO_ICH
)},
261 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_82801AB_0
, TCO_ICH0
)},
262 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_82801BA_0
, TCO_ICH2
)},
263 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_82801BA_10
, TCO_ICH2M
)},
264 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_82801CA_0
, TCO_ICH3
)},
265 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_82801CA_12
, TCO_ICH3M
)},
266 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_82801DB_0
, TCO_ICH4
)},
267 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_82801DB_12
, TCO_ICH4M
)},
268 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_82801E_0
, TCO_CICH
)},
269 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_82801EB_0
, TCO_ICH5
)},
270 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_ESB_1
, TCO_6300ESB
)},
271 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_ICH6_0
, TCO_ICH6
)},
272 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_ICH6_1
, TCO_ICH6M
)},
273 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_ICH6_2
, TCO_ICH6W
)},
274 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_ESB2_0
, TCO_631XESB
)},
275 { ITCO_PCI_DEVICE(0x2671, TCO_631XESB
)},
276 { ITCO_PCI_DEVICE(0x2672, TCO_631XESB
)},
277 { ITCO_PCI_DEVICE(0x2673, TCO_631XESB
)},
278 { ITCO_PCI_DEVICE(0x2674, TCO_631XESB
)},
279 { ITCO_PCI_DEVICE(0x2675, TCO_631XESB
)},
280 { ITCO_PCI_DEVICE(0x2676, TCO_631XESB
)},
281 { ITCO_PCI_DEVICE(0x2677, TCO_631XESB
)},
282 { ITCO_PCI_DEVICE(0x2678, TCO_631XESB
)},
283 { ITCO_PCI_DEVICE(0x2679, TCO_631XESB
)},
284 { ITCO_PCI_DEVICE(0x267a, TCO_631XESB
)},
285 { ITCO_PCI_DEVICE(0x267b, TCO_631XESB
)},
286 { ITCO_PCI_DEVICE(0x267c, TCO_631XESB
)},
287 { ITCO_PCI_DEVICE(0x267d, TCO_631XESB
)},
288 { ITCO_PCI_DEVICE(0x267e, TCO_631XESB
)},
289 { ITCO_PCI_DEVICE(0x267f, TCO_631XESB
)},
290 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_ICH7_0
, TCO_ICH7
)},
291 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_ICH7_30
, TCO_ICH7DH
)},
292 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_ICH7_1
, TCO_ICH7M
)},
293 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_ICH7_31
, TCO_ICH7MDH
)},
294 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_ICH8_0
, TCO_ICH8
)},
295 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_ICH8_2
, TCO_ICH8DH
)},
296 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_ICH8_3
, TCO_ICH8DO
)},
297 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_ICH8_4
, TCO_ICH8M
)},
298 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_ICH8_1
, TCO_ICH8ME
)},
299 { ITCO_PCI_DEVICE(0x2918, TCO_ICH9
)},
300 { ITCO_PCI_DEVICE(0x2916, TCO_ICH9R
)},
301 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_ICH9_2
, TCO_ICH9DH
)},
302 { ITCO_PCI_DEVICE(PCI_DEVICE_ID_INTEL_ICH9_4
, TCO_ICH9DO
)},
303 { ITCO_PCI_DEVICE(0x2919, TCO_ICH9M
)},
304 { ITCO_PCI_DEVICE(0x2917, TCO_ICH9ME
)},
305 { ITCO_PCI_DEVICE(0x3a18, TCO_ICH10
)},
306 { ITCO_PCI_DEVICE(0x3a16, TCO_ICH10R
)},
307 { ITCO_PCI_DEVICE(0x3a1a, TCO_ICH10D
)},
308 { ITCO_PCI_DEVICE(0x3a14, TCO_ICH10DO
)},
309 { ITCO_PCI_DEVICE(0x3b00, TCO_PCH
)},
310 { ITCO_PCI_DEVICE(0x3b01, TCO_PCHM
)},
311 { ITCO_PCI_DEVICE(0x3b02, TCO_P55
)},
312 { ITCO_PCI_DEVICE(0x3b03, TCO_PM55
)},
313 { ITCO_PCI_DEVICE(0x3b06, TCO_H55
)},
314 { ITCO_PCI_DEVICE(0x3b07, TCO_QM57
)},
315 { ITCO_PCI_DEVICE(0x3b08, TCO_H57
)},
316 { ITCO_PCI_DEVICE(0x3b09, TCO_HM55
)},
317 { ITCO_PCI_DEVICE(0x3b0a, TCO_Q57
)},
318 { ITCO_PCI_DEVICE(0x3b0b, TCO_HM57
)},
319 { ITCO_PCI_DEVICE(0x3b0d, TCO_PCHMSFF
)},
320 { ITCO_PCI_DEVICE(0x3b0f, TCO_QS57
)},
321 { ITCO_PCI_DEVICE(0x3b12, TCO_3400
)},
322 { ITCO_PCI_DEVICE(0x3b14, TCO_3420
)},
323 { ITCO_PCI_DEVICE(0x3b16, TCO_3450
)},
324 { ITCO_PCI_DEVICE(0x5031, TCO_EP80579
)},
325 { ITCO_PCI_DEVICE(0x1c41, TCO_CPT1
)},
326 { ITCO_PCI_DEVICE(0x1c42, TCO_CPT2
)},
327 { ITCO_PCI_DEVICE(0x1c43, TCO_CPT3
)},
328 { ITCO_PCI_DEVICE(0x1c44, TCO_CPT4
)},
329 { ITCO_PCI_DEVICE(0x1c45, TCO_CPT5
)},
330 { ITCO_PCI_DEVICE(0x1c46, TCO_CPT6
)},
331 { ITCO_PCI_DEVICE(0x1c47, TCO_CPT7
)},
332 { ITCO_PCI_DEVICE(0x1c48, TCO_CPT8
)},
333 { ITCO_PCI_DEVICE(0x1c49, TCO_CPT9
)},
334 { ITCO_PCI_DEVICE(0x1c4a, TCO_CPT10
)},
335 { ITCO_PCI_DEVICE(0x1c4b, TCO_CPT11
)},
336 { ITCO_PCI_DEVICE(0x1c4c, TCO_CPT12
)},
337 { ITCO_PCI_DEVICE(0x1c4d, TCO_CPT13
)},
338 { ITCO_PCI_DEVICE(0x1c4e, TCO_CPT14
)},
339 { ITCO_PCI_DEVICE(0x1c4f, TCO_CPT15
)},
340 { ITCO_PCI_DEVICE(0x1c50, TCO_CPT16
)},
341 { ITCO_PCI_DEVICE(0x1c51, TCO_CPT17
)},
342 { ITCO_PCI_DEVICE(0x1c52, TCO_CPT18
)},
343 { ITCO_PCI_DEVICE(0x1c53, TCO_CPT19
)},
344 { ITCO_PCI_DEVICE(0x1c54, TCO_CPT20
)},
345 { ITCO_PCI_DEVICE(0x1c55, TCO_CPT21
)},
346 { ITCO_PCI_DEVICE(0x1c56, TCO_CPT22
)},
347 { ITCO_PCI_DEVICE(0x1c57, TCO_CPT23
)},
348 { ITCO_PCI_DEVICE(0x1c58, TCO_CPT24
)},
349 { ITCO_PCI_DEVICE(0x1c59, TCO_CPT25
)},
350 { ITCO_PCI_DEVICE(0x1c5a, TCO_CPT26
)},
351 { ITCO_PCI_DEVICE(0x1c5b, TCO_CPT27
)},
352 { ITCO_PCI_DEVICE(0x1c5c, TCO_CPT28
)},
353 { ITCO_PCI_DEVICE(0x1c5d, TCO_CPT29
)},
354 { ITCO_PCI_DEVICE(0x1c5e, TCO_CPT30
)},
355 { ITCO_PCI_DEVICE(0x1c5f, TCO_CPT31
)},
356 { ITCO_PCI_DEVICE(0x1d40, TCO_PBG1
)},
357 { ITCO_PCI_DEVICE(0x1d41, TCO_PBG2
)},
358 { 0, }, /* End of list */
360 MODULE_DEVICE_TABLE(pci
, iTCO_wdt_pci_tbl
);
362 /* Address definitions for the TCO */
363 /* TCO base address */
364 #define TCOBASE (iTCO_wdt_private.ACPIBASE + 0x60)
365 /* SMI Control and Enable Register */
366 #define SMI_EN (iTCO_wdt_private.ACPIBASE + 0x30)
368 #define TCO_RLD (TCOBASE + 0x00) /* TCO Timer Reload and Curr. Value */
369 #define TCOv1_TMR (TCOBASE + 0x01) /* TCOv1 Timer Initial Value */
370 #define TCO_DAT_IN (TCOBASE + 0x02) /* TCO Data In Register */
371 #define TCO_DAT_OUT (TCOBASE + 0x03) /* TCO Data Out Register */
372 #define TCO1_STS (TCOBASE + 0x04) /* TCO1 Status Register */
373 #define TCO2_STS (TCOBASE + 0x06) /* TCO2 Status Register */
374 #define TCO1_CNT (TCOBASE + 0x08) /* TCO1 Control Register */
375 #define TCO2_CNT (TCOBASE + 0x0a) /* TCO2 Control Register */
376 #define TCOv2_TMR (TCOBASE + 0x12) /* TCOv2 Timer Initial Value */
378 /* internal variables */
379 static unsigned long is_active
;
380 static char expect_release
;
381 static struct { /* this is private data for the iTCO_wdt device */
382 /* TCO version/generation */
383 unsigned int iTCO_version
;
384 /* The device's ACPIBASE address (TCOBASE = ACPIBASE+0x60) */
385 unsigned long ACPIBASE
;
386 /* NO_REBOOT flag is Memory-Mapped GCS register bit 5 (TCO version 2)*/
387 unsigned long __iomem
*gcs
;
388 /* the lock for io operations */
391 struct pci_dev
*pdev
;
394 /* the watchdog platform device */
395 static struct platform_device
*iTCO_wdt_platform_device
;
397 /* module parameters */
398 #define WATCHDOG_HEARTBEAT 30 /* 30 sec default heartbeat */
399 static int heartbeat
= WATCHDOG_HEARTBEAT
; /* in seconds */
400 module_param(heartbeat
, int, 0);
401 MODULE_PARM_DESC(heartbeat
, "Watchdog timeout in seconds. "
402 "5..76 (TCO v1) or 3..614 (TCO v2), default="
403 __MODULE_STRING(WATCHDOG_HEARTBEAT
) ")");
405 static int nowayout
= WATCHDOG_NOWAYOUT
;
406 module_param(nowayout
, int, 0);
407 MODULE_PARM_DESC(nowayout
,
408 "Watchdog cannot be stopped once started (default="
409 __MODULE_STRING(WATCHDOG_NOWAYOUT
) ")");
412 * Some TCO specific functions
415 static inline unsigned int seconds_to_ticks(int seconds
)
417 /* the internal timer is stored as ticks which decrement
418 * every 0.6 seconds */
419 return (seconds
* 10) / 6;
422 static void iTCO_wdt_set_NO_REBOOT_bit(void)
426 /* Set the NO_REBOOT bit: this disables reboots */
427 if (iTCO_wdt_private
.iTCO_version
== 2) {
428 val32
= readl(iTCO_wdt_private
.gcs
);
430 writel(val32
, iTCO_wdt_private
.gcs
);
431 } else if (iTCO_wdt_private
.iTCO_version
== 1) {
432 pci_read_config_dword(iTCO_wdt_private
.pdev
, 0xd4, &val32
);
434 pci_write_config_dword(iTCO_wdt_private
.pdev
, 0xd4, val32
);
438 static int iTCO_wdt_unset_NO_REBOOT_bit(void)
443 /* Unset the NO_REBOOT bit: this enables reboots */
444 if (iTCO_wdt_private
.iTCO_version
== 2) {
445 val32
= readl(iTCO_wdt_private
.gcs
);
447 writel(val32
, iTCO_wdt_private
.gcs
);
449 val32
= readl(iTCO_wdt_private
.gcs
);
450 if (val32
& 0x00000020)
452 } else if (iTCO_wdt_private
.iTCO_version
== 1) {
453 pci_read_config_dword(iTCO_wdt_private
.pdev
, 0xd4, &val32
);
455 pci_write_config_dword(iTCO_wdt_private
.pdev
, 0xd4, val32
);
457 pci_read_config_dword(iTCO_wdt_private
.pdev
, 0xd4, &val32
);
458 if (val32
& 0x00000002)
462 return ret
; /* returns: 0 = OK, -EIO = Error */
465 static int iTCO_wdt_start(void)
469 spin_lock(&iTCO_wdt_private
.io_lock
);
471 iTCO_vendor_pre_start(iTCO_wdt_private
.ACPIBASE
, heartbeat
);
473 /* disable chipset's NO_REBOOT bit */
474 if (iTCO_wdt_unset_NO_REBOOT_bit()) {
475 spin_unlock(&iTCO_wdt_private
.io_lock
);
476 printk(KERN_ERR PFX
"failed to reset NO_REBOOT flag, "
477 "reboot disabled by hardware/BIOS\n");
481 /* Force the timer to its reload value by writing to the TCO_RLD
483 if (iTCO_wdt_private
.iTCO_version
== 2)
485 else if (iTCO_wdt_private
.iTCO_version
== 1)
488 /* Bit 11: TCO Timer Halt -> 0 = The TCO timer is enabled to count */
493 spin_unlock(&iTCO_wdt_private
.io_lock
);
500 static int iTCO_wdt_stop(void)
504 spin_lock(&iTCO_wdt_private
.io_lock
);
506 iTCO_vendor_pre_stop(iTCO_wdt_private
.ACPIBASE
);
508 /* Bit 11: TCO Timer Halt -> 1 = The TCO timer is disabled */
514 /* Set the NO_REBOOT bit to prevent later reboots, just for sure */
515 iTCO_wdt_set_NO_REBOOT_bit();
517 spin_unlock(&iTCO_wdt_private
.io_lock
);
519 if ((val
& 0x0800) == 0)
524 static int iTCO_wdt_keepalive(void)
526 spin_lock(&iTCO_wdt_private
.io_lock
);
528 iTCO_vendor_pre_keepalive(iTCO_wdt_private
.ACPIBASE
, heartbeat
);
530 /* Reload the timer by writing to the TCO Timer Counter register */
531 if (iTCO_wdt_private
.iTCO_version
== 2)
533 else if (iTCO_wdt_private
.iTCO_version
== 1) {
534 /* Reset the timeout status bit so that the timer
535 * needs to count down twice again before rebooting */
536 outw(0x0008, TCO1_STS
); /* write 1 to clear bit */
541 spin_unlock(&iTCO_wdt_private
.io_lock
);
545 static int iTCO_wdt_set_heartbeat(int t
)
551 tmrval
= seconds_to_ticks(t
);
553 /* For TCO v1 the timer counts down twice before rebooting */
554 if (iTCO_wdt_private
.iTCO_version
== 1)
557 /* from the specs: */
558 /* "Values of 0h-3h are ignored and should not be attempted" */
561 if (((iTCO_wdt_private
.iTCO_version
== 2) && (tmrval
> 0x3ff)) ||
562 ((iTCO_wdt_private
.iTCO_version
== 1) && (tmrval
> 0x03f)))
565 iTCO_vendor_pre_set_heartbeat(tmrval
);
567 /* Write new heartbeat to watchdog */
568 if (iTCO_wdt_private
.iTCO_version
== 2) {
569 spin_lock(&iTCO_wdt_private
.io_lock
);
570 val16
= inw(TCOv2_TMR
);
573 outw(val16
, TCOv2_TMR
);
574 val16
= inw(TCOv2_TMR
);
575 spin_unlock(&iTCO_wdt_private
.io_lock
);
577 if ((val16
& 0x3ff) != tmrval
)
579 } else if (iTCO_wdt_private
.iTCO_version
== 1) {
580 spin_lock(&iTCO_wdt_private
.io_lock
);
581 val8
= inb(TCOv1_TMR
);
583 val8
|= (tmrval
& 0xff);
584 outb(val8
, TCOv1_TMR
);
585 val8
= inb(TCOv1_TMR
);
586 spin_unlock(&iTCO_wdt_private
.io_lock
);
588 if ((val8
& 0x3f) != tmrval
)
596 static int iTCO_wdt_get_timeleft(int *time_left
)
601 /* read the TCO Timer */
602 if (iTCO_wdt_private
.iTCO_version
== 2) {
603 spin_lock(&iTCO_wdt_private
.io_lock
);
604 val16
= inw(TCO_RLD
);
606 spin_unlock(&iTCO_wdt_private
.io_lock
);
608 *time_left
= (val16
* 6) / 10;
609 } else if (iTCO_wdt_private
.iTCO_version
== 1) {
610 spin_lock(&iTCO_wdt_private
.io_lock
);
613 if (!(inw(TCO1_STS
) & 0x0008))
614 val8
+= (inb(TCOv1_TMR
) & 0x3f);
615 spin_unlock(&iTCO_wdt_private
.io_lock
);
617 *time_left
= (val8
* 6) / 10;
624 * /dev/watchdog handling
627 static int iTCO_wdt_open(struct inode
*inode
, struct file
*file
)
629 /* /dev/watchdog can only be opened once */
630 if (test_and_set_bit(0, &is_active
))
634 * Reload and activate timer
637 return nonseekable_open(inode
, file
);
640 static int iTCO_wdt_release(struct inode
*inode
, struct file
*file
)
643 * Shut off the timer.
645 if (expect_release
== 42) {
649 "Unexpected close, not stopping watchdog!\n");
650 iTCO_wdt_keepalive();
652 clear_bit(0, &is_active
);
657 static ssize_t
iTCO_wdt_write(struct file
*file
, const char __user
*data
,
658 size_t len
, loff_t
*ppos
)
660 /* See if we got the magic character 'V' and reload the timer */
665 /* note: just in case someone wrote the magic
666 character five months ago... */
669 /* scan to see whether or not we got the
671 for (i
= 0; i
!= len
; i
++) {
673 if (get_user(c
, data
+ i
))
680 /* someone wrote to us, we should reload the timer */
681 iTCO_wdt_keepalive();
686 static long iTCO_wdt_ioctl(struct file
*file
, unsigned int cmd
,
689 int new_options
, retval
= -EINVAL
;
691 void __user
*argp
= (void __user
*)arg
;
692 int __user
*p
= argp
;
693 static const struct watchdog_info ident
= {
694 .options
= WDIOF_SETTIMEOUT
|
695 WDIOF_KEEPALIVEPING
|
697 .firmware_version
= 0,
698 .identity
= DRV_NAME
,
702 case WDIOC_GETSUPPORT
:
703 return copy_to_user(argp
, &ident
, sizeof(ident
)) ? -EFAULT
: 0;
704 case WDIOC_GETSTATUS
:
705 case WDIOC_GETBOOTSTATUS
:
706 return put_user(0, p
);
708 case WDIOC_SETOPTIONS
:
710 if (get_user(new_options
, p
))
713 if (new_options
& WDIOS_DISABLECARD
) {
717 if (new_options
& WDIOS_ENABLECARD
) {
718 iTCO_wdt_keepalive();
724 case WDIOC_KEEPALIVE
:
725 iTCO_wdt_keepalive();
728 case WDIOC_SETTIMEOUT
:
730 if (get_user(new_heartbeat
, p
))
732 if (iTCO_wdt_set_heartbeat(new_heartbeat
))
734 iTCO_wdt_keepalive();
737 case WDIOC_GETTIMEOUT
:
738 return put_user(heartbeat
, p
);
739 case WDIOC_GETTIMELEFT
:
742 if (iTCO_wdt_get_timeleft(&time_left
))
744 return put_user(time_left
, p
);
755 static const struct file_operations iTCO_wdt_fops
= {
756 .owner
= THIS_MODULE
,
758 .write
= iTCO_wdt_write
,
759 .unlocked_ioctl
= iTCO_wdt_ioctl
,
760 .open
= iTCO_wdt_open
,
761 .release
= iTCO_wdt_release
,
764 static struct miscdevice iTCO_wdt_miscdev
= {
765 .minor
= WATCHDOG_MINOR
,
767 .fops
= &iTCO_wdt_fops
,
771 * Init & exit routines
774 static int __devinit
iTCO_wdt_init(struct pci_dev
*pdev
,
775 const struct pci_device_id
*ent
, struct platform_device
*dev
)
783 * Find the ACPI/PM base I/O address which is the base
784 * for the TCO registers (TCOBASE=ACPIBASE + 0x60)
785 * ACPIBASE is bits [15:7] from 0x40-0x43
787 pci_read_config_dword(pdev
, 0x40, &base_address
);
788 base_address
&= 0x0000ff80;
789 if (base_address
== 0x00000000) {
790 /* Something's wrong here, ACPIBASE has to be set */
791 printk(KERN_ERR PFX
"failed to get TCOBASE address, "
792 "device disabled by hardware/BIOS\n");
795 iTCO_wdt_private
.iTCO_version
=
796 iTCO_chipset_info
[ent
->driver_data
].iTCO_version
;
797 iTCO_wdt_private
.ACPIBASE
= base_address
;
798 iTCO_wdt_private
.pdev
= pdev
;
800 /* Get the Memory-Mapped GCS register, we need it for the
801 NO_REBOOT flag (TCO v2). To get access to it you have to
802 read RCBA from PCI Config space 0xf0 and use it as base.
803 GCS = RCBA + ICH6_GCS(0x3410). */
804 if (iTCO_wdt_private
.iTCO_version
== 2) {
805 pci_read_config_dword(pdev
, 0xf0, &base_address
);
806 if ((base_address
& 1) == 0) {
807 printk(KERN_ERR PFX
"RCBA is disabled by hardware"
808 "/BIOS, device disabled\n");
812 RCBA
= base_address
& 0xffffc000;
813 iTCO_wdt_private
.gcs
= ioremap((RCBA
+ 0x3410), 4);
816 /* Check chipset's NO_REBOOT bit */
817 if (iTCO_wdt_unset_NO_REBOOT_bit() && iTCO_vendor_check_noreboot_on()) {
818 printk(KERN_INFO PFX
"unable to reset NO_REBOOT flag, "
819 "device disabled by hardware/BIOS\n");
820 ret
= -ENODEV
; /* Cannot reset NO_REBOOT bit */
824 /* Set the NO_REBOOT bit to prevent later reboots, just for sure */
825 iTCO_wdt_set_NO_REBOOT_bit();
827 /* The TCO logic uses the TCO_EN bit in the SMI_EN register */
828 if (!request_region(SMI_EN
, 4, "iTCO_wdt")) {
830 "I/O address 0x%04lx already in use, "
831 "device disabled\n", SMI_EN
);
835 /* Bit 13: TCO_EN -> 0 = Disables TCO logic generating an SMI# */
837 val32
&= 0xffffdfff; /* Turn off SMI clearing watchdog */
840 /* The TCO I/O registers reside in a 32-byte range pointed to
841 by the TCOBASE value */
842 if (!request_region(TCOBASE
, 0x20, "iTCO_wdt")) {
843 printk(KERN_ERR PFX
"I/O address 0x%04lx already in use "
844 "device disabled\n", TCOBASE
);
850 "Found a %s TCO device (Version=%d, TCOBASE=0x%04lx)\n",
851 iTCO_chipset_info
[ent
->driver_data
].name
,
852 iTCO_chipset_info
[ent
->driver_data
].iTCO_version
,
855 /* Clear out the (probably old) status */
856 outw(0x0008, TCO1_STS
); /* Clear the Time Out Status bit */
857 outw(0x0002, TCO2_STS
); /* Clear SECOND_TO_STS bit */
858 outw(0x0004, TCO2_STS
); /* Clear BOOT_STS bit */
860 /* Make sure the watchdog is not running */
863 /* Check that the heartbeat value is within it's range;
864 if not reset to the default */
865 if (iTCO_wdt_set_heartbeat(heartbeat
)) {
866 iTCO_wdt_set_heartbeat(WATCHDOG_HEARTBEAT
);
868 "timeout value out of range, using %d\n", heartbeat
);
871 ret
= misc_register(&iTCO_wdt_miscdev
);
874 "cannot register miscdev on minor=%d (err=%d)\n",
875 WATCHDOG_MINOR
, ret
);
879 printk(KERN_INFO PFX
"initialized. heartbeat=%d sec (nowayout=%d)\n",
880 heartbeat
, nowayout
);
885 release_region(TCOBASE
, 0x20);
887 release_region(SMI_EN
, 4);
889 if (iTCO_wdt_private
.iTCO_version
== 2)
890 iounmap(iTCO_wdt_private
.gcs
);
892 iTCO_wdt_private
.ACPIBASE
= 0;
896 static void __devexit
iTCO_wdt_cleanup(void)
898 /* Stop the timer before we leave */
903 misc_deregister(&iTCO_wdt_miscdev
);
904 release_region(TCOBASE
, 0x20);
905 release_region(SMI_EN
, 4);
906 if (iTCO_wdt_private
.iTCO_version
== 2)
907 iounmap(iTCO_wdt_private
.gcs
);
908 pci_dev_put(iTCO_wdt_private
.pdev
);
909 iTCO_wdt_private
.ACPIBASE
= 0;
912 static int __devinit
iTCO_wdt_probe(struct platform_device
*dev
)
916 struct pci_dev
*pdev
= NULL
;
917 const struct pci_device_id
*ent
;
919 spin_lock_init(&iTCO_wdt_private
.io_lock
);
921 for_each_pci_dev(pdev
) {
922 ent
= pci_match_id(iTCO_wdt_pci_tbl
, pdev
);
925 ret
= iTCO_wdt_init(pdev
, ent
, dev
);
932 printk(KERN_INFO PFX
"No device detected.\n");
937 static int __devexit
iTCO_wdt_remove(struct platform_device
*dev
)
939 if (iTCO_wdt_private
.ACPIBASE
)
945 static void iTCO_wdt_shutdown(struct platform_device
*dev
)
950 #define iTCO_wdt_suspend NULL
951 #define iTCO_wdt_resume NULL
953 static struct platform_driver iTCO_wdt_driver
= {
954 .probe
= iTCO_wdt_probe
,
955 .remove
= __devexit_p(iTCO_wdt_remove
),
956 .shutdown
= iTCO_wdt_shutdown
,
957 .suspend
= iTCO_wdt_suspend
,
958 .resume
= iTCO_wdt_resume
,
960 .owner
= THIS_MODULE
,
965 static int __init
iTCO_wdt_init_module(void)
969 printk(KERN_INFO PFX
"Intel TCO WatchDog Timer Driver v%s\n",
972 err
= platform_driver_register(&iTCO_wdt_driver
);
976 iTCO_wdt_platform_device
= platform_device_register_simple(DRV_NAME
,
978 if (IS_ERR(iTCO_wdt_platform_device
)) {
979 err
= PTR_ERR(iTCO_wdt_platform_device
);
980 goto unreg_platform_driver
;
985 unreg_platform_driver
:
986 platform_driver_unregister(&iTCO_wdt_driver
);
990 static void __exit
iTCO_wdt_cleanup_module(void)
992 platform_device_unregister(iTCO_wdt_platform_device
);
993 platform_driver_unregister(&iTCO_wdt_driver
);
994 printk(KERN_INFO PFX
"Watchdog Module Unloaded.\n");
997 module_init(iTCO_wdt_init_module
);
998 module_exit(iTCO_wdt_cleanup_module
);
1000 MODULE_AUTHOR("Wim Van Sebroeck <wim@iguana.be>");
1001 MODULE_DESCRIPTION("Intel TCO WatchDog Timer Driver");
1002 MODULE_VERSION(DRV_VERSION
);
1003 MODULE_LICENSE("GPL");
1004 MODULE_ALIAS_MISCDEV(WATCHDOG_MINOR
);