On 2016/04/28 08:56, stan wrote:
> On Thu, Apr 28, 2016 at 08:44:49AM +0100, Stuart Henderson wrote:
> > Stan, can you send the information that is output when you run
> > sendbug -P as root? Just putting the whole thing inline in a
> > reply-to-all to this mail would be fine. Please add "sysctl hw"
> > output as well. Ideally we want a way to identify the watchdog
> > itself rather than the general machine type etc. which is why
> > I'm hoping they follow Microsoft's spec (which is the de-facto 
> > standard for this).
> 
> 
> Sorry got distracted and frgot to cc the list.

OK, pity, there doesn't seem to be anything to properly identify
the watchdog in acpi tables. Just the vendor-specific thing which
needs reading to figure things out further. If they had followed
the usual spec then the driver would have been *very* generally
useful.

In that case maybe the approach would be to do something similar
to acpithinkpad, but matching SECD instead of MHKV, and then
looking for the SEL0002 HID. But I only know a bit about how
to find my way round the decompiled files, so ignore me if
a real ACPI hacker steps in with a better idea ;)

> hw.vendor=Schweitzer Engineering Laboratories, Inc.
> hw.product=SEL-3355

An alternative might be to match on vendor/product, see the last
commit to sys/dev/ic/re.c for how to do this, but then you're
having to look at fixed addresses which they seem to be providing
via acpi.

Reply via email to