https://bugzilla.kernel.org/show_bug.cgi?id=218305 --- Comment #59 from Mario Limonciello (AMD) (mario.limonciello@xxxxxxx) --- Created attachment 306264 --> https://bugzilla.kernel.org/attachment.cgi?id=306264&action=edit debugging patch I'm attaching a patch that isn't upstreamed at the moment, but you can apply to your kernel to try to capture a debug register for me. Apply it to your kernel and then read the register value like this: echo "0x59804" | sudo tee /sys/kernel/debug/amd_nb/smn_address sudo cat /sys/kernel/debug/amd_nb/smn_value Here is what a reasonable value looks like on my local system: $ echo "0x59804" | sudo tee /sys/kernel/debug/amd_nb/smn_address $ sudo cat /sys/kernel/debug/amd_nb/smn_value 0x017f1201 Share to me the values that you get from smn_value in these 3 situations: 1) At bootup (before you suspend) 2) After you've suspended and reproduced the issue 3) After you've done the W/A to undo the issue. -- You may reply to this email to add a comment. You are receiving this mail because: You are watching the assignee of the bug.