Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1763873AbZCYSIT (ORCPT ); Wed, 25 Mar 2009 14:08:19 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1756340AbZCYSIF (ORCPT ); Wed, 25 Mar 2009 14:08:05 -0400 Received: from mx2.mail.elte.hu ([157.181.151.9]:35407 "EHLO mx2.mail.elte.hu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1758899AbZCYSIE (ORCPT ); Wed, 25 Mar 2009 14:08:04 -0400 Date: Wed, 25 Mar 2009 19:07:20 +0100 From: Ingo Molnar To: David Woodhouse Cc: Andrew Lutomirski , Jesse Barnes , Kyle McMartin , Fenghua Yu , Suresh Siddha , Yinghai Lu , Mark Gross , LKML Subject: Re: 2.6.29: can't resume from suspend with DMAR (intel iommu) enabled Message-ID: <20090325180720.GA28366@elte.hu> References: <20090324203259.GC26930@elte.hu> <1238003581.2085.53.camel@macbook.infradead.org> <20090325175908.GA25518@elte.hu> <1238004228.2085.56.camel@macbook.infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1238004228.2085.56.camel@macbook.infradead.org> User-Agent: Mutt/1.5.18 (2008-05-17) X-ELTE-VirusStatus: clean X-ELTE-SpamScore: -1.5 X-ELTE-SpamLevel: X-ELTE-SpamCheck: no X-ELTE-SpamVersion: ELTE 2.0 X-ELTE-SpamCheck-Details: score=-1.5 required=5.9 tests=BAYES_00 autolearn=no SpamAssassin version=3.2.3 -1.5 BAYES_00 BODY: Bayesian spam probability is 0 to 1% [score: 0.0000] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1694 Lines: 40 * David Woodhouse wrote: > On Wed, 2009-03-25 at 18:59 +0100, Ingo Molnar wrote: > > > > that's not easy - i use it right now :) > > > > That's another reason why warnings and non-panic() behavior are > > better for developers too. Had it not crashed i could have sent you > > my dmesg and i would not have turned off DMAR in the BIOS. > > > > Now it's turned off in my BIOS (first barrier) and i need to reboot > > the kernel (second barrier) and i need to hack up a kernel in a > > certain way to produce debug info (third barrier) - in the merge > > window (fourth barrier ;-). > > Yeah, trusting BIOS monkeys for this was always going to be a bad > plan. We should have just known how to set/read the damn hardware > BARs -- the most likely explanation for this is that your BIOS is > just lying to you about where it put the registers, I believe. > > I'd like to put in a basic sanity check when we first ioremap the > (alleged) DMAR registers. Hopefully, the output I asked for will > confirm that there's a simple way to do that... Could you please fix the panic() and add the debug output you'd like to see? That would give me a kernel to run straight away. Without me having to think much about what i should run and when. (unless you really need this pr_debug info to proceed) But it will be some time really. The laptop has 8 days uptime and is not set up to run custom kernels at all. Ingo -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/