You are not logged in.

#1 2025-07-12 17:55:44

MaskRay
Member
From: California, USA
Registered: 2025-07-11
Posts: 4
Website

Random freeze, Intel Core Ultra 7 255H, Intel Wi-Fi 7 BE200

I got a new laptop (Eurocom Blitz Ultra 2) and installed Arch Linux on it.
For the first three days, I've been experiencing random, complete system freezes.
Input (keyboard,mouse) becomes unresponsive.
Display on the laptop and the external monitor do not change.

* Pretty idle (one chrome, one wezterm).
* A Thunderbolt 4 port connects to an external monitor.
* I've switched to `intel_idle.max_cstate=2` (`/boot/loader/entries/arch.conf`). Still observed one freeze.

Product: Eurocom Blitz Ultra 2
CPU: Intel Core Ultra 7 255H

Tried memtest86+. Got 1 pass with 0 error. It was super slow, so I did not wait for the second run.

% less /boot/loader/entries/memtest.conf
title     Memory Tester (memtest86+)
efi       /memtest86+/memtest.efi

Detailed hardware information:

% inxi -F
System:
  Host: hacking Kernel: 6.15.6-arch1-1 arch: x86_64 bits: 64
  Desktop: N/A Distro: Arch Linux
Machine:
  Type: Laptop System: EUROCOM product: BLITZ Ultra 2 v: N/A
    serial: <superuser required>
  Mobo: EUROCOM model: V54x_6x_TU serial: <superuser required> UEFI: INSYDE
    v: 1.07.14aEu date: 02/06/2025
Battery:
  ID-1: BAT0 charge: 72.8 Wh (100.0%) condition: 72.8/72.1 Wh (101.0%)
CPU:
  Info: 16-core model: Intel Core Ultra 7 255H bits: 64 type: MCP cache:
    L2: 28 MiB
  Speed (MHz): avg: 400 min/max: 400/5100:4400:2500 cores: 1: 400 2: 400
    3: 400 4: 400 5: 400 6: 400 7: 400 8: 400 9: 400 10: 400 11: 400 12: 400
    13: 400 14: 400 15: 400 16: 400
Graphics:
  Device-1: Intel Arrow Lake-P [Intel Graphics] driver: i915 v: kernel
  Device-2: CHICONY USB2.0 Camera driver: uvcvideo type: USB
  Display: unspecified server: X.org v: 1.21.1.18 driver: X:
    loaded: modesetting dri: iris gpu: i915 resolution: 1: 3440x1440~60Hz
    2: 1920x1200~60Hz
  API: OpenGL Message: Unable to show GL data. glxinfo is missing.
  Info: Tools: x11: xprop,xrandr
Audio:
  Device-1: Intel driver: snd_hda_intel
  API: ALSA v: k6.15.6-arch1-1 status: kernel-api
  Server-1: PipeWire v: 1.4.6 status: active
Network:
  Device-1: Intel driver: e1000e
  IF: enp0s31f6 state: down mac: d4:93:90:57:77:c4
  Device-2: Intel Wi-Fi 7 AX1775 /AX1790 /BE20 /BE401/BE1750 2x2
    driver: iwlwifi
  IF: wlan0 state: up mac: 5c:b4:7e:c1:32:3e
  Device-3: Realtek USB 10/100/1000 LAN driver: r8152 type: USB
  IF: enp0s13f0u1u4u4 state: down mac: f4:dd:06:c5:08:2c
Bluetooth:
  Device-1: N/A driver: btusb type: USB
  Report: btmgmt ID: hci0 state: up address: N/A
Drives:
  Local Storage: total: 931.51 GiB used: 25.52 GiB (2.7%)
  ID-1: /dev/nvme0n1 vendor: Samsung model: SSD 990 EVO 1TB size: 931.51 GiB
Partition:
  ID-1: / size: 910.89 GiB used: 25.19 GiB (2.8%) fs: ext4 dev: /dev/nvme0n1p3
  ID-2: /boot size: 1022 MiB used: 336.8 MiB (33.0%) fs: vfat
    dev: /dev/nvme0n1p1
Swap:
  ID-1: swap-1 type: partition size: 4 GiB used: 0 KiB (0.0%)
    dev: /dev/nvme0n1p2
Sensors:
  System Temperatures: cpu: 48.0 C mobo: N/A
  Fan Speeds (rpm): cpu: 4083
Info:
  Memory: total: 32 GiB note: est. available: 30.84 GiB used: 4.78 GiB (15.5%)
  Processes: 346 Uptime: 42m Shell: fish inxi: 3.3.38

% lspci -tvvnn
-[0000:00]-+-00.0  Intel Corporation Device [8086:7d06]
           +-02.0  Intel Corporation Arrow Lake-P [Intel Graphics] [8086:7dd1]
           +-04.0  Intel Corporation Meteor Lake-P Dynamic Tuning Technology [8086:7d03]
           +-06.0-[01]----00.0  Samsung Electronics Co Ltd NVMe SSD Controller PM9C1a (DRAM-less) [144d:a80d]
           +-07.0-[02-2b]--
           +-08.0  Intel Corporation Device [8086:774c]
           +-0a.0  Intel Corporation Meteor Lake-P Platform Monitoring Technology [8086:7d0d]
           +-0b.0  Intel Corporation Meteor Lake NPU [8086:7d1d]
           +-0d.0  Intel Corporation Meteor Lake-P Thunderbolt 4 USB Controller [8086:7ec0]
           +-0d.2  Intel Corporation Meteor Lake-P Thunderbolt 4 NHI #0 [8086:7ec2]
           +-14.0  Intel Corporation Device [8086:777d]
           +-14.2  Intel Corporation Device [8086:777f]
           +-15.0  Intel Corporation Arrow Lake-H [Serial IO I2C Host Controller] [8086:7778]
           +-15.1  Intel Corporation Arrow Lake-H [Serial IO I2C Host Controller] [8086:7779]
           +-16.0  Intel Corporation Device [8086:7770]
           +-1c.0-[2c]----00.0  O2 Micro, Inc. SD/MMC Card Reader Controller [1217:8621]
           +-1c.7-[2d]----00.0  Intel Corporation Wi-Fi 7(802.11be) AX1775*/AX1790*/BE20*/BE401/BE1750* 2x2 [8086:272b]
           +-1f.0  Intel Corporation Device [8086:7702]
           +-1f.3  Intel Corporation Device [8086:7728]
           +-1f.4  Intel Corporation Device [8086:7722]
           +-1f.5  Intel Corporation Device [8086:7723]
           \-1f.6  Intel Corporation Device [8086:550a]

In one of the `journalctl -b -[#]` log:

Jul 11 21:43:18 hacking kernel: Oops: general protection fault, probably for non-canonical address 0xd0000000b60018: 0000 [#1] SMP NOPTI
Jul 11 21:43:18 hacking kernel: CPU: 8 UID: 0 PID: 4291 Comm: dhcpcd-run-hook Tainted: G        W  OE       6.15.6-arch1-1 #1 PREEMPT(full)  a49b9575025ef78fca63b5f170baaeaabd0c299d
Jul 11 21:43:18 hacking kernel: Tainted: [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Jul 11 21:43:18 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025
Jul 11 21:43:18 hacking kernel: RIP: 0010:vma_interval_tree_insert+0x36/0xe0
Jul 11 21:43:18 hacking kernel: Code: 48 8b 7f 50 49 89 f2 49 8b 40 08 49 2b 00 48 c1 e8 0c 48 8d 74 07 ff 49 8b 02 48 85 c0 74 70 41 b9 01 00 00 00 eb 03 48 89 d0 <48> 39 70 18 73 04 48 89 70 18 48 8d 48 10 48 3b 78 c8 72 07 48 8d
Jul 11 21:43:18 hacking kernel: RSP: 0018:ffffcf9224307a40 EFLAGS: 00010206
Jul 11 21:43:18 hacking kernel: RAX: 00d0000000b60000 RBX: ffffcf9224307a78 RCX: ffff8967b8b154d0
Jul 11 21:43:18 hacking kernel: RDX: 00d0000000b60000 RSI: 0000000000000038 RDI: 0000000000000001
Jul 11 21:43:18 hacking kernel: RBP: ffff8966fdb298c0 R08: ffff8966fdb28240 R09: 0000000000000000
Jul 11 21:43:18 hacking kernel: R10: ffff896689c9bdd0 R11: 0000000000000000 R12: ffff8966880b8000
Jul 11 21:43:18 hacking kernel: R13: ffffcf9224307c98 R14: 00007fab9125f000 R15: 0000000000000000
Jul 11 21:43:18 hacking kernel: FS:  0000000000000000(0000) GS:ffff896e2d92d000(0000) knlGS:0000000000000000
Jul 11 21:43:18 hacking kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jul 11 21:43:18 hacking kernel: CR2: 0000558766b3530c CR3: 00000001f1fe8002 CR4: 0000000000f72ef0
Jul 11 21:43:18 hacking kernel: PKRU: 55555554
Jul 11 21:43:18 hacking kernel: Call Trace:
Jul 11 21:43:18 hacking kernel:  <TASK>
Jul 11 21:43:18 hacking kernel:  vma_complete+0x45/0x300
Jul 11 21:43:18 hacking kernel:  __split_vma+0x24b/0x300
Jul 11 21:43:18 hacking kernel:  vms_gather_munmap_vmas+0x46/0x2c0
Jul 11 21:43:18 hacking kernel:  do_vmi_align_munmap+0xeb/0x1e0
Jul 11 21:43:18 hacking kernel:  do_vmi_munmap+0xd0/0x170
Jul 11 21:43:18 hacking kernel:  __vm_munmap+0xad/0x170
Jul 11 21:43:18 hacking kernel:  elf_load+0x20f/0x290
Jul 11 21:43:18 hacking kernel:  load_elf_binary+0xb35/0x1830
Jul 11 21:43:18 hacking kernel:  ? __kernel_read+0x1e1/0x300
Jul 11 21:43:18 hacking kernel:  bprm_execve+0x2a9/0x520
Jul 11 21:43:18 hacking kernel:  do_execveat_common.isra.0+0x194/0x1a0
Jul 11 21:43:18 hacking kernel:  __x64_sys_execve+0x38/0x50
Jul 11 21:43:18 hacking kernel:  do_syscall_64+0x7b/0x810
Jul 11 21:43:18 hacking kernel:  ? irqentry_exit_to_user_mode+0x2c/0x1b0
Jul 11 21:43:18 hacking kernel:  entry_SYSCALL_64_after_hwframe+0x76/0x7e
Jul 11 21:43:18 hacking kernel: RIP: 0033:0x7f94844f4bcb
Jul 11 21:43:18 hacking kernel: Code: Unable to access opcode bytes at 0x7f94844f4ba1.
Jul 11 21:43:18 hacking kernel: RSP: 002b:00007f9484cfde68 EFLAGS: 00000246 ORIG_RAX: 000000000000003b
Jul 11 21:43:18 hacking kernel: RAX: ffffffffffffffda RBX: 00007ffed6baa1c0 RCX: 00007f94844f4bcb
Jul 11 21:43:18 hacking kernel: RDX: 000055bd2fdc1ff0 RSI: 00007ffed6baa3d0 RDI: 000055bd1a4f3288
Jul 11 21:43:18 hacking kernel: RBP: 00007f9484cfdff0 R08: 0000000000000000 R09: 0000000000000000
Jul 11 21:43:18 hacking kernel: R10: 0000000000000008 R11: 0000000000000246 R12: 00007ffed6ba9ef0
Jul 11 21:43:18 hacking kernel: R13: 0000000000000040 R14: 0000000000000001 R15: 00007f9484cfdf20
Jul 11 21:43:18 hacking kernel:  </TASK>
Jul 11 21:43:18 hacking kernel: Modules linked in: snd_seq_dummy snd_hrtimer rfcomm snd_seq snd_seq_device uinput 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda soundwire_cadence snd_hda_codec_hdmi snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_hda_scodec_component snd_compress ac97_bus snd_pcm_dmaengine crc8 cmac algif_hash algif_skcipher af_alg bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iwlmld kvm mac80211 joydev irqbypass mousedev polyval_clmulni polyval_generic ghash_clmulni_intel libarc4 r8153_ecm uvcvideo snd_hda_intel cdc_ether
Jul 11 21:43:18 hacking kernel:  sha512_ssse3 videobuf2_vmalloc btusb sha256_ssse3 snd_intel_dspcfg uvc usbnet videobuf2_memops sha1_ssse3 snd_intel_sdw_acpi btrtl videobuf2_v4l2 aesni_intel crypto_simd snd_hda_codec iTCO_wdt btintel videobuf2_common cryptd iwlwifi processor_thermal_device_pci snd_hda_core btbcm r8152 intel_pmc_bxt processor_thermal_device rapl videodev processor_thermal_wt_hint btmtk snd_hwdep hid_multitouch mii intel_cstate processor_thermal_rfim cfg80211 bluetooth snd_pcm mei_gsc_proxy intel_rapl_msr iTCO_vendor_support processor_thermal_rapl ucsi_acpi intel_uncore libphy mc clevo_wmi(OE) pcspkr mei_me wmi_bmof intel_rapl_common rfkill typec_ucsi snd_timer e1000e intel_lpss_pci processor_thermal_wt_req i2c_i801 snd ptp i2c_smbus thunderbolt typec mei processor_thermal_power_floor intel_lpss intel_vpu soundcore pps_core idma64 i2c_mux clevo_acpi(OE) int3400_thermal roles igen6_edac processor_thermal_mbox intel_pmc_core tuxedo_io(OE) tuxedo_keyboard(OE) i2c_hid_acpi intel_hid acpi_tad int3403_thermal pmt_telemetry
Jul 11 21:43:18 hacking kernel:  tuxedo_compatibility_check(OE) i2c_hid acpi_thermal_rel int340x_thermal_zone acpi_pad sparse_keymap pmt_class led_class_multicolor pinctrl_meteorlake mac_hid pkcs8_key_parser crypto_user loop dm_mod nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit sdhci_uhs2 drm_buddy nvme ttm sdhci cqhci intel_gtt nvme_core serio_raw drm_display_helper mmc_core video intel_vsec nvme_keyring cec nvme_auth wmi
Jul 11 21:43:18 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1
Jul 11 21:43:18 hacking kernel: ---[ end trace 0000000000000000 ]---
Jul 11 21:43:18 hacking kernel: RIP: 0010:vma_interval_tree_insert+0x36/0xe0
Jul 11 21:43:18 hacking kernel: Code: 48 8b 7f 50 49 89 f2 49 8b 40 08 49 2b 00 48 c1 e8 0c 48 8d 74 07 ff 49 8b 02 48 85 c0 74 70 41 b9 01 00 00 00 eb 03 48 89 d0 <48> 39 70 18 73 04 48 89 70 18 48 8d 48 10 48 3b 78 c8 72 07 48 8d
Jul 11 21:43:18 hacking kernel: RSP: 0018:ffffcf9224307a40 EFLAGS: 00010206
Jul 11 21:43:18 hacking kernel: RAX: 00d0000000b60000 RBX: ffffcf9224307a78 RCX: ffff8967b8b154d0
Jul 11 21:43:18 hacking kernel: RDX: 00d0000000b60000 RSI: 0000000000000038 RDI: 0000000000000001
Jul 11 21:43:18 hacking kernel: RBP: ffff8966fdb298c0 R08: ffff8966fdb28240 R09: 0000000000000000
Jul 11 21:43:18 hacking kernel: R10: ffff896689c9bdd0 R11: 0000000000000000 R12: ffff8966880b8000
Jul 11 21:43:18 hacking kernel: R13: ffffcf9224307c98 R14: 00007fab9125f000 R15: 0000000000000000
Jul 11 21:43:18 hacking kernel: FS:  0000000000000000(0000) GS:ffff896e2d92d000(0000) knlGS:0000000000000000
Jul 11 21:43:18 hacking kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jul 11 21:43:18 hacking kernel: CR2: 00007f94844f4ba1 CR3: 00000001f1fe8002 CR4: 0000000000f72ef0
Jul 11 21:43:18 hacking kernel: PKRU: 55555554
Jul 11 21:43:24 hacking kernel: watchdog: CPU10: Watchdog detected hard LOCKUP on cpu 10
Jul 11 21:43:24 hacking kernel: Modules linked in: snd_seq_dummy snd_hrtimer rfcomm snd_seq snd_seq_device uinput 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda soundwire_cadence snd_hda_codec_hdmi snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_hda_scodec_component snd_compress ac97_bus snd_pcm_dmaengine crc8 cmac algif_hash algif_skcipher af_alg bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iwlmld kvm mac80211 joydev irqbypass mousedev polyval_clmulni polyval_generic ghash_clmulni_intel libarc4 r8153_ecm uvcvideo snd_hda_intel cdc_ether
Jul 11 21:43:24 hacking kernel:  sha512_ssse3 videobuf2_vmalloc btusb sha256_ssse3 snd_intel_dspcfg uvc usbnet videobuf2_memops sha1_ssse3 snd_intel_sdw_acpi btrtl videobuf2_v4l2 aesni_intel crypto_simd snd_hda_codec iTCO_wdt btintel videobuf2_common cryptd iwlwifi processor_thermal_device_pci snd_hda_core btbcm r8152 intel_pmc_bxt processor_thermal_device rapl videodev processor_thermal_wt_hint btmtk snd_hwdep hid_multitouch mii intel_cstate processor_thermal_rfim cfg80211 bluetooth snd_pcm mei_gsc_proxy intel_rapl_msr iTCO_vendor_support processor_thermal_rapl ucsi_acpi intel_uncore libphy mc clevo_wmi(OE) pcspkr mei_me wmi_bmof intel_rapl_common rfkill typec_ucsi snd_timer e1000e intel_lpss_pci processor_thermal_wt_req i2c_i801 snd ptp i2c_smbus thunderbolt typec mei processor_thermal_power_floor intel_lpss intel_vpu soundcore pps_core idma64 i2c_mux clevo_acpi(OE) int3400_thermal roles igen6_edac processor_thermal_mbox intel_pmc_core tuxedo_io(OE) tuxedo_keyboard(OE) i2c_hid_acpi intel_hid acpi_tad int3403_thermal pmt_telemetry
Jul 11 21:43:24 hacking kernel:  tuxedo_compatibility_check(OE) i2c_hid acpi_thermal_rel int340x_thermal_zone acpi_pad sparse_keymap pmt_class led_class_multicolor pinctrl_meteorlake mac_hid pkcs8_key_parser crypto_user loop dm_mod nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit sdhci_uhs2 drm_buddy nvme ttm sdhci cqhci intel_gtt nvme_core serio_raw drm_display_helper mmc_core video intel_vsec nvme_keyring cec nvme_auth wmi
Jul 11 21:43:24 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1
Jul 11 21:43:24 hacking kernel: CPU: 10 UID: 0 PID: 0 Comm: swapper/10 Tainted: G      D W  OE       6.15.6-arch1-1 #1 PREEMPT(full)  a49b9575025ef78fca63b5f170baaeaabd0c299d
Jul 11 21:43:24 hacking kernel: Tainted: [D]=DIE, [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Jul 11 21:43:24 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025
Jul 11 21:43:24 hacking kernel: RIP: 0010:native_queued_spin_lock_slowpath+0x2c4/0x2f0
Jul 11 21:43:24 hacking kernel: Code: 83 e0 03 83 ee 01 48 c1 e0 05 48 63 f6 48 05 c0 5f 90 b2 48 03 04 f5 80 ff 2f b1 48 89 10 8b 42 08 85 c0 75 09 f3 90 8b 42 08 <85> c0 74 f7 48 8b 32 48 85 f6 0f 84 6c ff ff ff 0f 0d 0e e9 64 ff
Jul 11 21:43:24 hacking kernel: RSP: 0018:ffffcf9200430db0 EFLAGS: 00000046
Jul 11 21:43:24 hacking kernel: RAX: 0000000000000000 RBX: 0000000000000002 RCX: ffff896686d80e04
Jul 11 21:43:24 hacking kernel: RDX: ffff896de02b2fc0 RSI: 0000000000000011 RDI: ffff896686d80e04
Jul 11 21:43:24 hacking kernel: RBP: 0000000000000000 R08: 00000000002c0000 R09: ffff896e2d9ad000
Jul 11 21:43:24 hacking kernel: R10: 00000000002c0000 R11: 0000000000000000 R12: ffff896686d80e04
Jul 11 21:43:24 hacking kernel: R13: 0000000000000008 R14: 000000000000000a R15: ffff8966801d4200
Jul 11 21:43:24 hacking kernel: FS:  0000000000000000(0000) GS:ffff896e2d9ad000(0000) knlGS:0000000000000000
Jul 11 21:43:24 hacking kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jul 11 21:43:24 hacking kernel: CR2: 000006ec01824100 CR3: 00000001cc41b003 CR4: 0000000000f72ef0
Jul 11 21:43:24 hacking kernel: PKRU: 55555554
Jul 11 21:43:24 hacking kernel: Call Trace:
Jul 11 21:43:24 hacking kernel:  <IRQ>
Jul 11 21:43:24 hacking kernel:  _raw_spin_lock_irqsave+0x3d/0x50
Jul 11 21:43:24 hacking kernel:  try_to_wake_up+0x53/0x740
Jul 11 21:43:24 hacking kernel:  ? sched_balance_rq+0x222/0x1070
Jul 11 21:43:24 hacking kernel:  ? rcu_sched_clock_irq+0x7b0/0xb60
Jul 11 21:43:24 hacking kernel:  kick_pool+0x5f/0x150
Jul 11 21:43:24 hacking kernel:  __queue_work+0x2b9/0x430
Jul 11 21:43:24 hacking kernel:  ? __pfx_delayed_work_timer_fn+0x10/0x10
Jul 11 21:43:24 hacking kernel:  call_timer_fn+0x26/0x120
Jul 11 21:43:24 hacking kernel:  ? __pfx_delayed_work_timer_fn+0x10/0x10
Jul 11 21:43:24 hacking kernel:  __run_timers+0x18a/0x280
Jul 11 21:43:24 hacking kernel:  run_timer_softirq+0xce/0xf0
Jul 11 21:43:24 hacking kernel:  handle_softirqs+0xe3/0x2a0
Jul 11 21:43:24 hacking kernel:  __irq_exit_rcu+0xcb/0xf0
Jul 11 21:43:24 hacking kernel:  sysvec_apic_timer_interrupt+0x71/0x90
Jul 11 21:43:24 hacking kernel:  </IRQ>
Jul 11 21:43:24 hacking kernel:  <TASK>
Jul 11 21:43:24 hacking kernel:  asm_sysvec_apic_timer_interrupt+0x1a/0x20
Jul 11 21:43:24 hacking kernel: RIP: 0010:cpuidle_enter_state+0xbb/0x410
Jul 11 21:43:24 hacking kernel: Code: 00 00 e8 f8 d6 0c ff e8 83 f1 ff ff 48 89 c5 0f 1f 44 00 00 31 ff e8 a4 48 0b ff 45 84 ff 0f 85 33 02 00 00 fb 0f 1f 44 00 00 <45> 85 f6 0f 88 7c 01 00 00 49 63 ce 48 2b 2c 24 48 6b d1 68 48 89
Jul 11 21:43:24 hacking kernel: RSP: 0018:ffffcf92001f7e78 EFLAGS: 00000246
Jul 11 21:43:24 hacking kernel: RAX: ffff896e2d9ad000 RBX: 0000000000000002 RCX: 0000000000000000
Jul 11 21:43:24 hacking kernel: RDX: 0000005227c071ae RSI: fffffffb8765c0cb RDI: 0000000000000000
Jul 11 21:43:24 hacking kernel: RBP: 0000005227c071ae R08: 0000000000000000 R09: ffff896de02a0d60
Jul 11 21:43:24 hacking kernel: R10: ffff896de02a0d00 R11: 0000000000000002 R12: ffffef91ffc81698
Jul 11 21:43:24 hacking kernel: R13: ffffffffb1dede60 R14: 0000000000000002 R15: 0000000000000000
Jul 11 21:43:24 hacking kernel:  ? cpuidle_enter_state+0xac/0x410
Jul 11 21:43:24 hacking kernel:  cpuidle_enter+0x31/0x50
Jul 11 21:43:24 hacking kernel:  do_idle+0x1b1/0x210
Jul 11 21:43:24 hacking kernel:  cpu_startup_entry+0x29/0x30
Jul 11 21:43:24 hacking kernel:  start_secondary+0x119/0x140
Jul 11 21:43:24 hacking kernel:  common_startup_64+0x13e/0x141
Jul 11 21:43:24 hacking kernel:  </TASK>
Jul 11 21:43:24 hacking kernel: iwlwifi 0000:2d:00.0: Queue 3 is stuck 17902 17912
Jul 11 21:43:24 hacking kernel:  non-paged memory
Jul 11 21:43:24 hacking kernel: ------------[ cut here ]------------
Jul 11 21:43:24 hacking kernel: list_del corruption. prev->next should be fffffbbe453b2988, but was fff3fbbe451f2988. (prev=fffffbbe48e26208)
Jul 11 21:43:24 hacking kernel: WARNING: CPU: 6 PID: 0 at lib/list_debug.c:62 __list_del_entry_valid_or_report+0xfa/0x10a
Jul 11 21:43:24 hacking kernel: Modules linked in: snd_seq_dummy snd_hrtimer rfcomm snd_seq snd_seq_device uinput 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda soundwire_cadence snd_hda_codec_hdmi snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_hda_scodec_component snd_compress ac97_bus snd_pcm_dmaengine crc8 cmac algif_hash algif_skcipher af_alg bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iwlmld kvm mac80211 joydev irqbypass mousedev polyval_clmulni polyval_generic ghash_clmulni_intel libarc4 r8153_ecm uvcvideo snd_hda_intel cdc_ether
Jul 11 21:43:24 hacking kernel:  sha512_ssse3 videobuf2_vmalloc btusb sha256_ssse3 snd_intel_dspcfg uvc usbnet videobuf2_memops sha1_ssse3 snd_intel_sdw_acpi btrtl videobuf2_v4l2 aesni_intel crypto_simd snd_hda_codec iTCO_wdt btintel videobuf2_common cryptd iwlwifi processor_thermal_device_pci snd_hda_core btbcm r8152 intel_pmc_bxt processor_thermal_device rapl videodev processor_thermal_wt_hint btmtk snd_hwdep hid_multitouch mii intel_cstate processor_thermal_rfim cfg80211 bluetooth snd_pcm mei_gsc_proxy intel_rapl_msr iTCO_vendor_support processor_thermal_rapl ucsi_acpi intel_uncore libphy mc clevo_wmi(OE) pcspkr mei_me wmi_bmof intel_rapl_common rfkill typec_ucsi snd_timer e1000e intel_lpss_pci processor_thermal_wt_req i2c_i801 snd ptp i2c_smbus thunderbolt typec mei processor_thermal_power_floor intel_lpss intel_vpu soundcore pps_core idma64 i2c_mux clevo_acpi(OE) int3400_thermal roles igen6_edac processor_thermal_mbox intel_pmc_core tuxedo_io(OE) tuxedo_keyboard(OE) i2c_hid_acpi intel_hid acpi_tad int3403_thermal pmt_telemetry
Jul 11 21:43:24 hacking kernel:  tuxedo_compatibility_check(OE) i2c_hid acpi_thermal_rel int340x_thermal_zone acpi_pad sparse_keymap pmt_class led_class_multicolor pinctrl_meteorlake mac_hid pkcs8_key_parser crypto_user loop dm_mod nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit sdhci_uhs2 drm_buddy nvme ttm sdhci cqhci intel_gtt nvme_core serio_raw drm_display_helper mmc_core video intel_vsec nvme_keyring cec nvme_auth wmi
Jul 11 21:43:24 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1
Jul 11 21:43:24 hacking kernel: CPU: 6 UID: 0 PID: 0 Comm: swapper/6 Tainted: G      D W  OE       6.15.6-arch1-1 #1 PREEMPT(full)  a49b9575025ef78fca63b5f170baaeaabd0c299d
Jul 11 21:43:24 hacking kernel: Tainted: [D]=DIE, [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Jul 11 21:43:24 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025
Jul 11 21:43:24 hacking kernel: RIP: 0010:__list_del_entry_valid_or_report+0xfa/0x10a
Jul 11 21:43:24 hacking kernel: Code: e8 7b 30 11 00 0f 0b e9 77 ff ff ff 4c 89 e7 e8 6c 00 3d 00 49 8b 14 24 4c 89 e1 48 89 de 48 c7 c7 50 63 1f b1 e8 56 30 11 00 <0f> 0b e9 52 ff ff ff 5b 5d 41 5c c3 cc cc cc cc 48 89 df e8 1e fe
Jul 11 21:43:24 hacking kernel: RSP: 0018:ffffcf9200360c78 EFLAGS: 00010046
Jul 11 21:43:24 hacking kernel: RAX: 0000000000000000 RBX: fffffbbe453b2988 RCX: 0000000000000027
Jul 11 21:43:24 hacking kernel: RDX: ffff896de019cbc8 RSI: 0000000000000001 RDI: ffff896de019cbc0
Jul 11 21:43:24 hacking kernel: RBP: ffff896de01b7fa0 R08: 0000000000000000 R09: 00000000ffffefff
Jul 11 21:43:24 hacking kernel: R10: ffffffffb1c60f20 R11: ffffcf9200360b10 R12: fffffbbe48e26208
Jul 11 21:43:24 hacking kernel: R13: ffff896de01b7f80 R14: 0000000000000000 R15: 000000000000028b
Jul 11 21:43:24 hacking kernel: FS:  0000000000000000(0000) GS:ffff896e2d8ad000(0000) knlGS:0000000000000000
Jul 11 21:43:24 hacking kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jul 11 21:43:24 hacking kernel: CR2: 000008cc03e46000 CR3: 0000000117f42006 CR4: 0000000000f72ef0
Jul 11 21:43:24 hacking kernel: PKRU: 55555554
Jul 11 21:43:24 hacking kernel: Call Trace:
Jul 11 21:43:24 hacking kernel:  <IRQ>
Jul 11 21:43:24 hacking kernel:  free_pcppages_bulk.cold+0x17/0x2b
Jul 11 21:43:24 hacking kernel:  free_frozen_page_commit+0x182/0x2f0
Jul 11 21:43:24 hacking kernel:  __free_frozen_pages+0x4db/0x5f0
Jul 11 21:43:24 hacking kernel:  __put_partials+0xf6/0x120
Jul 11 21:43:24 hacking kernel:  kmem_cache_free+0x40c/0x4d0
Jul 11 21:43:24 hacking kernel:  bio_free+0x2f/0x50
Jul 11 21:43:24 hacking kernel:  blk_mq_end_request_batch+0x114/0x540
Jul 11 21:43:24 hacking kernel:  nvme_irq+0x7a/0x90 [nvme 3bec3f65c0d9a7a5b2f55d5745cc486e5f920baf]
Jul 11 21:43:24 hacking kernel:  ? __pfx_nvme_pci_complete_batch+0x10/0x10 [nvme 3bec3f65c0d9a7a5b2f55d5745cc486e5f920baf]
Jul 11 21:43:24 hacking kernel:  __handle_irq_event_percpu+0x47/0x1b0
Jul 11 21:43:24 hacking kernel:  handle_irq_event+0x38/0x80
Jul 11 21:43:24 hacking kernel:  handle_edge_irq+0x8b/0x220
Jul 11 21:43:24 hacking kernel:  __common_interrupt+0x3e/0xa0
Jul 11 21:43:24 hacking kernel:  common_interrupt+0x80/0xa0
Jul 11 21:43:24 hacking kernel:  </IRQ>
Jul 11 21:43:24 hacking kernel:  <TASK>
Jul 11 21:43:24 hacking kernel:  asm_common_interrupt+0x26/0x40
Jul 11 21:43:24 hacking kernel: RIP: 0010:cpuidle_enter_state+0xbb/0x410
Jul 11 21:43:24 hacking kernel: Code: 00 00 e8 f8 d6 0c ff e8 83 f1 ff ff 48 89 c5 0f 1f 44 00 00 31 ff e8 a4 48 0b ff 45 84 ff 0f 85 33 02 00 00 fb 0f 1f 44 00 00 <45> 85 f6 0f 88 7c 01 00 00 49 63 ce 48 2b 2c 24 48 6b d1 68 48 89
Jul 11 21:43:24 hacking kernel: RSP: 0018:ffffcf92001d7e78 EFLAGS: 00000246
Jul 11 21:43:24 hacking kernel: RAX: ffff896e2d8ad000 RBX: 0000000000000002 RCX: 0000000000000000
Jul 11 21:43:24 hacking kernel: RDX: 00000054c780d693 RSI: fffffffb8765c0cb RDI: 0000000000000000
Jul 11 21:43:24 hacking kernel: RBP: 00000054c780d693 R08: 0000000000000000 R09: 000000000000a46b
Jul 11 21:43:24 hacking kernel: R10: 00000000ffffffff R11: 00000000000000a8 R12: ffffef91ffb81698
Jul 11 21:43:24 hacking kernel: R13: ffffffffb1dede60 R14: 0000000000000002 R15: 0000000000000000
Jul 11 21:43:24 hacking kernel:  ? cpuidle_enter_state+0xac/0x410
Jul 11 21:43:24 hacking kernel:  cpuidle_enter+0x31/0x50
Jul 11 21:43:24 hacking kernel:  do_idle+0x1b1/0x210
Jul 11 21:43:24 hacking kernel:  cpu_startup_entry+0x29/0x30
Jul 11 21:43:24 hacking kernel:  start_secondary+0x119/0x140
Jul 11 21:43:24 hacking kernel:  common_startup_64+0x13e/0x141
Jul 11 21:43:24 hacking kernel:  </TASK>
Jul 11 21:43:24 hacking kernel: ---[ end trace 0000000000000000 ]---

Full log:
https://gist.github.com/MaskRay/1a11d76 … b1d656cf83

Last edited by MaskRay (2025-07-15 04:45:23)

Offline

#2 2025-07-12 22:03:45

MaskRay
Member
From: California, USA
Registered: 2025-07-11
Posts: 4
Website

Re: Random freeze, Intel Core Ultra 7 255H, Intel Wi-Fi 7 BE200

Two other issues:

The keyboard LED was constantly on. Resolved by installing the Tuxedo driver (perhaps these Clevo-based laptops are compatible) https://aur.archlinux.org/packages/tuxe … check-dkms

Fan control: The fan intermittently spins up every minute even if the laptop is super cool, which is noisy. Running sensors when it is spinning:

acpi_fan-acpi-0
Adapter: ACPI interface
fan1:        4647 RPM

I don't know how to make it quiet.

% sudo pwmconfig
# pwmconfig version 3.6.2
This program will search your sensors for pulse width modulation (pwm)
controls, and test each one to see if it controls a fan on
your motherboard. Note that many motherboards do not have pwm
circuitry installed, even if your sensor chip supports pwm.

We will attempt to briefly stop each fan using the pwm controls.
The program will attempt to restore each fan to full speed
after testing. However, it is ** very important ** that you
physically verify that the fans have been to full speed
after the program has completed.

/usr/bin/pwmconfig: There are no pwm-capable sensor modules installed

Offline

#3 2025-07-12 22:59:31

seth
Member
Registered: 2012-09-03
Posts: 66,061

Re: Random freeze, Intel Core Ultra 7 255H, Intel Wi-Fi 7 BE200

Jul 11 21:37:25 hacking kernel: platform regulatory.0: Direct firmware load for regulatory.db failed with error -2
Jul 11 21:37:25 hacking kernel: cfg80211: failed to load regulatory.db
…
Jul 11 21:38:35 hacking kernel: WARNING: CPU: 0 PID: 951 at net/wireless/nl80211.c:8819 nl80211_get_reg_do+0x1e4/0x210 [cfg80211]
Jul 11 21:38:35 hacking kernel: RIP: 0010:nl80211_get_reg_do+0x1e4/0x210 [cfg80211]

https://wiki.archlinux.org/title/Networ … ory_domain

For the rest: do you get those freezes
1. w/o the OOT modules (tuxedo*, clevo*)
2. w/ the LTS kernel?

Things go south w/

Jul 11 21:43:18 hacking kernel: Oops: general protection fault, probably for non-canonical address 0xd0000000b60018: 0000 [#1] SMP NOPTI
Jul 11 21:43:18 hacking kernel: CPU: 8 UID: 0 PID: 4291 Comm: dhcpcd-run-hook Tainted: G        W  OE       6.15.6-arch1-1 #1 PREEMPT(full)  a49b9575025ef78fca63b5f170baaeaabd0c299d
Jul 11 21:43:18 hacking kernel: Tainted: [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Jul 11 21:43:18 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025
Jul 11 21:43:18 hacking kernel: RIP: 0010:vma_interval_tree_insert+0x36/0xe0
Jul 11 21:43:18 hacking kernel: Code: 48 8b 7f 50 49 89 f2 49 8b 40 08 49 2b 00 48 c1 e8 0c 48 8d 74 07 ff 49 8b 02 48 85 c0 74 70 41 b9 01 00 00 00 eb 03 48 89 d0 <48> 39 70 18 73 04 48 89 70 18 48 8d 48 10 48 3b 78 c8 72 07 48 8d
Jul 11 21:43:18 hacking kernel: RSP: 0018:ffffcf9224307a40 EFLAGS: 00010206
Jul 11 21:43:18 hacking kernel: RAX: 00d0000000b60000 RBX: ffffcf9224307a78 RCX: ffff8967b8b154d0
Jul 11 21:43:18 hacking kernel: RDX: 00d0000000b60000 RSI: 0000000000000038 RDI: 0000000000000001
Jul 11 21:43:18 hacking kernel: RBP: ffff8966fdb298c0 R08: ffff8966fdb28240 R09: 0000000000000000
Jul 11 21:43:18 hacking kernel: R10: ffff896689c9bdd0 R11: 0000000000000000 R12: ffff8966880b8000
Jul 11 21:43:18 hacking kernel: R13: ffffcf9224307c98 R14: 00007fab9125f000 R15: 0000000000000000
Jul 11 21:43:18 hacking kernel: FS:  0000000000000000(0000) GS:ffff896e2d92d000(0000) knlGS:0000000000000000
Jul 11 21:43:18 hacking kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jul 11 21:43:18 hacking kernel: CR2: 0000558766b3530c CR3: 00000001f1fe8002 CR4: 0000000000f72ef0
Jul 11 21:43:18 hacking kernel: PKRU: 55555554
Jul 11 21:43:18 hacking kernel: Call Trace:
Jul 11 21:43:18 hacking kernel:  <TASK>
Jul 11 21:43:18 hacking kernel:  vma_complete+0x45/0x300
Jul 11 21:43:18 hacking kernel:  __split_vma+0x24b/0x300
Jul 11 21:43:18 hacking kernel:  vms_gather_munmap_vmas+0x46/0x2c0
Jul 11 21:43:18 hacking kernel:  do_vmi_align_munmap+0xeb/0x1e0
Jul 11 21:43:18 hacking kernel:  do_vmi_munmap+0xd0/0x170
Jul 11 21:43:18 hacking kernel:  __vm_munmap+0xad/0x170
Jul 11 21:43:18 hacking kernel:  elf_load+0x20f/0x290
Jul 11 21:43:18 hacking kernel:  load_elf_binary+0xb35/0x1830
Jul 11 21:43:18 hacking kernel:  ? __kernel_read+0x1e1/0x300
Jul 11 21:43:18 hacking kernel:  bprm_execve+0x2a9/0x520
Jul 11 21:43:18 hacking kernel:  do_execveat_common.isra.0+0x194/0x1a0
Jul 11 21:43:18 hacking kernel:  __x64_sys_execve+0x38/0x50
Jul 11 21:43:18 hacking kernel:  do_syscall_64+0x7b/0x810
Jul 11 21:43:18 hacking kernel:  ? irqentry_exit_to_user_mode+0x2c/0x1b0
Jul 11 21:43:18 hacking kernel:  entry_SYSCALL_64_after_hwframe+0x76/0x7e
Jul 11 21:43:18 hacking kernel: RIP: 0033:0x7f94844f4bcb
Jul 11 21:43:18 hacking kernel: Code: Unable to access opcode bytes at 0x7f94844f4ba1.
Jul 11 21:43:18 hacking kernel: RSP: 002b:00007f9484cfde68 EFLAGS: 00000246 ORIG_RAX: 000000000000003b
Jul 11 21:43:18 hacking kernel: RAX: ffffffffffffffda RBX: 00007ffed6baa1c0 RCX: 00007f94844f4bcb
Jul 11 21:43:18 hacking kernel: RDX: 000055bd2fdc1ff0 RSI: 00007ffed6baa3d0 RDI: 000055bd1a4f3288
Jul 11 21:43:18 hacking kernel: RBP: 00007f9484cfdff0 R08: 0000000000000000 R09: 0000000000000000
Jul 11 21:43:18 hacking kernel: R10: 0000000000000008 R11: 0000000000000246 R12: 00007ffed6ba9ef0
Jul 11 21:43:18 hacking kernel: R13: 0000000000000040 R14: 0000000000000001 R15: 00007f9484cfdf20
Jul 11 21:43:18 hacking kernel:  </TASK>
Jul 11 21:43:18 hacking kernel: Modules linked in: snd_seq_dummy snd_hrtimer rfcomm snd_seq snd_seq_device uinput 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda soundwire_cadence snd_hda_codec_hdmi snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_hda_codec_realtek snd_soc_core snd_hda_codec_generic snd_hda_scodec_component snd_compress ac97_bus snd_pcm_dmaengine crc8 cmac algif_hash algif_skcipher af_alg bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iwlmld kvm mac80211 joydev irqbypass mousedev polyval_clmulni polyval_generic ghash_clmulni_intel libarc4 r8153_ecm uvcvideo snd_hda_intel cdc_ether
Jul 11 21:43:18 hacking kernel:  sha512_ssse3 videobuf2_vmalloc btusb sha256_ssse3 snd_intel_dspcfg uvc usbnet videobuf2_memops sha1_ssse3 snd_intel_sdw_acpi btrtl videobuf2_v4l2 aesni_intel crypto_simd snd_hda_codec iTCO_wdt btintel videobuf2_common cryptd iwlwifi processor_thermal_device_pci snd_hda_core btbcm r8152 intel_pmc_bxt processor_thermal_device rapl videodev processor_thermal_wt_hint btmtk snd_hwdep hid_multitouch mii intel_cstate processor_thermal_rfim cfg80211 bluetooth snd_pcm mei_gsc_proxy intel_rapl_msr iTCO_vendor_support processor_thermal_rapl ucsi_acpi intel_uncore libphy mc clevo_wmi(OE) pcspkr mei_me wmi_bmof intel_rapl_common rfkill typec_ucsi snd_timer e1000e intel_lpss_pci processor_thermal_wt_req i2c_i801 snd ptp i2c_smbus thunderbolt typec mei processor_thermal_power_floor intel_lpss intel_vpu soundcore pps_core idma64 i2c_mux clevo_acpi(OE) int3400_thermal roles igen6_edac processor_thermal_mbox intel_pmc_core tuxedo_io(OE) tuxedo_keyboard(OE) i2c_hid_acpi intel_hid acpi_tad int3403_thermal pmt_telemetry
Jul 11 21:43:18 hacking kernel:  tuxedo_compatibility_check(OE) i2c_hid acpi_thermal_rel int340x_thermal_zone acpi_pad sparse_keymap pmt_class led_class_multicolor pinctrl_meteorlake mac_hid pkcs8_key_parser crypto_user loop dm_mod nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit sdhci_uhs2 drm_buddy nvme ttm sdhci cqhci intel_gtt nvme_core serio_raw drm_display_helper mmc_core video intel_vsec nvme_keyring cec nvme_auth wmi
Jul 11 21:43:18 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1
Jul 11 21:43:18 hacking kernel: ---[ end trace 0000000000000000 ]---

Also there seems to be some external usb hub/dock - you might want to remove that for the moment.
I don't think it's related, but your Evoluent VerticalMouse 4 initially acts up

Offline

#4 2025-07-12 23:35:14

MaskRay
Member
From: California, USA
Registered: 2025-07-11
Posts: 4
Website

Re: Random freeze, Intel Core Ultra 7 255H, Intel Wi-Fi 7 BE200

seth wrote:
Jul 11 21:37:25 hacking kernel: platform regulatory.0: Direct firmware load for regulatory.db failed with error -2
Jul 11 21:37:25 hacking kernel: cfg80211: failed to load regulatory.db
…
Jul 11 21:38:35 hacking kernel: WARNING: CPU: 0 PID: 951 at net/wireless/nl80211.c:8819 nl80211_get_reg_do+0x1e4/0x210 [cfg80211]
Jul 11 21:38:35 hacking kernel: RIP: 0010:nl80211_get_reg_do+0x1e4/0x210 [cfg80211]

https://wiki.archlinux.org/title/Networ … ory_domain

Thanks. Set `/etc/conf.d/wireless-regdom` and `iw reg get` correctly reports US now.

Perhaps related to the network-related diagnostics, my pet peeve is when I first ran

sudo iwctl station wlan0 connect wifiname

iwctl would error

No matching method found
Failed to retrieve IWD dbus objects, quitting...

Running it for the second time would succeed and I can then

dhcpcd wlan0
seth wrote:

For the rest: do you get those freezes
1. w/o the OOT modules (tuxedo*, clevo*)
2. w/ the LTS kernel?

1. Yes, I experienced freezes even before installing aur/tuxedo-drivers-nocompatcheck-dkms to turn off the keyboard LED. I've now uninstalled the package and observed another freeze after running for almost 4 hours
(journalctl -b log, no kernel "bad"/"oops" record before the freeze https://gist.github.com/MaskRay/396db07 … 12dd63a5f)


2. Freezes have occurred with at least the following kernel configurations:

* core/linux 6.15.6.arch1-1 w/o max_cstate
* core/linux 6.15.6.arch1-1 intel_idle.max_cstate=2
* core/linux-lts 6.12.37-1
* core/linux-lts 6.12.37-1 intel_idle.max_cstate=1

On occasion, a freeze would occur within the first 30 minutes of booting.

seth wrote:

Things go south w/

Also there seems to be some external usb hub/dock - you might want to remove that for the moment.
I don't think it's related, but your Evoluent VerticalMouse 4 initially acts up

Yes. Interestingly, the messages are not the same among freezes.
I've only recorded

Oops: general protection fault, probably for non-canonical address 0xd0000000b60018: 0000 [#1] SMP NOPTI

once.

I just experienced two freezes in the past hour. There are a few minutes between the last logged time and the freeze time.

https://gist.github.com/MaskRay/0fa33f7 … 27b4565a47

Jul 12 15:25:59 hacking kernel: ------------[ cut here ]------------
Jul 12 15:25:59 hacking kernel: frame on invalid queue - is on 8 and indicates 6
Jul 12 15:25:59 hacking kernel: WARNING: CPU: 7 PID: 590 at drivers/net/wireless/intel/iwlwifi/pcie/rx.c:1335 iwl_pcie_rx_handle+0x492/0xa00 [iwlwifi]
Jul 12 15:25:59 hacking kernel: Modules linked in: snd_seq_dummy snd_hrtimer rfcomm snd_seq snd_seq_device 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 cmac algif_hash algif_skcipher af_alg snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda snd_hda_codec_hdmi soundwire_cadence snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_soc_core snd_hda_codec_realtek snd_hda_codec_generic snd_compress snd_hda_scodec_component ac97_bus snd_pcm_dmaengine crc8 bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp iwlmld kvm_intel mac80211 kvm libarc4 irqbypass snd_hda_intel polyval_clmulni snd_intel_dspcfg snd_intel_sdw_acpi polyval_generic ghash_clmulni_intel uvcvideo snd_hda_codec
Jul 12 15:25:59 hacking kernel:  btusb processor_thermal_device_pci sha512_ssse3 processor_thermal_device videobuf2_vmalloc btrtl hid_multitouch r8153_ecm sha256_ssse3 processor_thermal_wt_hint uvc snd_hda_core btintel cdc_ether iwlwifi videobuf2_memops sha1_ssse3 videobuf2_v4l2 aesni_intel usbnet btbcm snd_hwdep videobuf2_common crypto_simd iTCO_wdt btmtk videodev intel_pmc_bxt snd_pcm cryptd processor_thermal_rfim cfg80211 mei_gsc_proxy intel_rapl_msr bluetooth iTCO_vendor_support e1000e mc mousedev r8152 rapl intel_lpss_pci processor_thermal_rapl intel_cstate snd_timer ptp intel_lpss intel_rapl_common mii ucsi_acpi intel_uncore libphy typec_ucsi joydev wmi_bmof pcspkr clevo_wmi(OE) mei_me rfkill pps_core processor_thermal_wt_req idma64 snd i2c_i801 thunderbolt intel_vpu typec processor_thermal_power_floor i2c_smbus mei clevo_acpi(OE) soundcore i2c_mux processor_thermal_mbox igen6_edac roles tuxedo_io(OE) intel_pmc_core int3403_thermal i2c_hid_acpi tuxedo_keyboard(OE) int340x_thermal_zone int3400_thermal i2c_hid pmt_telemetry
Jul 12 15:25:59 hacking kernel:  tuxedo_compatibility_check(OE) intel_hid acpi_thermal_rel acpi_tad led_class_multicolor acpi_pad pmt_class pinctrl_meteorlake sparse_keymap mac_hid pkcs8_key_parser dm_mod crypto_user loop nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit drm_buddy sdhci_uhs2 nvme ttm sdhci nvme_core cqhci intel_gtt nvme_keyring mmc_core drm_display_helper serio_raw nvme_auth intel_vsec video cec wmi
Jul 12 15:25:59 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1
Jul 12 15:25:59 hacking kernel: CPU: 7 UID: 0 PID: 590 Comm: irq/189-iwlwifi Tainted: G        W  OE       6.15.6-arch1-1 #1 PREEMPT(full)  a49b9575025ef78fca63b5f170baaeaabd0c299d
Jul 12 15:25:59 hacking kernel: Tainted: [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Jul 12 15:25:59 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025
Jul 12 15:25:59 hacking kernel: RIP: 0010:iwl_pcie_rx_handle+0x492/0xa00 [iwlwifi]
Jul 12 15:25:59 hacking kernel: Code: 1f 84 00 00 00 00 00 90 48 83 c0 01 48 39 c8 0f 84 06 ff ff ff 38 10 75 ef e9 02 ff ff ff 48 c7 c7 d8 49 98 c1 e8 ae 70 43 e5 <0f> 0b e9 54 fe ff ff 8b 6c 24 3c 4c 8b 54 24 10 4c 8b 7c 24 40 80
Jul 12 15:25:59 hacking kernel: RSP: 0018:ffffcbfb00394d90 EFLAGS: 00010246
Jul 12 15:25:59 hacking kernel: RAX: 0000000000000000 RBX: 0000000000001000 RCX: 0000000000000027
Jul 12 15:25:59 hacking kernel: RDX: ffff8b66601dcbc8 RSI: 0000000000000001 RDI: ffff8b66601dcbc0
Jul 12 15:25:59 hacking kernel: RBP: 000000000000057e R08: 0000000000000000 R09: 00000000ffffefff
Jul 12 15:25:59 hacking kernel: R10: ffffffffa8e60f20 R11: ffffcbfb00394c28 R12: ffff8b5f048c8028
Jul 12 15:25:59 hacking kernel: R13: 0000000000000000 R14: ffff8b5f21eb5380 R15: ffff8b5f06d8b000
Jul 12 15:25:59 hacking kernel: FS:  0000000000000000(0000) GS:ffff8b66b66ed000(0000) knlGS:0000000000000000
Jul 12 15:25:59 hacking kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jul 12 15:25:59 hacking kernel: CR2: 00007f5070fe09ac CR3: 0000000103bd4002 CR4: 0000000000f72ef0
Jul 12 15:25:59 hacking kernel: PKRU: 55555554
Jul 12 15:25:59 hacking kernel: Call Trace:
Jul 12 15:25:59 hacking kernel:  <IRQ>
Jul 12 15:25:59 hacking kernel:  iwl_pcie_napi_poll_msix+0x38/0xd0 [iwlwifi 34f0cb96706d9a49c69481e2d4133edbae3a2e27]
Jul 12 15:25:59 hacking kernel:  __napi_poll+0x2e/0x1e0
Jul 12 15:25:59 hacking kernel:  net_rx_action+0x341/0x3e0
Jul 12 15:25:59 hacking kernel:  ? enqueue_task+0xce/0x170
Jul 12 15:25:59 hacking kernel:  handle_softirqs+0xe3/0x2a0
Jul 12 15:25:59 hacking kernel:  ? handle_edge_irq+0x8b/0x220
Jul 12 15:25:59 hacking kernel:  ? __pfx_irq_thread_fn+0x10/0x10
Jul 12 15:25:59 hacking kernel:  do_softirq.part.0+0x3b/0x60
Jul 12 15:25:59 hacking kernel:  </IRQ>
Jul 12 15:25:59 hacking kernel:  <TASK>
Jul 12 15:25:59 hacking kernel:  __local_bh_enable_ip+0x60/0x70
Jul 12 15:25:59 hacking kernel:  iwl_pcie_irq_rx_msix_handler+0xcc/0x180 [iwlwifi 34f0cb96706d9a49c69481e2d4133edbae3a2e27]
Jul 12 15:25:59 hacking kernel:  irq_thread_fn+0x22/0x60
Jul 12 15:25:59 hacking kernel:  irq_thread+0x1b0/0x310
Jul 12 15:25:59 hacking kernel:  ? __pfx_irq_thread_dtor+0x10/0x10
Jul 12 15:25:59 hacking kernel:  ? __pfx_irq_thread+0x10/0x10
Jul 12 15:25:59 hacking kernel:  kthread+0xf9/0x240
Jul 12 15:25:59 hacking kernel:  ? __pfx_kthread+0x10/0x10
Jul 12 15:25:59 hacking kernel:  ret_from_fork+0x31/0x50
Jul 12 15:25:59 hacking kernel:  ? __pfx_kthread+0x10/0x10
Jul 12 15:25:59 hacking kernel:  ret_from_fork_asm+0x1a/0x30
Jul 12 15:25:59 hacking kernel:  </TASK>
Jul 12 15:25:59 hacking kernel: ---[ end trace 0000000000000000 ]---
Jul 12 15:27:15 hacking systemd[1]: Starting Cleanup of Temporary Directories...
Jul 12 15:27:15 hacking systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully.
Jul 12 15:27:15 hacking systemd[1]: Finished Cleanup of Temporary Directories.
Jul 12 15:27:26 hacking systemd-logind[640]: Lid closed.
Jul 12 15:28:58 hacking dhcpcd[1984]: wlan0: fe80::8e76:3fff:fea4:7623: router expired
Jul 12 15:28:58 hacking dhcpcd[1984]: wlan0: part of a Router Advertisement expired
Jul 12 15:28:58 hacking dhcpcd[1984]: wlan0: deleting default route via fe80::8e76:3fff:fea4:7623
Jul 12 15:30:34 hacking kernel: i915 0000:00:02.0: [drm] *ERROR* CPU pipe A FIFO underrun

https://gist.github.com/MaskRay/ef2fcbf … 55d064b428

overwhelming BUG diagnostics at the end

Jul 12 15:37:15 hacking kernel: BUG: TASK stack guard page was hit at 0000000096024444 (stack is 00000000eec07d4e..0000000069af97c3)
Jul 12 15:37:15 hacking kernel: BUG: #DF stack guard page was hit at 000000005d495123 (stack is 0000000054b36f23..00000000c659be9d)
Jul 12 15:37:15 hacking kernel: BUG: #DF stack guard page was hit at 000000005d495123 (stack is 0000000054b36f23..00000000c659be9d)
Jul 12 15:37:15 hacking kernel: BUG: #DF stack guard page was hit at 000000005d495123 (stack is 0000000054b36f23..00000000c659be9d)
Jul 12 15:37:15 hacking kernel: BUG: #DF stack guard page was hit at 000000005d495123 (stack is 0000000054b36f23..00000000c659be9d)

Last edited by MaskRay (2025-07-13 04:06:29)

Offline

#5 2025-07-13 06:23:00

seth
Member
Registered: 2012-09-03
Posts: 66,061

Re: Random freeze, Intel Core Ultra 7 255H, Intel Wi-Fi 7 BE200

Perhaps related to the network-related diagnostics, my pet peeve is when I first ran

Please post the output of

find /etc/systemd -type l -exec test -f {} \; -print | awk -F'/' '{ printf ("%-40s | %s\n", $(NF-0), $(NF-1)) }' | sort -f

-----

You're still running into the cfg80211 warning, hopefully just a red herring - your wifi works until the system crashes?

Jul 12 17:03:35 hacking kernel: frame on invalid queue - is on 0 and indicates 54
Jul 12 17:03:35 hacking kernel: WARNING: CPU: 9 PID: 570 at drivers/net/wireless/intel/iwlwifi/pcie/rx.c:1335 iwl_pcie_rx_handle+0x492/0xa00 [iwlwifi]
Jul 12 17:03:35 hacking kernel: Modules linked in: uinput 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 r8153_ecm cdc_ether usbnet r8152 mii libphy cmac algif_hash algif_skcipher af_alg snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda snd_hda_codec_hdmi soundwire_cadence snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_soc_core snd_hda_codec_realtek snd_hda_codec_generic snd_compress snd_hda_scodec_component ac97_bus snd_pcm_dmaengine crc8 bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel iwlmld kvm mac80211 irqbypass polyval_clmulni libarc4 polyval_generic ghash_clmulni_intel snd_hda_intel sha512_ssse3 snd_intel_dspcfg uvcvideo sha256_ssse3
Jul 12 17:03:35 hacking kernel:  snd_intel_sdw_acpi btusb processor_thermal_device_pci sha1_ssse3 snd_hda_codec btrtl processor_thermal_device videobuf2_vmalloc aesni_intel btintel uvc snd_hda_core processor_thermal_wt_hint crypto_simd iwlwifi btbcm snd_hwdep videobuf2_memops processor_thermal_rfim iTCO_wdt cryptd hid_multitouch snd_pcm videobuf2_v4l2 btmtk rapl intel_pmc_bxt processor_thermal_rapl intel_rapl_msr mei_gsc_proxy iTCO_vendor_support e1000e snd_timer videobuf2_common cfg80211 intel_cstate intel_rapl_common bluetooth snd videodev intel_uncore i2c_i801 ucsi_acpi intel_lpss_pci soundcore mei_me ptp mc typec_ucsi intel_lpss pcspkr wmi_bmof i2c_smbus pps_core processor_thermal_wt_req mei i2c_mux rfkill idma64 typec processor_thermal_power_floor thunderbolt intel_vpu mousedev processor_thermal_mbox igen6_edac roles joydev int3403_thermal i2c_hid_acpi int340x_thermal_zone intel_pmc_core int3400_thermal i2c_hid intel_hid pmt_telemetry acpi_thermal_rel pinctrl_meteorlake sparse_keymap pmt_class acpi_tad acpi_pad mac_hid
Jul 12 17:03:35 hacking kernel:  pkcs8_key_parser crypto_user loop dm_mod nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 nvme i2c_algo_bit drm_buddy sdhci_pci ttm nvme_core sdhci_uhs2 intel_gtt sdhci cqhci drm_display_helper serio_raw nvme_keyring mmc_core video nvme_auth cec intel_vsec wmi
Jul 12 17:03:35 hacking kernel: CPU: 9 UID: 0 PID: 570 Comm: irq/126-iwlwifi Tainted: G        W           6.15.6-arch1-1 #1 PREEMPT(full)  a49b9575025ef78fca63b5f170baaeaabd0c299d
Jul 12 17:03:35 hacking kernel: Tainted: [W]=WARN
Jul 12 17:03:35 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025
Jul 12 17:03:35 hacking kernel: RIP: 0010:iwl_pcie_rx_handle+0x492/0xa00 [iwlwifi]
Jul 12 17:03:35 hacking kernel: Code: 1f 84 00 00 00 00 00 90 48 83 c0 01 48 39 c8 0f 84 06 ff ff ff 38 10 75 ef e9 02 ff ff ff 48 c7 c7 d8 79 82 c1 e8 ae 80 65 f6 <0f> 0b e9 54 fe ff ff 8b 6c 24 3c 4c 8b 54 24 10 4c 8b 7c 24 40 80
Jul 12 17:03:35 hacking kernel: RSP: 0018:ffffcf94003fcd90 EFLAGS: 00010246
Jul 12 17:03:35 hacking kernel: RAX: 0000000000000000 RBX: 0000000000001000 RCX: 0000000000000027
Jul 12 17:03:35 hacking kernel: RDX: ffff89cc6025cbc8 RSI: 0000000000000001 RDI: ffff89cc6025cbc0
Jul 12 17:03:35 hacking kernel: RBP: 0000000000001bbc R08: 0000000000000000 R09: 00000000ffffefff
Jul 12 17:03:35 hacking kernel: R10: ffffffffb9e60f20 R11: ffffcf94003fcc28 R12: ffff89c504f90028
Jul 12 17:03:35 hacking kernel: R13: 0000000000000000 R14: ffff89c51c2f0000 R15: ffff89c51a2c8000
Jul 12 17:03:35 hacking kernel: FS:  0000000000000000(0000) GS:ffff89cca576d000(0000) knlGS:0000000000000000
Jul 12 17:03:35 hacking kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jul 12 17:03:35 hacking kernel: CR2: 00005620d4b1bc58 CR3: 000000011b96c006 CR4: 0000000000f72ef0
Jul 12 17:03:35 hacking kernel: PKRU: 55555554
Jul 12 17:03:35 hacking kernel: Call Trace:
Jul 12 17:03:35 hacking kernel:  <IRQ>
Jul 12 17:03:35 hacking kernel:  iwl_pcie_napi_poll_msix+0x38/0xd0 [iwlwifi 34f0cb96706d9a49c69481e2d4133edbae3a2e27]
Jul 12 17:03:46 hacking kernel: traps: wezterm-gui[806] general protection fault ip:7f00fc4b265f sp:7fff455d2df0 error:0 in libc.so.6[a265f,7f00fc434000+170000]
Jul 12 17:03:46 hacking systemd-coredump[3483]: Process 806 (wezterm-gui) of user 1000 terminated abnormally with signal 11/SEGV, processing...
Jul 12 17:03:46 hacking systemd[1]: Created slice Slice /system/systemd-coredump.
Jul 12 17:03:46 hacking systemd[1]: Started Process Core Dump (PID 3483/UID 0).
Jul 12 17:03:47 hacking systemd-coredump[3484]: Process 806 (wezterm-gui) of user 1000 dumped core.
                                                
                                                Stack trace of thread 806:
                                                #0  0x00007f00fc4b265f n/a (libc.so.6 + 0xa265f)
                                                #1  0x00007f00fc4b5a1b n/a (libc.so.6 + 0xa5a1b)
                                                #2  0x00007f00fc4b5ea2 n/a (libc.so.6 + 0xa5ea2)
                                                #3  0x00007f00fc4b7236 realloc (libc.so.6 + 0xa7236)
Jul 12 17:04:45 hacking dhcpcd[1030]: script_status: /usr/lib/dhcpcd/dhcpcd-run-hooks: Segmentation fault
Jul 12 17:04:45 hacking kernel: Oops: general protection fault, probably for non-canonical address 0xae0000005a0034: 0000 [#1] SMP NOPTI
…
Jul 12 17:04:45 hacking kernel:  truncate_inode_pages_range+0xd6/0x460
Jul 12 17:04:45 hacking kernel:  evict+0x26d/0x290
Jul 12 15:25:59 hacking kernel: frame on invalid queue - is on 8 and indicates 6
Jul 12 15:25:59 hacking kernel: WARNING: CPU: 7 PID: 590 at drivers/net/wireless/intel/iwlwifi/pcie/rx.c:1335 iwl_pcie_rx_handle+0x492/0xa00 [iwlwifi]
Jul 12 15:25:59 hacking kernel: Modules linked in: snd_seq_dummy snd_hrtimer rfcomm snd_seq snd_seq_device 8021q garp mrp stp llc ccm algif_aead crypto_null des3_ede_x86_64 des_generic libdes md4 cmac algif_hash algif_skcipher af_alg snd_sof_pci_intel_mtl snd_sof_intel_hda_generic soundwire_intel snd_sof_intel_hda_sdw_bpt snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda_mlink snd_sof_intel_hda snd_hda_codec_hdmi soundwire_cadence snd_sof_pci snd_sof_xtensa_dsp snd_sof snd_sof_utils snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi_intel_sdca_quirks soundwire_generic_allocation snd_soc_acpi soundwire_bus snd_soc_sdca snd_soc_core snd_hda_codec_realtek snd_hda_codec_generic snd_compress snd_hda_scodec_component ac97_bus snd_pcm_dmaengine crc8 bnep vfat fat intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp iwlmld kvm_intel mac80211 kvm libarc4 irqbypass snd_hda_intel polyval_clmulni snd_intel_dspcfg snd_intel_sdw_acpi polyval_generic ghash_clmulni_intel uvcvideo snd_hda_codec
Jul 12 15:25:59 hacking kernel:  btusb processor_thermal_device_pci sha512_ssse3 processor_thermal_device videobuf2_vmalloc btrtl hid_multitouch r8153_ecm sha256_ssse3 processor_thermal_wt_hint uvc snd_hda_core btintel cdc_ether iwlwifi videobuf2_memops sha1_ssse3 videobuf2_v4l2 aesni_intel usbnet btbcm snd_hwdep videobuf2_common crypto_simd iTCO_wdt btmtk videodev intel_pmc_bxt snd_pcm cryptd processor_thermal_rfim cfg80211 mei_gsc_proxy intel_rapl_msr bluetooth iTCO_vendor_support e1000e mc mousedev r8152 rapl intel_lpss_pci processor_thermal_rapl intel_cstate snd_timer ptp intel_lpss intel_rapl_common mii ucsi_acpi intel_uncore libphy typec_ucsi joydev wmi_bmof pcspkr clevo_wmi(OE) mei_me rfkill pps_core processor_thermal_wt_req idma64 snd i2c_i801 thunderbolt intel_vpu typec processor_thermal_power_floor i2c_smbus mei clevo_acpi(OE) soundcore i2c_mux processor_thermal_mbox igen6_edac roles tuxedo_io(OE) intel_pmc_core int3403_thermal i2c_hid_acpi tuxedo_keyboard(OE) int340x_thermal_zone int3400_thermal i2c_hid pmt_telemetry
Jul 12 15:25:59 hacking kernel:  tuxedo_compatibility_check(OE) intel_hid acpi_thermal_rel acpi_tad led_class_multicolor acpi_pad pmt_class pinctrl_meteorlake sparse_keymap mac_hid pkcs8_key_parser dm_mod crypto_user loop nfnetlink ip_tables x_tables xe drm_ttm_helper drm_suballoc_helper gpu_sched drm_gpuvm drm_exec drm_gpusvm i915 sdhci_pci i2c_algo_bit drm_buddy sdhci_uhs2 nvme ttm sdhci nvme_core cqhci intel_gtt nvme_keyring mmc_core drm_display_helper serio_raw nvme_auth intel_vsec video cec wmi
Jul 12 15:25:59 hacking kernel: Unloaded tainted modules: tuxedo_nb02_nvidia_power_ctrl(OE):1
Jul 12 15:25:59 hacking kernel: CPU: 7 UID: 0 PID: 590 Comm: irq/189-iwlwifi Tainted: G        W  OE       6.15.6-arch1-1 #1 PREEMPT(full)  a49b9575025ef78fca63b5f170baaeaabd0c299d
Jul 12 15:25:59 hacking kernel: Tainted: [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Jul 12 15:25:59 hacking kernel: Hardware name: EUROCOM BLITZ Ultra 2/V54x_6x_TU, BIOS 1.07.14aEu 02/06/2025
Jul 12 15:25:59 hacking kernel: RIP: 0010:iwl_pcie_rx_handle+0x492/0xa00 [iwlwifi]
Jul 12 15:25:59 hacking kernel: Code: 1f 84 00 00 00 00 00 90 48 83 c0 01 48 39 c8 0f 84 06 ff ff ff 38 10 75 ef e9 02 ff ff ff 48 c7 c7 d8 49 98 c1 e8 ae 70 43 e5 <0f> 0b e9 54 fe ff ff 8b 6c 24 3c 4c 8b 54 24 10 4c 8b 7c 24 40 80
Jul 12 15:25:59 hacking kernel: RSP: 0018:ffffcbfb00394d90 EFLAGS: 00010246
Jul 12 15:25:59 hacking kernel: RAX: 0000000000000000 RBX: 0000000000001000 RCX: 0000000000000027
Jul 12 15:25:59 hacking kernel: RDX: ffff8b66601dcbc8 RSI: 0000000000000001 RDI: ffff8b66601dcbc0
Jul 12 15:25:59 hacking kernel: RBP: 000000000000057e R08: 0000000000000000 R09: 00000000ffffefff
Jul 12 15:25:59 hacking kernel: R10: ffffffffa8e60f20 R11: ffffcbfb00394c28 R12: ffff8b5f048c8028
Jul 12 15:25:59 hacking kernel: R13: 0000000000000000 R14: ffff8b5f21eb5380 R15: ffff8b5f06d8b000
Jul 12 15:25:59 hacking kernel: FS:  0000000000000000(0000) GS:ffff8b66b66ed000(0000) knlGS:0000000000000000
Jul 12 15:25:59 hacking kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jul 12 15:25:59 hacking kernel: CR2: 00007f5070fe09ac CR3: 0000000103bd4002 CR4: 0000000000f72ef0
Jul 12 15:25:59 hacking kernel: PKRU: 55555554
Jul 12 15:25:59 hacking kernel: Call Trace:
Jul 12 15:25:59 hacking kernel:  <IRQ>
Jul 12 15:25:59 hacking kernel:  iwl_pcie_napi_poll_msix+0x38/0xd0 [iwlwifi 34f0cb96706d9a49c69481e2d4133edbae3a2e27]
Jul 12 15:37:15 hacking kernel: BUG: TASK stack guard page was hit at 0000000096024444 (stack is 00000000eec07d4e..0000000069af97c3)
Jul 12 15:37:15 hacking kernel: BUG: #DF stack guard page was hit at 000000005d495123 (stack is 0000000054b36f23..00000000c659be9d)
Jul 12 15:37:15 hacking kernel: BUG: #DF stack guard page was hit at 000000005d495123 (stack is 0000000054b36f23..00000000c659be9d)
Jul 12 15:37:15 hacking kernel: BUG: #DF stack guard page was hit at 000000005d495123 (stack is 0000000054b36f23..00000000c659be9d)
Jul 12 15:37:15 hacking kernel: BUG: #DF stack guard page was hit at 000000005d495123 (stack is 0000000054b36f23..00000000c659be9d)
Jul 12 15:37:15 hacking kernel: BUG: #DF stack guard page was hit at 000000005d495123 (stack is 0000000054b36f23..00000000c659be9d)
Jul 12 15:37:15 hacking kernel: BUG: #DF stack guard page was hit at 000000005d495123 (stack is 0000000054b36f23..00000000c659be9d)
…

1. disable https://wiki.archlinux.org/title/Zswap
2. https://wiki.archlinux.org/title/Stress … MemTest86+ (run that over night, one successful memtest cycle proves nothing)
3. ready to deactivate the wifi chip in the firmware (or blacklist iwlwifi) and run the system stationary on either of your rj45 connections for a while?

Jul 12 16:53:20 hacking kernel: e1000e 0000:00:1f.6 enp0s31f6: renamed from eth0
Jul 12 16:53:25 hacking kernel: r8152 2-1.4.4:1.0 enp0s13f0u1u4u4: renamed from eth0

Offline

#6 2025-07-15 04:54:09

MaskRay
Member
From: California, USA
Registered: 2025-07-11
Posts: 4
Website

Re: Random freeze, Intel Core Ultra 7 255H, Intel Wi-Fi 7 BE200

I've disabled Zswap, but the freezing issue continues. I don't have a long Ethernet cable, so I haven't tested disabling wifi on Arch.

The iwlwifi driver diagnostics do seem concerning. As Eurocom has tested Ubuntu 24.04, I decided to give it a try.
After installing Ubuntu 24.04 with Linux kernel 6.11.0-29-generic (in the install wizard, I split the Arch / for the Ubuntu root partition), I haven't experienced any freezes.
A good journalctl -b log: https://gist.github.com/MaskRay/26903fc … 6aa38580ce

It installed GRUB on the EFI partition, likely overwriting the systemd-boot record. I'll need to sort out how to boot Arch Linux again another day.


% efibootmgr
BootCurrent: 0002
Timeout: 0 seconds
BootOrder: 0002,2001,2002,2003
Boot0002* ubuntu        HD(1,GPT,d9811ac5-88b9-4704-8b1e-40a24b5b43c3,0x800,0x200000)/File(\EFI\ubuntu\shimx64.efi)
Boot2001* EFI USB Device        RC
Boot2002* EFI DVD/CDROM RC
Boot2003* EFI Network   RC
% df -h
Filesystem      Size  Used Avail Use% Mounted on
tmpfs           3.1G  2.5M  3.1G   1% /run
/dev/nvme0n1p4  145G   19G  119G  14% /
tmpfs            16G  236M   16G   2% /dev/shm
tmpfs           5.0M  8.0K  5.0M   1% /run/lock
efivarfs        268K  136K  128K  52% /sys/firmware/efi/efivars
tmpfs            16G   65M   16G   1% /tmp
/dev/nvme0n1p1 1022M  344M  679M  34% /boot/efi
/dev/nvme0n1p3  766G   52G  675G   8% /arch
tmpfs           3.1G  768K  3.1G   1% /run/user/1000

I've reported the problem on https://community.intel.com/t5/Wireless … -p/1703035 , but looks like it has been marked as a spam...

Last edited by MaskRay (2025-07-15 05:07:46)

Offline

#7 2025-07-15 07:01:57

seth
Member
Registered: 2012-09-03
Posts: 66,061

Re: Random freeze, Intel Core Ultra 7 255H, Intel Wi-Fi 7 BE200

"lsblk -f" and add the UUID for nvme0n1p3 to ubuntu's grub.cfg

I don't have a long Ethernet cable, so I haven't tested disabling wifi on Arch.

I bet you've an ethernet cable that can reach trough walls… https://wiki.archlinux.org/title/Tethering smile

Offline

Board footer

Powered by FluxBB