Control: severity -1 important Control: tags -1 + moreinfo Hi Damir,
On Tue, Jan 20, 2026 at 03:12:12PM +0300, Damir Mansurov wrote: > Package: src:linux > Version: 6.17.13-1 > Severity: critical > Justification: breaks the whole system > X-Debbugs-Cc: [email protected], [email protected] > User: [email protected] > Usertags: amd64 > > I am trying to read the receive flow hash indirection table from a NIC > serviced by the sfc driver and I get a hung system. > > $ ethtool -x enp1s0f0np0 > Jan 20 14:30:30 kernel: ------------[ cut here ]------------ > Jan 20 14:30:30 kernel: rtmutex deadlock detected > Jan 20 14:30:30 kernel: WARNING: CPU: 2 PID: 1194 at > kernel/locking/rtmutex.c:1674 > __rt_mutex_slowlock_locked.constprop.0+0x1e8/0x220 > Jan 20 14:30:30 kernel: Modules linked in: rpcsec_gss_krb5 nfsv4 dns_resolver > nfs lockd grace netfs 8021q garp stp llc mrp binfmt_misc nls_ascii nls_cp437 > vfat fat intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal > intel_powerclamp coretemp kvm_intel kvm jc42 dell_smbios ppdev > dell_wmi_descriptor platform_profile dcdbas irqbypass ghash_clmulni_intel > mgag200 aesni_intel drm_client_lib rapl drm_shmem_helper at24 drm_kms_helper > intel_cstate intel_uncore vga16fb i2c_algo_bit vgastate pcspkr acpi_cpufreq > parport_pc parport intel_vbtn sparse_keymap joydev ipmi_ssif evdev button > ie31200_edac sg onload(OE) acpi_ipmi ipmi_si ipmi_watchdog sfc_resource(OE) > ipmi_devintf ipmi_msghandler drm efi_pstore configfs auth_rpcgss sunrpc > nfnetlink autofs4 ext4 crc16 mbcache jbd2 crc32c_cryptoapi hid_generic usbhid > hid dm_mod sd_mod iTCO_wdt ahci intel_pmc_bxt iTCO_vendor_support watchdog > tg3 libahci xhci_pci ehci_pci video sfc xhci_hcd libphy ehci_hcd wmi battery > libata usbcore mdio_bus mtd scsi_mod i2c_i801 fan usb_common i2c_smbus > scsi_common > Jan 20 14:30:30 kernel: lpc_ich > Jan 20 14:30:30 kernel: CPU: 2 UID: 1100 PID: 1194 Comm: ethtool Tainted: G > W OE 6.17.13+deb14-rt-amd64 #1 PREEMPT_{RT,(full)} Debian > 6.17.13-1 > Jan 20 14:30:30 kernel: Tainted: [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE > Jan 20 14:30:30 kernel: Hardware name: Dell Inc. PowerEdge R220/05Y15N, BIOS > 1.4.0 10/23/2014 > Jan 20 14:30:30 kernel: RIP: > 0010:__rt_mutex_slowlock_locked.constprop.0+0x1e8/0x220 > Jan 20 14:30:30 kernel: Code: 00 4c 89 e6 48 89 ef e8 b6 35 ca 00 41 83 fd dd > 0f 85 d7 fe ff ff 48 89 ef e8 f4 9c ca 00 48 c7 c7 6c 51 5d a9 e8 a8 00 f6 ff > <0f> 0b 66 90 b8 01 00 00 00 87 43 18 e8 c7 3e fb ff eb ef bf 01 00 > Jan 20 14:30:30 kernel: RSP: 0018:ffffcdc24208f5a0 EFLAGS: 00010246 > Jan 20 14:30:30 kernel: RAX: 0000000000000000 RBX: ffff8b14d3888000 RCX: > 0000000000000027 > Jan 20 14:30:30 kernel: RDX: ffff8b1617f1ce88 RSI: 0000000000000001 RDI: > ffff8b1617f1ce80 > Jan 20 14:30:30 kernel: RBP: ffff8b14ca3d9150 R08: 0000000000000000 R09: > ffffcdc24208f378 > Jan 20 14:30:30 kernel: R10: ffffffffa9ee3e48 R11: 00000000ffffefff R12: > ffffcdc24208f5a0 > Jan 20 14:30:30 kernel: R13: 00000000ffffffdd R14: ffffcdc24208f648 R15: > ffffffffa9168880 > Jan 20 14:30:30 kernel: FS: 00007f1bb6609b80(0000) GS:ffff8b166d501000(0000) > knlGS:0000000000000000 > Jan 20 14:30:30 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > Jan 20 14:30:30 kernel: CR2: 000055f2ef901700 CR3: 000000013b2c4001 CR4: > 00000000001726f0 > Jan 20 14:30:30 kernel: Call Trace: > Jan 20 14:30:30 kernel: <TASK> > Jan 20 14:30:30 kernel: rt_mutex_slowlock.constprop.0+0x4d/0xc0 > Jan 20 14:30:30 kernel: efx_mcdi_rx_pull_rss_config+0x28/0x60 [sfc] > Jan 20 14:30:30 kernel: efx_ethtool_get_rxfh+0x3b/0xd0 [sfc] > Jan 20 14:30:30 kernel: rss_prepare.isra.0+0x1c9/0x330 > Jan 20 14:30:30 kernel: ethnl_default_doit+0x147/0x3f0 > Jan 20 14:30:30 kernel: genl_family_rcv_msg_doit+0xff/0x160 > Jan 20 14:30:30 kernel: genl_rcv_msg+0x1aa/0x2b0 > Jan 20 14:30:30 kernel: ? __pfx_ethnl_default_doit+0x10/0x10 > Jan 20 14:30:30 kernel: ? __pfx_genl_rcv_msg+0x10/0x10 > Jan 20 14:30:30 kernel: netlink_rcv_skb+0x5c/0x110 > Jan 20 14:30:30 kernel: genl_rcv+0x28/0x40 > Jan 20 14:30:30 kernel: netlink_unicast+0x28f/0x3c0 > Jan 20 14:30:30 kernel: ? __alloc_skb+0xdb/0x1a0 > Jan 20 14:30:30 kernel: netlink_sendmsg+0x20d/0x440 > Jan 20 14:30:30 kernel: __sys_sendto+0x1f5/0x200 > Jan 20 14:30:30 kernel: __x64_sys_sendto+0x24/0x30 > Jan 20 14:30:30 kernel: do_syscall_64+0x82/0x320 > Jan 20 14:30:30 kernel: ? netlink_recvmsg+0x273/0x310 > Jan 20 14:30:30 kernel: ? __check_object_size+0x48/0x200 > Jan 20 14:30:30 kernel: ? mod_memcg_lruvec_state+0xe7/0x2e0 > Jan 20 14:30:30 kernel: ? xas_load+0x11/0x100 > Jan 20 14:30:30 kernel: ? __lruvec_stat_mod_folio+0x85/0xd0 > Jan 20 14:30:30 kernel: ? xas_find+0x83/0x1b0 > Jan 20 14:30:30 kernel: ? folio_add_file_rmap_ptes+0x3d/0xc0 > Jan 20 14:30:30 kernel: ? next_uptodate_folio+0xa0/0x350 > Jan 20 14:30:30 kernel: ? rt_spin_unlock+0x17/0x40 > Jan 20 14:30:30 kernel: ? filemap_map_pages+0x4c7/0x5d0 > Jan 20 14:30:30 kernel: ? do_fault+0x310/0x560 > Jan 20 14:30:30 kernel: ? ___pte_offset_map+0x1b/0xe0 > Jan 20 14:30:30 kernel: ? __handle_mm_fault+0x2b3/0x380 > Jan 20 14:30:30 kernel: ? count_memcg_events+0xd6/0x220 > Jan 20 14:30:30 kernel: ? handle_mm_fault+0x1d6/0x2d0 > Jan 20 14:30:30 kernel: ? do_user_addr_fault+0x21a/0x690 > Jan 20 14:30:30 kernel: ? exc_page_fault+0x74/0x180 > Jan 20 14:30:30 kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e > Jan 20 14:30:30 kernel: RIP: 0033:0x7f1bb669ceb2 > Jan 20 14:30:30 kernel: Code: 18 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 75 1a > 83 e2 39 83 fa 08 75 12 e8 2b ff ff ff 0f 1f 00 49 89 ca 48 8b 44 24 20 0f 05 > <48> 83 c4 18 c3 66 0f 1f 84 00 00 00 00 00 48 83 ec 10 ff 74 24 18 > Jan 20 14:30:30 kernel: RSP: 002b:00007ffd41813ba0 EFLAGS: 00000202 ORIG_RAX: > 000000000000002c > Jan 20 14:30:30 kernel: RAX: ffffffffffffffda RBX: 00007ffd41813cd0 RCX: > 00007f1bb669ceb2 > Jan 20 14:30:30 kernel: RDX: 0000000000000028 RSI: 000055f2fed75420 RDI: > 0000000000000003 > Jan 20 14:30:30 kernel: RBP: 000055f2fed75310 R08: 00007f1bb6831000 R09: > 000000000000000c > Jan 20 14:30:30 kernel: R10: 0000000000000000 R11: 0000000000000202 R12: > 000055f2fed753c0 > Jan 20 14:30:30 kernel: R13: 000055f2fed753b0 R14: 0000000000000000 R15: > 000055f2ef9061dd > Jan 20 14:30:30 kernel: </TASK> > > > enp1s0f0np0 info: > $ ethtool -i enp1s0f0np0 > driver: sfc > version: 6.17.13+deb14-rt-amd64 > firmware-version: 8.5.0.1002 rx0 tx0 > expansion-rom-version: > bus-info: 0000:01:00.0 > supports-statistics: yes > supports-test: yes > supports-eeprom-access: no > supports-register-dump: yes > supports-priv-flags: no Thanks for the report. A couple of questions: 6.17.13-1 is not the recent kernel (it is in backports) but still please test with the current 6.18.5-1 from unstable to confirm if the problem persist (please do with both the rt and the normal kernel). If the problem is triggered as well in 6.18.y from unstable, then it would be ideal to confirm the issue is as well present in mainline, so test the kernel from experimental (6.19~rc5-1~exp1). Is this an experienced regression from earlier version? If so from which? Futhermore the kernel is tained with OOT module, afaics this might be sfc_resource. That is you still would need to check if the problem is trigerable without loading OOT module. Regards, Salvatore

