Your message dated Tue, 03 Feb 2026 21:30:08 +0000
with message-id <[email protected]>
and subject line Bug#1126015: fixed in linux 6.19~rc8-1~exp1
has caused the Debian Bug report #1126015,
regarding linux-image-6.17.13+deb14-rt-amd64: ethtool -x 
<sfc-net-driver-ifname> causes: rtmutex deadlock detected
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1126015: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126015
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: src:linux
Version: 6.17.13-1
Severity: critical
Justification: breaks the whole system
X-Debbugs-Cc: [email protected], [email protected]
User: [email protected]
Usertags: amd64

I am trying to read the receive flow hash indirection table from a NIC serviced 
by the sfc driver and I get a hung system.

$ ethtool -x enp1s0f0np0
Jan 20 14:30:30 kernel: ------------[ cut here ]------------
Jan 20 14:30:30 kernel: rtmutex deadlock detected
Jan 20 14:30:30 kernel: WARNING: CPU: 2 PID: 1194 at 
kernel/locking/rtmutex.c:1674 __rt_mutex_slowlock_locked.constprop.0+0x1e8/0x220
Jan 20 14:30:30 kernel: Modules linked in: rpcsec_gss_krb5 nfsv4 dns_resolver 
nfs lockd grace netfs 8021q garp stp llc mrp binfmt_misc nls_ascii nls_cp437 
vfat fat intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp 
coretemp kvm_intel kvm jc42 dell_smbios ppdev dell_wmi_descriptor 
platform_profile dcdbas irqbypass ghash_clmulni_intel mgag200 aesni_intel 
drm_client_lib rapl drm_shmem_helper at24 drm_kms_helper intel_cstate 
intel_uncore vga16fb i2c_algo_bit vgastate pcspkr acpi_cpufreq parport_pc 
parport intel_vbtn sparse_keymap joydev ipmi_ssif evdev button ie31200_edac sg 
onload(OE) acpi_ipmi ipmi_si ipmi_watchdog sfc_resource(OE) ipmi_devintf 
ipmi_msghandler drm efi_pstore configfs auth_rpcgss sunrpc nfnetlink autofs4 
ext4 crc16 mbcache jbd2 crc32c_cryptoapi hid_generic usbhid hid dm_mod sd_mod 
iTCO_wdt ahci intel_pmc_bxt iTCO_vendor_support watchdog tg3 libahci xhci_pci 
ehci_pci video sfc xhci_hcd libphy ehci_hcd wmi battery libata usbcore mdio_bus 
mtd scsi_mod i2c_i801 fan usb_common i2c_smbus scsi_common
Jan 20 14:30:30 kernel:  lpc_ich
Jan 20 14:30:30 kernel: CPU: 2 UID: 1100 PID: 1194 Comm: ethtool Tainted: G     
   W  OE       6.17.13+deb14-rt-amd64 #1 PREEMPT_{RT,(full)}  Debian 6.17.13-1 
Jan 20 14:30:30 kernel: Tainted: [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Jan 20 14:30:30 kernel: Hardware name: Dell Inc. PowerEdge R220/05Y15N, BIOS 
1.4.0 10/23/2014
Jan 20 14:30:30 kernel: RIP: 
0010:__rt_mutex_slowlock_locked.constprop.0+0x1e8/0x220
Jan 20 14:30:30 kernel: Code: 00 4c 89 e6 48 89 ef e8 b6 35 ca 00 41 83 fd dd 
0f 85 d7 fe ff ff 48 89 ef e8 f4 9c ca 00 48 c7 c7 6c 51 5d a9 e8 a8 00 f6 ff 
<0f> 0b 66 90 b8 01 00 00 00 87 43 18 e8 c7 3e fb ff eb ef bf 01 00 
Jan 20 14:30:30 kernel: RSP: 0018:ffffcdc24208f5a0 EFLAGS: 00010246
Jan 20 14:30:30 kernel: RAX: 0000000000000000 RBX: ffff8b14d3888000 RCX: 
0000000000000027
Jan 20 14:30:30 kernel: RDX: ffff8b1617f1ce88 RSI: 0000000000000001 RDI: 
ffff8b1617f1ce80
Jan 20 14:30:30 kernel: RBP: ffff8b14ca3d9150 R08: 0000000000000000 R09: 
ffffcdc24208f378
Jan 20 14:30:30 kernel: R10: ffffffffa9ee3e48 R11: 00000000ffffefff R12: 
ffffcdc24208f5a0
Jan 20 14:30:30 kernel: R13: 00000000ffffffdd R14: ffffcdc24208f648 R15: 
ffffffffa9168880
Jan 20 14:30:30 kernel: FS:  00007f1bb6609b80(0000) GS:ffff8b166d501000(0000) 
knlGS:0000000000000000
Jan 20 14:30:30 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 20 14:30:30 kernel: CR2: 000055f2ef901700 CR3: 000000013b2c4001 CR4: 
00000000001726f0
Jan 20 14:30:30 kernel: Call Trace:
Jan 20 14:30:30 kernel:  <TASK>
Jan 20 14:30:30 kernel:  rt_mutex_slowlock.constprop.0+0x4d/0xc0
Jan 20 14:30:30 kernel:  efx_mcdi_rx_pull_rss_config+0x28/0x60 [sfc] 
Jan 20 14:30:30 kernel:  efx_ethtool_get_rxfh+0x3b/0xd0 [sfc] 
Jan 20 14:30:30 kernel:  rss_prepare.isra.0+0x1c9/0x330
Jan 20 14:30:30 kernel:  ethnl_default_doit+0x147/0x3f0
Jan 20 14:30:30 kernel:  genl_family_rcv_msg_doit+0xff/0x160
Jan 20 14:30:30 kernel:  genl_rcv_msg+0x1aa/0x2b0
Jan 20 14:30:30 kernel:  ? __pfx_ethnl_default_doit+0x10/0x10
Jan 20 14:30:30 kernel:  ? __pfx_genl_rcv_msg+0x10/0x10
Jan 20 14:30:30 kernel:  netlink_rcv_skb+0x5c/0x110
Jan 20 14:30:30 kernel:  genl_rcv+0x28/0x40
Jan 20 14:30:30 kernel:  netlink_unicast+0x28f/0x3c0
Jan 20 14:30:30 kernel:  ? __alloc_skb+0xdb/0x1a0
Jan 20 14:30:30 kernel:  netlink_sendmsg+0x20d/0x440
Jan 20 14:30:30 kernel:  __sys_sendto+0x1f5/0x200
Jan 20 14:30:30 kernel:  __x64_sys_sendto+0x24/0x30
Jan 20 14:30:30 kernel:  do_syscall_64+0x82/0x320
Jan 20 14:30:30 kernel:  ? netlink_recvmsg+0x273/0x310
Jan 20 14:30:30 kernel:  ? __check_object_size+0x48/0x200
Jan 20 14:30:30 kernel:  ? mod_memcg_lruvec_state+0xe7/0x2e0
Jan 20 14:30:30 kernel:  ? xas_load+0x11/0x100
Jan 20 14:30:30 kernel:  ? __lruvec_stat_mod_folio+0x85/0xd0
Jan 20 14:30:30 kernel:  ? xas_find+0x83/0x1b0
Jan 20 14:30:30 kernel:  ? folio_add_file_rmap_ptes+0x3d/0xc0
Jan 20 14:30:30 kernel:  ? next_uptodate_folio+0xa0/0x350
Jan 20 14:30:30 kernel:  ? rt_spin_unlock+0x17/0x40
Jan 20 14:30:30 kernel:  ? filemap_map_pages+0x4c7/0x5d0
Jan 20 14:30:30 kernel:  ? do_fault+0x310/0x560
Jan 20 14:30:30 kernel:  ? ___pte_offset_map+0x1b/0xe0
Jan 20 14:30:30 kernel:  ? __handle_mm_fault+0x2b3/0x380
Jan 20 14:30:30 kernel:  ? count_memcg_events+0xd6/0x220
Jan 20 14:30:30 kernel:  ? handle_mm_fault+0x1d6/0x2d0
Jan 20 14:30:30 kernel:  ? do_user_addr_fault+0x21a/0x690
Jan 20 14:30:30 kernel:  ? exc_page_fault+0x74/0x180
Jan 20 14:30:30 kernel:  entry_SYSCALL_64_after_hwframe+0x76/0x7e
Jan 20 14:30:30 kernel: RIP: 0033:0x7f1bb669ceb2
Jan 20 14:30:30 kernel: Code: 18 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 75 1a 
83 e2 39 83 fa 08 75 12 e8 2b ff ff ff 0f 1f 00 49 89 ca 48 8b 44 24 20 0f 05 
<48> 83 c4 18 c3 66 0f 1f 84 00 00 00 00 00 48 83 ec 10 ff 74 24 18 
Jan 20 14:30:30 kernel: RSP: 002b:00007ffd41813ba0 EFLAGS: 00000202 ORIG_RAX: 
000000000000002c
Jan 20 14:30:30 kernel: RAX: ffffffffffffffda RBX: 00007ffd41813cd0 RCX: 
00007f1bb669ceb2
Jan 20 14:30:30 kernel: RDX: 0000000000000028 RSI: 000055f2fed75420 RDI: 
0000000000000003
Jan 20 14:30:30 kernel: RBP: 000055f2fed75310 R08: 00007f1bb6831000 R09: 
000000000000000c
Jan 20 14:30:30 kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 
000055f2fed753c0
Jan 20 14:30:30 kernel: R13: 000055f2fed753b0 R14: 0000000000000000 R15: 
000055f2ef9061dd
Jan 20 14:30:30 kernel:  </TASK>


enp1s0f0np0 info:
$ ethtool -i enp1s0f0np0
driver: sfc
version: 6.17.13+deb14-rt-amd64
firmware-version: 8.5.0.1002 rx0 tx0
expansion-rom-version: 
bus-info: 0000:01:00.0
supports-statistics: yes
supports-test: yes
supports-eeprom-access: no
supports-register-dump: yes
supports-priv-flags: no


-- System Information:
Debian Release: forky/sid
  APT prefers oldstable-updates
  APT policy: (500, 'oldstable-updates'), (500, 'oldstable-security'), (500, 
'testing'), (500, 'oldstable'), (300, 'unstable'), (200, 
'oldstable-proposed-updates'), (200, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.17.13+deb14-rt-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_WARN, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages linux-image-6.17.13+deb14-rt-amd64 depends on:
ii  initramfs-tools [linux-initramfs-tool]  0.150
ii  kmod                                    34.2-2
ii  linux-base                              4.15

Versions of packages linux-image-6.17.13+deb14-rt-amd64 recommends:
pn  apparmor  <none>

Versions of packages linux-image-6.17.13+deb14-rt-amd64 suggests:
pn  debian-kernel-handbook  <none>
ii  firmware-linux-free     20241210-2
ii  grub-pc                 2.14~git20250718.0e36779-2
pn  linux-doc-6.17          <none>

Versions of packages linux-image-6.17.13+deb14-rt-amd64 is related to:
ii  firmware-amd-graphics      20230210-5
pn  firmware-atheros           <none>
pn  firmware-bnx2              <none>
pn  firmware-bnx2x             <none>
pn  firmware-brcm80211         <none>
pn  firmware-cavium            <none>
pn  firmware-cirrus            <none>
pn  firmware-intel-graphics    <none>
pn  firmware-intel-misc        <none>
pn  firmware-intel-sound       <none>
pn  firmware-ipw2x00           <none>
pn  firmware-ivtv              <none>
pn  firmware-iwlwifi           <none>
pn  firmware-libertas          <none>
pn  firmware-marvell-prestera  <none>
pn  firmware-mediatek          <none>
ii  firmware-misc-nonfree      20230210-5
pn  firmware-myricom           <none>
pn  firmware-netronome         <none>
pn  firmware-netxen            <none>
pn  firmware-nvidia-graphics   <none>
pn  firmware-qcom-soc          <none>
pn  firmware-qlogic            <none>
pn  firmware-realtek           <none>
pn  firmware-samsung           <none>
pn  firmware-siano             <none>
pn  firmware-ti-connectivity   <none>
pn  xen-hypervisor             <none>

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 6.19~rc8-1~exp1
Done: Salvatore Bonaccorso <[email protected]>

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <[email protected]> (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 02 Feb 2026 18:11:38 +0100
Source: linux
Architecture: source
Version: 6.19~rc8-1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Kernel Team <[email protected]>
Changed-By: Salvatore Bonaccorso <[email protected]>
Closes: 1122521 1126015
Changes:
 linux (6.19~rc8-1~exp1) experimental; urgency=medium
 .
   * New upstream release candidate
     - nvmet: fix race in nvmet_bio_done() leading to NULL pointer dereference
       (Closes: #1122521)
     - sfc: fix deadlock in RSS config read (Closes: #1126015)
 .
   [ Salvatore Bonaccorso ]
   * fs/nfsd: Enable NFSD_SCSILAYOUT (NFSv4.1 server support for pNFS SCSI
     layouts)
Checksums-Sha1:
 6a059db4d2088abd4986aff9012da4caadf958c2 183406 linux_6.19~rc8-1~exp1.dsc
 d288877dc9cc8444f9fc6d9468dcb22ec5b5deb9 159120336 linux_6.19~rc8.orig.tar.xz
 fad5637ca3ee6917a17e66d48cae0dedef9d81da 1452260 
linux_6.19~rc8-1~exp1.debian.tar.xz
 68bdbf2272ed0bc8d657ea41db797fb3835385d5 6991 
linux_6.19~rc8-1~exp1_source.buildinfo
Checksums-Sha256:
 f5a2ec71621c581f6e09596d09f31d0d7daaaf849796f0b7b023aa863473f0d6 183406 
linux_6.19~rc8-1~exp1.dsc
 128a77e1cdf291e780b7cea24801e0d3269263f90a38939dca3e2fd0b63effd1 159120336 
linux_6.19~rc8.orig.tar.xz
 aaf281c146276c623f79276c8be9cb1657eb69c1099d10893f618c6f4a801989 1452260 
linux_6.19~rc8-1~exp1.debian.tar.xz
 5297d18370930d260f964e2ee4a6c09b3a90d4173f3562de25d046b54375fbe9 6991 
linux_6.19~rc8-1~exp1_source.buildinfo
Files:
 a68b7ca7d8ae7e93094d3f75115d43c4 183406 kernel optional 
linux_6.19~rc8-1~exp1.dsc
 55466b97998d116e764adc882d795aa8 159120336 kernel optional 
linux_6.19~rc8.orig.tar.xz
 8054db91f527a1f82b1b699bf2117437 1452260 kernel optional 
linux_6.19~rc8-1~exp1.debian.tar.xz
 dfb6df46b5b489b125c5fda3ef1061b7 6991 kernel optional 
linux_6.19~rc8-1~exp1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=TN19
-----END PGP SIGNATURE-----

Attachment: pgpGkBINNgJyL.pgp
Description: PGP signature


--- End Message ---

Reply via email to