This problem is still present in Ubuntu 16.04:
# Linux version 4.4.0-36-generic (buildd@lcy01-01) (gcc version 5.4.0 20160609 
(Ubuntu 5.4.0-6ubuntu1~16.04.2) ) #55-Ubuntu SMP Thu Aug 11 18:01:55 UTC 2016

The workaround from comment #2 (disable PAC) still works

dmesg output:
[349643.292059]  [<ffffffff8182dfb2>] ? entry_SYSCALL_64_fastpath+0x16/0x71
[349668.156063] NMI watchdog: BUG: soft lockup - CPU#1 stuck for 22s! 
[rpc.svcgssd:1342]
[349668.156063] Modules linked in: cts rpcsec_gss_krb5 intel_rapl 
x86_pkg_temp_thermal coretemp nfsd nfs_acl lockd auth_rpcgss grace sunrpc xenfs 
xen_privcmd autofs4
[349668.156063] CPU: 1 PID: 1342 Comm: rpc.svcgssd Tainted: G             L  
4.4.0-36-generic #55-Ubuntu
[349668.156063] task: ffff880006ce2580 ti: ffff88007bb78000 task.ti: 
ffff88007bb78000
[349668.156063] RIP: e030:[<ffffffffc0036fcc>]  [<ffffffffc0036fcc>] 
qword_addhex+0x6c/0xe0 [sunrpc]
[349668.156063] RSP: e02b:ffff88007bb7bdc8  EFLAGS: 00000202
[349668.156063] RAX: ffff8800074089c3 RBX: ffff88003ed81980 RCX: 
000000000000033f
[349668.156063] RDX: ffff88000740f4de RSI: ffff88007bb7be34 RDI: 
ffff88007bb7be38
[349668.156063] RBP: ffff88007bb7bdc8 R08: 0000000000000000 R09: 
000000000000063d
[349668.156063] R10: 0000000000000001 R11: 0000000000000246 R12: 
ffff88007bb7be38
[349668.156063] R13: ffff88007bb7be34 R14: ffff8800794356a8 R15: 
00000000fffffff5
[349668.156063] FS:  00007fa8c93ed740(0000) GS:ffff88007d300000(0000) 
knlGS:0000000000000000
[349668.156063] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[349668.156063] CR2: 00007f261bf81000 CR3: 000000007813a000 CR4: 
0000000000002660
[349668.156063] Stack:
[349668.156063]  ffff88007bb7bdf0 ffffffffc009045b 0000000000001000 
ffff8800793ce940
[349668.156063]  ffff88007b8c3320 ffff88007bb7be70 ffffffffc0039101 
000000008c6f5a6d
[349668.156063]  0000000100000000 ffff88007b1d7e10 ffff880007235bb0 
ffff880079435600
[349668.156063] Call Trace:
[349668.156063]  [<ffffffffc009045b>] rsi_request+0x3b/0x50 [auth_rpcgss]
[349668.156063]  [<ffffffffc0039101>] cache_read.isra.19+0x2b1/0x400 [sunrpc]
[349668.156063]  [<ffffffffc0039281>] cache_read_procfs+0x31/0x40 [sunrpc]
[349668.156063]  [<ffffffff8127a132>] proc_reg_read+0x42/0x70
[349668.156063]  [<ffffffff8120cc28>] __vfs_read+0x18/0x40
[349668.156063]  [<ffffffff8120d1f6>] vfs_read+0x86/0x130
[349668.156063]  [<ffffffff8120df45>] SyS_read+0x55/0xc0
[349668.156063]  [<ffffffff8182dfb2>] entry_SYSCALL_64_fastpath+0x16/0x71
[349668.156063] Code: 00 00 84 c0 0f 84 84 00 00 00 4c 89 d0 eb 05 45 84 c0 74 
5d 44 0f b6 02 48 83 c0 02 41 83 e9 02 45 89 c2 41 83 e0 0f 41 c0 ea 04 <45> 0f 
b6 80 80 4a a5 81 41 83 e2 0f 45 0f b6 92 80 4a a5 81 44 


** Tags added: xenial

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1466654

Title:
  kernel soft lockup on nfs server when using a kerberos mount

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nfs-utils/+bug/1466654/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to