This problem is still present in Ubuntu 16.04: # Linux version 4.4.0-36-generic (buildd@lcy01-01) (gcc version 5.4.0 20160609 (Ubuntu 5.4.0-6ubuntu1~16.04.2) ) #55-Ubuntu SMP Thu Aug 11 18:01:55 UTC 2016
The workaround from comment #2 (disable PAC) still works dmesg output: [349643.292059] [<ffffffff8182dfb2>] ? entry_SYSCALL_64_fastpath+0x16/0x71 [349668.156063] NMI watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [rpc.svcgssd:1342] [349668.156063] Modules linked in: cts rpcsec_gss_krb5 intel_rapl x86_pkg_temp_thermal coretemp nfsd nfs_acl lockd auth_rpcgss grace sunrpc xenfs xen_privcmd autofs4 [349668.156063] CPU: 1 PID: 1342 Comm: rpc.svcgssd Tainted: G L 4.4.0-36-generic #55-Ubuntu [349668.156063] task: ffff880006ce2580 ti: ffff88007bb78000 task.ti: ffff88007bb78000 [349668.156063] RIP: e030:[<ffffffffc0036fcc>] [<ffffffffc0036fcc>] qword_addhex+0x6c/0xe0 [sunrpc] [349668.156063] RSP: e02b:ffff88007bb7bdc8 EFLAGS: 00000202 [349668.156063] RAX: ffff8800074089c3 RBX: ffff88003ed81980 RCX: 000000000000033f [349668.156063] RDX: ffff88000740f4de RSI: ffff88007bb7be34 RDI: ffff88007bb7be38 [349668.156063] RBP: ffff88007bb7bdc8 R08: 0000000000000000 R09: 000000000000063d [349668.156063] R10: 0000000000000001 R11: 0000000000000246 R12: ffff88007bb7be38 [349668.156063] R13: ffff88007bb7be34 R14: ffff8800794356a8 R15: 00000000fffffff5 [349668.156063] FS: 00007fa8c93ed740(0000) GS:ffff88007d300000(0000) knlGS:0000000000000000 [349668.156063] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b [349668.156063] CR2: 00007f261bf81000 CR3: 000000007813a000 CR4: 0000000000002660 [349668.156063] Stack: [349668.156063] ffff88007bb7bdf0 ffffffffc009045b 0000000000001000 ffff8800793ce940 [349668.156063] ffff88007b8c3320 ffff88007bb7be70 ffffffffc0039101 000000008c6f5a6d [349668.156063] 0000000100000000 ffff88007b1d7e10 ffff880007235bb0 ffff880079435600 [349668.156063] Call Trace: [349668.156063] [<ffffffffc009045b>] rsi_request+0x3b/0x50 [auth_rpcgss] [349668.156063] [<ffffffffc0039101>] cache_read.isra.19+0x2b1/0x400 [sunrpc] [349668.156063] [<ffffffffc0039281>] cache_read_procfs+0x31/0x40 [sunrpc] [349668.156063] [<ffffffff8127a132>] proc_reg_read+0x42/0x70 [349668.156063] [<ffffffff8120cc28>] __vfs_read+0x18/0x40 [349668.156063] [<ffffffff8120d1f6>] vfs_read+0x86/0x130 [349668.156063] [<ffffffff8120df45>] SyS_read+0x55/0xc0 [349668.156063] [<ffffffff8182dfb2>] entry_SYSCALL_64_fastpath+0x16/0x71 [349668.156063] Code: 00 00 84 c0 0f 84 84 00 00 00 4c 89 d0 eb 05 45 84 c0 74 5d 44 0f b6 02 48 83 c0 02 41 83 e9 02 45 89 c2 41 83 e0 0f 41 c0 ea 04 <45> 0f b6 80 80 4a a5 81 41 83 e2 0f 45 0f b6 92 80 4a a5 81 44 ** Tags added: xenial -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1466654 Title: kernel soft lockup on nfs server when using a kerberos mount To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nfs-utils/+bug/1466654/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs