The kernel crashes with a message "BUG: unable to handle kernel paging request at 00000002040800bc"
Issue
- The kernel crashes with a message "BUG: unable to handle kernel paging request at 00000002040800bc"
[443135.988943] BUG: unable to handle kernel paging request at 00000002040800bc
[443135.988946] IP: [<ffffffffafa5cb60>] __d_lookup_rcu+0x80/0x160
[443135.988951] PGD 80000004382c7067 PUD 0
[443135.988952] Oops: 0000 [#1] SMP
[443135.988954] Modules linked in: symap_custom_3_10_0_957_21_3_el7_x86_64(POE) xt_CHECKSUM tun devlink symev_custom_3_10_0_957_21_3_el7_x86_64(OE) ip6t_MASQUERADE nf_nat_masquerade_ipv6 ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netbios_ns nf_conntrack_broadcast xt_set ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 ipt_REJECT nf_reject_ipv4 nf_log_ipv4 nf_log_common xt_LOG xt_pkttype xt_conntrack ip_set_hash_ip ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter sunrpc snd_hda_codec_hdmi vfat
[443135.988971] fat snd_hda_codec_realtek snd_hda_codec_generic intel_pmc_core intel_powerclamp coretemp iTCO_wdt iTCO_vendor_support intel_rapl ppdev intel_wmi_thunderbolt kvm_intel kvm irqbypass crc32_pclmul snd_hda_intel ghash_clmulni_intel snd_hda_codec snd_hda_core snd_hwdep snd_seq snd_seq_device snd_pcm aesni_intel lrw gf128mul glue_helper ablk_helper pcspkr cryptd sg snd_timer snd i2c_i801 soundcore parport_pc parport pinctrl_cannonlake tpm_crb pinctrl_intel wmi acpi_pad ip_tables xfs libcrc32c sr_mod cdrom i915 i2c_algo_bit iosf_mbi drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ahci libahci drm e1000e crct10dif_pclmul crct10dif_common libata crc32c_intel nvme r8169 serio_raw ptp nvme_core pps_core mii drm_panel_orientation_quirks video i2c_hid dm_mirror dm_region_hash dm_log
[443135.988992] dm_mod
[443135.988994] CPU: 2 PID: 1671 Comm: rtvscand Kdump: loaded Tainted: P OE ------------ 3.10.0-957.21.3.el7.x86_64 #1
[443135.988995] Hardware name: LENOVO 10SUS0J400/312A, BIOS M1UKT1FA 09/26/2018
[443135.988996] task: ffff8a6418fe1040 ti: ffff8a640da68000 task.ti: ffff8a640da68000
[443135.988997] RIP: 0010:[<ffffffffafa5cb60>] [<ffffffffafa5cb60>] __d_lookup_rcu+0x80/0x160
[443135.989000] RSP: 0018:ffff8a640da6bc48 EFLAGS: 00210206
[443135.989001] RAX: 0000000000000006 RBX: 00000002040800c0 RCX: 0000000000000015
[443135.989002] RDX: 00000000ffff8a63 RSI: ffff8a640da6bdd0 RDI: ffff8a6419a6fd80
[443135.989003] RBP: ffff8a640da6bc88 R08: 747379732f6b6f6f R09: ffff8a640da6bcac
[443135.989004] R10: ffff8a6416b57052 R11: 0000000000000006 R12: ffff8a6419a6fd80
[443135.989005] R13: 00000002040800b8 R14: 000000067473e6d8 R15: ffff8a640da6bdd0
[443135.989006] FS: 0000000000000000(0000) GS:ffff8a645e480000(0063) knlGS:00000000e6807b40
[443135.989007] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033
[443135.989008] CR2: 00000002040800bc CR3: 00000004383f6000 CR4: 00000000003607e0
[443135.989009] Call Trace:
[443135.989012] [<ffffffffafa4d923>] lookup_fast+0x53/0x230
[443135.989014] [<ffffffffafa51d2d>] path_lookupat+0x16d/0x8b0
[443135.989015] [<ffffffffafa5017d>] ? do_last+0x66d/0x12a0
[443135.989018] [<ffffffffafa3e82a>] ? __check_object_size+0x1ca/0x250
[443135.989020] [<ffffffffafa1c345>] ? kmem_cache_alloc+0x35/0x1f0
[443135.989022] [<ffffffffafa532ef>] ? getname_flags+0x4f/0x1a0
[443135.989023] [<ffffffffafa5249b>] filename_lookup+0x2b/0xc0
[443135.989025] [<ffffffffafa54487>] user_path_at_empty+0x67/0xc0
[443135.989027] [<ffffffffafa544f1>] user_path_at+0x11/0x20
[443135.989029] [<ffffffffafa473b3>] vfs_fstatat+0x63/0xc0
[443135.989030] [<ffffffffafa4744e>] vfs_lstat+0x1e/0x20
[443135.989033] [<ffffffffaf886f49>] sys32_lstat64+0x29/0x60
[443135.989035] [<ffffffffaf82bc65>] ? do_notify_resume+0xa5/0xc0
[443135.989037] [<ffffffffaff76134>] ? int_signal+0x12/0x17
[443135.989039] [<ffffffffaf938e54>] ? __audit_syscall_entry+0xb4/0x110
[443135.989041] [<ffffffffaff79bb0>] sysenter_dispatch+0xd/0x2b
[443135.989042] Code: 84 ae 00 00 00 4c 89 f0 48 c1 e8 20 49 89 c3 eb 16 66 2e 0f 1f 84 00 00 00 00 00 48 8b 1b 48 85 db 0f 84 8c 00 00 00 4c 8d 6b f8 <8b> 53 fc 4c 39 63 10 75 e7 48 83 7b 08 00 74 e0 83 e2 fe 41 f6
[443135.989060] RIP [<ffffffffafa5cb60>] __d_lookup_rcu+0x80/0x160
[443135.989062] RSP <ffff8a640da6bc48>
[443135.989062] CR2: 00000002040800bc
Environment
- kernel-3.10.0-957.21.3.el7
- Symantec security modules installed and loaded
symev_custom_3_10_0_957_21_3_el7_x86_64 OE
symap_custom_3_10_0_957_21_3_el7_x86_64 POE
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.