The kernel crashes with a message "BUG: unable to handle kernel paging request at 00000002040800bc"

Solution Unverified - Updated -

Issue

  • The kernel crashes with a message "BUG: unable to handle kernel paging request at 00000002040800bc"
[443135.988943] BUG: unable to handle kernel paging request at 00000002040800bc
[443135.988946] IP: [<ffffffffafa5cb60>] __d_lookup_rcu+0x80/0x160
[443135.988951] PGD 80000004382c7067 PUD 0 
[443135.988952] Oops: 0000 [#1] SMP 
[443135.988954] Modules linked in: symap_custom_3_10_0_957_21_3_el7_x86_64(POE) xt_CHECKSUM tun devlink symev_custom_3_10_0_957_21_3_el7_x86_64(OE) ip6t_MASQUERADE nf_nat_masquerade_ipv6 ipt_MASQUERADE nf_nat_masquerade_ipv4 nf_conntrack_netbios_ns nf_conntrack_broadcast xt_set ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 ipt_REJECT nf_reject_ipv4 nf_log_ipv4 nf_log_common xt_LOG xt_pkttype xt_conntrack ip_set_hash_ip ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter sunrpc snd_hda_codec_hdmi vfat
[443135.988971]  fat snd_hda_codec_realtek snd_hda_codec_generic intel_pmc_core intel_powerclamp coretemp iTCO_wdt iTCO_vendor_support intel_rapl ppdev intel_wmi_thunderbolt kvm_intel kvm irqbypass crc32_pclmul snd_hda_intel ghash_clmulni_intel snd_hda_codec snd_hda_core snd_hwdep snd_seq snd_seq_device snd_pcm aesni_intel lrw gf128mul glue_helper ablk_helper pcspkr cryptd sg snd_timer snd i2c_i801 soundcore parport_pc parport pinctrl_cannonlake tpm_crb pinctrl_intel wmi acpi_pad ip_tables xfs libcrc32c sr_mod cdrom i915 i2c_algo_bit iosf_mbi drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ahci libahci drm e1000e crct10dif_pclmul crct10dif_common libata crc32c_intel nvme r8169 serio_raw ptp nvme_core pps_core mii drm_panel_orientation_quirks video i2c_hid dm_mirror dm_region_hash dm_log
[443135.988992]  dm_mod
[443135.988994] CPU: 2 PID: 1671 Comm: rtvscand Kdump: loaded Tainted: P           OE  ------------   3.10.0-957.21.3.el7.x86_64 #1
[443135.988995] Hardware name: LENOVO 10SUS0J400/312A, BIOS M1UKT1FA 09/26/2018
[443135.988996] task: ffff8a6418fe1040 ti: ffff8a640da68000 task.ti: ffff8a640da68000
[443135.988997] RIP: 0010:[<ffffffffafa5cb60>]  [<ffffffffafa5cb60>] __d_lookup_rcu+0x80/0x160
[443135.989000] RSP: 0018:ffff8a640da6bc48  EFLAGS: 00210206
[443135.989001] RAX: 0000000000000006 RBX: 00000002040800c0 RCX: 0000000000000015
[443135.989002] RDX: 00000000ffff8a63 RSI: ffff8a640da6bdd0 RDI: ffff8a6419a6fd80
[443135.989003] RBP: ffff8a640da6bc88 R08: 747379732f6b6f6f R09: ffff8a640da6bcac
[443135.989004] R10: ffff8a6416b57052 R11: 0000000000000006 R12: ffff8a6419a6fd80
[443135.989005] R13: 00000002040800b8 R14: 000000067473e6d8 R15: ffff8a640da6bdd0
[443135.989006] FS:  0000000000000000(0000) GS:ffff8a645e480000(0063) knlGS:00000000e6807b40
[443135.989007] CS:  0010 DS: 002b ES: 002b CR0: 0000000080050033
[443135.989008] CR2: 00000002040800bc CR3: 00000004383f6000 CR4: 00000000003607e0
[443135.989009] Call Trace:
[443135.989012]  [<ffffffffafa4d923>] lookup_fast+0x53/0x230
[443135.989014]  [<ffffffffafa51d2d>] path_lookupat+0x16d/0x8b0
[443135.989015]  [<ffffffffafa5017d>] ? do_last+0x66d/0x12a0
[443135.989018]  [<ffffffffafa3e82a>] ? __check_object_size+0x1ca/0x250
[443135.989020]  [<ffffffffafa1c345>] ? kmem_cache_alloc+0x35/0x1f0
[443135.989022]  [<ffffffffafa532ef>] ? getname_flags+0x4f/0x1a0
[443135.989023]  [<ffffffffafa5249b>] filename_lookup+0x2b/0xc0
[443135.989025]  [<ffffffffafa54487>] user_path_at_empty+0x67/0xc0
[443135.989027]  [<ffffffffafa544f1>] user_path_at+0x11/0x20
[443135.989029]  [<ffffffffafa473b3>] vfs_fstatat+0x63/0xc0
[443135.989030]  [<ffffffffafa4744e>] vfs_lstat+0x1e/0x20
[443135.989033]  [<ffffffffaf886f49>] sys32_lstat64+0x29/0x60
[443135.989035]  [<ffffffffaf82bc65>] ? do_notify_resume+0xa5/0xc0
[443135.989037]  [<ffffffffaff76134>] ? int_signal+0x12/0x17
[443135.989039]  [<ffffffffaf938e54>] ? __audit_syscall_entry+0xb4/0x110
[443135.989041]  [<ffffffffaff79bb0>] sysenter_dispatch+0xd/0x2b
[443135.989042] Code: 84 ae 00 00 00 4c 89 f0 48 c1 e8 20 49 89 c3 eb 16 66 2e 0f 1f 84 00 00 00 00 00 48 8b 1b 48 85 db 0f 84 8c 00 00 00 4c 8d 6b f8 <8b> 53 fc 4c 39 63 10 75 e7 48 83 7b 08 00 74 e0 83 e2 fe 41 f6 
[443135.989060] RIP  [<ffffffffafa5cb60>] __d_lookup_rcu+0x80/0x160
[443135.989062]  RSP <ffff8a640da6bc48>
[443135.989062] CR2: 00000002040800bc

Environment

  • kernel-3.10.0-957.21.3.el7
  • Symantec security modules installed and loaded
    symev_custom_3_10_0_957_21_3_el7_x86_64  OE
    symap_custom_3_10_0_957_21_3_el7_x86_64  POE

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content