Hide Forgot
Steps to reproduce: 1) lvcreate --type raid1 -m 1 -L 500M -n lv vg 2) dmsetup suspend vg-lv 3) dmsetup resume vg-lv ** KERNEL OPPS ** It may be necessary to repeat steps 2 & 3.
I managed to reproduce the bug. In function bitmap_daemon_work, just after the "/* skip this page unless it's marked as needing cleaning */" comment, page is a wild pointer, pointing to 0x0000006f0000006f. This should be forwarded to the developers of md subsystem, because they have best knowledge of their code.
Created attachment 559583 [details] my crashlog. The kernel is 2.6.32-220.4.1.el6.x86_64
Missed this bug when creating bug 789409. That bug has all the acks already and i've described the patch I sent upstream there. *** This bug has been marked as a duplicate of bug 789409 ***