From owner-freebsd-fs@FreeBSD.ORG Mon Nov 8 15:05:05 2010 Return-Path: Delivered-To: freebsd-fs@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id D93851065697; Mon, 8 Nov 2010 15:05:05 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from cyrus.watson.org (cyrus.watson.org [65.122.17.42]) by mx1.freebsd.org (Postfix) with ESMTP id A67D68FC1D; Mon, 8 Nov 2010 15:05:05 +0000 (UTC) Received: from bigwig.baldwin.cx (66.111.2.69.static.nyinternet.net [66.111.2.69]) by cyrus.watson.org (Postfix) with ESMTPSA id 590B446B06; Mon, 8 Nov 2010 10:05:05 -0500 (EST) Received: from jhbbsd.localnet (smtp.hudson-trading.com [209.249.190.9]) by bigwig.baldwin.cx (Postfix) with ESMTPSA id 85A328A029; Mon, 8 Nov 2010 10:05:04 -0500 (EST) From: John Baldwin To: freebsd-current@freebsd.org Date: Mon, 8 Nov 2010 09:42:41 -0500 User-Agent: KMail/1.13.5 (FreeBSD/7.3-CBSD-20100819; KDE/4.4.5; amd64; ; ) References: <4CD7C8FC.900@icyb.net.ua> In-Reply-To: MIME-Version: 1.0 Content-Type: Text/Plain; charset="utf-8" Content-Transfer-Encoding: 7bit Message-Id: <201011080942.41546.jhb@freebsd.org> X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.2.6 (bigwig.baldwin.cx); Mon, 08 Nov 2010 10:05:04 -0500 (EST) X-Virus-Scanned: clamav-milter 0.96.3 at bigwig.baldwin.cx X-Virus-Status: Clean X-Spam-Status: No, score=-1.9 required=4.2 tests=BAYES_00 autolearn=ham version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on bigwig.baldwin.cx Cc: freebsd-fs@freebsd.org, Ivan Voras Subject: Re: another fuse panic X-BeenThere: freebsd-fs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Filesystems List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 08 Nov 2010 15:05:06 -0000 On Monday, November 08, 2010 6:35:55 am Ivan Voras wrote: > On 11/08/10 10:55, Andriy Gapon wrote: > > > > JFYI. > > Fatal trap 12: page fault while in kernel mode > > Can you find any set of circumstances which make this repeatable? > > This panic apparently goes like this: > > 1) used by devfs_open(): > 47 static struct cdevsw fuse_cdevsw = { > 48 .d_open = fusedev_open, > > 2) in fusedev_open(): > 119 fdata = fdata_alloc(dev, td->td_ucred); > > 3) in fdata_alloc(): > 297 data->daemoncred = crhold(cred); > > in other words, td->td_ucred from td passed to fusedev_open (presumably > when the device is opened from the userland) appears to be NULL. > > I don't know if there is any normal set of circumstances under which > this is expected. No, td_ucred should never be NULL. -- John Baldwin