[Barrelfish-users] barrelfish help!

Antonio Barbalace antoniob at vt.edu
Wed Nov 5 17:47:21 CET 2014


Attached the log and the output of print_cspace.

thanks again for your support,
Antonio

On Tue, Nov 4, 2014 at 7:51 AM, Kornilios Kourtis <
kornilios.kourtis at inf.ethz.ch> wrote:

> On Mon, Nov 03, 2014 at 12:56:46PM -0500, Antonio Barbalace wrote:
> > Dear all,
> >
> > I am now trying to run the bomp experiments.
> >
> > Just to make some context, I am using a tftp server. bomp_benchmark_ft is
> > loaded by the menu.lst/grub (maybe is not the right way to do it). I am
> > attaching menu.lst.
> >
> > This is what happen when I am loading bomp_benchmark_ft (also without
> > arguments, the same errors are reported during boot):
> >
> > > bomp_benchmark_ft
> > cap_copy failed for src_slot = 0, dest_slot = 5
> > ERROR: spawnd.0 in spawn_with_caps_handler() ../usr/spawnd/service.c:352
> > ERROR: spawn
> > Failure: (          spawn) Failure while loading [SPAWN_ERR_LOAD]
> > Failure: (         libelf) Nested failure in allocator function
> > [ELF_ERR_ALLOCATE]
> > Failure: (  libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]
> > Failure: (         kernel) Error looking up source capability
> > [SYS_ERR_SOURCE_CAP_LOOKUP]
> > Failure: (         kernel) Exceeded depth limit of CSpace
> > [SYS_ERR_DEPTH_EXCEEDED]
>
> Grepping for SYS_ERR_DEPTH_EXCEEDED results in:
> kernel/capabilities.c-618-    // If lookup exceeded expected depth then
> table is malformed
> kernel/capabilities.c-619-    if (bits_resolved > vbits) {
> kernel/capabilities.c-620-        debug(SUBSYS_CAPS, "caps_lookup_slot:
> Lookup exceeded valid bits\n"
> kernel/capabilities.c-621-              "Cnode bits = %u, guard size = %u,
> valid bits = %u\n",
> kernel/capabilities.c-622-              cnode_cap->u.cnode.bits,
> cnode_cap->u.cnode.guard_size,
> kernel/capabilities.c-623-              vbits);
> kernel/capabilities.c:624:        return SYS_ERR_DEPTH_EXCEEDED;
> kernel/capabilities.c-625-    }
>
> I'm wondering whether this has something to do with the patch that you
> applied... I'm guessing that using BIOS allocation did not help.
>
> It might be worth enabling the debug for the caps system. Can you please
> replace the corresponding line in menu.lst with:
>
>  module  /x86_64/sbin/cpu loglevel=5 logmask=0x40
>
> And send us the debug messages?
>
> cheers,
> Kornilios.
>
>
>
> > bomp_benchmark_ft: error spawning: Failure while loading
> > ERROR: fish.0 in execute_program() ../usr/fish/fish.c:102
> > ERROR: Spawning Error
> >
> > Failure: (          spawn) Failure while loading [SPAWN_ERR_LOAD]
> > Failure: (         libelf) Nested failure in allocator function
> > [ELF_ERR_ALLOCATE]
> > Failure: (  libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]
> > Failure: (         kernel) Error looking up source capability
> > [SYS_ERR_SOURCE_CAP_LOOKUP]
> > Failure: (         kernel) Exceeded depth limit of CSpace
> > [SYS_ERR_DEPTH_EXCEEDED]
> > > bomp_benchmark_ft 0
> > cap_copy failed for src_slot = 0, dest_slot = 5
> > ERROR: spawnd.0 in spawn_with_caps_handler() ../usr/spawnd/service.c:352
> > ERROR: spawn
> > Failure: (          spawn) Failure while loading [SPAWN_ERR_LOAD]
> > Failure: (         libelf) Nested failure in allocator function
> > [ELF_ERR_ALLOCATE]
> > Failure: (  libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]
> > Failure: (         kernel) Error looking up source capability
> > [SYS_ERR_SOURCE_CAP_LOOKUP]
> > Failure: (         kernel) Exceeded depth limit of CSpace
> > [SYS_ERR_DEPTH_EXCEEDED]
> > bomp_benchmark_ft: error spawning: Failure while loading
> > ERROR: fish.0 in execute_program() ../usr/fish/fish.c:102
> > ERROR: Spawning Error
> >
> > Failure: (          spawn) Failure while loading [SPAWN_ERR_LOAD]
> > Failure: (         libelf) Nested failure in allocator function
> > [ELF_ERR_ALLOCATE]
> > Failure: (  libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]
> > Failure: (         kernel) Error looking up source capability
> > [SYS_ERR_SOURCE_CAP_LOOKUP]
> > Failure: (         kernel) Exceeded depth limit of CSpace
> > [SYS_ERR_DEPTH_EXCEEDED]
> > > bomp_benchmark_ft 1
> > cap_copy failed for src_slot = 0, dest_slot = 5
> > ERROR: spawnd.0 in spawn_with_caps_handler() ../usr/spawnd/service.c:352
> > ERROR: spawn
> > Failure: (          spawn) Failure while loading [SPAWN_ERR_LOAD]
> > Failure: (         libelf) Nested failure in allocator function
> > [ELF_ERR_ALLOCATE]
> > Failure: (  libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]
> > Failure: (         kernel) Error looking up source capability
> > [SYS_ERR_SOURCE_CAP_LOOKUP]
> > Failure: (         kernel) Exceeded depth limit of CSpace
> > [SYS_ERR_DEPTH_EXCEEDED]
> > bomp_benchmark_ft: error spawning: Failure while loading
> > ERROR: fish.0 in execute_program() ../usr/fish/fish.c:102
> > ERROR: Spawning Error
> >
> > Failure: (          spawn) Failure while loading [SPAWN_ERR_LOAD]
> > Failure: (         libelf) Nested failure in allocator function
> > [ELF_ERR_ALLOCATE]
> > Failure: (  libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]
> > Failure: (         kernel) Error looking up source capability
> > [SYS_ERR_SOURCE_CAP_LOOKUP]
> > Failure: (         kernel) Exceeded depth limit of CSpace
> > [SYS_ERR_DEPTH_EXCEEDED]
> > > bomp_benchmark_ft 4
> > cap_copy failed for src_slot = 0, dest_slot = 5
> > ERROR: spawnd.0 in spawn_with_caps_handler() ../usr/spawnd/service.c:352
> > ERROR: spawn
> > Failure: (          spawn) Failure while loading [SPAWN_ERR_LOAD]
> > Failure: (         libelf) Nested failure in allocator function
> > [ELF_ERR_ALLOCATE]
> > Failure: (  libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]
> > Failure: (         kernel) Error looking up source capability
> > [SYS_ERR_SOURCE_CAP_LOOKUP]
> > Failure: (         kernel) Exceeded depth limit of CSpace
> > [SYS_ERR_DEPTH_EXCEEDED]
> > bomp_benchmark_ft: error spawning: Failure while loading
> > ERROR: fish.0 in execute_program() ../usr/fish/fish.c:102
> > ERROR: Spawning Error
> >
> > Failure: (          spawn) Failure while loading [SPAWN_ERR_LOAD]
> > Failure: (         libelf) Nested failure in allocator function
> > [ELF_ERR_ALLOCATE]
> > Failure: (  libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]
> > Failure: (         kernel) Error looking up source capability
> > [SYS_ERR_SOURCE_CAP_LOOKUP]
> > Failure: (         kernel) Exceeded depth limit of CSpace
> > [SYS_ERR_DEPTH_EXCEEDED]
> >
> > many thanks,
> > Antonio
> >
> >
> > On Mon, Nov 3, 2014 at 9:58 AM, Antonio Barbalace <antoniob at vt.edu>
> wrote:
> >
> >     Kornilios, Stefan, Gerd,
> >
> >     thank you very much! I am now able to interact with the terminal via
> the
> >     serial line. The patch was necessary, note that maxchild is 2 while
> busnum
> >     is 4.
> >
> >     I am attaching the boot logs as a reference.
> >
> >     appreciate your support,
> >     Antonio
> >
> >     On Fri, Oct 31, 2014 at 10:45 AM, Gerd Zellweger <
> >     gerd.zellweger at inf.ethz.ch> wrote:
> >
> >         Hi,
> >
> >         Just in case: If changing the bridge program as suggested by
> Stefan is
> >         not helping, you can also try this small patch that essentially
> >         disables the assertion.
> >         AFAIK that bound check there, which is reported by ACPI seems to
> be (at
> >         least on our machines) not really a strict limit and can be
> ignored.
> >
> >         Gerd
> >
> >
> >         On 2014-10-31 14:01, Stefan Kaestle wrote:
> >
> >             Hi Antonio,
> >
> >              This could be due to a bug in the PCI bus allocation code.
> >              It is worth trying the BIOS given PCI allocation plan
> instead. For
> >             that, try using the following arguments to PCI in menu.lst
> >
> >              modulenounzip /harness/sbrinz2_harness/x86_64/sbin/pci auto
> >             SKB_BRIDGE_PROGRAM=BRIDGE_BIOS
> >
> >
> >              Also, can you please enable PCI debug output and send the
> log? For
> >             that, uncomment the following in line  17 of
> usr/pci/pci_debug.h
> >             and
> >             recompile:
> >
> >              #define PCI_SERVICE_DEBUG 1
> >
> >              Cheers,
> >               Stefan
> >
> >             On 10/31/2014 11:36 AM, Kornilios Kourtis wrote:
> >
> >
> >                 Hi Antonio,
> >
> >                 [CCing the list and Gerd]
> >
> >                 On Thu, Oct 30, 2014 at 11:29:16AM -0400, Antonio
> Barbalace
> >                 wrote:
> >
> >
> >                     Hi Kornilios,
> >
> >                     I re-started my adventure with Barrelfish this
> morning with
> >                     the
> >                     last mercurial
> >                     release. I am using tftpboot PXE boot (modified grub
> etc.).
> >                     I kept
> >                     myself from
> >                     modify the code at the moment. But I have to confess
> that I
> >                     added
> >                     a PCI_DEBUG()
> >                     before this error and nothing was printed even
> changing the
> >                     loglevel= . Let me
> >                     know if you prefer me to send this error on the
> forum.
> >
> >                     monitor: synchronizing clocks
> >                     Kaluga: pci_root_bridge
> >                     spawnd.0: spawning /x86_64/sbin/pci on core 0
> >                     Kaluga: pci_devices
> >                     pci: Unknown commandline option "auto" -- skipping.
> >                     startd.0: starting app /x86_64/sbin/serial on core 0
> >                     spawnd.0: spawning /x86_64/sbin/serial on core 0
> >                     startd.0: starting app /x86_64/sbin/angler on core 0
> >                     spawnd.0: spawning /x86_64/sbin/angler on core 0
> >                     No bootscript
> >                     skb.0: waiting for: pci
> >                     skb.0: waiting for: serial0.terminal
> >                     assertion "*busnum <= maxchild" failed: file
> "../usr/pci/
> >                     pci.c",
> >                     line 598,
> >                     function: assign_bus_numbers
> >                     Aborted
> >                     Spawnd up.
> >
> >
> >                 Sounds like a problem Gerd has been dealing with. If
> that's the
> >                 case, we
> >                 might have a quick-fix for it. Gerd?
> >
> >                 cheers,
> >                 Kornilios.
> >
> >
> >             --
> >             Stefan
> >             http://people.inf.ethz.ch/skaestle/ [1]
> >
> >
> >             Links:
> >             ------
> >             [1] http://people.inf.ethz.ch/skaestle/
> >
> >             _______________________________________________
> >             Barrelfish-users mailing list
> >             Barrelfish-users at lists.inf.ethz.ch
> >             https://lists.inf.ethz.ch/mailman/listinfo/barrelfish-users
> >
> >
> >         _______________________________________________
> >         Barrelfish-users mailing list
> >         Barrelfish-users at lists.inf.ethz.ch
> >         https://lists.inf.ethz.ch/mailman/listinfo/barrelfish-users
> >
> >
> >
> >
> >
> >     --
> >     Dr. Eng. Antonio Barbalace, PhD
> >     Systems Software Research Group (SSRG)
> >     Bradley Department of Electrical and Computer Engineering
> >     Virginia Tech
> >     453 Durham Hall (0111)
> >     Blacksburg, VA 24061
> >     phone: +1 (540) 231-2494
> >     email: antoniob at vt.edu
> >
> >
> >
> >
> > --
> > Dr. Eng. Antonio Barbalace, PhD
> > Systems Software Research Group (SSRG)
> > Bradley Department of Electrical and Computer Engineering
> > Virginia Tech
> > 453 Durham Hall (0111)
> > Blacksburg, VA 24061
> > phone: +1 (540) 231-2494
> > email: antoniob at vt.edu
>
>
>
> > _______________________________________________
> > Barrelfish-users mailing list
> > Barrelfish-users at lists.inf.ethz.ch
> > https://lists.inf.ethz.ch/mailman/listinfo/barrelfish-users
>
>
> --
> Kornilios Kourtis
>



-- 
Dr. Eng. Antonio Barbalace, PhD
Systems Software Research Group (SSRG)
Bradley Department of Electrical and Computer Engineering
Virginia Tech
453 Durham Hall (0111)
Blacksburg, VA 24061
phone: +1 (540) 231-2494
email: antoniob at vt.edu
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.inf.ethz.ch/pipermail/barrelfish-users/attachments/20141105/c53e41f5/attachment-0001.html 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: jojo.bf.log
Type: application/octet-stream
Size: 525003 bytes
Desc: not available
Url : https://lists.inf.ethz.ch/pipermail/barrelfish-users/attachments/20141105/c53e41f5/attachment-0002.obj 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: jojo.bf.print_cspace
Type: application/octet-stream
Size: 7087 bytes
Desc: not available
Url : https://lists.inf.ethz.ch/pipermail/barrelfish-users/attachments/20141105/c53e41f5/attachment-0003.obj 


More information about the Barrelfish-users mailing list