<div dir="ltr"><div><div>Let me also include this:<br><br>bomp_benhchmark_ft 2<br>ERROR: spawnd.0 in elf_allocate() ../lib/spawndomain/arch/x86/spawn_arch.c:165<br>ERROR: lib_err_memobj_pagefault_handler<br>Failure: (  libbarrelfish) Failure in pmap_map() [LIB_ERR_PMAP_MAP]<br>Failure: (  libbarrelfish) Failure in pmap_do_map() [LIB_ERR_PMAP_DO_MAP]<br>Failure: (  libbarrelfish) Failure in get_mapping() [LIB_ERR_PMAP_GET_PTABLE]<br>Failure: (  libbarrelfish) Failure in alloc_vnode() [LIB_ERR_PMAP_ALLOC_VNODE]<br>Failure: (  libbarrelfish) Failure in slot_alloc() [LIB_ERR_SLOT_ALLOC]<br>Failure: (  libbarrelfish) Slot allocator is out of space [LIB_ERR_SLOT_ALLOC_NO_SPACE]<br>ERROR: spawnd.0 in spawn_with_caps_handler() ../usr/spawnd/service.c:352<br>ERROR: spawn<br>Failure: (          spawn) Failure while loading [SPAWN_ERR_LOAD]<br>Failure: (         libelf) Nested failure in allocator function [ELF_ERR_ALLOCATE]<br>Failure: (  libbarrelfish) Failure in memobj_pagefault_handler() [LIB_ERR_MEMOBJ_PAGEFAULT_HANDLER]<br>Failure: (  libbarrelfish) Failure in pmap_map() [LIB_ERR_PMAP_MAP]<br>Failure: (  libbarrelfish) Failure in pmap_do_map() [LIB_ERR_PMAP_DO_MAP]<br>Failure: (  libbarrelfish) Failure in get_mapping() [LIB_ERR_PMAP_GET_PTABLE]<br>bomp_benchmark_ft: error spawning: Failure while loading<br>ERROR: fish.0 in execute_program() ../usr/fish/fish.c:102<br>ERROR: Spawning Error<br><br>Failure: (          spawn) Failure while loading [SPAWN_ERR_LOAD]<br>Failure: (         libelf) Nested failure in allocator function [ELF_ERR_ALLOCATE]<br>Failure: (  libbarrelfish) Failure in memobj_pagefault_handler() [LIB_ERR_MEMOBJ_PAGEFAULT_HANDLER]<br>Failure: (  libbarrelfish) Failure in pmap_map() [LIB_ERR_PMAP_MAP]<br>Failure: (  libbarrelfish) Failure in pmap_do_map() [LIB_ERR_PMAP_DO_MAP]<br>Failure: (  libbarrelfish) Failure in get_mapping() [LIB_ERR_PMAP_GET_PTABLE]<br><br></div>&gt;&gt;&gt; Slot allocator is out of space<br><br></div>ab<br></div><div class="gmail_extra"><br><div class="gmail_quote">On Wed, Nov 5, 2014 at 11:47 AM, Antonio Barbalace <span dir="ltr">&lt;<a href="mailto:antoniob@vt.edu" target="_blank">antoniob@vt.edu</a>&gt;</span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div>Attached the log and the output of print_cspace.<br><br></div>thanks again for your support,<br>Antonio<br></div><div class="HOEnZb"><div class="h5"><div class="gmail_extra"><br><div class="gmail_quote">On Tue, Nov 4, 2014 at 7:51 AM, Kornilios Kourtis <span dir="ltr">&lt;<a href="mailto:kornilios.kourtis@inf.ethz.ch" target="_blank">kornilios.kourtis@inf.ethz.ch</a>&gt;</span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span>On Mon, Nov 03, 2014 at 12:56:46PM -0500, Antonio Barbalace wrote:<br>
&gt; Dear all,<br>
&gt;<br>
&gt; I am now trying to run the bomp experiments.<br>
&gt;<br>
&gt; Just to make some context, I am using a tftp server. bomp_benchmark_ft is<br>
&gt; loaded by the menu.lst/grub (maybe is not the right way to do it). I am<br>
&gt; attaching menu.lst.<br>
&gt;<br>
&gt; This is what happen when I am loading bomp_benchmark_ft (also without<br>
&gt; arguments, the same errors are reported during boot):<br>
&gt;<br>
&gt; &gt; bomp_benchmark_ft<br>
&gt; cap_copy failed for src_slot = 0, dest_slot = 5<br>
&gt; ERROR: spawnd.0 in spawn_with_caps_handler() ../usr/spawnd/service.c:352<br>
&gt; ERROR: spawn<br>
&gt; Failure: (          spawn) Failure while loading [SPAWN_ERR_LOAD]<br>
&gt; Failure: (         libelf) Nested failure in allocator function<br>
&gt; [ELF_ERR_ALLOCATE]<br>
&gt; Failure: (  libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]<br>
&gt; Failure: (         kernel) Error looking up source capability<br>
&gt; [SYS_ERR_SOURCE_CAP_LOOKUP]<br>
&gt; Failure: (         kernel) Exceeded depth limit of CSpace<br>
&gt; [SYS_ERR_DEPTH_EXCEEDED]<br>
<br>
</span>Grepping for SYS_ERR_DEPTH_EXCEEDED results in:<br>
kernel/capabilities.c-618-    // If lookup exceeded expected depth then table is malformed<br>
kernel/capabilities.c-619-    if (bits_resolved &gt; vbits) {<br>
kernel/capabilities.c-620-        debug(SUBSYS_CAPS, &quot;caps_lookup_slot: Lookup exceeded valid bits\n&quot;<br>
kernel/capabilities.c-621-              &quot;Cnode bits = %u, guard size = %u, valid bits = %u\n&quot;,<br>
kernel/capabilities.c-622-              cnode_cap-&gt;u.cnode.bits, cnode_cap-&gt;u.cnode.guard_size,<br>
kernel/capabilities.c-623-              vbits);<br>
kernel/capabilities.c:624:        return SYS_ERR_DEPTH_EXCEEDED;<br>
kernel/capabilities.c-625-    }<br>
<br>
I&#39;m wondering whether this has something to do with the patch that you<br>
applied... I&#39;m guessing that using BIOS allocation did not help.<br>
<br>
It might be worth enabling the debug for the caps system. Can you please<br>
replace the corresponding line in menu.lst with:<br>
<br>
 module  /x86_64/sbin/cpu loglevel=5 logmask=0x40<br>
<br>
And send us the debug messages?<br>
<br>
cheers,<br>
Kornilios.<br>
<div><div><br>
<br>
<br>
&gt; bomp_benchmark_ft: error spawning: Failure while loading<br>
&gt; ERROR: fish.0 in execute_program() ../usr/fish/fish.c:102<br>
&gt; ERROR: Spawning Error<br>
&gt;<br>
&gt; Failure: (          spawn) Failure while loading [SPAWN_ERR_LOAD]<br>
&gt; Failure: (         libelf) Nested failure in allocator function<br>
&gt; [ELF_ERR_ALLOCATE]<br>
&gt; Failure: (  libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]<br>
&gt; Failure: (         kernel) Error looking up source capability<br>
&gt; [SYS_ERR_SOURCE_CAP_LOOKUP]<br>
&gt; Failure: (         kernel) Exceeded depth limit of CSpace<br>
&gt; [SYS_ERR_DEPTH_EXCEEDED]<br>
&gt; &gt; bomp_benchmark_ft 0<br>
&gt; cap_copy failed for src_slot = 0, dest_slot = 5<br>
&gt; ERROR: spawnd.0 in spawn_with_caps_handler() ../usr/spawnd/service.c:352<br>
&gt; ERROR: spawn<br>
&gt; Failure: (          spawn) Failure while loading [SPAWN_ERR_LOAD]<br>
&gt; Failure: (         libelf) Nested failure in allocator function<br>
&gt; [ELF_ERR_ALLOCATE]<br>
&gt; Failure: (  libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]<br>
&gt; Failure: (         kernel) Error looking up source capability<br>
&gt; [SYS_ERR_SOURCE_CAP_LOOKUP]<br>
&gt; Failure: (         kernel) Exceeded depth limit of CSpace<br>
&gt; [SYS_ERR_DEPTH_EXCEEDED]<br>
&gt; bomp_benchmark_ft: error spawning: Failure while loading<br>
&gt; ERROR: fish.0 in execute_program() ../usr/fish/fish.c:102<br>
&gt; ERROR: Spawning Error<br>
&gt;<br>
&gt; Failure: (          spawn) Failure while loading [SPAWN_ERR_LOAD]<br>
&gt; Failure: (         libelf) Nested failure in allocator function<br>
&gt; [ELF_ERR_ALLOCATE]<br>
&gt; Failure: (  libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]<br>
&gt; Failure: (         kernel) Error looking up source capability<br>
&gt; [SYS_ERR_SOURCE_CAP_LOOKUP]<br>
&gt; Failure: (         kernel) Exceeded depth limit of CSpace<br>
&gt; [SYS_ERR_DEPTH_EXCEEDED]<br>
&gt; &gt; bomp_benchmark_ft 1<br>
&gt; cap_copy failed for src_slot = 0, dest_slot = 5<br>
&gt; ERROR: spawnd.0 in spawn_with_caps_handler() ../usr/spawnd/service.c:352<br>
&gt; ERROR: spawn<br>
&gt; Failure: (          spawn) Failure while loading [SPAWN_ERR_LOAD]<br>
&gt; Failure: (         libelf) Nested failure in allocator function<br>
&gt; [ELF_ERR_ALLOCATE]<br>
&gt; Failure: (  libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]<br>
&gt; Failure: (         kernel) Error looking up source capability<br>
&gt; [SYS_ERR_SOURCE_CAP_LOOKUP]<br>
&gt; Failure: (         kernel) Exceeded depth limit of CSpace<br>
&gt; [SYS_ERR_DEPTH_EXCEEDED]<br>
&gt; bomp_benchmark_ft: error spawning: Failure while loading<br>
&gt; ERROR: fish.0 in execute_program() ../usr/fish/fish.c:102<br>
&gt; ERROR: Spawning Error<br>
&gt;<br>
&gt; Failure: (          spawn) Failure while loading [SPAWN_ERR_LOAD]<br>
&gt; Failure: (         libelf) Nested failure in allocator function<br>
&gt; [ELF_ERR_ALLOCATE]<br>
&gt; Failure: (  libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]<br>
&gt; Failure: (         kernel) Error looking up source capability<br>
&gt; [SYS_ERR_SOURCE_CAP_LOOKUP]<br>
&gt; Failure: (         kernel) Exceeded depth limit of CSpace<br>
&gt; [SYS_ERR_DEPTH_EXCEEDED]<br>
&gt; &gt; bomp_benchmark_ft 4<br>
&gt; cap_copy failed for src_slot = 0, dest_slot = 5<br>
&gt; ERROR: spawnd.0 in spawn_with_caps_handler() ../usr/spawnd/service.c:352<br>
&gt; ERROR: spawn<br>
&gt; Failure: (          spawn) Failure while loading [SPAWN_ERR_LOAD]<br>
&gt; Failure: (         libelf) Nested failure in allocator function<br>
&gt; [ELF_ERR_ALLOCATE]<br>
&gt; Failure: (  libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]<br>
&gt; Failure: (         kernel) Error looking up source capability<br>
&gt; [SYS_ERR_SOURCE_CAP_LOOKUP]<br>
&gt; Failure: (         kernel) Exceeded depth limit of CSpace<br>
&gt; [SYS_ERR_DEPTH_EXCEEDED]<br>
&gt; bomp_benchmark_ft: error spawning: Failure while loading<br>
&gt; ERROR: fish.0 in execute_program() ../usr/fish/fish.c:102<br>
&gt; ERROR: Spawning Error<br>
&gt;<br>
&gt; Failure: (          spawn) Failure while loading [SPAWN_ERR_LOAD]<br>
&gt; Failure: (         libelf) Nested failure in allocator function<br>
&gt; [ELF_ERR_ALLOCATE]<br>
&gt; Failure: (  libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]<br>
&gt; Failure: (         kernel) Error looking up source capability<br>
&gt; [SYS_ERR_SOURCE_CAP_LOOKUP]<br>
&gt; Failure: (         kernel) Exceeded depth limit of CSpace<br>
&gt; [SYS_ERR_DEPTH_EXCEEDED]<br>
&gt;<br>
&gt; many thanks,<br>
&gt; Antonio<br>
&gt;<br>
&gt;<br>
&gt; On Mon, Nov 3, 2014 at 9:58 AM, Antonio Barbalace &lt;<a href="mailto:antoniob@vt.edu" target="_blank">antoniob@vt.edu</a>&gt; wrote:<br>
&gt;<br>
&gt;     Kornilios, Stefan, Gerd,<br>
&gt;<br>
&gt;     thank you very much! I am now able to interact with the terminal via the<br>
&gt;     serial line. The patch was necessary, note that maxchild is 2 while busnum<br>
&gt;     is 4.<br>
&gt;<br>
&gt;     I am attaching the boot logs as a reference.<br>
&gt;<br>
&gt;     appreciate your support,<br>
&gt;     Antonio<br>
&gt;<br>
&gt;     On Fri, Oct 31, 2014 at 10:45 AM, Gerd Zellweger &lt;<br>
&gt;     <a href="mailto:gerd.zellweger@inf.ethz.ch" target="_blank">gerd.zellweger@inf.ethz.ch</a>&gt; wrote:<br>
&gt;<br>
&gt;         Hi,<br>
&gt;<br>
&gt;         Just in case: If changing the bridge program as suggested by Stefan is<br>
&gt;         not helping, you can also try this small patch that essentially<br>
&gt;         disables the assertion.<br>
&gt;         AFAIK that bound check there, which is reported by ACPI seems to be (at<br>
&gt;         least on our machines) not really a strict limit and can be ignored.<br>
&gt;<br>
&gt;         Gerd<br>
&gt;<br>
&gt;<br>
&gt;         On 2014-10-31 14:01, Stefan Kaestle wrote:<br>
&gt;<br>
&gt;             Hi Antonio,<br>
&gt;<br>
&gt;              This could be due to a bug in the PCI bus allocation code.<br>
&gt;              It is worth trying the BIOS given PCI allocation plan instead. For<br>
&gt;             that, try using the following arguments to PCI in menu.lst<br>
&gt;<br>
&gt;              modulenounzip /harness/sbrinz2_harness/x86_64/sbin/pci auto<br>
&gt;             SKB_BRIDGE_PROGRAM=BRIDGE_BIOS<br>
&gt;<br>
&gt;<br>
&gt;              Also, can you please enable PCI debug output and send the log? For<br>
&gt;             that, uncomment the following in line  17 of usr/pci/pci_debug.h<br>
&gt;             and<br>
&gt;             recompile:<br>
&gt;<br>
&gt;              #define PCI_SERVICE_DEBUG 1<br>
&gt;<br>
&gt;              Cheers,<br>
&gt;               Stefan<br>
&gt;<br>
&gt;             On 10/31/2014 11:36 AM, Kornilios Kourtis wrote:<br>
&gt;<br>
&gt;<br>
&gt;                 Hi Antonio,<br>
&gt;<br>
&gt;                 [CCing the list and Gerd]<br>
&gt;<br>
&gt;                 On Thu, Oct 30, 2014 at 11:29:16AM -0400, Antonio Barbalace<br>
&gt;                 wrote:<br>
&gt;<br>
&gt;<br>
&gt;                     Hi Kornilios,<br>
&gt;<br>
&gt;                     I re-started my adventure with Barrelfish this morning with<br>
&gt;                     the<br>
&gt;                     last mercurial<br>
&gt;                     release. I am using tftpboot PXE boot (modified grub etc.).<br>
&gt;                     I kept<br>
&gt;                     myself from<br>
&gt;                     modify the code at the moment. But I have to confess that I<br>
&gt;                     added<br>
&gt;                     a PCI_DEBUG()<br>
&gt;                     before this error and nothing was printed even changing the<br>
&gt;                     loglevel= . Let me<br>
&gt;                     know if you prefer me to send this error on the forum.<br>
&gt;<br>
&gt;                     monitor: synchronizing clocks<br>
&gt;                     Kaluga: pci_root_bridge<br>
&gt;                     spawnd.0: spawning /x86_64/sbin/pci on core 0<br>
&gt;                     Kaluga: pci_devices<br>
&gt;                     pci: Unknown commandline option &quot;auto&quot; -- skipping.<br>
&gt;                     startd.0: starting app /x86_64/sbin/serial on core 0<br>
&gt;                     spawnd.0: spawning /x86_64/sbin/serial on core 0<br>
&gt;                     startd.0: starting app /x86_64/sbin/angler on core 0<br>
&gt;                     spawnd.0: spawning /x86_64/sbin/angler on core 0<br>
&gt;                     No bootscript<br>
&gt;                     skb.0: waiting for: pci<br>
&gt;                     skb.0: waiting for: serial0.terminal<br>
&gt;                     assertion &quot;*busnum &lt;= maxchild&quot; failed: file &quot;../usr/pci/<br>
&gt;                     pci.c&quot;,<br>
&gt;                     line 598,<br>
&gt;                     function: assign_bus_numbers<br>
&gt;                     Aborted<br>
&gt;                     Spawnd up.<br>
&gt;<br>
&gt;<br>
&gt;                 Sounds like a problem Gerd has been dealing with. If that&#39;s the<br>
&gt;                 case, we<br>
&gt;                 might have a quick-fix for it. Gerd?<br>
&gt;<br>
&gt;                 cheers,<br>
&gt;                 Kornilios.<br>
&gt;<br>
&gt;<br>
&gt;             --<br>
&gt;             Stefan<br>
&gt;             <a href="http://people.inf.ethz.ch/skaestle/" target="_blank">http://people.inf.ethz.ch/skaestle/</a> [1]<br>
&gt;<br>
&gt;<br>
&gt;             Links:<br>
&gt;             ------<br>
&gt;             [1] <a href="http://people.inf.ethz.ch/skaestle/" target="_blank">http://people.inf.ethz.ch/skaestle/</a><br>
&gt;<br>
&gt;             _______________________________________________<br>
&gt;             Barrelfish-users mailing list<br>
&gt;             <a href="mailto:Barrelfish-users@lists.inf.ethz.ch" target="_blank">Barrelfish-users@lists.inf.ethz.ch</a><br>
&gt;             <a href="https://lists.inf.ethz.ch/mailman/listinfo/barrelfish-users" target="_blank">https://lists.inf.ethz.ch/mailman/listinfo/barrelfish-users</a><br>
&gt;<br>
&gt;<br>
&gt;         _______________________________________________<br>
&gt;         Barrelfish-users mailing list<br>
&gt;         <a href="mailto:Barrelfish-users@lists.inf.ethz.ch" target="_blank">Barrelfish-users@lists.inf.ethz.ch</a><br>
&gt;         <a href="https://lists.inf.ethz.ch/mailman/listinfo/barrelfish-users" target="_blank">https://lists.inf.ethz.ch/mailman/listinfo/barrelfish-users</a><br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;     --<br>
&gt;     Dr. Eng. Antonio Barbalace, PhD<br>
&gt;     Systems Software Research Group (SSRG)<br>
&gt;     Bradley Department of Electrical and Computer Engineering<br>
&gt;     Virginia Tech<br>
&gt;     453 Durham Hall (0111)<br>
&gt;     Blacksburg, VA 24061<br>
&gt;     phone: <a href="tel:%2B1%20%28540%29%20231-2494" value="+15402312494" target="_blank">+1 (540) 231-2494</a><br>
&gt;     email: <a href="mailto:antoniob@vt.edu" target="_blank">antoniob@vt.edu</a><br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt; --<br>
&gt; Dr. Eng. Antonio Barbalace, PhD<br>
&gt; Systems Software Research Group (SSRG)<br>
&gt; Bradley Department of Electrical and Computer Engineering<br>
&gt; Virginia Tech<br>
&gt; 453 Durham Hall (0111)<br>
&gt; Blacksburg, VA 24061<br>
&gt; phone: <a href="tel:%2B1%20%28540%29%20231-2494" value="+15402312494" target="_blank">+1 (540) 231-2494</a><br>
&gt; email: <a href="mailto:antoniob@vt.edu" target="_blank">antoniob@vt.edu</a><br>
<br>
<br>
<br>
&gt; _______________________________________________<br>
&gt; Barrelfish-users mailing list<br>
&gt; <a href="mailto:Barrelfish-users@lists.inf.ethz.ch" target="_blank">Barrelfish-users@lists.inf.ethz.ch</a><br>
&gt; <a href="https://lists.inf.ethz.ch/mailman/listinfo/barrelfish-users" target="_blank">https://lists.inf.ethz.ch/mailman/listinfo/barrelfish-users</a><br>
<br>
<br>
--<br>
</div></div><span><font color="#888888">Kornilios Kourtis<br>
</font></span></blockquote></div><br><br clear="all"><br>-- <br><div>Dr. Eng. Antonio Barbalace, PhD<br>Systems Software Research Group (SSRG)<br>Bradley Department of Electrical and Computer Engineering<br>Virginia Tech<br>453 Durham Hall (0111)<br>Blacksburg, VA 24061<br>phone: <a href="tel:%2B1%20%28540%29%20231-2494" value="+15402312494" target="_blank">+1 (540) 231-2494</a><br>email: <a href="mailto:antoniob@vt.edu" target="_blank">antoniob@vt.edu</a></div>
</div>
</div></div></blockquote></div><br><br clear="all"><br>-- <br><div class="gmail_signature">Dr. Eng. Antonio Barbalace, PhD<br>Systems Software Research Group (SSRG)<br>Bradley Department of Electrical and Computer Engineering<br>Virginia Tech<br>453 Durham Hall (0111)<br>Blacksburg, VA 24061<br>phone: +1 (540) 231-2494<br>email: <a href="mailto:antoniob@vt.edu" target="_blank">antoniob@vt.edu</a></div>
</div>