<div dir="ltr"><div><div>Let me also include this:<br><br>bomp_benhchmark_ft 2<br>ERROR: spawnd.0 in elf_allocate() ../lib/spawndomain/arch/x86/spawn_arch.c:165<br>ERROR: lib_err_memobj_pagefault_handler<br>Failure: ( libbarrelfish) Failure in pmap_map() [LIB_ERR_PMAP_MAP]<br>Failure: ( libbarrelfish) Failure in pmap_do_map() [LIB_ERR_PMAP_DO_MAP]<br>Failure: ( libbarrelfish) Failure in get_mapping() [LIB_ERR_PMAP_GET_PTABLE]<br>Failure: ( libbarrelfish) Failure in alloc_vnode() [LIB_ERR_PMAP_ALLOC_VNODE]<br>Failure: ( libbarrelfish) Failure in slot_alloc() [LIB_ERR_SLOT_ALLOC]<br>Failure: ( libbarrelfish) Slot allocator is out of space [LIB_ERR_SLOT_ALLOC_NO_SPACE]<br>ERROR: spawnd.0 in spawn_with_caps_handler() ../usr/spawnd/service.c:352<br>ERROR: spawn<br>Failure: ( spawn) Failure while loading [SPAWN_ERR_LOAD]<br>Failure: ( libelf) Nested failure in allocator function [ELF_ERR_ALLOCATE]<br>Failure: ( libbarrelfish) Failure in memobj_pagefault_handler() [LIB_ERR_MEMOBJ_PAGEFAULT_HANDLER]<br>Failure: ( libbarrelfish) Failure in pmap_map() [LIB_ERR_PMAP_MAP]<br>Failure: ( libbarrelfish) Failure in pmap_do_map() [LIB_ERR_PMAP_DO_MAP]<br>Failure: ( libbarrelfish) Failure in get_mapping() [LIB_ERR_PMAP_GET_PTABLE]<br>bomp_benchmark_ft: error spawning: Failure while loading<br>ERROR: fish.0 in execute_program() ../usr/fish/fish.c:102<br>ERROR: Spawning Error<br><br>Failure: ( spawn) Failure while loading [SPAWN_ERR_LOAD]<br>Failure: ( libelf) Nested failure in allocator function [ELF_ERR_ALLOCATE]<br>Failure: ( libbarrelfish) Failure in memobj_pagefault_handler() [LIB_ERR_MEMOBJ_PAGEFAULT_HANDLER]<br>Failure: ( libbarrelfish) Failure in pmap_map() [LIB_ERR_PMAP_MAP]<br>Failure: ( libbarrelfish) Failure in pmap_do_map() [LIB_ERR_PMAP_DO_MAP]<br>Failure: ( libbarrelfish) Failure in get_mapping() [LIB_ERR_PMAP_GET_PTABLE]<br><br></div>>>> Slot allocator is out of space<br><br></div>ab<br></div><div class="gmail_extra"><br><div class="gmail_quote">On Wed, Nov 5, 2014 at 11:47 AM, Antonio Barbalace <span dir="ltr"><<a href="mailto:antoniob@vt.edu" target="_blank">antoniob@vt.edu</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div>Attached the log and the output of print_cspace.<br><br></div>thanks again for your support,<br>Antonio<br></div><div class="HOEnZb"><div class="h5"><div class="gmail_extra"><br><div class="gmail_quote">On Tue, Nov 4, 2014 at 7:51 AM, Kornilios Kourtis <span dir="ltr"><<a href="mailto:kornilios.kourtis@inf.ethz.ch" target="_blank">kornilios.kourtis@inf.ethz.ch</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span>On Mon, Nov 03, 2014 at 12:56:46PM -0500, Antonio Barbalace wrote:<br>
> Dear all,<br>
><br>
> I am now trying to run the bomp experiments.<br>
><br>
> Just to make some context, I am using a tftp server. bomp_benchmark_ft is<br>
> loaded by the menu.lst/grub (maybe is not the right way to do it). I am<br>
> attaching menu.lst.<br>
><br>
> This is what happen when I am loading bomp_benchmark_ft (also without<br>
> arguments, the same errors are reported during boot):<br>
><br>
> > bomp_benchmark_ft<br>
> cap_copy failed for src_slot = 0, dest_slot = 5<br>
> ERROR: spawnd.0 in spawn_with_caps_handler() ../usr/spawnd/service.c:352<br>
> ERROR: spawn<br>
> Failure: ( spawn) Failure while loading [SPAWN_ERR_LOAD]<br>
> Failure: ( libelf) Nested failure in allocator function<br>
> [ELF_ERR_ALLOCATE]<br>
> Failure: ( libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]<br>
> Failure: ( kernel) Error looking up source capability<br>
> [SYS_ERR_SOURCE_CAP_LOOKUP]<br>
> Failure: ( kernel) Exceeded depth limit of CSpace<br>
> [SYS_ERR_DEPTH_EXCEEDED]<br>
<br>
</span>Grepping for SYS_ERR_DEPTH_EXCEEDED results in:<br>
kernel/capabilities.c-618- // If lookup exceeded expected depth then table is malformed<br>
kernel/capabilities.c-619- if (bits_resolved > vbits) {<br>
kernel/capabilities.c-620- debug(SUBSYS_CAPS, "caps_lookup_slot: Lookup exceeded valid bits\n"<br>
kernel/capabilities.c-621- "Cnode bits = %u, guard size = %u, valid bits = %u\n",<br>
kernel/capabilities.c-622- cnode_cap->u.cnode.bits, cnode_cap->u.cnode.guard_size,<br>
kernel/capabilities.c-623- vbits);<br>
kernel/capabilities.c:624: return SYS_ERR_DEPTH_EXCEEDED;<br>
kernel/capabilities.c-625- }<br>
<br>
I'm wondering whether this has something to do with the patch that you<br>
applied... I'm guessing that using BIOS allocation did not help.<br>
<br>
It might be worth enabling the debug for the caps system. Can you please<br>
replace the corresponding line in menu.lst with:<br>
<br>
module /x86_64/sbin/cpu loglevel=5 logmask=0x40<br>
<br>
And send us the debug messages?<br>
<br>
cheers,<br>
Kornilios.<br>
<div><div><br>
<br>
<br>
> bomp_benchmark_ft: error spawning: Failure while loading<br>
> ERROR: fish.0 in execute_program() ../usr/fish/fish.c:102<br>
> ERROR: Spawning Error<br>
><br>
> Failure: ( spawn) Failure while loading [SPAWN_ERR_LOAD]<br>
> Failure: ( libelf) Nested failure in allocator function<br>
> [ELF_ERR_ALLOCATE]<br>
> Failure: ( libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]<br>
> Failure: ( kernel) Error looking up source capability<br>
> [SYS_ERR_SOURCE_CAP_LOOKUP]<br>
> Failure: ( kernel) Exceeded depth limit of CSpace<br>
> [SYS_ERR_DEPTH_EXCEEDED]<br>
> > bomp_benchmark_ft 0<br>
> cap_copy failed for src_slot = 0, dest_slot = 5<br>
> ERROR: spawnd.0 in spawn_with_caps_handler() ../usr/spawnd/service.c:352<br>
> ERROR: spawn<br>
> Failure: ( spawn) Failure while loading [SPAWN_ERR_LOAD]<br>
> Failure: ( libelf) Nested failure in allocator function<br>
> [ELF_ERR_ALLOCATE]<br>
> Failure: ( libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]<br>
> Failure: ( kernel) Error looking up source capability<br>
> [SYS_ERR_SOURCE_CAP_LOOKUP]<br>
> Failure: ( kernel) Exceeded depth limit of CSpace<br>
> [SYS_ERR_DEPTH_EXCEEDED]<br>
> bomp_benchmark_ft: error spawning: Failure while loading<br>
> ERROR: fish.0 in execute_program() ../usr/fish/fish.c:102<br>
> ERROR: Spawning Error<br>
><br>
> Failure: ( spawn) Failure while loading [SPAWN_ERR_LOAD]<br>
> Failure: ( libelf) Nested failure in allocator function<br>
> [ELF_ERR_ALLOCATE]<br>
> Failure: ( libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]<br>
> Failure: ( kernel) Error looking up source capability<br>
> [SYS_ERR_SOURCE_CAP_LOOKUP]<br>
> Failure: ( kernel) Exceeded depth limit of CSpace<br>
> [SYS_ERR_DEPTH_EXCEEDED]<br>
> > bomp_benchmark_ft 1<br>
> cap_copy failed for src_slot = 0, dest_slot = 5<br>
> ERROR: spawnd.0 in spawn_with_caps_handler() ../usr/spawnd/service.c:352<br>
> ERROR: spawn<br>
> Failure: ( spawn) Failure while loading [SPAWN_ERR_LOAD]<br>
> Failure: ( libelf) Nested failure in allocator function<br>
> [ELF_ERR_ALLOCATE]<br>
> Failure: ( libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]<br>
> Failure: ( kernel) Error looking up source capability<br>
> [SYS_ERR_SOURCE_CAP_LOOKUP]<br>
> Failure: ( kernel) Exceeded depth limit of CSpace<br>
> [SYS_ERR_DEPTH_EXCEEDED]<br>
> bomp_benchmark_ft: error spawning: Failure while loading<br>
> ERROR: fish.0 in execute_program() ../usr/fish/fish.c:102<br>
> ERROR: Spawning Error<br>
><br>
> Failure: ( spawn) Failure while loading [SPAWN_ERR_LOAD]<br>
> Failure: ( libelf) Nested failure in allocator function<br>
> [ELF_ERR_ALLOCATE]<br>
> Failure: ( libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]<br>
> Failure: ( kernel) Error looking up source capability<br>
> [SYS_ERR_SOURCE_CAP_LOOKUP]<br>
> Failure: ( kernel) Exceeded depth limit of CSpace<br>
> [SYS_ERR_DEPTH_EXCEEDED]<br>
> > bomp_benchmark_ft 4<br>
> cap_copy failed for src_slot = 0, dest_slot = 5<br>
> ERROR: spawnd.0 in spawn_with_caps_handler() ../usr/spawnd/service.c:352<br>
> ERROR: spawn<br>
> Failure: ( spawn) Failure while loading [SPAWN_ERR_LOAD]<br>
> Failure: ( libelf) Nested failure in allocator function<br>
> [ELF_ERR_ALLOCATE]<br>
> Failure: ( libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]<br>
> Failure: ( kernel) Error looking up source capability<br>
> [SYS_ERR_SOURCE_CAP_LOOKUP]<br>
> Failure: ( kernel) Exceeded depth limit of CSpace<br>
> [SYS_ERR_DEPTH_EXCEEDED]<br>
> bomp_benchmark_ft: error spawning: Failure while loading<br>
> ERROR: fish.0 in execute_program() ../usr/fish/fish.c:102<br>
> ERROR: Spawning Error<br>
><br>
> Failure: ( spawn) Failure while loading [SPAWN_ERR_LOAD]<br>
> Failure: ( libelf) Nested failure in allocator function<br>
> [ELF_ERR_ALLOCATE]<br>
> Failure: ( libbarrelfish) Failure in cap_copy() [LIB_ERR_CAP_COPY]<br>
> Failure: ( kernel) Error looking up source capability<br>
> [SYS_ERR_SOURCE_CAP_LOOKUP]<br>
> Failure: ( kernel) Exceeded depth limit of CSpace<br>
> [SYS_ERR_DEPTH_EXCEEDED]<br>
><br>
> many thanks,<br>
> Antonio<br>
><br>
><br>
> On Mon, Nov 3, 2014 at 9:58 AM, Antonio Barbalace <<a href="mailto:antoniob@vt.edu" target="_blank">antoniob@vt.edu</a>> wrote:<br>
><br>
> Kornilios, Stefan, Gerd,<br>
><br>
> thank you very much! I am now able to interact with the terminal via the<br>
> serial line. The patch was necessary, note that maxchild is 2 while busnum<br>
> is 4.<br>
><br>
> I am attaching the boot logs as a reference.<br>
><br>
> appreciate your support,<br>
> Antonio<br>
><br>
> On Fri, Oct 31, 2014 at 10:45 AM, Gerd Zellweger <<br>
> <a href="mailto:gerd.zellweger@inf.ethz.ch" target="_blank">gerd.zellweger@inf.ethz.ch</a>> wrote:<br>
><br>
> Hi,<br>
><br>
> Just in case: If changing the bridge program as suggested by Stefan is<br>
> not helping, you can also try this small patch that essentially<br>
> disables the assertion.<br>
> AFAIK that bound check there, which is reported by ACPI seems to be (at<br>
> least on our machines) not really a strict limit and can be ignored.<br>
><br>
> Gerd<br>
><br>
><br>
> On 2014-10-31 14:01, Stefan Kaestle wrote:<br>
><br>
> Hi Antonio,<br>
><br>
> This could be due to a bug in the PCI bus allocation code.<br>
> It is worth trying the BIOS given PCI allocation plan instead. For<br>
> that, try using the following arguments to PCI in menu.lst<br>
><br>
> modulenounzip /harness/sbrinz2_harness/x86_64/sbin/pci auto<br>
> SKB_BRIDGE_PROGRAM=BRIDGE_BIOS<br>
><br>
><br>
> Also, can you please enable PCI debug output and send the log? For<br>
> that, uncomment the following in line 17 of usr/pci/pci_debug.h<br>
> and<br>
> recompile:<br>
><br>
> #define PCI_SERVICE_DEBUG 1<br>
><br>
> Cheers,<br>
> Stefan<br>
><br>
> On 10/31/2014 11:36 AM, Kornilios Kourtis wrote:<br>
><br>
><br>
> Hi Antonio,<br>
><br>
> [CCing the list and Gerd]<br>
><br>
> On Thu, Oct 30, 2014 at 11:29:16AM -0400, Antonio Barbalace<br>
> wrote:<br>
><br>
><br>
> Hi Kornilios,<br>
><br>
> I re-started my adventure with Barrelfish this morning with<br>
> the<br>
> last mercurial<br>
> release. I am using tftpboot PXE boot (modified grub etc.).<br>
> I kept<br>
> myself from<br>
> modify the code at the moment. But I have to confess that I<br>
> added<br>
> a PCI_DEBUG()<br>
> before this error and nothing was printed even changing the<br>
> loglevel= . Let me<br>
> know if you prefer me to send this error on the forum.<br>
><br>
> monitor: synchronizing clocks<br>
> Kaluga: pci_root_bridge<br>
> spawnd.0: spawning /x86_64/sbin/pci on core 0<br>
> Kaluga: pci_devices<br>
> pci: Unknown commandline option "auto" -- skipping.<br>
> startd.0: starting app /x86_64/sbin/serial on core 0<br>
> spawnd.0: spawning /x86_64/sbin/serial on core 0<br>
> startd.0: starting app /x86_64/sbin/angler on core 0<br>
> spawnd.0: spawning /x86_64/sbin/angler on core 0<br>
> No bootscript<br>
> skb.0: waiting for: pci<br>
> skb.0: waiting for: serial0.terminal<br>
> assertion "*busnum <= maxchild" failed: file "../usr/pci/<br>
> pci.c",<br>
> line 598,<br>
> function: assign_bus_numbers<br>
> Aborted<br>
> Spawnd up.<br>
><br>
><br>
> Sounds like a problem Gerd has been dealing with. If that's the<br>
> case, we<br>
> might have a quick-fix for it. Gerd?<br>
><br>
> cheers,<br>
> Kornilios.<br>
><br>
><br>
> --<br>
> Stefan<br>
> <a href="http://people.inf.ethz.ch/skaestle/" target="_blank">http://people.inf.ethz.ch/skaestle/</a> [1]<br>
><br>
><br>
> Links:<br>
> ------<br>
> [1] <a href="http://people.inf.ethz.ch/skaestle/" target="_blank">http://people.inf.ethz.ch/skaestle/</a><br>
><br>
> _______________________________________________<br>
> Barrelfish-users mailing list<br>
> <a href="mailto:Barrelfish-users@lists.inf.ethz.ch" target="_blank">Barrelfish-users@lists.inf.ethz.ch</a><br>
> <a href="https://lists.inf.ethz.ch/mailman/listinfo/barrelfish-users" target="_blank">https://lists.inf.ethz.ch/mailman/listinfo/barrelfish-users</a><br>
><br>
><br>
> _______________________________________________<br>
> Barrelfish-users mailing list<br>
> <a href="mailto:Barrelfish-users@lists.inf.ethz.ch" target="_blank">Barrelfish-users@lists.inf.ethz.ch</a><br>
> <a href="https://lists.inf.ethz.ch/mailman/listinfo/barrelfish-users" target="_blank">https://lists.inf.ethz.ch/mailman/listinfo/barrelfish-users</a><br>
><br>
><br>
><br>
><br>
><br>
> --<br>
> Dr. Eng. Antonio Barbalace, PhD<br>
> Systems Software Research Group (SSRG)<br>
> Bradley Department of Electrical and Computer Engineering<br>
> Virginia Tech<br>
> 453 Durham Hall (0111)<br>
> Blacksburg, VA 24061<br>
> phone: <a href="tel:%2B1%20%28540%29%20231-2494" value="+15402312494" target="_blank">+1 (540) 231-2494</a><br>
> email: <a href="mailto:antoniob@vt.edu" target="_blank">antoniob@vt.edu</a><br>
><br>
><br>
><br>
><br>
> --<br>
> Dr. Eng. Antonio Barbalace, PhD<br>
> Systems Software Research Group (SSRG)<br>
> Bradley Department of Electrical and Computer Engineering<br>
> Virginia Tech<br>
> 453 Durham Hall (0111)<br>
> Blacksburg, VA 24061<br>
> phone: <a href="tel:%2B1%20%28540%29%20231-2494" value="+15402312494" target="_blank">+1 (540) 231-2494</a><br>
> email: <a href="mailto:antoniob@vt.edu" target="_blank">antoniob@vt.edu</a><br>
<br>
<br>
<br>
> _______________________________________________<br>
> Barrelfish-users mailing list<br>
> <a href="mailto:Barrelfish-users@lists.inf.ethz.ch" target="_blank">Barrelfish-users@lists.inf.ethz.ch</a><br>
> <a href="https://lists.inf.ethz.ch/mailman/listinfo/barrelfish-users" target="_blank">https://lists.inf.ethz.ch/mailman/listinfo/barrelfish-users</a><br>
<br>
<br>
--<br>
</div></div><span><font color="#888888">Kornilios Kourtis<br>
</font></span></blockquote></div><br><br clear="all"><br>-- <br><div>Dr. Eng. Antonio Barbalace, PhD<br>Systems Software Research Group (SSRG)<br>Bradley Department of Electrical and Computer Engineering<br>Virginia Tech<br>453 Durham Hall (0111)<br>Blacksburg, VA 24061<br>phone: <a href="tel:%2B1%20%28540%29%20231-2494" value="+15402312494" target="_blank">+1 (540) 231-2494</a><br>email: <a href="mailto:antoniob@vt.edu" target="_blank">antoniob@vt.edu</a></div>
</div>
</div></div></blockquote></div><br><br clear="all"><br>-- <br><div class="gmail_signature">Dr. Eng. Antonio Barbalace, PhD<br>Systems Software Research Group (SSRG)<br>Bradley Department of Electrical and Computer Engineering<br>Virginia Tech<br>453 Durham Hall (0111)<br>Blacksburg, VA 24061<br>phone: +1 (540) 231-2494<br>email: <a href="mailto:antoniob@vt.edu" target="_blank">antoniob@vt.edu</a></div>
</div>