Re: [devel] [users] On starting OpenSAF system is crashing

2019-02-15 Thread nagendra
Hi Darshan,
Please share the configuration commands(./configure --enable-tipc and other 
options you passed), configuration details, steps to start, output of syslog 
after you start OpenSAF.
 
Best of my guess is that OpenSAF maybe rebooting the system because of IP 
address mismatch between configuration in dtmd.conf and the IP address of the 
interface in TCP as transport.
 

 
 
Thanks,
Nagendra, 91-9866424860
High Availability Solutions Pvt. Ltd. (www.hasolutions.in)
- OpenSAF Support and Services
 
 
 
 
 
 
 
- Original Message - Subject: [users] On starting OpenSAF 
system is crashing
From: "Darshan" 
Date: 2/16/19 12:16 pm
To: "opensaf-users" , "opensaf-devel" 


Hi all,
 
 I installed opensaf-5.19.01 in ubuntu14.4, 64-bit system by following 
 the steps in README, i tried running OpenSAF by "sudo 
 /etc/init.d/opensafd start". In few seconds my pc is crashing, i tried 
 this several times even by reinstalling OpenSAF, i'm unable to resolve. 
 Can someone please help me with this.
 
 -- 
 Regards,
 Darshan
 
 
 
 ___
 Opensaf-users mailing list
 opensaf-us...@lists.sourceforge.net
 https://lists.sourceforge.net/lists/listinfo/opensaf-users

___
Opensaf-devel mailing list
Opensaf-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/opensaf-devel


Re: [devel] [PATCH 1/1] osaf: Call opensaf_quick_reboot if failed to set active role in consensus [#3001]

2019-02-15 Thread Hans Nordebäck
Hi Minh,

ack, review only/Thanks HansN

On 2/15/19 10:51, Minh Chau wrote:
> ---
>   src/fm/fmd/fm_rda.cc | 4 ++--
>   src/rde/rded/rde_main.cc | 8 +++-
>   src/rde/rded/role.cc | 8 
>   3 files changed, 9 insertions(+), 11 deletions(-)
>
> diff --git a/src/fm/fmd/fm_rda.cc b/src/fm/fmd/fm_rda.cc
> index 028bfa3..0aa5a3d 100644
> --- a/src/fm/fmd/fm_rda.cc
> +++ b/src/fm/fmd/fm_rda.cc
> @@ -97,8 +97,8 @@ uint32_t fm_rda_set_role(FM_CB *fm_cb, PCS_RDA_ROLE role) {
>   rc = consensus_service.PromoteThisNode(true, fm_cb->cluster_size);
>   if (rc != SA_AIS_OK && rc != SA_AIS_ERR_EXIST) {
> LOG_ER("Unable to set active controller in consensus service");
> -  opensaf_reboot(0, nullptr,
> - "Unable to set active controller in consensus service");
> +  opensaf_quick_reboot("Unable to set active controller"
> +  "in consensus service");
>   } else if (rc == SA_AIS_ERR_EXIST) {
> // @todo if we don't reboot, we don't seem to recover from this. Can 
> we
> // improve?
> diff --git a/src/rde/rded/rde_main.cc b/src/rde/rded/rde_main.cc
> index bb17133..3487f0b 100644
> --- a/src/rde/rded/rde_main.cc
> +++ b/src/rde/rded/rde_main.cc
> @@ -203,9 +203,8 @@ static void handle_mbx_event() {
>   if (state == Consensus::TakeoverState::ACCEPTED) {
> LOG_NO("Accepted takeover request");
> if (consensus_service.IsRemoteFencingEnabled() == false) {
> -opensaf_reboot(0, nullptr,
> -   "Another controller is taking over the active 
> role. "
> -   "Rebooting this node");
> +opensaf_quick_reboot("Another controller is taking over"
> +"the active role. Rebooting this node");
> }
>   } else if (state == Consensus::TakeoverState::UNDEFINED) {
> bool fencing_required = true;
> @@ -233,8 +232,7 @@ static void handle_mbx_event() {
> if (fencing_required == true) {
>   LOG_NO("Lost connectivity to consensus service");
>   if (consensus_service.IsRemoteFencingEnabled() == false) {
> -opensaf_reboot(0, nullptr,
> -   "Lost connectivity to consensus service. "
> +opensaf_quick_reboot("Lost connectivity to consensus 
> service. "
>  "Rebooting this node");
>   }
> }
> diff --git a/src/rde/rded/role.cc b/src/rde/rded/role.cc
> index 499f7c8..b2b9b49 100644
> --- a/src/rde/rded/role.cc
> +++ b/src/rde/rded/role.cc
> @@ -112,8 +112,8 @@ void Role::PromoteNode(const uint64_t cluster_size,
>   promotion_pending = true;
> } else if (rc != SA_AIS_OK) {
>   LOG_ER("Unable to set active controller in consensus service");
> -opensaf_reboot(0, nullptr,
> -   "Unable to set active controller in consensus service");
> +opensaf_quick_reboot("Unable to set active controller"
> +"in consensus service");
> }
>   
> RDE_CONTROL_BLOCK* cb = rde_get_control_block();
> @@ -133,8 +133,8 @@ void Role::PromoteNode(const uint64_t cluster_size,
> rc = consensus_service.PromoteThisNode(true, cluster_size);
> if (rc == SA_AIS_ERR_EXIST) {
>   LOG_ER("Unable to set active controller in consensus service");
> -opensaf_reboot(0, nullptr,
> -   "Unable to set active controller in consensus 
> service");
> +opensaf_quick_reboot("Unable to set active controller in"
> +"consensus service");
> }
> std::this_thread::sleep_for(std::chrono::seconds(1));
>   }

___
Opensaf-devel mailing list
Opensaf-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/opensaf-devel


Re: [devel] [PATCH 1/1] osaf: Call opensaf_quick_reboot if failed to set active role in consensus [#3001]

2019-02-15 Thread Gary Lee
Ack, review only.

> On 15 Feb 2019, at 5:51 pm, Minh Chau  wrote:
> 
> ---
> src/fm/fmd/fm_rda.cc | 4 ++--
> src/rde/rded/rde_main.cc | 8 +++-
> src/rde/rded/role.cc | 8 
> 3 files changed, 9 insertions(+), 11 deletions(-)
> 
> diff --git a/src/fm/fmd/fm_rda.cc b/src/fm/fmd/fm_rda.cc
> index 028bfa3..0aa5a3d 100644
> --- a/src/fm/fmd/fm_rda.cc
> +++ b/src/fm/fmd/fm_rda.cc
> @@ -97,8 +97,8 @@ uint32_t fm_rda_set_role(FM_CB *fm_cb, PCS_RDA_ROLE role) {
> rc = consensus_service.PromoteThisNode(true, fm_cb->cluster_size);
> if (rc != SA_AIS_OK && rc != SA_AIS_ERR_EXIST) {
>   LOG_ER("Unable to set active controller in consensus service");
> -  opensaf_reboot(0, nullptr,
> - "Unable to set active controller in consensus service");
> +  opensaf_quick_reboot("Unable to set active controller"
> +  "in consensus service");
> } else if (rc == SA_AIS_ERR_EXIST) {
>   // @todo if we don't reboot, we don't seem to recover from this. Can we
>   // improve?
> diff --git a/src/rde/rded/rde_main.cc b/src/rde/rded/rde_main.cc
> index bb17133..3487f0b 100644
> --- a/src/rde/rded/rde_main.cc
> +++ b/src/rde/rded/rde_main.cc
> @@ -203,9 +203,8 @@ static void handle_mbx_event() {
> if (state == Consensus::TakeoverState::ACCEPTED) {
>   LOG_NO("Accepted takeover request");
>   if (consensus_service.IsRemoteFencingEnabled() == false) {
> -opensaf_reboot(0, nullptr,
> -   "Another controller is taking over the active 
> role. "
> -   "Rebooting this node");
> +opensaf_quick_reboot("Another controller is taking over"
> +"the active role. Rebooting this node");
>   }
> } else if (state == Consensus::TakeoverState::UNDEFINED) {
>   bool fencing_required = true;
> @@ -233,8 +232,7 @@ static void handle_mbx_event() {
>   if (fencing_required == true) {
> LOG_NO("Lost connectivity to consensus service");
> if (consensus_service.IsRemoteFencingEnabled() == false) {
> -opensaf_reboot(0, nullptr,
> -   "Lost connectivity to consensus service. "
> +opensaf_quick_reboot("Lost connectivity to consensus 
> service. "
>"Rebooting this node");
> }
>   }
> diff --git a/src/rde/rded/role.cc b/src/rde/rded/role.cc
> index 499f7c8..b2b9b49 100644
> --- a/src/rde/rded/role.cc
> +++ b/src/rde/rded/role.cc
> @@ -112,8 +112,8 @@ void Role::PromoteNode(const uint64_t cluster_size,
> promotion_pending = true;
>   } else if (rc != SA_AIS_OK) {
> LOG_ER("Unable to set active controller in consensus service");
> -opensaf_reboot(0, nullptr,
> -   "Unable to set active controller in consensus service");
> +opensaf_quick_reboot("Unable to set active controller"
> +"in consensus service");
>   }
> 
>   RDE_CONTROL_BLOCK* cb = rde_get_control_block();
> @@ -133,8 +133,8 @@ void Role::PromoteNode(const uint64_t cluster_size,
>   rc = consensus_service.PromoteThisNode(true, cluster_size);
>   if (rc == SA_AIS_ERR_EXIST) {
> LOG_ER("Unable to set active controller in consensus service");
> -opensaf_reboot(0, nullptr,
> -   "Unable to set active controller in consensus 
> service");
> +opensaf_quick_reboot("Unable to set active controller in"
> +"consensus service");
>   }
>   std::this_thread::sleep_for(std::chrono::seconds(1));
> }
> -- 
> 2.7.4
> 



___
Opensaf-devel mailing list
Opensaf-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/opensaf-devel


[devel] [PATCH 0/1] Review Request for osaf: Call opensaf_quick_reboot if failed to set active role in consensus [#3001]

2019-02-15 Thread Minh Chau
Summary: osaf: Call opensaf_quick_reboot if failed to set active role in 
consensus [#3001]
Review request for Ticket(s): 3001
Peer Reviewer(s): Hans, Gary, Vu
Pull request to: *** LIST THE PERSON WITH PUSH ACCESS HERE ***
Affected branch(es): develop
Development branch: ticket-3001
Base revision: 497b55530e1562b88522e3e2a6f4c5dd21fb4f50
Personal repository: git://git.code.sf.net/u/minh-chau/review


Impacted area   Impact y/n

 Docsn
 Build systemn
 RPM/packaging   n
 Configuration files n
 Startup scripts n
 SAF servicesy
 OpenSAF servicesn
 Core libraries  n
 Samples n
 Tests   n
 Other   n


Comments (indicate scope for each "y" above):
-
*** EXPLAIN/COMMENT THE PATCH SERIES HERE ***

revision a053a51ea1116dc2bb4342fa2ddf5827877b43cf
Author: Minh Chau 
Date:   Fri, 15 Feb 2019 20:33:30 +1100

osaf: Call opensaf_quick_reboot if failed to set active role in consensus 
[#3001]



Complete diffstat:
--
 src/fm/fmd/fm_rda.cc | 4 ++--
 src/rde/rded/rde_main.cc | 8 +++-
 src/rde/rded/role.cc | 8 
 3 files changed, 9 insertions(+), 11 deletions(-)


Testing Commands:
-
*** LIST THE COMMAND LINE TOOLS/STEPS TO TEST YOUR CHANGES ***


Testing, Expected Results:
--
*** PASTE COMMAND OUTPUTS / TEST RESULTS ***


Conditions of Submission:
-
ack from reviewers


Arch  Built StartedLinux distro
---
mipsn  n
mips64  n  n
x86 n  n
x86_64  y  y
powerpc n  n
powerpc64   n  n


Reviewer Checklist:
---
[Submitters: make sure that your review doesn't trigger any checkmarks!]


Your checkin has not passed review because (see checked entries):

___ Your RR template is generally incomplete; it has too many blank entries
that need proper data filled in.

___ You have failed to nominate the proper persons for review and push.

___ Your patches do not have proper short+long header

___ You have grammar/spelling in your header that is unacceptable.

___ You have exceeded a sensible line length in your headers/comments/text.

___ You have failed to put in a proper Trac Ticket # into your commits.

___ You have incorrectly put/left internal data in your comments/files
(i.e. internal bug tracking tool IDs, product names etc)

___ You have not given any evidence of testing beyond basic build tests.
Demonstrate some level of runtime or other sanity testing.

___ You have ^M present in some of your files. These have to be removed.

___ You have needlessly changed whitespace or added whitespace crimes
like trailing spaces, or spaces before tabs.

___ You have mixed real technical changes with whitespace and other
cosmetic code cleanup changes. These have to be separate commits.

___ You need to refactor your submission into logical chunks; there is
too much content into a single commit.

___ You have extraneous garbage in your review (merge commits etc)

___ You have giant attachments which should never have been sent;
Instead you should place your content in a public tree to be pulled.

___ You have too many commits attached to an e-mail; resend as threaded
commits, or place in a public tree for a pull.

___ You have resent this content multiple times without a clear indication
of what has changed between each re-send.

___ You have failed to adequately and individually address all of the
comments and change requests that were proposed in the initial review.

___ You have a misconfigured ~/.gitconfig file (i.e. user.name, user.email etc)

___ Your computer have a badly configured date and time; confusing the
the threaded patch review.

___ Your changes affect IPC mechanism, and you don't present any results
for in-service upgradability test.

___ Your changes affect user manual and documentation, your patch series
do not contain the patch that updates the Doxygen manual.



___
Opensaf-devel mailing list
Opensaf-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/opensaf-devel


[devel] [PATCH 1/1] osaf: Call opensaf_quick_reboot if failed to set active role in consensus [#3001]

2019-02-15 Thread Minh Chau
---
 src/fm/fmd/fm_rda.cc | 4 ++--
 src/rde/rded/rde_main.cc | 8 +++-
 src/rde/rded/role.cc | 8 
 3 files changed, 9 insertions(+), 11 deletions(-)

diff --git a/src/fm/fmd/fm_rda.cc b/src/fm/fmd/fm_rda.cc
index 028bfa3..0aa5a3d 100644
--- a/src/fm/fmd/fm_rda.cc
+++ b/src/fm/fmd/fm_rda.cc
@@ -97,8 +97,8 @@ uint32_t fm_rda_set_role(FM_CB *fm_cb, PCS_RDA_ROLE role) {
 rc = consensus_service.PromoteThisNode(true, fm_cb->cluster_size);
 if (rc != SA_AIS_OK && rc != SA_AIS_ERR_EXIST) {
   LOG_ER("Unable to set active controller in consensus service");
-  opensaf_reboot(0, nullptr,
- "Unable to set active controller in consensus service");
+  opensaf_quick_reboot("Unable to set active controller"
+  "in consensus service");
 } else if (rc == SA_AIS_ERR_EXIST) {
   // @todo if we don't reboot, we don't seem to recover from this. Can we
   // improve?
diff --git a/src/rde/rded/rde_main.cc b/src/rde/rded/rde_main.cc
index bb17133..3487f0b 100644
--- a/src/rde/rded/rde_main.cc
+++ b/src/rde/rded/rde_main.cc
@@ -203,9 +203,8 @@ static void handle_mbx_event() {
 if (state == Consensus::TakeoverState::ACCEPTED) {
   LOG_NO("Accepted takeover request");
   if (consensus_service.IsRemoteFencingEnabled() == false) {
-opensaf_reboot(0, nullptr,
-   "Another controller is taking over the active role. 
"
-   "Rebooting this node");
+opensaf_quick_reboot("Another controller is taking over"
+"the active role. Rebooting this node");
   }
 } else if (state == Consensus::TakeoverState::UNDEFINED) {
   bool fencing_required = true;
@@ -233,8 +232,7 @@ static void handle_mbx_event() {
   if (fencing_required == true) {
 LOG_NO("Lost connectivity to consensus service");
 if (consensus_service.IsRemoteFencingEnabled() == false) {
-opensaf_reboot(0, nullptr,
-   "Lost connectivity to consensus service. "
+opensaf_quick_reboot("Lost connectivity to consensus service. "
"Rebooting this node");
 }
   }
diff --git a/src/rde/rded/role.cc b/src/rde/rded/role.cc
index 499f7c8..b2b9b49 100644
--- a/src/rde/rded/role.cc
+++ b/src/rde/rded/role.cc
@@ -112,8 +112,8 @@ void Role::PromoteNode(const uint64_t cluster_size,
 promotion_pending = true;
   } else if (rc != SA_AIS_OK) {
 LOG_ER("Unable to set active controller in consensus service");
-opensaf_reboot(0, nullptr,
-   "Unable to set active controller in consensus service");
+opensaf_quick_reboot("Unable to set active controller"
+"in consensus service");
   }
 
   RDE_CONTROL_BLOCK* cb = rde_get_control_block();
@@ -133,8 +133,8 @@ void Role::PromoteNode(const uint64_t cluster_size,
   rc = consensus_service.PromoteThisNode(true, cluster_size);
   if (rc == SA_AIS_ERR_EXIST) {
 LOG_ER("Unable to set active controller in consensus service");
-opensaf_reboot(0, nullptr,
-   "Unable to set active controller in consensus service");
+opensaf_quick_reboot("Unable to set active controller in"
+"consensus service");
   }
   std::this_thread::sleep_for(std::chrono::seconds(1));
 }
-- 
2.7.4



___
Opensaf-devel mailing list
Opensaf-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/opensaf-devel