Re: [devel] [users] On starting OpenSAF system is crashing
Hi Darshan, Please share the configuration commands(./configure --enable-tipc and other options you passed), configuration details, steps to start, output of syslog after you start OpenSAF. Best of my guess is that OpenSAF maybe rebooting the system because of IP address mismatch between configuration in dtmd.conf and the IP address of the interface in TCP as transport. Thanks, Nagendra, 91-9866424860 High Availability Solutions Pvt. Ltd. (www.hasolutions.in) - OpenSAF Support and Services - Original Message - Subject: [users] On starting OpenSAF system is crashing From: "Darshan" Date: 2/16/19 12:16 pm To: "opensaf-users" , "opensaf-devel" Hi all, I installed opensaf-5.19.01 in ubuntu14.4, 64-bit system by following the steps in README, i tried running OpenSAF by "sudo /etc/init.d/opensafd start". In few seconds my pc is crashing, i tried this several times even by reinstalling OpenSAF, i'm unable to resolve. Can someone please help me with this. -- Regards, Darshan ___ Opensaf-users mailing list opensaf-us...@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/opensaf-users ___ Opensaf-devel mailing list Opensaf-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/opensaf-devel
Re: [devel] [PATCH 1/1] osaf: Call opensaf_quick_reboot if failed to set active role in consensus [#3001]
Hi Minh, ack, review only/Thanks HansN On 2/15/19 10:51, Minh Chau wrote: > --- > src/fm/fmd/fm_rda.cc | 4 ++-- > src/rde/rded/rde_main.cc | 8 +++- > src/rde/rded/role.cc | 8 > 3 files changed, 9 insertions(+), 11 deletions(-) > > diff --git a/src/fm/fmd/fm_rda.cc b/src/fm/fmd/fm_rda.cc > index 028bfa3..0aa5a3d 100644 > --- a/src/fm/fmd/fm_rda.cc > +++ b/src/fm/fmd/fm_rda.cc > @@ -97,8 +97,8 @@ uint32_t fm_rda_set_role(FM_CB *fm_cb, PCS_RDA_ROLE role) { > rc = consensus_service.PromoteThisNode(true, fm_cb->cluster_size); > if (rc != SA_AIS_OK && rc != SA_AIS_ERR_EXIST) { > LOG_ER("Unable to set active controller in consensus service"); > - opensaf_reboot(0, nullptr, > - "Unable to set active controller in consensus service"); > + opensaf_quick_reboot("Unable to set active controller" > + "in consensus service"); > } else if (rc == SA_AIS_ERR_EXIST) { > // @todo if we don't reboot, we don't seem to recover from this. Can > we > // improve? > diff --git a/src/rde/rded/rde_main.cc b/src/rde/rded/rde_main.cc > index bb17133..3487f0b 100644 > --- a/src/rde/rded/rde_main.cc > +++ b/src/rde/rded/rde_main.cc > @@ -203,9 +203,8 @@ static void handle_mbx_event() { > if (state == Consensus::TakeoverState::ACCEPTED) { > LOG_NO("Accepted takeover request"); > if (consensus_service.IsRemoteFencingEnabled() == false) { > -opensaf_reboot(0, nullptr, > - "Another controller is taking over the active > role. " > - "Rebooting this node"); > +opensaf_quick_reboot("Another controller is taking over" > +"the active role. Rebooting this node"); > } > } else if (state == Consensus::TakeoverState::UNDEFINED) { > bool fencing_required = true; > @@ -233,8 +232,7 @@ static void handle_mbx_event() { > if (fencing_required == true) { > LOG_NO("Lost connectivity to consensus service"); > if (consensus_service.IsRemoteFencingEnabled() == false) { > -opensaf_reboot(0, nullptr, > - "Lost connectivity to consensus service. " > +opensaf_quick_reboot("Lost connectivity to consensus > service. " > "Rebooting this node"); > } > } > diff --git a/src/rde/rded/role.cc b/src/rde/rded/role.cc > index 499f7c8..b2b9b49 100644 > --- a/src/rde/rded/role.cc > +++ b/src/rde/rded/role.cc > @@ -112,8 +112,8 @@ void Role::PromoteNode(const uint64_t cluster_size, > promotion_pending = true; > } else if (rc != SA_AIS_OK) { > LOG_ER("Unable to set active controller in consensus service"); > -opensaf_reboot(0, nullptr, > - "Unable to set active controller in consensus service"); > +opensaf_quick_reboot("Unable to set active controller" > +"in consensus service"); > } > > RDE_CONTROL_BLOCK* cb = rde_get_control_block(); > @@ -133,8 +133,8 @@ void Role::PromoteNode(const uint64_t cluster_size, > rc = consensus_service.PromoteThisNode(true, cluster_size); > if (rc == SA_AIS_ERR_EXIST) { > LOG_ER("Unable to set active controller in consensus service"); > -opensaf_reboot(0, nullptr, > - "Unable to set active controller in consensus > service"); > +opensaf_quick_reboot("Unable to set active controller in" > +"consensus service"); > } > std::this_thread::sleep_for(std::chrono::seconds(1)); > } ___ Opensaf-devel mailing list Opensaf-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/opensaf-devel
Re: [devel] [PATCH 1/1] osaf: Call opensaf_quick_reboot if failed to set active role in consensus [#3001]
Ack, review only. > On 15 Feb 2019, at 5:51 pm, Minh Chau wrote: > > --- > src/fm/fmd/fm_rda.cc | 4 ++-- > src/rde/rded/rde_main.cc | 8 +++- > src/rde/rded/role.cc | 8 > 3 files changed, 9 insertions(+), 11 deletions(-) > > diff --git a/src/fm/fmd/fm_rda.cc b/src/fm/fmd/fm_rda.cc > index 028bfa3..0aa5a3d 100644 > --- a/src/fm/fmd/fm_rda.cc > +++ b/src/fm/fmd/fm_rda.cc > @@ -97,8 +97,8 @@ uint32_t fm_rda_set_role(FM_CB *fm_cb, PCS_RDA_ROLE role) { > rc = consensus_service.PromoteThisNode(true, fm_cb->cluster_size); > if (rc != SA_AIS_OK && rc != SA_AIS_ERR_EXIST) { > LOG_ER("Unable to set active controller in consensus service"); > - opensaf_reboot(0, nullptr, > - "Unable to set active controller in consensus service"); > + opensaf_quick_reboot("Unable to set active controller" > + "in consensus service"); > } else if (rc == SA_AIS_ERR_EXIST) { > // @todo if we don't reboot, we don't seem to recover from this. Can we > // improve? > diff --git a/src/rde/rded/rde_main.cc b/src/rde/rded/rde_main.cc > index bb17133..3487f0b 100644 > --- a/src/rde/rded/rde_main.cc > +++ b/src/rde/rded/rde_main.cc > @@ -203,9 +203,8 @@ static void handle_mbx_event() { > if (state == Consensus::TakeoverState::ACCEPTED) { > LOG_NO("Accepted takeover request"); > if (consensus_service.IsRemoteFencingEnabled() == false) { > -opensaf_reboot(0, nullptr, > - "Another controller is taking over the active > role. " > - "Rebooting this node"); > +opensaf_quick_reboot("Another controller is taking over" > +"the active role. Rebooting this node"); > } > } else if (state == Consensus::TakeoverState::UNDEFINED) { > bool fencing_required = true; > @@ -233,8 +232,7 @@ static void handle_mbx_event() { > if (fencing_required == true) { > LOG_NO("Lost connectivity to consensus service"); > if (consensus_service.IsRemoteFencingEnabled() == false) { > -opensaf_reboot(0, nullptr, > - "Lost connectivity to consensus service. " > +opensaf_quick_reboot("Lost connectivity to consensus > service. " >"Rebooting this node"); > } > } > diff --git a/src/rde/rded/role.cc b/src/rde/rded/role.cc > index 499f7c8..b2b9b49 100644 > --- a/src/rde/rded/role.cc > +++ b/src/rde/rded/role.cc > @@ -112,8 +112,8 @@ void Role::PromoteNode(const uint64_t cluster_size, > promotion_pending = true; > } else if (rc != SA_AIS_OK) { > LOG_ER("Unable to set active controller in consensus service"); > -opensaf_reboot(0, nullptr, > - "Unable to set active controller in consensus service"); > +opensaf_quick_reboot("Unable to set active controller" > +"in consensus service"); > } > > RDE_CONTROL_BLOCK* cb = rde_get_control_block(); > @@ -133,8 +133,8 @@ void Role::PromoteNode(const uint64_t cluster_size, > rc = consensus_service.PromoteThisNode(true, cluster_size); > if (rc == SA_AIS_ERR_EXIST) { > LOG_ER("Unable to set active controller in consensus service"); > -opensaf_reboot(0, nullptr, > - "Unable to set active controller in consensus > service"); > +opensaf_quick_reboot("Unable to set active controller in" > +"consensus service"); > } > std::this_thread::sleep_for(std::chrono::seconds(1)); > } > -- > 2.7.4 > ___ Opensaf-devel mailing list Opensaf-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/opensaf-devel
[devel] [PATCH 0/1] Review Request for osaf: Call opensaf_quick_reboot if failed to set active role in consensus [#3001]
Summary: osaf: Call opensaf_quick_reboot if failed to set active role in consensus [#3001] Review request for Ticket(s): 3001 Peer Reviewer(s): Hans, Gary, Vu Pull request to: *** LIST THE PERSON WITH PUSH ACCESS HERE *** Affected branch(es): develop Development branch: ticket-3001 Base revision: 497b55530e1562b88522e3e2a6f4c5dd21fb4f50 Personal repository: git://git.code.sf.net/u/minh-chau/review Impacted area Impact y/n Docsn Build systemn RPM/packaging n Configuration files n Startup scripts n SAF servicesy OpenSAF servicesn Core libraries n Samples n Tests n Other n Comments (indicate scope for each "y" above): - *** EXPLAIN/COMMENT THE PATCH SERIES HERE *** revision a053a51ea1116dc2bb4342fa2ddf5827877b43cf Author: Minh Chau Date: Fri, 15 Feb 2019 20:33:30 +1100 osaf: Call opensaf_quick_reboot if failed to set active role in consensus [#3001] Complete diffstat: -- src/fm/fmd/fm_rda.cc | 4 ++-- src/rde/rded/rde_main.cc | 8 +++- src/rde/rded/role.cc | 8 3 files changed, 9 insertions(+), 11 deletions(-) Testing Commands: - *** LIST THE COMMAND LINE TOOLS/STEPS TO TEST YOUR CHANGES *** Testing, Expected Results: -- *** PASTE COMMAND OUTPUTS / TEST RESULTS *** Conditions of Submission: - ack from reviewers Arch Built StartedLinux distro --- mipsn n mips64 n n x86 n n x86_64 y y powerpc n n powerpc64 n n Reviewer Checklist: --- [Submitters: make sure that your review doesn't trigger any checkmarks!] Your checkin has not passed review because (see checked entries): ___ Your RR template is generally incomplete; it has too many blank entries that need proper data filled in. ___ You have failed to nominate the proper persons for review and push. ___ Your patches do not have proper short+long header ___ You have grammar/spelling in your header that is unacceptable. ___ You have exceeded a sensible line length in your headers/comments/text. ___ You have failed to put in a proper Trac Ticket # into your commits. ___ You have incorrectly put/left internal data in your comments/files (i.e. internal bug tracking tool IDs, product names etc) ___ You have not given any evidence of testing beyond basic build tests. Demonstrate some level of runtime or other sanity testing. ___ You have ^M present in some of your files. These have to be removed. ___ You have needlessly changed whitespace or added whitespace crimes like trailing spaces, or spaces before tabs. ___ You have mixed real technical changes with whitespace and other cosmetic code cleanup changes. These have to be separate commits. ___ You need to refactor your submission into logical chunks; there is too much content into a single commit. ___ You have extraneous garbage in your review (merge commits etc) ___ You have giant attachments which should never have been sent; Instead you should place your content in a public tree to be pulled. ___ You have too many commits attached to an e-mail; resend as threaded commits, or place in a public tree for a pull. ___ You have resent this content multiple times without a clear indication of what has changed between each re-send. ___ You have failed to adequately and individually address all of the comments and change requests that were proposed in the initial review. ___ You have a misconfigured ~/.gitconfig file (i.e. user.name, user.email etc) ___ Your computer have a badly configured date and time; confusing the the threaded patch review. ___ Your changes affect IPC mechanism, and you don't present any results for in-service upgradability test. ___ Your changes affect user manual and documentation, your patch series do not contain the patch that updates the Doxygen manual. ___ Opensaf-devel mailing list Opensaf-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/opensaf-devel
[devel] [PATCH 1/1] osaf: Call opensaf_quick_reboot if failed to set active role in consensus [#3001]
--- src/fm/fmd/fm_rda.cc | 4 ++-- src/rde/rded/rde_main.cc | 8 +++- src/rde/rded/role.cc | 8 3 files changed, 9 insertions(+), 11 deletions(-) diff --git a/src/fm/fmd/fm_rda.cc b/src/fm/fmd/fm_rda.cc index 028bfa3..0aa5a3d 100644 --- a/src/fm/fmd/fm_rda.cc +++ b/src/fm/fmd/fm_rda.cc @@ -97,8 +97,8 @@ uint32_t fm_rda_set_role(FM_CB *fm_cb, PCS_RDA_ROLE role) { rc = consensus_service.PromoteThisNode(true, fm_cb->cluster_size); if (rc != SA_AIS_OK && rc != SA_AIS_ERR_EXIST) { LOG_ER("Unable to set active controller in consensus service"); - opensaf_reboot(0, nullptr, - "Unable to set active controller in consensus service"); + opensaf_quick_reboot("Unable to set active controller" + "in consensus service"); } else if (rc == SA_AIS_ERR_EXIST) { // @todo if we don't reboot, we don't seem to recover from this. Can we // improve? diff --git a/src/rde/rded/rde_main.cc b/src/rde/rded/rde_main.cc index bb17133..3487f0b 100644 --- a/src/rde/rded/rde_main.cc +++ b/src/rde/rded/rde_main.cc @@ -203,9 +203,8 @@ static void handle_mbx_event() { if (state == Consensus::TakeoverState::ACCEPTED) { LOG_NO("Accepted takeover request"); if (consensus_service.IsRemoteFencingEnabled() == false) { -opensaf_reboot(0, nullptr, - "Another controller is taking over the active role. " - "Rebooting this node"); +opensaf_quick_reboot("Another controller is taking over" +"the active role. Rebooting this node"); } } else if (state == Consensus::TakeoverState::UNDEFINED) { bool fencing_required = true; @@ -233,8 +232,7 @@ static void handle_mbx_event() { if (fencing_required == true) { LOG_NO("Lost connectivity to consensus service"); if (consensus_service.IsRemoteFencingEnabled() == false) { -opensaf_reboot(0, nullptr, - "Lost connectivity to consensus service. " +opensaf_quick_reboot("Lost connectivity to consensus service. " "Rebooting this node"); } } diff --git a/src/rde/rded/role.cc b/src/rde/rded/role.cc index 499f7c8..b2b9b49 100644 --- a/src/rde/rded/role.cc +++ b/src/rde/rded/role.cc @@ -112,8 +112,8 @@ void Role::PromoteNode(const uint64_t cluster_size, promotion_pending = true; } else if (rc != SA_AIS_OK) { LOG_ER("Unable to set active controller in consensus service"); -opensaf_reboot(0, nullptr, - "Unable to set active controller in consensus service"); +opensaf_quick_reboot("Unable to set active controller" +"in consensus service"); } RDE_CONTROL_BLOCK* cb = rde_get_control_block(); @@ -133,8 +133,8 @@ void Role::PromoteNode(const uint64_t cluster_size, rc = consensus_service.PromoteThisNode(true, cluster_size); if (rc == SA_AIS_ERR_EXIST) { LOG_ER("Unable to set active controller in consensus service"); -opensaf_reboot(0, nullptr, - "Unable to set active controller in consensus service"); +opensaf_quick_reboot("Unable to set active controller in" +"consensus service"); } std::this_thread::sleep_for(std::chrono::seconds(1)); } -- 2.7.4 ___ Opensaf-devel mailing list Opensaf-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/opensaf-devel