- Oct 11, 2017
-
-
Steven Murray authored
-
Steven Murray authored
This unfortunate move is necessary because the error/exception handling of rmcd is done using the TCP/IP connection with the client.
-
Steven Murray authored
-
Steven Murray authored
-
Steven Murray authored
-
Steven Murray authored
The following two log snippets show that after retrying a mount several times and finally succeeding, there is still the error "rmc_sendrep: RMC02 - send error : No such file or directory". This commit adds more logs to try an determine what is happening. tpsrv001 ======== 10/24 14:16:54 6638 dispatch: Dispatching request handler: req_type=4 req_type_str=RMC_MOUNT attemptNb=1 maxNbAttempts=3 10/24 14:16:54 6638 rmc_srv_mount: RMC92 - mount request by 14029,1474 from tpsrv001.cern.ch 10/24 14:16:54 6638 rmc_srv_mount: RMC98 - mount I07700/0 on drive 1 10/24 14:16:55 6638 lasterror: Function entered: asc=40 ascq=1 save_errno=5 rc=-4 sensekey=6 skvalid=1 10/24 14:16:55 6638 lasterror: Entry found in scsierr_acttbl: action_str=RBT_FAST_RETRY 10/24 14:16:55 6638 rmc_sendrep: smc_mount: SR017 - find_cartridge I07700 failed : Import or Export Element Accessed 10/24 14:16:55 6638 rmc_srv_mount: returns 2205 10/24 14:16:55 6638 dispatch: Sleeping before fast retry: delayInSec=1 req_type=4 req_type_str=RMC_MOUNT attemptNb=2 maxNbAttempts=3 10/24 14:16:56 6638 dispatch: Dispatching request handler: req_type=4 req_type_str=RMC_MOUNT attemptNb=2 maxNbAttempts=3 10/24 14:16:56 6638 rmc_srv_mount: RMC92 - mount request by 14029,1474 from tpsrv001.cern.ch 10/24 14:16:56 6638 rmc_srv_mount: RMC98 - mount I07700/0 on drive 1 10/24 14:16:56 6638 lasterror: Function entered: asc=40 ascq=0 save_errno=5 rc=-4 sensekey=6 skvalid=1 10/24 14:16:56 6638 lasterror: Entry found in scsierr_acttbl: action_str=RBT_FAST_RETRY 10/24 14:16:56 6638 rmc_sendrep: smc_mount: SR017 - find_cartridge I07700 failed : Not Ready to Ready Transition 10/24 14:16:56 6638 rmc_srv_mount: returns 2205 10/24 14:16:56 6638 dispatch: Sleeping before fast retry: delayInSec=1 req_type=4 req_type_str=RMC_MOUNT attemptNb=3 maxNbAttempts=3 10/24 14:16:57 6638 dispatch: Dispatching request handler: req_type=4 req_type_str=RMC_MOUNT attemptNb=3 maxNbAttempts=3 10/24 14:16:57 6638 rmc_srv_mount: RMC92 - mount request by 14029,1474 from tpsrv001.cern.ch 10/24 14:16:57 6638 rmc_srv_mount: RMC98 - mount I07700/0 on drive 1 10/24 14:17:09 6638 rmc_srv_mount: returns 0 10/24 14:17:09 6638 rmc_sendrep: RMC02 - send error : No such file or directory tpsrv007 ======== 10/24 14:17:14 8152 dispatch: Dispatching request handler: req_type=4 req_type_str=RMC_MOUNT attemptNb=1 maxNbAttempts=3 10/24 14:17:14 8152 rmc_srv_mount: RMC92 - mount request by 14029,1474 from tpsrv007.cern.ch 10/24 14:17:14 8152 rmc_srv_mount: RMC98 - mount I20497/0 on drive 11 10/24 14:17:14 8152 lasterror: Function entered: asc=41 ascq=0 save_errno=5 rc=-4 sensekey=6 skvalid=1 10/24 14:17:14 8152 lasterror: Entry found in scsierr_acttbl: action_str=RBT_FAST_RETRY 10/24 14:17:14 8152 rmc_sendrep: smc_mount: SR017 - find_cartridge I20497 failed : Power On, Reset, or Bus Device Reset Occurred 10/24 14:17:14 8152 rmc_srv_mount: returns 2205 10/24 14:17:14 8152 dispatch: Sleeping before fast retry: delayInSec=1 req_type=4 req_type_str=RMC_MOUNT attemptNb=2 maxNbAttempts=3 10/24 14:17:15 8152 dispatch: Dispatching request handler: req_type=4 req_type_str=RMC_MOUNT attemptNb=2 maxNbAttempts=3 10/24 14:17:15 8152 rmc_srv_mount: RMC92 - mount request by 14029,1474 from tpsrv007.cern.ch 10/24 14:17:15 8152 rmc_srv_mount: RMC98 - mount I20497/0 on drive 11 10/24 14:17:15 8152 lasterror: Function entered: asc=40 ascq=0 save_errno=5 rc=-4 sensekey=6 skvalid=1 10/24 14:17:15 8152 lasterror: Entry found in scsierr_acttbl: action_str=RBT_FAST_RETRY 10/24 14:17:15 8152 rmc_sendrep: smc_mount: SR017 - find_cartridge I20497 failed : Not Ready to Ready Transition 10/24 14:17:15 8152 rmc_srv_mount: returns 2205 10/24 14:17:15 8152 dispatch: Sleeping before fast retry: delayInSec=1 req_type=4 req_type_str=RMC_MOUNT attemptNb=3 maxNbAttempts=3 10/24 14:17:16 8152 dispatch: Dispatching request handler: req_type=4 req_type_str=RMC_MOUNT attemptNb=3 maxNbAttempts=3 10/24 14:17:16 8152 rmc_srv_mount: RMC92 - mount request by 14029,1474 from tpsrv007.cern.ch 10/24 14:17:16 8152 rmc_srv_mount: RMC98 - mount I20497/0 on drive 11 10/24 14:17:25 8152 rmc_srv_mount: returns 0 10/24 14:17:25 8152 rmc_sendrep: RMC02 - send error : No such file or directory
-
Steven Murray authored
-
Steven Murray authored
-
Steven Murray authored
-
Steven Murray authored
-
Steven Murray authored
Found and removed some left over manual page text that still referred to the RMC/HOST configuration parameter.
-
Steven Murray authored
This reverts commit 5f4306f2. Conflicts: h/serrno.man
-
Steven Murray authored
This reverts commit a01400c4. Conflicts: common/serror.c h/serrno.h
-
Steven Murray authored
There will be separate rmcd and acsd daemons, therefore removing the need for an rmcd "super-daemon" that does both SCSI and ACS.
-
Steven Murray authored
-
Steven Murray authored
Fixed.
-
Steven Murray authored
-
Steven Murray authored
-
David COME authored
-
David COME authored
-
David COME authored
-
David COME authored
-
Steven Murray authored
The current rmcd daemon only does SCSI compatible actions. The future rmcd daemon will be able to do both SCSI compatible and ACS compatible actions. I have therefore added the SCSI qualifier to the "old" rmcd message constants to differentiate them from the ACS message constants.
-
Steven Murray authored
Fixed in the trunk ready for the version 2.1.15.x release of CASTOR.
-
Steven Murray authored
Fixed in the trunk ready for CASTOR 2.1.15.x release.
-
Steven Murray authored
-
Steven Murray authored
-
Steven Murray authored
The Rmc class is currently empty. It will eventually become a proxy class for communicating with the rmcd daemon over the network.
-
Daniele Kruse authored
-
Eric Cano authored
Fixed h/rfcntl.h which missed multiple inclusion guards entirely.
-
Steven Murray authored
I introduced a bug into sstrerror() when I added error checking code around the call to Cglobals_get(). The hash of the offending commit is: ff8021a2 Before my so say improvements, the return value of Cglobals_get() was not checked. I added a check that assumed an error had occured if the return value was non-zero. Unfortuntaley for me, the return values 0 and 1 both mean success. A return value of -1 signifies a failure.
-
Steven Murray authored
With this commit tapeserverd connects to the vdqm using Cgethostbyname(). It is planned to replace this use of Cgethostbyname() by getAddrInfo().
-
Steven Murray authored
-
Steven Murray authored
-
Eric Cano authored
-
Steven Murray authored
-
Steven Murray authored
-
Steven Murray authored
-
Steven Murray authored
-
Steven Murray authored
rmc_mnt().
-