[Ips] detection of failed sessions to allow re-login

"Paul Hughes" <phughes@pillardata.com> Thu, 19 April 2007 23:13 UTC

Return-path: <ips-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1Hefp5-0003vK-DG; Thu, 19 Apr 2007 19:13:55 -0400
Received: from ips by megatron.ietf.org with local (Exim 4.43) id 1Hefp3-0003vE-Jt for ips-confirm+ok@megatron.ietf.org; Thu, 19 Apr 2007 19:13:53 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Hefp3-0003v6-AG for ips@ietf.org; Thu, 19 Apr 2007 19:13:53 -0400
Received: from mail3.pillardata.com ([209.120.231.20]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Hefp1-00055N-DK for ips@ietf.org; Thu, 19 Apr 2007 19:13:53 -0400
Received: from coex02.trans.corp ([172.18.24.19]) by mail3.pillardata.com with ESMTP; 19 Apr 2007 16:13:50 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Thu, 19 Apr 2007 17:13:49 -0600
Message-ID: <16236EEEF4D4264DA31C2E35E3607CFE08906E1B@coex02.trans.corp>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: detection of failed sessions to allow re-login
Thread-Index: AceC2Geaj9izq1egS867H12pdfy0iw==
From: Paul Hughes <phughes@pillardata.com>
To: ips@ietf.org
X-Spam-Score: 0.1 (/)
X-Scan-Signature: f49c97ce49302a02285a2d36a99eef8c
Subject: [Ips] detection of failed sessions to allow re-login
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>, <mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>, <mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============2143689045=="
Errors-To: ips-bounces@ietf.org

I have a question about how a target can quickly detect session failures
so that a re-login can succeed.
 
Here's my scenario:
 
1) an initiator is booting from an iSCSI target
2) the initiator is using an iSCSI HBA to communicate with the iSCSI
target
3) the HBA BIOS creates the first session, discovers the boot LUN, and
reads the boot loader
4) the boot loader reads the kernel from the boot LUN
5) the kernel resets the iSCSI HBA while loading an HBA driver
6) the HBA driver attempts to create a new session
 
The problem I'm seeing is that the target is failing the login for the
new session because the target thinks the first session created by the
HBA BIOS is still valid (not in failed state).  The HBA reset was not
detected by the target soon enough for the target to know that the first
session is now in the failed state when the initiator attempts to login
and create the second session using the same InitiatorName, ISID,
TargetName, and TargetPortalGroupTag as the first session (with TSIH=0).
The target does not see a link down event because a switch is connected
between the HBA and the target port.  The target eventually detects that
the first session is failed when it sends a NOP-Out PDU and receives a
transport failure.  Unfortunately, this occurs too late and the boot
fails.
 
In my case the target is sending NOP-Out PDUs every 60 seconds.  I can
change that to 5 seconds, but I don't think that will fix every case.
Is there a better way for the target to determine that the first session
has failed so that a re-login will succeed on the first try?
 
Thanks,
Paul
 
 
 
_______________________________________________
Ips mailing list
Ips@ietf.org
https://www1.ietf.org/mailman/listinfo/ips