[Ips] detection of failed sessions to allow re-login
"Paul Hughes" <phughes@pillardata.com> Thu, 19 April 2007 23:13 UTC
Return-path: <ips-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1Hefp5-0003vK-DG; Thu, 19 Apr 2007 19:13:55 -0400
Received: from ips by megatron.ietf.org with local (Exim 4.43) id 1Hefp3-0003vE-Jt for ips-confirm+ok@megatron.ietf.org; Thu, 19 Apr 2007 19:13:53 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1Hefp3-0003v6-AG for ips@ietf.org; Thu, 19 Apr 2007 19:13:53 -0400
Received: from mail3.pillardata.com ([209.120.231.20]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1Hefp1-00055N-DK for ips@ietf.org; Thu, 19 Apr 2007 19:13:53 -0400
Received: from coex02.trans.corp ([172.18.24.19]) by mail3.pillardata.com with ESMTP; 19 Apr 2007 16:13:50 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Thu, 19 Apr 2007 17:13:49 -0600
Message-ID: <16236EEEF4D4264DA31C2E35E3607CFE08906E1B@coex02.trans.corp>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: detection of failed sessions to allow re-login
Thread-Index: AceC2Geaj9izq1egS867H12pdfy0iw==
From: Paul Hughes <phughes@pillardata.com>
To: ips@ietf.org
X-Spam-Score: 0.1 (/)
X-Scan-Signature: f49c97ce49302a02285a2d36a99eef8c
Subject: [Ips] detection of failed sessions to allow re-login
X-BeenThere: ips@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IP Storage <ips.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ips>, <mailto:ips-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ips@ietf.org>
List-Help: <mailto:ips-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ips>, <mailto:ips-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============2143689045=="
Errors-To: ips-bounces@ietf.org
I have a question about how a target can quickly detect session failures so that a re-login can succeed. Here's my scenario: 1) an initiator is booting from an iSCSI target 2) the initiator is using an iSCSI HBA to communicate with the iSCSI target 3) the HBA BIOS creates the first session, discovers the boot LUN, and reads the boot loader 4) the boot loader reads the kernel from the boot LUN 5) the kernel resets the iSCSI HBA while loading an HBA driver 6) the HBA driver attempts to create a new session The problem I'm seeing is that the target is failing the login for the new session because the target thinks the first session created by the HBA BIOS is still valid (not in failed state). The HBA reset was not detected by the target soon enough for the target to know that the first session is now in the failed state when the initiator attempts to login and create the second session using the same InitiatorName, ISID, TargetName, and TargetPortalGroupTag as the first session (with TSIH=0). The target does not see a link down event because a switch is connected between the HBA and the target port. The target eventually detects that the first session is failed when it sends a NOP-Out PDU and receives a transport failure. Unfortunately, this occurs too late and the boot fails. In my case the target is sending NOP-Out PDUs every 60 seconds. I can change that to 5 seconds, but I don't think that will fix every case. Is there a better way for the target to determine that the first session has failed so that a re-login will succeed on the first try? Thanks, Paul
_______________________________________________ Ips mailing list Ips@ietf.org https://www1.ietf.org/mailman/listinfo/ips
- [Ips] detection of failed sessions to allow re-lo… Paul Hughes
- RE: [Ips] detection of failed sessions to allow r… Sandars, Ken
- RE: [Ips] detection of failed sessions to allow r… Paul Hughes
- RE: [Ips] detection of failed sessions to allow r… Sandars, Ken
- Re: [Ips] detection of failed sessions to allow r… Julian Satran
- RE: [Ips] detection of failed sessions to allow r… Paul Hughes