Bug 1624670
Summary: | iSCSI Login negotiation failed due to CHAP_N values do not match! | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Xiubo Li <xiubli> |
Component: | iscsi-initiator-utils | Assignee: | Chris Leech <cleech> |
Status: | CLOSED ERRATA | QA Contact: | Filip Suba <fsuba> |
Severity: | urgent | Docs Contact: | |
Priority: | high | ||
Version: | 7.5 | CC: | bkunal, cleech, mmuench, prasanna.kalever, sheggodu, ykaul |
Target Milestone: | rc | ||
Target Release: | 7.8 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | iscsi-initiator-utils-6.2.0.874-13.el7 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2020-03-31 20:03:52 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1554642, 1577173, 1597320, 1625824, 1646945, 1654409, 1657156, 1727425 |
Description
Xiubo Li
2018-09-03 02:56:26 UTC
#iscsiadm -m node -p $N:3260 -T $IQN -I default -o update -n node.session.auth.authmethod -v CHAP #iscsiadm -m node -p $N:3260 -T $IQN -I default -o update -n node.session.auth.username -v $USER #iscsiadm -m node -p $N:3260 -T $IQN -I default -o update -n node.session.auth.password -v $PASSWORD For this, from my debug and through reading the code it seems when updating the parm followed it will overwrite the front one. I have tried to combine the above 3 commands to single one, like: # iscsiadm -m node -p $N:3260 -T $IQN -I default -o update -n node.session.auth.authmethod -v CHAP -o update -n node.session.auth.username -v $USER -o update -n node.session.auth.password -v $PASSWORD Test for many times, didn't reproduce it yet. @Chris It seems buggy when loading -> updating -> storing the node type rec info in parallel. For the workaround will it be work just combining them ? Thanks, (In reply to Xiubo Li from comment #3) > #iscsiadm -m node -p $N:3260 -T $IQN -I default -o update -n > node.session.auth.authmethod -v CHAP > #iscsiadm -m node -p $N:3260 -T $IQN -I default -o update -n > node.session.auth.username -v $USER > #iscsiadm -m node -p $N:3260 -T $IQN -I default -o update -n > node.session.auth.password -v $PASSWORD > > For this, from my debug and through reading the code it seems when updating > the parm followed it will overwrite the front one. I have tried to combine > the above 3 commands to single one, like: > > # iscsiadm -m node -p $N:3260 -T $IQN -I default -o update -n > node.session.auth.authmethod -v CHAP -o update -n node.session.auth.username > -v $USER -o update -n node.session.auth.password -v $PASSWORD > > Test for many times, didn't reproduce it yet. > > @Chris It seems buggy when loading -> updating -> storing the node type rec > info in parallel. For the workaround will it be work just combining them ? > > Thanks, Ug. iscsiadm is getting a file lock while writing out records, but updates are a read-modify-write operation and only the write is locked. So the parallel requests are reading in the pre-update record and then overwriting each other with the writes. I'll look at improving the parallel handling of the records, but I think it should be fine if you only have one process per record updating with multiple values. Chris, just checking if you got any chance to go further with this bug? Do we have any updates on this BZ? Solution has been agreed to and code merged upstream. *** Bug 1624678 has been marked as a duplicate of this bug. *** Verified with iscsi-initiator-utils-6.2.0.874-17.el7. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2020:1124 |