
 *****************************************************************************
 Installation and Design Notes for iSCSI RHEL 4 U2
 *****************************************************************************

 This program is free software; you can redistribute it and/or modify
 it under the terms of the GNU General Public License as published by
 the Free Software Foundation; either version 2 of the License, or (at
 your option) any later version. Please see the "GPL License" section
 for more information on this.

 This program is distributed in the hope that it will be useful, but
 WITHOUT ANY WARRANTY; without even the implied warranty of
 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 General Public License for more details.

 See the file COPYING included with this distribution for more
 details.


===============================================================================
CONTENTS
===============================================================================
  
  Product Overview
  Product Features
  Before Installing The Driver
  Installing And Removing The Driver
  Configuring And Using The Driver
  GPL License


===============================================================================
PRODUCT OVERVIEW
===============================================================================

  The iSCSI Driver provides a host with the ability to access storage
  through an IP network. The driver uses the iSCSI protocol to transport SCSI
  requests and responses over an IP network between the host and an iSCSI target
  device. The iSCSI protocol is an IETF-defined protocol for IP storage. For
  more information about the IETF standards, refer to http://www.ietf.org. 
  For more information about the iSCSI protocol, refer to the RFC 3720 at
  http://www.ietf.org/rfc/rfc3720.txt

  Architecturally, the iSCSI driver combines with the host's TCP/IP stack,
  network drivers, and Network Interface Card (NIC) to provide the same
  functions as a SCSI or a Fibre Channel (FC) adapter driver with a Host Bus
  Adapter (HBA) (see Figure 1).

  Figure 1 - iSCSI Driver Architecture 

       iSCSI Access To Storage     |  SCSI or FC Access to Storage
  ====================================================================
                                   |
        Host applications          |         Host applications
                                   |
  =======|===========|===============================|================
         |           |             |                 |
         |    +------------+       |                 |
         |    |    SCSI    |       |                 |
         |    |   driver   |       |                 |
         |    +------------+       |           +-----------+
         |    |   iSCSI    |       |           |           |
         |    |   driver   |       |           |   SCSI    |
    +---------+------------+       |           |   or FC   |
    |        TCP/IP        |       |           |  adapter  |
    +----------------------+       |           |  driver   |
    |   Network drivers    |       |           |           |
    +----------------------+       |           +-----------+
               |                   |                 |
  =============|=====================================|================
               |                   |                 |
         +-----------+             |           +-----------+
         |    NIC    |             |           |    HBA    |
         +-----------+             |           +-----------+
               |                   |                 |
  =============|=====================================|================
              _|_                  |                _|_               
            _(   )_                |              _(   )_             
          _(  IP   )_              |            _(  FC   )_           
         (_ network _)             |           (_ or SCSI _)          
           (_     _)               |             (_     _)            
             (_ _)                 |               (_ _)              
               |                   |                 |

      +------------------+         |                 |
      |  Storage Router  |         |                 |
      |    or Gateway    |         |                 |
      +------------------+         |                 |
               |                   |                 |
      +------------------+         |       +------------------+
      |     Storage      |         |       |      Storage     |
      +------------------+         |       +------------------+
      | (___)(___)(___)  |         |       | (___)(___)(___)  |
      | (___)(___)(___)  |         |       | (___)(___)(___)  |
      | (___)(___)(___)  |         |       | (___)(___)(___)  |
      | (___)(___)(___)  |         |       | (___)(___)(___)  |
      +------------------+         |       +------------------+
                                   |
  ====================================================================

  The iSCSI driver provides a transport for SCSI requests and responses to 
  storage devices via an IP network instead of using a direct attached SCSI bus
  channel or an FC connection. The Storage Router, in turn, transports these
  SCSI requests and responses received via the IP network between it and the
  storage devices attached to it.

  Once the iSCSI driver is installed, the host will proceed with a
  discovery process for storage devices as follows:

   1. The iSCSI driver requests available targets through SendTargets
      discovery mechanism as configured in the /etc/iscsi.conf configuration
      file.

   2. Each iSCSI target sends available iSCSI target names to the iSCSI driver.

   3. The iSCSI target accepts the login and sends target identifiers.

   4. The iSCSI driver queries the targets for device information.

   5. The targets respond with the device information.

   6. The iSCSI driver creates a table of available target devices.

  Once the table is completed, the iSCSI targets are available for use by the
  host using the same commands and utilities as a direct attached (e.g., via
  a SCSI bus) storage device.


===============================================================================
PRODUCT FEATURES
===============================================================================

  A list of the major features supported by the iSCSI driver are shown below.
  A more detailed description of each these features is described in later
  sections of this document and with the associated man pages.

 1. Header digest support
 2. Two way CHAP authentication
 3. R2T flow control support with a target
 4. Third party multi-path support
 5. Sendtargets discovery mechanisms
 6. Dynamic target discovery
 7. Async event notifications for portal and target changes
 8. Immediate Data Support
 9. Error recovery level 0
10. Dynamic driver reconfiguration
11. Auto-mounting for iSCSI filesystems after a reboot


The following features are planned for future releases:

 1. IPv6 support


===============================================================================
CONFIGURING AND USING THE DRIVER
===============================================================================

  This section describes a number of topics related to configuring and using 
  the iSCSI Driver for Linux. The topics covered include:

    Starting and Stopping the iSCSI driver
    Rebooting Linux
    Device Names
    Auto-Mounting Filesystems
    Log Messages
    Dynamic Driver Reconfiguration
    Async Event Notification
    iSCSI HBA Status
    Using Multipath I/O Software
    Making Storage Configuration Changes
    Target and LUN Discovery Limits
    Target Authentication
    Editing The iscsi.conf File
    Tuning iSCSI Timeout Parameters
    iSCSI Commands and Utilities
    iSCSI sysfs files and module params
    Driver File Listing


--------------------------------------
STARTING AND STOPPING THE iSCSI DRIVER
--------------------------------------

  To manually start the iSCSI driver enter:

          service iscsi start

  The iSCSI initialization will report information on each detected
  device to the console or in dmesg(8) output. For example:
  
  ********************************************************************
  Vendor: SEAGATE   Model: ST39103FC         Rev: 0002
  Type:   Direct-Access                      ANSI SCSI revision: 02
  Detected scsi disk sda at scsi0, channel 0, id 0, lun 0
  SCSI device sda: hdwr sector= 512 bytes.
                               Sectors= 17783240 [8683 MB] [8.7 GB]
  sda: sda1
  ********************************************************************

  To see the iscsi devices currently available on this system, use the
  utility:

    /sbin/iscsi-ls -l

  If there are problems loading the iSCSI kernel module, diagnostic
  information will be placed in /var/log/messages.

  To manually stop the iSCSI driver enter:

     service iscsi stop

  You must make sure that anything that has an iscsi device open has
  closed the iscsi device before shutting down iscsi. This includes
  filesystems, volume managers, and user applications.

  If iscsi devices are open when you attempt to stop the driver, the
  script will error out instead of removing those devices.  This
  prevents you from corrupting the data on iscsi devices.  In this
  case, iscsid will no longer be running - so if you want to continue
  using the iscsi devices, it is recommended you issue 'service iscsi
  start'.

  Note: It is recommended that on all filesystems mounted on iscsi
  devices, either directly or on virtual devices (LVM, MD) that are
  made up of iscsi devices, the '_netdev' mount option is used.  This
  way they will automatically be unmounted by the netfs initscript
  (before iscsi is stopped) during normal shutdown, and you can more
  easily see which filesystems are in network storage.


---------------
REBOOTING LINUX
---------------

  To safely reboot a Linux system, enter the following command:

      reboot
        OR
     /sbin/shutdown -r now 

  All iSCSI devices should be unmounted prior to a system shutdown or reboot.
  See the Starting And Stopping The Driver section of this document for a more
  detailed description of the unmounting process.


------------
DEVICE NAMES
------------

  iSCSI driver uses the default kernel names for iSCSI device. This
  is inline with other SCSI devices and transports like FC/SATA.

  Since Linux assigns SCSI device nodes dynamically whenever a
  SCSI logical unit is detected, the mapping from device nodes
  (e.g., /dev/sda or /dev/sdb) to iSCSI targets and logical units may
  vary.

  Variations in process scheduling and network delay may result in
  iSCSI targets being mapped to different SCSI device nodes every time
  the driver is started.  Because of this variability, configuring
  applications or operating system utilities to use the standard
  SCSI device nodes to access iSCSI devices may result in SCSI
  commands being sent to the wrong target or logical unit.

  The above issues justify the need for persistent device naming for
  iSCSI devices. If you intend to have persistent names for iSCSI devices,
  you can make use of one or more schemes available for 2.6 kernel users.
 
  a) Udev - udev can be used to provide persistent names for all types of
  devices. scsi_id program which provides serial number for a given block
  device is integrated with udev and can be made use for persistency.

  b) UUID & LABEL based mouting - Filesystems and LVM provide facility
  to mount devices by UUID or LABEL and hence ensure persistency
  across reboots.


-------------------------
AUTO-MOUNTING FILESYSTEMS
-------------------------

  Filesystems installed on iSCSI devices cannot be automatically mounted at
  system reboot due to the fact that the IP network is not yet configured at
  mount time. However, the driver provides a method to auto-mount these
  filesystems as soon as the iSCSI devices become available (i.e., after the IP
  network is configured).

  To auto-mount a filesystem installed on an iSCSI device, follow these steps:

   1. List the iSCSI partitions to be automatically mounted in
      /etc/fstab.

   2. For each filesystem on each iscsi device(s), enter the logical volume on
      which the filesystem resides. The mount points must exist for the 
      filesystems to be mounted. For example, the following /etc/fstab
      entries will mount the two iSCSI devices specified (sda and sdb);

      *************************************************************************
      #device                   mount      FS      mount      backup      fsck 
      #to mount                 point      type    options    frequency    pass
      LABEL=/                   /          ext3    defaults      1          1
      LABEL=/boot               /boot      ext3    defaults      1          2
      /dev/sda                  /mnt/t0    ext2    _netdev       0          0
      /dev/sdb                  /mnt/t1    ext2    _netdev       0          0
      *************************************************************************

   3. Upon a system restart, the netfs init script will mount all filesystems
      with the '_netdev mount' option.  This init script is run after the
      networking and iscsi scripts to ensure the system is ready to mount these
      devices.

  Due to variable network delays, targets may not always become available in the
  same order from one boot to the next. Thus, the order in which iSCSI devices
  are mounted may vary and may not match the order the devices are listed in
  /etc/fstab.  You should not assume mounts of iSCSI devices will occur in
  any particular order.

  Because of the variability of the mapping between SCSI device nodes
  and iSCSI targets, it is always recommended to either mount the iSCSI
  device nodes which have persistent device names, mount filesystem UUIDs
  or labels (see man pages for mke2fs, mount, and fstab), or use logical
  volume management (see Linux LVM) to avoid mounting the wrong device due
  to device name changes resulting from iSCSI target configuration changes
  or network delays.


------------
LOG MESSAGES
------------

  The iSCSI driver contains components in the kernel and user level.
  The log messages from these components are sent to syslog. Based on the
  syslogd configuration on the Linux host, the messages will be sent to the
  appropriate destination. For example, if /etc/syslog.conf has the following
  entry:
  
     *.info /var/log/messages

  then all log messages of level 'info' or higher will be sent to
  /var/log/messages.
  
  If /etc/syslog.conf has the following entry:

    *.info;kern.none  /var/log/messages

  then all log messages (except kernel messages) of level info or higher
  will be sent to /var/log/messages.

  If /etc/syslog.conf has the following entry:

    kern.* /dev/console

  then all kernel messages will be sent to the console.

  All messages from the iSCSI driver when loading the iSCSI kernel 
  module will be placed in /var/log/messages.

  The user can also use dmesg(8) to view the log messages.


------------------------------
DYNAMIC DRIVER RECONFIGURATION
------------------------------

  Configuration changes can be made to the iSCSI driver without having to stop
  it or reboot the host system. To dynamically change the configuration of the
  driver, follow the steps below:

   1. Edit /etc/iscsi.conf with the desired configuration changes.

   2. Enter the following command:

         /etc/init.d/iscsi reload 

      This will cause the iSCSI daemon to re-read /etc/iscsi.conf file and to
      create any new DiscoveryAddress connections it finds. Those discovery
      sessions will then discover targets and create new target connections.

  Note that any configuration changes will not affect existing target sessions.
  For example, removal of a DiscoveryAddress entry from /etc/iscsi.conf
  will not cause the removal of sessions to targets discovered through this 
  DiscoveryAddress, but it will cause the removal of the discovery session 
  corresponding to the deleted DiscoveryAddress.
  To remove these sessions execute the following for each of these sessions:
  - Set ConnFailTimeout, ResetTimeout and AbortTimeout on the session to a low
    value, like 5 seconds through sysfs by executing the following commands:
    echo 5 > /sys/class/scsi_host/host<host_no>/connfail_timeout
    echo 5 > /sys/class/scsi_host/host<host_no>/reset_timeout
    echo 5 > /sys/class/scsi_host/host<host_no>/abort_timeout
  - Stop IOs to all the devices discovered through the session.
  - If these devices have been mounted, unmount them.
  - Shutdown the session through sysfs by executing the following command:
    echo > /sys/class/scsi_host/host<host_no>/shutdown
    where <host_no> is the Host Number of the session that has to be removed.

------------------------
ASYNC EVENT NOTIFICATION
------------------------

  Changes occuring at the iSCSI target need to be communicated to the initiator
  as asynchronous messages after negotiating the key "SendAsyncText". The async
  events will be notified to the initiator in the following scenario.
  These events are sent over the discovery session.

  1. PortalOnline - Indicates that a portal (IP Address and TCP port) has been
     added, so target sessions can be established on this portal.

  2. PortalOffline - Indicates the initiator that a portal (IP Address and TCP
     port) has been removed, hence if the initiator loses connectivity to this
     address and port, it should not be retried.

  3. TargetOnline - Notifies the initiator that a new target may be
     available for use and the initiator can try to establish connection to
     this target.

  4. TargetOffline - Notifies the initiator that a target has become
     unavailable. If the initiator loses target connectivity, it should not
     retry connection if any further connection attempt is denied.

----------------
iSCSI HBA STATUS
----------------

  The directory '/sys/class/scsi_host/' contains all registered SCSI HBA
  entries and corresponding sysfs files to read/write any host specific
  attributes. All iSCSI host entries will be present in any of hostX
  directory, where X can be (0 to 2^32 - 1) number of allowable host ids.

  The proc_name attribute can be used to identify the iSCSI host under
  sysfs.
  # more /sys/class/scsi_host/hostX/proc_name
  iscsi-sfnet

  The following file can be used to request shutdown of an iscsi session.

  shutdown - stop the iSCSI driver.
  # echo "shutdown" > /sys/class/scsi_host/hostX/shutdown


----------------------------
USING MULTIPATH I/O SOFTWARE
----------------------------
  Some iSCSI target devices have multiple Ethernet ports. Those systems may be
  configured to allow iSCSI target access via multiple paths. When the iSCSI
  driver discovers targets through a multi-port device, it also discovers all
  the IP addresses that can be used to reach each of those targets. 
  It establishes a session using each of the IP addresses through which the
  target can be reached. It exports all the available paths to the user.

  Multipath drivers exploit this feature to provide better performance
  (due to load sharing) and high availability (failover of I/O if one of the
  path goes bad).

  It may be necessary to modify the configuration of the driver to allow 
  the multi-pathing software to operate more efficiently. If you are using
  a multipath I/O application, you may need to set the "ConnFailTimeout" 
  parameter of the iSCSI driver to a smaller value so that SCSI commands will
  fail more quickly when an iSCSI network connection drops allowing the
  multipath application to try a different path to for access to the storage
  device.

  A safe timeout configuration for dm-multipath would be the following:
  ConnFailTimeout=90
  LoginTimeout=30
  ActiveTimeout=5
  PingTimeout=15

  These settings would put a upper bound of 90 seconds for when upper layers,
  like the scsi layer or multipath layer, would be notified of a problem. In
  most cases when there is a network problem the ActiveTimeout and PingTimeout
  would force a error within 20 seconds.

  Depending on the network, target, number of iscsi users, etc, user may need
  to increase the timeouts to prevent flooding the system with errors.

  Device mapper, a multipath software can be obtained from the 
  following URL:
  http://sources.redhat.com/dm/

------------------------------------
MAKING STORAGE CONFIGURATION CHANGES
------------------------------------

  Making changes to your storage configuration, including adding or
  removing targets or LUNs, remapping targets, or modifying target
  access, may change how the devices are presented to the host operating
  system. This may require corresponding changes in the iSCSI driver
  configuration and /etc/fstab file.

  It is important to understand the ramifications of SCSI routing
  service configuration changes on the hosts accessing the associated
  storage devices. For example, changing the instance configuration
  may change the device presentation to the host's iSCSI driver,
  effectively changing the name or number assigned to the device
  by the host operating system. Certain configuration changes,
  such as adding or deleting targets, adding or deleting LUNs
  within a particular target, or adding or deleting entire instances
  may change the order of the devices presented to the host.
  Even if the host is only associated with one SCSI routing
  service instance, the device order could make a difference.

  Typically, the host operating system assigns drive identifications
  in the order they are received based on certain criteria. Changing
  the order of the storage device discovery may result in a changed
  drive identification. Applications running on the host may require
  modifications to appropriately access the current drives.

  If an entire SCSI routing service instance is removed, or there
  are no targets available for the host, the host's iSCSI driver
  configuration file must be updated to remove the appropriate
  reference before restarting the iSCSI driver. If a host's iSCSI
  configuration file contains an IP address of a SCSI routing
  service instance that does not exist, or has no targets available
  for the host, the iSCSI driver will not complete a login and
  will keep on trying to discover targets associated with this SCSI
  routing service instance.


  In general, the following steps are normally required when reconfiguring
  iSCSI storage:

   1. Unmount any filesystems and stop any applications using iSCSI
      devices.

   2. Stop the iSCSI driver by entering:

        service iscsi stop

   3. Make the appropriate changes to the iSCSI driver
      configuration file. Remove any references to iSCSI
      DiscoveryAddresses that have been removed, or that
      no longer have valid targets for this host.

   4. Modify /etc/fstab and application configurations as
      appropriate.

   5. Restart the iSCSI driver by entering:

      service iscsi start 

  Failure to appropriately update the iSCSI configuration using 
  the above procedure may result in a situation that prevents 
  the host from accessing iSCSI storage resources.


-------------------------------
TARGET AND LUN DISCOVERY LIMITS
-------------------------------

  The bus ID and target ID are always zero in the new one hba per transport
  model since every target will have one hba instance. The host ID is unique
  for every target and changes across reboots. Totally 0 to 2^23 -1 hosts can
  be allocated on a linux system. The lun ID is assigned by the iSCSI target,
  the iSCSI intiator driver currently supports 256 LUNs per target.
  If a LUN ID > 256 it will be ignored by the driver and will not be
  configured in the system.

---------------------
TARGET AUTHENTICATION
---------------------

  The CHAP authentication mechanism provides for two way authentication between
  the target and the initiator. The CHAP authentication capability must also be
  available on the iSCSI target device for this feature to work.

  The username and password for both the initiator and the target needs to be
  added to the /etc/iscsi.conf file. The username and password can be specified
  as global values or can be made specific to each target address. Please refer
  to the Editing The iscsi.conf File section of this document for a more
  detailed description of these parameters.

---------------------------
EDITING THE ISCSI.CONF FILE
---------------------------

  The /etc/iscsi.conf file is used to control the operation of the iSCSI driver
  by allowing the user to configure the values for a number of programmable
  parameters. These parameters can be setup to apply to specific configuration
  types or they can be setup to apply globally. The configuration types that are
  supported are:

    - DiscoveryAddress = SCSI routing instance IP address with format a.d.c.d
                         or a.b.c.d:n or hostname.
    - TargetName = Target name in 'iqn' or 'eui' format
                   e.g.: TargetName = iqn.1987-05.com.cisco:00.0d1d898e8d66.t0
    - Subnet = Network portal IP address with format a.b.c.d/n or a.b.c.d&hex

  The complete list of parameters that can be applied either globally or to the
  configuration types listed above are shown below. Not all parameters are
  applicable to all configuration types. Some of the parameters are actual
  iSCSI login keys, and others are just configuration options for the 
  initiator.

  ___________________________________________________________________________

          KEYS                      DESCRIPTION              DEFAULT VALUE
  ___________________________________________________________________________

   OutgoingUsername      CHAP username used for initiator           -
                         authentication by the target.

   OutgoingPassword      CHAP password used for initiator           -
                         authentication by the target.

   IncomingUsername      CHAP username for target                   -
                         authentication by the initiator.

   IncomingPassword      CHAP password for target                   -
                         authentication by the initiator.

   HeaderDigest          Type of header digest support the         prefer-off
                         initiator is requesting of the target.

   LoginTimeout          Time interval to wait for the login       120 sec
                         phase to complete before failing a
			 connection attempt. Includes initial
			 connection and login (+authentication).

   IdleTimeout           Time interval to wait for on a            60 sec
                         connection before sending a ping when
                         there are no active tasks in the
                         session.

   ActiveTimeout         Time interval to wait for on a             5 sec
                         connection before sending a ping when
                         there are active tasks in the session.

   PingTimeout           Time interval to wait for a ping          5 sec
                         response after a ping is sent before
                         failing a connection.

   ConnFailTimeout       Time interval to wait before failing      0 sec
                         SCSI commands back to an application
                         for unsuccessful commands.

   AbortTimeout          Time interval to wait for a abort         10 sec
                         command to complete before declaring
                         the abort command failed.

   ResetTimeout          Time interval to wait for a reset         30 sec
                         command to complete before declaring
                         the reset command failed.

   Enabled               Enable/Disable a target, list of        yes
                         targets or portals.

   InitialR2T            Enabling/disabling of R2T flow control    no
                         with the target.

   ImmediateData         Enabling/disabling the sending of         yes
                         unsolicited data burst with the iSCSI
                         command PDU.

   MaxRecvDataSegment    Maximum number of bytes that the          128K
   Length                initiator can receive in an iSCSI PDU.

   FirstBurstLength      Maximum number of bytes of unsolicited    256K
                         data the initiator is allowed to send.

   MaxBurstLength        Maximum number of bytes for the SCSI      16M
                         payload negotiated by initiator.

   TCPWindowSize         Maximum number of bytes that can be       256K
                         sent over a TCP connection by the
                         initiator before receiving an
                         acknowledgement from the target.

   Continuous            Enabling/disabling the discovery          yes
                         session to be kept alive. If 
                         Continuous = "yes" and a "Reject(0x3f)" 
                         message is received from the target in 
                         response to the ping (NOP_OUT) message 
                         sent by the initiator, the Continuous
                         parameter will be set to "no" and no 
                         further ping messages will be sent by
                         the initiator.

   SendAsyncText         Enable/disable sending "X" keys related to  	yes
                         Async events; Cisco target only.

  A detailed description for each of these parameters is included in both the
  man page and the included sample iscsi.conf file. Please consult these sources
  for examples and more detailed programming instructions.


-------------------------------
TUNING iSCSI TIMEOUT PARAMETERS
-------------------------------

  - ConnFailTimeout (Default = 0)

  Set this value to fail commands when there is network problem. Default
  value of 0 means that commands will not be failed. You might want to
  change ConnFailTimeout under following scenario:

  If the network is down for sufficiently long time, the application
  doing I/Os to iSCSI device will seem to hang. At this point, you
  might want to fail the I/Os by setting ConnFailTimeout to a reasonably
  low value. This will fail the I/Os to the application and the
  application will resume.

 *****************************************************************************
 NOTE: The above timeout can usually be changed dynamically by following the 
       instructions under Dynamic Driver Reconfiguration section. The above 
       procedure fails to propogate the changes when network connection is 
       down. Use the following command to change ConnFailTimeout value when
       the network connection is down.
     
       echo "<Timeout>" > /sys/class/scsi_host/hostX/connfail_timeout
       X - host number of iSCSI HBA.

       Specify timeout to change the value across all existing sessions.

       ConnFailTimeout is set to 30 in rc.iscsi during stop of the driver.
       This is done so as to prevent a hang that can be caused because of
       unresponsive targets. You can change this value by setting
       CONNFAILTIMEOUT in the rc.iscsi file.
 *****************************************************************************


----------------------------
iSCSI COMMANDS AND UTILITIES
----------------------------

  This section gives a description of all the commands and utilities available
  with the iSCSI driver.

  - "iscsi-ls" lists information about the iSCSI devices available to the
    driver. Please refer to the man page for more information.

  - "iscsi-rescan" rescans iSCSI targets for newly added LUNs.
    Please refer to the man page for more information.

  - "iscsi-kill-session" stops session attached to specific host or all
    sessions if a host is not specified. See sysfs below to match a
    host to a session to a target port. If IO is in progress, it will
    be failed.

-------------
MODULE PARAMS
-------------

max_initial_login_retries - Max number of times to retry logging into a target
for the first time before giving up. The default is 3. Set to -1 for no limit.

can_queue - Max number of commands per session that can be queued. The default
is 512.

cmds_per_lun - Max number of commands per device that can be queued to the
device. Default is 32. Cannot be lower than 1 and cannot be higher than
the can_queue.

max_sectors - Max number of sectors per requests.

max_sg - Max number of scatter list entries per request.

---------------
SYSFS INTERFACE
---------------
  This section describes the iscsi-sfnet, scsi_transport_iscsi, iscsi_host
  and some useful SCSI Mid Layer sysfs files.

  ISCSI SCSI HOST SYSFS DIRECTORY
  -------------------------------
  iSCSI scsi host sysfs files can found in the /sys/class/scsi_host/hostX
  (X is the host number) directory. Note, that the iscsi-sfnet driver
  allocates a scsi host per session, but in the past it allocated a single
  scsi host for all sessions. To now match a host with its iSCSI session you
  must follow the /sys/class/scsi_host/hostX /device link:
  #cd /sys/class/scsi_host/host1/device
  # ls
  power  target1:0:0
  Then use the target identifier to find the session in the
  /sys/class/iscsi_transport directory:
  #cd /sys/class/iscsi_transport
  #ls
  target1:0:0
  #cd target1:0:0

  FILES
  -----
  active_timeout - Time interval to wait for on a connection before sending
  a ping when there are active tasks in the session.

  idle_timeout - Time interval to wait for on a connection before sending
  a ping when there are no active tasks in the session.

  login_timeout - Time interval to wait for the login phase to complete
  before failing a connection attempt. Includes initial connection and
  login (+authentication).

  connfail_timeout - Time interval to wait after a session drop before
  failing new SCSI commands back to an application for unsuccessful commands.

  ping_timeout - Time interval to wait for a ping response after a ping is
  sent before failing a connection.

  abort_timeout - Time interval to wait for a abort command to complete
  before declaring the abort command failed.

  reset_timeout - Time interval to wait for a reset command to complete
  before declaring the reset command failed.

  session_established - Set to one if a session is established (in FFP)
  and zero if not.

  session_established_time - jiffies value when session is established.

  shutdown - Write "1" to the file to cause the session to be dropped and
  removed from the existing list of sessions that the driver is managing.
  The session will not be dropped until IO that has been internally queued
  by the driver has completed. New requests will be failed.

  drop_session - Write "1" to the file to force a session to be logged out
  and relogged in. IO that is currently being processed by the driver will
  be failed with the decision of whether or not to retry the IO left up to
  SCSI mid-layer. This is only useful for testing.

  session_drop_time - jiffies value when the session was dropped.

  host_busy - Number of commands being processed by the scsi host.

  scan - Write "B T L" to this file (where 'B' is the bus/channel number,
  'T' is the target/id number, and 'L' is the logical unit number) to scan
  a specific logical unit. A wildcard value of '-' can be used for any
  variable to force the driver to scan all valid values.

  cmd_per_lun - The initial max number of commands the driver can process
  per lu. This is defined in  iscsi-sfnet.h as ISCSI_CMDS_PER_LUN. For devices
  that support tags this value can be increased to a max of
  ISCSI_MAX_CMDS_PER_LUN (defined in iscsi-sfnet.h) through the scsi device
  queue_depth sysfs file described below.

  sg_tablesize - This determines the degree to which the host is capable of
  scatter-gather.

  window_closed -  Count of how many times the command window for this
  session has closed.

  proc_name - Name to identify the iSCSI driver. This value is "iscsi-sfnet".

  device - Symlink to scsi host driver model device directory. From the scsi
  host device directory you can find the host's targets, devices,
  iscsi_hosts and iscsi_transports.

  ISCSI HOST SYSFS DIRECTORY
  --------------------------
  The iSCSI host files can be found under /sys/class/iscsi_host/hostX
  (where X is the host number). These are files contain information or
  control settings that are specific to the iSCSI RFC.

  FILES
  -----
  initiator_alias - The iSCSI initiator alias.

  initiator_name - The iSCSI initiator name.

  device - Symlink to scsi host driver model device directory.

  ISCSI TRANSPORT SYSFS DIRECTORY
  -------------------------------
  The iSCSI transport/session files can be found under
  /sys/class/iscsi_transport/targetH:B:T where 'H' is the host no, 'B' is
  the bus/channel number and 'T' is the target/id number. The files found
  in this directory expose iSCSI RFC information for a particular session.

  FILES
  -----
  data_digest - Reading this file returns the type of cyclic integrity
  checksum that was negotiated for. The driver does not support data digests
  so this value is always "None".

  header_digest - Reading this file returns the type of cyclic integrity
  checksum that was negotiated for. The possible values are "CRC32C" or "None".

  immediate_data - Reading this file returns "Yes" if support for immediate
  data was negotiated for, and "N" if no

  initial_r2t - Reading this file returns "Yes" if InitialR2T=Yes was
  negotiated and "No" if not.

  max_burst_len - Reading this file returns the MaxBurstLength value
  negotiated for.

  max_recv_data_segment_len - Reading this file returns the
  MaxRecvDataSegmentLength value negotiated for.

  max_xmit_data_segment_len - Reading this file returns the
  MaxRecvDataSegmentLength for the target negotiated for.

  first_burst_len - Reading this file returns the FirstBurstLength value
  negotiated for.

  target_name - iSCSI target name.

  target_alias - iSCSI target alias.

  tpgt - Target portal group tag.

  ip_address - IP address of portal.

  port - Port number.

  tsih - Target Session Identifying Handle

  isid - Initiator part of the Session Identifer.

  device - Symlink to scsi target driver model device directory.

  ISCSI SCSI DEVICE DIRECTORY
  ---------------------------
  The iSCSI scsi device files can be found under
  /sys/class/scsi_device/H:B:T:L where 'H' is the host no, 'B' is the
  bus/channel number, 'T' is the target/id number and 'L' is the LUN. This
  section does not describe all the scsi device files, only the one that
  iscsi_sfnet driver specific or interesting for managing the driver.

  FILES
  -----
  queue_depth - Sets or returns the queue depth size of the device. If
  tagged command queueing is supported this value can be adjusted to a value
  between 1 and 128. Setting the value too high can result in memory
  allocation and deadlock problems.

  delete - Write "1" to the file to delete the device.

  state - Read the file to get the current device state. Write a new state
  value to change the device state. Valid values are:
  - created
  - running
  - cancel
  - deleted
  - quiesce
  - offline
  - blocked

-------------------
DRIVER FILE LISTING
-------------------

  The following files are present on the system after the successful
  installation of iSCSI driver:

     /etc/init.d/iscsi
     /etc/iscsi.conf
     /etc/initiatorname.iscsi
     /sbin/iscsid
     /sbin/iscsi-device
     /sbin/iscsi-iname
     /sbin/iscsi-ls
     /sbin/iscsi-rescan
     /man/man5/iscsi.conf.5
     /man/man1/iscsi-ls.1
     /man/man1/iscsi-rescan.1
     /man/man8/iscsid.8
     /lib/modules/<uname -r>/misc/iscsi_sfnet.ko
     /lib/modules/<uname -r>/misc/scsi_transport_iscsi.ko


===============================================================================
GPL LICENSE
===============================================================================
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991 

Copyright (C) 1989, 1991 Free Software Foundation, Inc.  
59 Temple Place - Suite 330, Boston, MA  02111-1307, USA

Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.

Preamble
The licenses for most software are designed to take away your freedom to
share and change it. By contrast, the GNU General Public License is intended
to guarantee your freedom to share and change free software--to make sure
the software is free for all its users. This General Public License applies
to most of the Free Software Foundation's software and to any other program
whose authors commit to using it. (Some other Free Software Foundation
software is covered by the GNU Library General Public License instead.) You
can apply it to your programs, too. 

When we speak of free software, we are referring to freedom, not price. Our
General Public Licenses are designed to make sure that you have the freedom
to distribute copies of free software (and charge for this service if you
wish), that you receive source code or can get it if you want it, that you
can change the software or use pieces of it in new free programs; and that
you know you can do these things. 

To protect your rights, we need to make restrictions that forbid anyone to
deny you these rights or to ask you to surrender the rights. These
restrictions translate to certain responsibilities for you if you distribute
copies of the software, or if you modify it. 

For example, if you distribute copies of such a program, whether gratis or
for a fee, you must give the recipients all the rights that you have. You
must make sure that they, too, receive or can get the source code. And you
must show them these terms so they know their rights. 

We protect your rights with two steps: (1) copyright the software, and (2)
offer you this license which gives you legal permission to copy, distribute
and/or modify the software. 

Also, for each author's protection and ours, we want to make certain that
everyone understands that there is no warranty for this free software. If
the software is modified by someone else and passed on, we want its
recipients to know that what they have is not the original, so that any
problems introduced by others will not reflect on the original authors'
reputations. 

Finally, any free program is threatened constantly by software patents. We
wish to avoid the danger that redistributors of a free program will
individually obtain patent licenses, in effect making the program
proprietary. To prevent this, we have made it clear that any patent must be
licensed for everyone's free use or not licensed at all. 

The precise terms and conditions for copying, distribution and modification
follow. 

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License applies to any program or other work which contains a notice
placed by the copyright holder saying it may be distributed under the terms
of this General Public License. The "Program", below, refers to any such
program or work, and a "work based on the Program" means either the Program
or any derivative work under copyright law: that is to say, a work containing
the Program or a portion of it, either verbatim or with modifications and/or
translated into another language. (Hereinafter, translation is included
without limitation in the term "modification".) Each licensee is addressed
as "you". 

Activities other than copying, distribution and modification are not covered
by this License; they are outside its scope. The act of running the Program
is not restricted, and the output from the Program is covered only if its
contents constitute a work based on the Program (independent of having been
made by running the Program). Whether that is true depends on what the
Program does. 

1. You may copy and distribute verbatim copies of the Program's source code
as you receive it, in any medium, provided that you conspicuously and
appropriately publish on each copy an appropriate copyright notice and
disclaimer of warranty; keep intact all the notices that refer to this
License and to the absence of any warranty; and give any other recipients
of the Program a copy of this License along with the Program. 

You may charge a fee for the physical act of transferring a copy, and you
may at your option offer warranty protection in exchange for a fee. 

2. You may modify your copy or copies of the Program or any portion of it, 
thus forming a work based on the Program, and copy and distribute such
modifications or work under the terms of Section 1 above, provided that you
also meet all of these conditions: 


a) You must cause the modified files to carry prominent notices stating that
you changed the files and the date of any change. 

b) You must cause any work that you distribute or publish, that in whole or
in part contains or is derived from the Program or any part thereof, to be
licensed as a whole at no charge to all third parties under the terms of
this License. 

c) If the modified program normally reads commands interactively when run,
you must cause it, when started running for such interactive use in the most
ordinary way, to print or display an announcement including an appropriate
copyright notice and a notice that there is no warranty (or else, saying that
you provide a warranty) and that users may redistribute the program under
these conditions, and telling the user how to view a copy of this License.
(Exception: if the Program itself is interactive but does not normally print
such an announcement, your work based on the Program is not required to print
an announcement.) 
These requirements apply to the modified work as a whole. If identifiable
sections of that work are not derived from the Program, and can be reasonably
considered independent and separate works in themselves, then this License,
and its terms, do not apply to those sections when you distribute them as
separate works. But when you distribute the same sections as part of a whole
which is a work based on the Program, the distribution of the whole must be
on the terms of this License, whose permissions for other licensees extend to
the entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your
rights to work written entirely by you; rather, the intent is to exercise the
right to control the distribution of derivative or collective works based on
the Program. 

In addition, mere aggregation of another work not based on the Program with
the Program (or with a work based on the Program) on a volume of a storage
or distribution medium does not bring the other work under the scope of this
License. 

3. You may copy and distribute the Program (or a work based on it, under
Section 2) in object code or executable form under the terms of Sections 1
and 2 above provided that you also do one of the following: 

a) Accompany it with the complete corresponding machine-readable source code,
which must be distributed under the terms of Sections 1 and 2 above on a
medium customarily used for software interchange; or, 

b) Accompany it with a written offer, valid for at least three years, to give
any third party, for a charge no more than yourram except as expressly
provided under this License. Any attempt otherwise to copy, modify,
sublicense or distribute the Program is void, and will automatically
terminate your rights under this License. However, parties who have received
copies, or rights, from you under this License will not have their licenses
terminated so long as such parties remain in full compliance. 

5. You are not required to accept this License, since you have not signed it.
However, nothing else grants you permission to modify or distribute the
Program or its derivative works. These actions are prohibited by law if you
do not accept this License. Therefore, by modifying or distributing the
Program (or any work based on the Program), you indicate your acceptance of
this License to do so, and all its terms and conditions for copying,
distributing or modifying the Program or works based on it. 

6. Each time you redistribute the Program (or any work based on the Program),
the recipient automatically receives a license from the originaices. Many
people have made generous contributions to the wide range of software
distributed through that system in reliance on consistent application of
that system; it is up to the author/donor to decide if he or she is willing
to distribute software through any other system and a licensee cannot impose
that choice. 

This section is intended to make thoroughly clear what is believed to be a
consequence of the rest of this License. 

8. If the distribution and/or use of the Program is restricted in certain
countries either by patents or by copyrighted interfaces, the original
copyright holder who places the Program under this License may add an
explicit geographical distribution limitation excluding those countries, so
that distribution is permitted only in or among countries not thus excluded.
In such case, this License incorporates the limitation as if written in the
body of this License. 

9. The Free Software Foundation may publish revised and/or new versions of
the General Public License from time to tgenerally. 

NO WARRANTY

11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR
THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE
STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE
PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND
PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE,
YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 

12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE
OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR
DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR
A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH
HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 


END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest possible
use to the public, the best way to achieve this is to make it free software
which everyone can redistribute and change under these terms. 

To do so, attach the following notices to the program. It is safest to
attach them to the start of each source file to most effectively convey
the exclusion of warranty; and each file should have at least the "copyright"
line and a pointer to where the full notice is found. 

one line to give the program's name and an idea of what it does.
Copyright (C) yyyy  name of author

This program is free software; you can redistribute it and/or
modify it under the terms of the GNU General Public License
as published by the Free Software Foundation; either version 2
of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA  02111-1307, USA.

Also add information on how to contact you by electronic and paper mail. 

If the program is interactive, make it output a short notice like this when
it starts in an interactive mode: 

Gnomovision version 69, Copyright (C) year name of author
Gnomovision comes with ABSOLUTELY NO WARRANTY; for details
type `show w'.  This is free software, and you are welcome
to redistribute it under certain conditions; type `show c' 
for details.

The hypothetical commands `show w' and `show c' should show the appropriate
parts of the General Public License. Of course, the commands you use may be
called something other than `show w' and `show c'; they could even be
mouse-clicks or menu items--whatever suits your program. 

You should also get your employer (if you work as a programmer) or your
school, if any, to sign a "copyright disclaimer" for the program, if
necessary. Here is a sample; alter the names: 

Yoyodyne, Inc., hereby disclaims all copyright
interest in the program `Gnomovision'
(which makes passes at compilers) written 
by James Hacker.

signature of Ty Coon, 1 April 1989
Ty Coon, President of Vice

This General Public License does not permit incorporating your program into
proprietary programs. If your program is a subroutine library, you may
consider it more useful to permit linking proprietary applications with the
library. If this is what you want to do, use the GNU Library General Public
License instead of this License. 

