没有合适的资源?快使用搜索试试~ 我知道了~
首页SCSI 块命令规范第四版工作草案
SCSI Block Command 4-r02
SCSI Block Command 4-r02 是一种小型计算机系统接口(Small Computer System Interface,SCSI)块命令规范,用于定义 SCSI 设备之间的数据传输协议。该规范由 INCITS(International Committee for Information Technology Standards)下的 T10 技术委员会负责制定和维护。
SCSI Block Command 4-r02 规范的主要内容包括:
1. SCSI 块命令结构:定义了 SCSI 块命令的格式和结构,包括命令码、参数列表、数据传输协议等。
2. 数据传输协议:定义了 SCSI 设备之间的数据传输协议,包括数据传输的格式、速度、错误检测和纠正机制等。
3. 命令集:定义了一组基本的 SCSI 命令,包括读取、写入、删除、格式化等命令。
4. 状态报告:定义了 SCSI 设备的状态报告机制,包括设备的当前状态、错误信息、性能指标等。
SCSI Block Command 4-r02 规范的应用场景包括:
1. 数据存储设备:SCSI 块命令规范广泛应用于数据存储设备,如硬盘、固态硬盘、磁带机等。
2. 服务器和存储系统:SCSI 块命令规范用于服务器和存储系统之间的数据传输,确保数据的安全和可靠性。
3. 嵌入式系统:SCSI 块命令规范也应用于嵌入式系统,如工业控制系统、医疗设备、汽车电子系统等。
SCSI Block Command 4-r02 规范的优势包括:
1. 高速数据传输:SCSI 块命令规范支持高速数据传输,满足高速数据存储和处理的需求。
2. 可靠性高:SCSI 块命令规范具有高可靠性,确保数据的安全和可靠性。
3. 通用性强:SCSI 块命令规范广泛应用于各种存储设备和系统,具有强的通用性。
SCSI Block Command 4-r02 规范是一种重要的存储设备之间的数据传输协议,广泛应用于数据存储设备、服务器、存储系统、嵌入式系统等领域,具有高速数据传输、可靠性高、通用性强等优势。
T10/BSR INCITS 506 Revision 2 20 May 2014
xvi Working Draft SCSI Block Commands – 4 (SBC-4)
Table 51 —
BMOP field .................................................................................................................................. 130
Table 52 — POPULATE TOKEN command ................................................................................................ 131
Table 53 — POPULATE TOKEN parameter list .......................................................................................... 132
Table 54 — Block device range descriptor .................................................................................................. 134
Table 55 — PRE-FETCH (10) command ..................................................................................................... 135
Table 56 — PRE-FETCH (16) command ..................................................................................................... 136
Table 57 — PREVENT ALLOW MEDIUM REMOVAL command ................................................................ 137
Table 58 —
PREVENT field ............................................................................................................................ 137
Table 59 — READ (10) command ............................................................................................................... 138
Table 60 —
RDPROTECT field ........................................................................................................................ 139
Table 61 — READ (12) command ............................................................................................................... 143
Table 62 — READ (16) command ............................................................................................................... 144
Table 63 — READ (32) command ............................................................................................................... 145
Table 64 — READ CAPACITY (10) command ............................................................................................ 146
Table 65 — READ CAPACITY (10) parameter data .................................................................................... 147
Table 66 — READ CAPACITY (16) command ............................................................................................ 148
Table 67 — READ CAPACITY (16) parameter data .................................................................................... 149
Table 68 —
P_TYPE field and PROT_EN bit .................................................................................................... 149
Table 69 —
LOGICAL BLOCKS PER PHYSICAL BLOCK EXPONENT field ............................................................... 150
Table 70 — READ DEFECT DATA (10) command ..................................................................................... 151
Table 71 —
REQ_PLIST bit and REQ_GLIST bit ............................................................................................... 151
Table 72 — READ DEFECT DATA (10) parameter data ............................................................................. 152
Table 73 — READ DEFECT DATA (12) command ..................................................................................... 153
Table 74 — READ DEFECT DATA (12) parameter data ............................................................................. 154
Table 75 — READ LONG (10) command .................................................................................................... 155
Table 76 — READ LONG (16) command .................................................................................................... 157
Table 77 — REASSIGN BLOCKS command ............................................................................................... 158
Table 78 — REASSIGN BLOCKS parameter list ......................................................................................... 159
Table 79 — REASSIGN BLOCKS short parameter list header ................................................................... 159
Table 80 — REASSIGN BLOCKS long parameter list header ..................................................................... 159
Table 81 — Reassign LBA if the
LONGLBA bit is set to zero ......................................................................... 160
Table 82 — Reassign LBA if the
LONGLBA bit is set to one .......................................................................... 160
Table 83 — RECEIVE ROD TOKEN INFORMATION reference ................................................................. 161
Table 84 — RECEIVE ROD TOKEN INFORMATION parameter data for POPULATE TOKEN ................. 162
Table 85 — RECEIVE ROD TOKEN INFORMATION parameter data for WRITE USING TOKEN ............ 164
Table 86 — REPORT REFERRALS command ........................................................................................... 165
Table 87 — REPORT REFERRALS parameter data ................................................................................... 166
Table 88 — SANITIZE command ................................................................................................................. 167
Table 89 — SANITIZE service action codes ................................................................................................ 168
Table 90 — OVERWRITE service action parameter list .............................................................................. 169
Table 91 —
TEST field ................................................................................................................................... 169
Table 92 — START STOP UNIT command ................................................................................................. 171
Table 93 —
POWER CONDITION and POWER CONDITION MODIFIER field ........................................................... 172
Table 94 — SYNCHRONIZE CACHE (10) command .................................................................................. 174
Table 95 — SYNCHRONIZE CACHE (16) command .................................................................................. 175
Table 96 — UNMAP command .................................................................................................................... 176
Table 97 — UNMAP parameter list .............................................................................................................. 177
Table 98 — UNMAP block descriptor .......................................................................................................... 178
Table 99 — Data-Out Buffer contents for the VERIFY (10) command ........................................................ 179
Table 100 — VERIFY (10) command .......................................................................................................... 179
Table 101 —
VRPROTECT field with the BYTCHK field set to 00b – checking protection information from the
verify operations ....................................................................................................................................... 181
Table 102 —
VRPROTECT field with the BYTCHK field set to 01b or 11b – checking protection information
from the verify operations ......................................................................................................................... 184
Table 103 —
VRPROTECT field with the BYTCHK field set to 01b or 11b – checking protection information
from the Data-Out Buffer .......................................................................................................................... 186
Table 104 —
VRPROTECT field with the BYTCHK field set to 01b or 11b – compare operation requirements . 188
20 May 2014 T10/BSR INCITS 506 Revision 2
Working Draft SCSI Block Commands – 4 (SBC-4) xvii
Table 105 — VERIFY (12) command .......................................................................................................... 191
Table 106 — VERIFY (16) command .......................................................................................................... 192
Table 107 — VERIFY (32) command .......................................................................................................... 193
Table 108 — WRITE (10) command ............................................................................................................ 194
Table 109 —
WRPROTECT field ..................................................................................................................... 195
Table 110 — WRITE (12) command ............................................................................................................ 198
Table 111 — WRITE (16) command ............................................................................................................ 199
Table 112 — WRITE (32) command ............................................................................................................ 200
Table 113 — WRITE AND VERIFY (10) command ..................................................................................... 201
Table 114 — WRITE AND VERIFY (12) command ..................................................................................... 202
Table 115 — WRITE AND VERIFY (16) command ..................................................................................... 203
Table 116 — WRITE AND VERIFY (32) command ..................................................................................... 204
Table 117 — WRITE ATOMIC (16) command ............................................................................................. 205
Table 118 — WRITE ATOMIC (32) command ............................................................................................. 206
Table 119 — WRITE LONG (10) command ................................................................................................. 207
Table 120 —
COR_DIS bit, WR_UNCOR bit, and PBLOCK bit ............................................................................ 208
Table 121 — WRITE LONG (16) command ................................................................................................. 210
Table 122 — WRITE SAME (10) command ................................................................................................. 212
Table 123 —
UNMAP bit, ANCHOR bit, and ANC_SUP bit relationships ............................................................ 213
Table 124 — WRITE SAME (16) command ................................................................................................. 214
Table 125 —
NDOB bit and UNMAP bit interactions ........................................................................................ 214
Table 126 — WRITE SAME (32) command ................................................................................................. 215
Table 127 — WRITE USING TOKEN command ......................................................................................... 216
Table 128 — WRITE USING TOKEN parameter list ................................................................................... 217
Table 129 — XDWRITEREAD (10) command ............................................................................................. 220
Table 130 — XDWRITEREAD (32) command ............................................................................................. 221
Table 131 — XPWRITE (10) command ....................................................................................................... 222
Table 132 — XPWRITE (32) command ....................................................................................................... 223
Table 133 — Parameters for direct access block devices ........................................................................... 225
Table 134 — Address descriptors ................................................................................................................ 226
Table 135 — Short block format address descriptor (000b) ........................................................................ 226
Table 136 — Extended bytes from index format address descriptor (001b) ................................................ 227
Table 137 — Sorting order for extended bytes from index format address descriptors ............................... 227
Table 138 — Extended physical sector format address descriptor (010b) .................................................. 228
Table 139 — Sorting order for extended physical sector format address descriptors ................................. 229
Table 140 — Long block format address descriptor (011b) ......................................................................... 229
Table 141 — Bytes from index format address descriptor (100b) ................................................................ 229
Table 142 — Sorting order for bytes from index format address descriptors ............................................... 230
Table 143 — Physical sector format address descriptor (101b) .................................................................. 230
Table 144 — Sorting order for physical sector format address descriptors ................................................. 230
Table 145 — Diagnostic page codes for direct access block devices ......................................................... 231
Table 146 — Rebuild Assist Input diagnostic page ...................................................................................... 232
Table 147 — Rebuild Assist Output diagnostic page ................................................................................... 233
Table 148 — Translate Address Input diagnostic page ............................................................................... 234
Table 149 — Translate Address Output diagnostic page ............................................................................ 236
Table 150 — Log page codes and subpage codes for direct access block devices .................................... 237
Table 151 — Keywords for resetting or changing log parameters ............................................................... 238
Table 152 — Background Scan log page parameter codes ........................................................................ 239
Table 153 — Background Scan log page .................................................................................................... 239
Table 154 — Background Scan Status log parameter format ...................................................................... 240
Table 155 —
BACKGROUND SCAN STATUS field .............................................................................................. 241
Table 156 — Background Scan Results log parameter format .................................................................... 242
Table 157 —
REASSIGN STATUS field ............................................................................................................. 243
Table 158 — Format Status log page parameter codes .............................................................................. 245
Table 159 — Format Status log page .......................................................................................................... 245
Table 160 — Format Data Out log parameter format .................................................................................. 246
Table 161 — Grown Defects During Certification log parameter format ...................................................... 247
T10/BSR INCITS 506 Revision 2 20 May 2014
xviii Working Draft SCSI Block Commands – 4 (SBC-4)
Table 162 — Total Blocks Reassigned During Format log parameter format .............................................. 248
Table 163 — Total New Blocks Reassigned log parameter format ............................................................. 249
Table 164 — Power On Minutes Since Format log parameter format ......................................................... 250
Table 165 — Logical Block Provisioning log parameters ............................................................................. 251
Table 166 — Logical Block Provisioning log page ....................................................................................... 252
Table 167 — Available LBA Mapping Resource Count log parameter format ............................................. 253
Table 168 —
SCOPE field .............................................................................................................................. 253
Table 169 — Used LBA Mapping Resource Count log parameter format ................................................... 254
Table 170 — De-duplicated LBA Resource Count log parameter format .................................................... 255
Table 171 — Compressed LBA Resource Count log parameter format ...................................................... 256
Table 172 — Total Efficiency LBA Resource Count log parameter format .................................................. 257
Table 173 — Nonvolatile Cache log parameters ......................................................................................... 258
Table 174 — Nonvolatile Cache log page .................................................................................................... 258
Table 175 — Remaining Nonvolatile Time parameter data ......................................................................... 259
Table 176 —
REMAINING NONVOLATILE TIME field ........................................................................................... 259
Table 177 — Maximum Nonvolatile Time parameter data ........................................................................... 260
Table 178 —
MAXIMUM NONVOLATILE TIME field ............................................................................................. 260
Table 179 — Pending Defects log page parameter codes .......................................................................... 261
Table 180 — Pending Defects log page ...................................................................................................... 261
Table 181 — Pending Defect Count log parameter format .......................................................................... 262
Table 182 — Pending Defect log parameter format ..................................................................................... 263
Table 183 — Solid State Media log parameters .......................................................................................... 263
Table 184 — Solid State Media log page ..................................................................................................... 264
Table 185 — Percentage Used Endurance Indicator log parameter format ................................................ 264
Table 186 — Mode page codes and subpage codes for direct access block devices ................................. 265
Table 187 —
DEVICE-SPECIFIC PARAMETER field for direct access block devices .......................................... 266
Table 188 — Short LBA mode parameter block descriptor .......................................................................... 267
Table 189 — Long LBA mode parameter block descriptor .......................................................................... 269
Table 190 — Application Tag mode page .................................................................................................... 271
Table 191 — Application tag descriptor format ............................................................................................ 272
Table 192 — Background Control mode page ............................................................................................. 273
Table 193 — Caching mode page ............................................................................................................... 275
Table 194 —
DEMAND READ RETENTION PRIORITY field .................................................................................. 276
Table 195 —
WRITE RETENTION PRIORITY field .............................................................................................. 277
Table 196 —
SYNC_PROG field ...................................................................................................................... 278
Table 197 — Informational Exceptions Control mode page ......................................................................... 279
Table 198 — Definitions for the combinations of values in EW
ASC, DEXCPT, and TEST .............................. 280
Table 199 — Method of reporting informational exceptions (
MRIE) field ...................................................... 281
Table 200 — Use of the
INTERVAL TIMER field and the REPORT COUNT field based on the MRIE field ............ 283
Table 201 — Logical Block Provisioning mode page ................................................................................... 284
Table 202 — Threshold descriptor format .................................................................................................... 285
Table 203 —
THRESHOLD TYPE field .............................................................................................................. 285
Table 204 —
THRESHOLD ARMING field .......................................................................................................... 285
Table 205 — Read-Write Error Recovery mode page ................................................................................. 286
Table 206 — Error recovery bit combinations .............................................................................................. 288
Table 207 — Verify Error Recovery mode page .......................................................................................... 290
Table 208 — VPD page codes for direct access block devices ................................................................... 291
Table 209 — Block Device Characteristics VPD page ................................................................................. 292
Table 210 —
MEDIUM ROTATION RATE field .................................................................................................... 292
Table 211 —
PRODUCT TYPE field ................................................................................................................. 293
Table 212 —
WABEREQ field ......................................................................................................................... 293
Table 213 —
WACEREQ field ......................................................................................................................... 294
Table 214 —
NOMINAL FORM FACTOR field ..................................................................................................... 294
Table 215 — Block Device Characteristics Extension VPD page ................................................................ 295
Table 216 —
UTILIZATION TYPE field .............................................................................................................. 295
Table 217 — utilization units field ................................................................................................................ 296
Table 218 — utilization interval field ............................................................................................................ 296
20 May 2014 T10/BSR INCITS 506 Revision 2
Working Draft SCSI Block Commands – 4 (SBC-4) xix
Table 219 — Block Limits VPD page ........................................................................................................... 299
Table 220 — Transfer limits for commands ................................................................................................. 301
Table 221 — Logical Block Provisioning VPD page .................................................................................... 303
Table 222 —
PROVISIONING TYPE field .......................................................................................................... 304
Table 223 — Referrals VPD page ................................................................................................................ 305
Table 224 — Block device third-party copy descriptor type codes .............................................................. 306
Table 225 — Block Device ROD Token Limits descriptor ............................................................................ 307
Table 226 — Logical block length and protection types descriptor format ................................................... 308
Table 227 — ROD token device type specific data ...................................................................................... 309
Table A.1 — Variable length command service action code assignments .................................................. 310
Table A.2 — SERVICE ACTION IN (16) service actions ............................................................................. 311
Table A.3 — SERVICE ACTION OUT (16) service actions ......................................................................... 311
Table D.1 — Sense information for locked or encrypted logical units .......................................................... 318
Table F.1 — Dedicated resource, threshold set tracked example capacity information .............................. 322
Table F.2 — Dedicated resource, threshold set tracked example capacity information .............................. 323
Table F.3 — Dedicated resource, threshold set tracked example initial conditions ..................................... 324
Table F.4 — Dedicated resource, threshold set tracked example final log page values ............................. 325
Table F.5 — Shared resource, logical block tracked example capacity information .................................... 326
Table F.6 — Shared resource, logical block tracked example initial conditions .......................................... 327
Table F.7 — Shared resource, logical block tracked example final log page values ................................... 328
Table F.8 — Shared available, dedicated used example capacity information ............................................ 329
Table F.9 — Shared resource, logical block tracked example initial conditions .......................................... 330
Table F.10 — Shared available, dedicated used example final log page values ......................................... 331
Table G.1 — Referrals application client information with no user data segment multiplier ........................ 333
Table G.2 — User data segment calculations with no user data segment multiplier ................................... 333
Table G.3 — Referrals application client information with non-zero user data segment multiplier .............. 335
Table G.4 — User data segment calculations with non-zero user data segment multiplier ......................... 335
T10/BSR INCITS 506 Revision 2 20 May 2014
xx Working Draft SCSI Block Commands – 4 (SBC-4)
Figures
Page
Figure 0 — SCSI document relationships ..................................................................................................... xxii
Figure 1 — Example state machine figure ..................................................................................................... 15
Figure 2 — One or more physical blocks per logical block examples ............................................................ 22
Figure 3 — One or more logical blocks per physical block examples ............................................................ 23
Figure 4 — Two logical blocks per physical block alignment examples ......................................................... 23
Figure 5 — Four logical blocks per physical block alignment examples ........................................................ 24
Figure 6 — Examples of the relationship between mapped and unmapped LBAs and physical blocks ........ 25
Figure 7 — Armed decreasing threshold operation ....................................................................................... 31
Figure 8 — Armed increasing threshold operation ......................................................................................... 31
Figure 9 — LBP state machine (anchored LBAs supported and deallocated LBAs supported) .................... 33
Figure 10 — LBP state machine (anchored LBAs not supported) ................................................................. 34
Figure 11 — LBP state machine (deallocated LBAs not supported) .............................................................. 34
Figure 12 — SSU_PC state machine ............................................................................................................. 66
Figure 13 — Referrals .................................................................................................................................... 93
Figure B.1 — Update write operation (SCSI storage array device supervised) ........................................... 313
Figure B.2 — Regenerate operation (SCSI storage array device supervised) ............................................ 314
Figure B.3 — Rebuild operation (SCSI storage array device supervised) ................................................... 315
Figure G.1 — Referrals example with no user data segment multiplier ....................................................... 332
Figure G.2 — Referrals example with non-zero user data segment multiplier ............................................. 334
剩余357页未读,继续阅读
点击了解资源详情
点击了解资源详情
点击了解资源详情
2023-05-25 上传
2022-09-22 上传
2012-08-10 上传
2012-08-10 上传
2021-01-30 上传
2016-01-03 上传
qq_17102425
- 粉丝: 0
- 资源: 1
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- C语言数组操作:高度检查器编程实践
- 基于Swift开发的嘉定单车LBS iOS应用项目解析
- 钗头凤声乐表演的二度创作分析报告
- 分布式数据库特训营全套教程资料
- JavaScript开发者Robert Bindar的博客平台
- MATLAB投影寻踪代码教程及文件解压缩指南
- HTML5拖放实现的RPSLS游戏教程
- HT://Dig引擎接口,Ampoliros开源模块应用
- 全面探测服务器性能与PHP环境的iprober PHP探针v0.024
- 新版提醒应用v2:基于MongoDB的数据存储
- 《我的世界》东方大陆1.12.2材质包深度体验
- Hypercore Promisifier: JavaScript中的回调转换为Promise包装器
- 探索开源项目Artifice:Slyme脚本与技巧游戏
- Matlab机器人学习代码解析与笔记分享
- 查尔默斯大学计算物理作业HP2解析
- GitHub问题管理新工具:GIRA-crx插件介绍
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功