Shopping Cart

No products in the cart.

BS ISO/IEC 14776-323:2017

$215.11

Information technology. Small computer system interface (SCSI) – SCSI Block Commands. 3 (SBC-3)

Published By Publication Date Number of Pages
BSI 2017 346
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
6 CONTENTS
20 FOREWORD
22 INTRODUCTION
General
SCSI standards family
23 1 Scope
2 Normative references
24 3 Terms, definitions, symbols, abbreviations, keywords, and conventions
3.1 Terms and definitions
34 3.2 Symbols
3.3 Abbreviations
35 3.4 Keywords
36 3.5 Editorial conventions
37 3.6 Numeric and character conventions
3.6.1 Numeric conventions
3.6.2 Units of measure
39 3.7 State machine conventions
40 4 Direct access block device type model
4.1 Direct access block device type model introduction
41 4.2 Direct access block device type model
4.2.1 Direct access block device type model overview
4.2.2 Logical block access command types
4.2.3 Logical block access operation types
4.3 Media examples
4.3.1 Media examples overview
42 4.3.2 Rotating media
4.3.3 Memory media
4.4 Removable media
43 4.5 Logical Blocks
44 4.6 Physical blocks
48 4.7 Logical block provisioning
4.7.1 Logical block provisioning overview
49 4.7.2 Fully provisioned logical unit
4.7.3 Logical block provisioning management
4.7.3.1 Logical block provisioning management overview
4.7.3.2 Resource provisioned logical unit
50 4.7.3.3 Thin provisioned logical unit
4.7.3.4 Unmapping LBAs
4.7.3.4.1 Processing unmap requests
4.7.3.4.2 Unmap operations
51 4.7.3.4.3 WRITE SAME command and unmap operations
52 4.7.3.5 Autonomous LBA transitions
4.7.3.6 Thin provisioned logical unit resource exhaustion considerations
4.7.3.7 Logical block provisioning thresholds
4.7.3.7.1 Logical block provisioning thresholds overview
53 4.7.3.7.2 Logical block provisioning armed decreasing thresholds
54 4.7.3.7.3 Logical block provisioning armed increasing thresholds
55 4.7.3.7.4 Logical block provisioning threshold notification
4.7.4 LBP (logical block provisioning) state machine
4.7.4.1 LBP state machine overview
56 4.7.4.2 LBP state machine for thin provisioned logical units supporting anchored LBAs
4.7.4.3 LBP state machine for thin provisioned logical units not supporting anchored LBAs
57 4.7.4.4 LBP state machine for resource provisioned logical units
4.7.4.5 Performing read operations with respect to logical block provisioning
59 4.7.4.6 LBP1:Mapped state
4.7.4.6.1 LBP1:Mapped state description
4.7.4.6.2 Transition LBP1:Mapped to LBP2:Deallocated
4.7.4.6.3 Transition LBP1:Mapped to LBP3:Anchored
4.7.4.7 LBP2:Deallocated state
4.7.4.7.1 LBP2:Deallocated state description
4.7.4.7.2 Transition LBP2:Deallocated to LBP1:Mapped
60 4.7.4.7.3 Transition LBP2:Deallocated to LBP3:Anchored
4.7.4.8 LBP3:Anchored state
4.7.4.8.1 LBP3:Anchored state description
4.7.4.8.2 Transition LBP3:Anchored to LBP1:Mapped
4.7.4.8.3 Transition LBP3:Anchored to LBP2:Deallocated
4.8 Data de-duplication
4.9 Ready state
61 4.10 Initialization
4.11 Sanitize operations
4.11.1 Sanitize operations overview
62 4.11.2 Performing a sanitize operation
63 4.11.3 Completing a sanitize operation
64 4.12 Write protection
4.13 Medium defects
4.13.1 Medium defects overview
67 4.13.2 Generation of defect lists
68 4.14 Write and unmap failures
4.15 Caches
4.15.1 Caches overview
4.15.2 Read caching
4.15.3 Write caching
69 4.15.4 Command interactions with caches
4.15.5 Write operation and write medium operation interactions with caches
4.15.6 Read operation and read medium operation interactions with caches
70 4.15.7 Verify medium operation interactions with caches
4.15.8 Unmap operation interactions with caches
4.15.9 Power loss effects on caches
71 4.16 Implicit head of queue command processing
4.17 Reservations
73 4.18 Error reporting
4.18.1 Error reporting overview
75 4.18.2 Processing pseudo unrecovered errors
76 4.18.3 Block commands sense data descriptor
77 4.18.4 User data segment referral sense data descriptor
79 4.18.5 Direct-access block device sense data descriptor
80 4.19 Model for XOR commands
4.19.1 Model for XOR commands overview
81 4.19.2 SCSI storage array device supervised XOR operations
4.19.2.1 SCSI storage array device supervised XOR operations overview
4.19.2.2 Update write operation
4.19.2.3 Regenerate operation
82 4.19.2.4 Rebuild operation
4.19.3 Array subsystem considerations
4.19.3.1 Array subsystem considerations overview
4.19.3.2 Access to an inconsistent stripe
4.20 Rebuild assist mode
4.20.1 Rebuild assist mode overview
83 4.20.2 Enabling rebuild assist mode
4.20.3 Using the rebuild assist mode
4.20.3.1 Using rebuild assist mode overview
4.20.3.2 Unpredicted unrecovered read error
84 4.20.3.3 Predicted unrecovered read error
4.20.3.4 Unpredicted unrecovered write error
4.20.3.5 Predicted unrecovered write error
85 4.20.4 Disabling the rebuild assist mode
4.20.5 Testing rebuild assist mode
4.21 START STOP UNIT and power conditions
4.21.1 START STOP UNIT and power conditions overview
4.21.2 Processing of concurrent START STOP UNIT commands
86 4.21.3 Managing logical block access commands during a change to the active power condition
4.21.4 Stopped power condition
4.21.5 START STOP UNIT and power condition state machine
4.21.5.1 START STOP UNIT and power condition state machine overview
88 4.21.5.2 SSU_PC0:Powered_On state
4.21.5.2.1 SSU_PC0:Powered_On state description
89 4.21.5.2.2 Transition SSU_PC0:Powered_On to SSU_PC4:Active_Wait
4.21.5.2.3 Transition SSU_PC0:Powered_On to SSU_PC8:Stopped
4.21.5.3 SSU_PC1:Active state
4.21.5.3.1 SSU_PC1:Active state description
4.21.5.3.2 Transition SSU_PC1:Active to SSU_PC5:Wait_Idle
4.21.5.3.3 Transition SSU_PC1:Active to SSU_PC6:Wait_Standby
90 4.21.5.3.4 Transition SSU_PC1:Active to SSU_PC10:Wait_Stopped
4.21.5.4 SSU_PC2:Idle state
4.21.5.4.1 SSU_PC2:Idle state description
4.21.5.4.2 Transition SSU_PC2:Idle to SSU_PC4:Active_Wait
4.21.5.4.3 Transition SSU_PC2:Idle to SSU_PC5:Wait_Idle
91 4.21.5.4.4 Transition SSU_PC2:Idle to SSU_PC6:Wait_Standby
4.21.5.4.5 Transition SSU_PC2:Idle to SSU_PC7:Idle_Wait
4.21.5.4.6 Transition SSU_PC2:Idle to SSU_PC10:Wait_Stopped
4.21.5.5 SSU_PC3:Standby state
4.21.5.5.1 SSU_PC3:Standby state description
4.21.5.5.2 Transition SSU_PC3:Standby to SSU_PC4:Active_Wait
92 4.21.5.5.3 Transition SSU_PC3:Standby to SSU_PC6:Wait_Standby
4.21.5.5.4 Transition SSU_PC3:Standby to SSU_PC7:Idle_Wait
4.21.5.5.5 Transition SSU_PC3:Standby to SSU_PC9:Standby_Wait
93 4.21.5.5.6 Transition SSU_PC3:Standby to SSU_PC10:Wait_Stopped
4.21.5.6 SSU_PC4:Active_Wait state
4.21.5.6.1 SSU_PC4:Active_Wait state description
94 4.21.5.6.2 Transition SSU_PC4:Active_Wait to SSU_PC1:Active
4.21.5.7 SSU_PC5:Wait_Idle state
4.21.5.7.1 SSU_PC5:Wait_Idle state description
4.21.5.7.2 Transition SSU_PC5:Wait_Idle to SSU_PC2:Idle
4.21.5.8 SSU_PC6:Wait_Standby state
4.21.5.8.1 SSU_PC6:Wait_Standby state description
4.21.5.8.2 Transition SSU_PC6:Wait_Standby to SSU_PC3:Standby
4.21.5.9 SSU_PC7:Idle_Wait state
4.21.5.9.1 SSU_PC7:Idle_Wait state description
95 4.21.5.9.2 Transition SSU_PC7:Idle_Wait to SSU_PC2:Idle
4.21.5.10 SSU_PC8:Stopped state
4.21.5.10.1 SSU_PC8:Stopped state description
4.21.5.10.2 Transition SSU_PC8:Stopped to SSU_PC4:Active_Wait
96 4.21.5.10.3 Transition SSU_PC8:Stopped to SSU_PC7:Idle_Wait
4.21.5.10.4 Transition SSU_PC8:Stopped to SSU_PC9:Standby_Wait
4.21.5.11 SSU_PC9:Standby_Wait state
4.21.5.11.1 SSU_PC9:Standby_Wait state description
4.21.5.11.2 Transition SSU_PC9:Standby_Wait to SSU_PC3:Standby
97 4.21.5.12 SSU_PC10:Wait_Stopped state
4.21.5.12.1 SSU_PC10:Wait_Stopped state description
4.21.5.12.2 Transition SSU_PC10:Wait_Stopped to SSU_PC8:Stopped
4.22 Protection information model
4.22.1 Protection information overview
4.22.2 Protection types
4.22.2.1 Protection types overview
98 4.22.2.2 Type 0 protection
99 4.22.2.3 Type 1 protection
4.22.2.4 Type 2 protection
100 4.22.2.5 Type 3 protection
4.22.3 Protection information format
104 4.22.4 Logical block guard
4.22.4.1 Logical block guard overview
4.22.4.2 CRC generation
105 4.22.4.3 CRC checking
4.22.4.4 CRC test cases
4.22.5 Application of protection information
106 4.22.6 Protection information and commands
4.23 Grouping function
4.24 Background scan operations
4.24.1 Background scan overview
107 4.24.2 Background pre-scan operations
4.24.2.1 Enabling background pre-scan operations
4.24.2.2 Suspending and resuming background pre-scan operations
108 4.24.2.3 Halting background pre-scan operations
4.24.3 Background medium scan
4.24.3.1 Enabling background medium scan operations
109 4.24.3.2 Suspending and resuming background medium scan operations
4.24.3.3 Halting background medium scan operations
110 4.24.4 Interpreting the logged background scan results
4.25 Association between commands and CbCS permission bits
112 4.26 Deferred microcode activation
4.27 Model for uninterrupted sequences on LBA ranges
4.28 Referrals
4.28.1 Referrals overview
113 4.28.2 Discovering referrals
114 4.28.3 Referrals in sense data
115 4.29 ORWRITE commands
4.29.1 ORWRITE commands overview
4.29.2 ORWgeneration code
4.29.2.1 ORWgeneration code overview
116 4.29.2.2 ORWgeneration code processing
4.29.3 Change generation and clear operation
118 4.29.4 Set operation
119 4.30 Block device ROD token operations
4.30.1 Block device ROD token operations overview
120 4.30.2 POPULATE TOKEN command and WRITE USING TOKEN command completion
4.30.3 Block device specific ROD tokens
121 4.30.4 Block device zero ROD token
4.30.5 ROD token device type specific data
123 5 Commands for direct access block devices
5.1 Commands for direct access block devices overview
126 5.2 COMPARE AND WRITE command
128 5.3 FORMAT UNIT command
5.3.1 FORMAT UNIT command overview
132 5.3.2 FORMAT UNIT parameter list
5.3.2.1 FORMAT UNIT parameter list overview
5.3.2.2 Parameter list header
137 5.3.2.3 Initialization pattern descriptor
138 5.4 GET LBA STATUS command
5.4.1 GET LBA STATUS command overview
140 5.4.2 GET LBA STATUS parameter data
5.4.2.1 GET LBA STATUS parameter data overview
141 5.4.2.2 LBA status descriptor
5.4.2.3 LBA status descriptor relationships
142 5.5 ORWRITE (16) command
148 5.6 ORWRITE (32) command
150 5.7 POPULATE TOKEN command
5.7.1 POPULATE TOKEN command overview
151 5.7.2 POPULATE TOKEN parameter list
153 5.7.3 Block device range descriptor
154 5.8 PRE-FETCH (10) command
155 5.9 PRE-FETCH (16) command
156 5.10 PREVENT ALLOW MEDIUM REMOVAL command
157 5.11 READ (10) command
161 5.12 READ (12) command
163 5.13 READ (16) command
164 5.14 READ (32) command
165 5.15 READ CAPACITY (10) command
5.15.1 READ CAPACITY (10) overview
166 5.15.2 READ CAPACITY (10) parameter data
5.16 READ CAPACITY (16) command
5.16.1 READ CAPACITY (16) command overview
167 5.16.2 READ CAPACITY (16) parameter data
169 5.17 READ DEFECT DATA (10) command
5.17.1 READ DEFECT DATA (10) command overview
171 5.17.2 READ DEFECT DATA (10) parameter data
5.18 READ DEFECT DATA (12) command
5.18.1 READ DEFECT DATA (12) command overview
173 5.18.2 READ DEFECT DATA (12) parameter data
174 5.19 READ LONG (10) command
176 5.20 READ LONG (16) command
5.21 REASSIGN BLOCKS command
5.21.1 REASSIGN BLOCKS command overview
178 5.21.2 REASSIGN BLOCKS parameter list
180 5.22 RECEIVE ROD TOKEN INFORMATION
5.22.1 RECEIVE ROD TOKEN INFORMATION overview
5.22.2 RECEIVE ROD TOKEN INFORMATION parameter data for POPULATE TOKEN command
183 5.22.3 The RECEIVE ROD TOKEN INFORMATION parameter data for the WRITE USING TOKEN command
184 5.23 REPORT REFERRALS command
5.23.1 REPORT REFERRALS command overview
185 5.23.2 REPORT REFERRALS parameter data
186 5.24 SANITIZE command
5.24.1 SANITIZE command overview
187 5.24.2 SANITIZE command service actions
5.24.2.1 SANITIZE command service actions overview
5.24.2.2 OVERWRITE service action
188 5.24.2.3 BLOCK ERASE service action
189 5.24.2.4 CRYPTOGRAPHIC ERASE service action
5.24.2.5 EXIT FAILURE MODE service action
5.25 START STOP UNIT command
193 5.26 SYNCHRONIZE CACHE (10) command
194 5.27 SYNCHRONIZE CACHE (16) command
195 5.28 UNMAP command
5.28.1 UNMAP command overview
196 5.28.2 UNMAP parameter list
197 5.29 VERIFY (10) command
210 5.30 VERIFY (12) command
211 5.31 VERIFY (16) command
212 5.32 VERIFY (32) command
213 5.33 WRITE (10) command
216 5.34 WRITE (12) command
217 5.35 WRITE (16) command
218 5.36 WRITE (32) command
219 5.37 WRITE AND VERIFY (10) command
220 5.38 WRITE AND VERIFY (12) command
221 5.39 WRITE AND VERIFY (16) command
222 5.40 WRITE AND VERIFY (32) command
223 5.41 WRITE LONG (10) command
226 5.42 WRITE LONG (16) command
227 5.43 WRITE SAME (10) command
229 5.44 WRITE SAME (16) command
230 5.45 WRITE SAME (32) command
232 5.46 WRITE USING TOKEN command
5.46.1 WRITE USING TOKEN command overview
233 5.46.2 WRITE USING TOKEN parameter list
235 5.47 XDWRITEREAD (10) command
237 5.48 XDWRITEREAD (32) command
5.49 XPWRITE (10) command
239 5.50 XPWRITE (32) command
240 6 Parameters for direct access block devices
6.1 Parameters for direct access block devices introduction
6.2 Address descriptors
6.2.1 Address descriptor overview
241 6.2.2 Short block format address descriptor
6.2.3 Extended bytes from index address descriptor
243 6.2.4 Extended physical sector format address descriptor
244 6.2.5 Long block format address descriptor
6.2.6 Bytes from index format address descriptor
245 6.2.7 Physical sector format address descriptor
246 6.3 Diagnostic parameters
6.3.1 Diagnostic parameters overview
247 6.3.2 Rebuild Assist Input diagnostic page
248 6.3.3 Rebuild Assist Output diagnostic page
249 6.3.4 Translate Address Input diagnostic page
251 6.3.5 Translate Address Output diagnostic page
252 6.4 Log parameters
6.4.1 Log parameters overview
6.4.1.1 Summary of log pages
6.4.1.2 Setting and resetting log parameters
253 6.4.2 Background Scan log page
6.4.2.1 Background Scan log page overview
255 6.4.2.2 Background Scan Status log parameter
257 6.4.2.3 Background Scan Results log parameter
260 6.4.3 Format Status log page
6.4.3.1 Format Status log page overview
261 6.4.3.2 Format Data Out log parameter
262 6.4.3.3 Grown Defects During Certification log parameter
263 6.4.3.4 Total Blocks Reassigned During Format log parameter
264 6.4.3.5 Total New Blocks Reassigned log parameter
265 6.4.3.6 Power On Minutes Since Format log parameter
266 6.4.4 Logical Block Provisioning log page
6.4.4.1 Logical Block Provisioning log page overview
268 6.4.4.2 Available LBA Mapping Resource Count log parameter
6.4.4.2.1 Available LBA Mapping Resource Count log parameter overview
269 6.4.4.2.2 resource count field
6.4.4.3 Used LBA Mapping Resource Count log parameter
270 6.4.4.4 De-duplicated LBA Resource Count log parameter
271 6.4.4.5 Compressed LBA Resource Count log parameter
272 6.4.4.6 Total Efficiency LBA Resource Count log parameter
273 6.4.5 Non-volatile Cache log page
6.4.5.1 Non-volatile Cache log page overview
274 6.4.5.2 Remaining Nonvolatile Time log parameter
275 6.4.5.3 Maximum Nonvolatile Time log parameter
6.4.6 Solid State Media log page
6.4.6.1 Solid State Media log page overview
277 6.4.6.2 Percentage Used Endurance Indicator log parameter
278 6.5 Mode parameters
6.5.1 Mode parameters overview
279 6.5.2 Mode parameter block descriptors
6.5.2.1 Mode parameter block descriptors overview
6.5.2.2 Short LBA mode parameter block descriptor
281 6.5.2.3 Long LBA mode parameter block descriptor
282 6.5.3 Application Tag mode page
6.5.3.1 Introduction
284 6.5.3.2 Application tag descriptor
285 6.5.4 Background Control mode page
287 6.5.5 Caching mode page
291 6.5.6 Informational Exceptions Control mode page
296 6.5.7 Logical Block Provisioning mode page
6.5.7.1 Logical Block Provisioning mode page overview
297 6.5.7.2 Threshold descriptor format
298 6.5.8 Read-Write Error Recovery mode page
304 6.5.9 Verify Error Recovery mode page
305 6.6 Vital product data (VPD) parameters
6.6.1 VPD parameters overview
306 6.6.2 Block Device Characteristics VPD page
309 6.6.3 Block Limits VPD page
312 6.6.4 Logical Block Provisioning VPD page
314 6.6.5 Referrals VPD page
315 6.6.6 Third-Party Copy VPD page
6.6.6.1 Third-Party Copy VPD page overview
6.6.6.2 Block device third-party copy descriptor type codes
316 6.6.6.3 Block Device ROD Token Limits descriptor
317 6.7 Copy manager parameters
318 Annex A (informative) Numeric order codes
A.1 Variable length CDBs
319 A.2 Service action CDBs
320 Annex B (informative) XOR command examples
B.1 XOR command examples overview
B.2 Update write operation
321 B.3 Regenerate operation
322 B.4 Rebuild operation
324 Annex C (informative) CRC example in C
326 Annex D (informative) Sense information for locked or encrypted logical units
327 Annex E (informative) Optimizing block access characteristics
E.1 Optimizing block access overview
E.2 Starting logical block offset
E.3 Optimal granularity sizes
E.4 Optimizing transfers
328 E.5 Examples
329 Annex F (informative) Logical block provisioning reporting examples
F.1 Logical block provisioning reporting examples overview
F.2 Interpreting log parameter counts
330 F.3 Dedicated resource, threshold set tracked example
F.3.1 Dedicated resource, threshold set tracked example overview
F.3.2 Dedicated resource, threshold set tracked example configuration
331 F.3.3 Dedicated resource, threshold set tracked example sequence
332 F.3.4 Dedicated resource, threshold set tracked example initial conditions
F.3.5 Operations that occur
333 F.3.6 Dedicated resource, threshold set tracked example final log page values
F.4 Shared resource, logical block tracked example
F.4.1 Shared resource, logical block tracked example overview
334 F.4.2 Shared resource, logical block tracked example configuration
F.4.3 Shared resource, logical block tracked example time line
335 F.4.4 Shared resource, logical block tracked example initial conditions
F.4.5 Operations that occur
336 F.4.6 Shared resource, logical block tracked example final log page values
337 F.5 Shared available, dedicated used, logical block tracked example
F.5.1 Shared available, dedicated used, logical block tracked example overview
F.5.2 Shared available, dedicated used, logical block tracked example configuration
F.5.3 Shared available, dedicated used, logical block tracked example time line
338 F.5.4 Shared available, dedicated used, logical block tracked example initial conditions
F.5.5 Operations that occur
339 F.5.6 Shared available, dedicated used, example final log page values
340 Annex G (informative) Discovering referrals examples
G.1 Referrals example with no user data segment multiplier
342 G.2 Referrals example with non-zero user data segment multiplier
344 Bibliography
BS ISO/IEC 14776-323:2017
$215.11