SCSI Inquiry Command - Factbites
 Where results make sense
About us   |   Why use us?   |   Reviews   |   PR   |   Contact us  

Topic: SCSI Inquiry Command

    Note: these results are not from the primary (high quality) database.

Related Topics

In the News (Wed 21 Mar 18)

 Guidelines for OpenVMS Cluster Configurations
When OpenVMS boots, it determines which devices are present on the SCSI bus by sending an inquiry command to every SCSI ID. When a device receives the inquiry, it indicates its presence by returning data that indicates whether it is a disk, tape, or processor.
The procedures for ensuring that a device is inactive are described in Section A.7.6.3.
The device that is hot plugged must be inactive during the disconnection and connection operations. /scsys/vms/vmsdoc/72final/6318/6318pro_018.html

 Linux Kernel Mailing List -- 2.4.18: aic7xxx soft reboot broken
Since the upgrade, soft reboots don't work; the machine appears to shut down normally, but during the subsequent boot the SCSI BIOS reports a timeout on an inquiry command and is unable to find any drives on the bus.
Problem seems to be that the reboot notifier for the new aic7xxx driver is registered in aic7xxx_setup, which only gets called when there are module or kernel command-line params for aic7xxx.
Without reboot notification and cleanup, the card is left in a bad state at shutdown, and BIOS does not appear to clean it up during boot. /lists/kernel/old/2002-q2/msg07848.html

 The Linux SCSI programming HOWTO: Additional sense codes and additional sense code qualifiers
When the status of the executed SCSI command is CHECK_CONDITION, sense data is available in the sense buffer.
The additional sense code and additional sense code qualifier are contained in that buffer. /HOWTO/SCSI-Programming-HOWTO-22.html

 InfoStor - Guidelines for ensuring storage security
LUN masking is a relatively weak security mechanism, because it just restricts information returned by a target device via the SCSI Inquiry command.
To defeat LUN masking, you usually have to be trying to defeat it or have a very badly behaving software application.
Like LUN masking, it limits what a host can "see." But data can still be written to "unseen" devices. /Articles/Article_Display.cfm?Section=Articles&ARTICLE_ID=186304   (2640 words)

Try your search on: Qwika (all wikis)

  About us   |   Why use us?   |   Reviews   |   Press   |   Contact us  
Copyright © 2005-2007 Usage implies agreement with terms.