SCSI Inquiry Command - Factbites
 Factbites
 Where results make sense
About us   |   Why use us?   |   Reviews   |   PR   |   Contact us  

Topic: SCSI Inquiry Command


    Note: these results are not from the primary (high quality) database.


Related Topics

In the News (Sun 23 Sep 18)

  
 Guidelines for OpenVMS Cluster Configurations
When OpenVMS boots, it determines which devices are present on the SCSI bus by sending an inquiry command to every SCSI ID. When a device receives the inquiry, it indicates its presence by returning data that indicates whether it is a disk, tape, or processor.
The procedures for ensuring that a device is inactive are described in Section A.7.6.3.
The device that is hot plugged must be inactive during the disconnection and connection operations.
www.itec.suny.edu /scsys/vms/vmsdoc/72final/6318/6318pro_018.html

  
 Linux Kernel Mailing List -- 2.4.18: aic7xxx soft reboot broken
Since the upgrade, soft reboots don't work; the machine appears to shut down normally, but during the subsequent boot the SCSI BIOS reports a timeout on an inquiry command and is unable to find any drives on the bus.
Problem seems to be that the reboot notifier for the new aic7xxx driver is registered in aic7xxx_setup, which only gets called when there are module or kernel command-line params for aic7xxx.
Without reboot notification and cleanup, the card is left in a bad state at shutdown, and BIOS does not appear to clean it up during boot.
www.spinics.net /lists/kernel/old/2002-q2/msg07848.html

  
 The Linux SCSI programming HOWTO: Additional sense codes and additional sense code qualifiers
When the status of the executed SCSI command is CHECK_CONDITION, sense data is available in the sense buffer.
3F 03 DTLPWRSOMC INQUIRY DATA HAS CHANGED
The additional sense code and additional sense code qualifier are contained in that buffer.
www.tldp.org /HOWTO/SCSI-Programming-HOWTO-22.html

  
 InfoStor - Guidelines for ensuring storage security
LUN masking is a relatively weak security mechanism, because it just restricts information returned by a target device via the SCSI Inquiry command.
To defeat LUN masking, you usually have to be trying to defeat it or have a very badly behaving software application.
Like LUN masking, it limits what a host can "see." But data can still be written to "unseen" devices.
is.pennnet.com /Articles/Article_Display.cfm?Section=Articles&ARTICLE_ID=186304   (2640 words)

Try your search on: Qwika (all wikis)

Factbites
  About us   |   Why use us?   |   Reviews   |   Press   |   Contact us  
Copyright © 2005-2007 www.factbites.com Usage implies agreement with terms.