ANSI INCITS 452 AMD 1-2010 Information Technology C AT Attachment 8 C ATA ATAPI Command Set (ATA8-ACS) C Amendment 1.pdf
《ANSI INCITS 452 AMD 1-2010 Information Technology C AT Attachment 8 C ATA ATAPI Command Set (ATA8-ACS) C Amendment 1.pdf》由会员分享,可在线阅读,更多相关《ANSI INCITS 452 AMD 1-2010 Information Technology C AT Attachment 8 C ATA ATAPI Command Set (ATA8-ACS) C Amendment 1.pdf(28页珍藏版)》请在麦多课文档分享上搜索。
1、American National StandardDeveloped byfor Information Technology AT Attachment 8 ATA/ATAPI Command Set(ATA8-ACS) Amendment 1INCITS 452-2009/AM1-2010INCITS 452-2009/AM1-2010INCITS 452-2009/AM1-2010Amendment toINCITS 452-2009American National Standardfor Information Technology AT Attachment 8 ATA/ATAP
2、I Command Set (ATA8-ACS) Amendment 1SecretariatInformation Technology Industry CouncilApproved May 13, 2010 American National Standards Institute, Inc.Approval of an American National Standard requires review by ANSI that therequirements for due process, consensus, and other criteria for approval ha
3、vebeen met by the standards developer.Consensus is established when, in the judgement of the ANSI Board ofStandards Review, substantial agreement has been reached by directly andmaterially affected interests. Substantial agreement means much more thana simple majority, but not necessarily unanimity.
4、 Consensus requires that allviews and objections be considered, and that a concerted effort be madetowards their resolution.The use of American National Standards is completely voluntary; theirexistence does not in any respect preclude anyone, whether he has approvedthe standards or not, from manufa
5、cturing, marketing, purchasing, or usingproducts, processes, or procedures not conforming to the standards.The American National Standards Institute does not develop standards andwill in no circumstances give an interpretation of any American NationalStandard. Moreover, no person shall have the righ
6、t or authority to issue aninterpretation of an American National Standard in the name of the AmericanNational Standards Institute. Requests for interpretations should beaddressed to the secretariat or sponsor whose name appears on the titlepage of this standard.CAUTION NOTICE: This American National
7、 Standard may be revised orwithdrawn at any time. The procedures of the American National StandardsInstitute require that action be taken periodically to reaffirm, revise, orwithdraw this standard. Purchasers of American National Standards mayreceive current information on all standards by calling o
8、r writing the AmericanNational Standards Institute.American National StandardPublished byAmerican National Standards Institute, Inc.25 West 43rd Street, New York, NY 10036Copyright 2010 by Information Technology Industry Council (ITI)All rights reserved.No part of this publication may be reproduced
9、in anyform, in an electronic retrieval system or otherwise,without prior written permission of ITI, 1101 K Street NW, Suite 610 Washington, DC 20005. Printed in the United States of AmericaCAUTION: The developers of this standard have requested that holders of patents that may be re-quired for the i
10、mplementation of the standard disclose such patents to the publisher. However, nei-ther the developers nor the publisher have undertaken a patent search in order to identify which, ifany, patents may apply to this standard. As of the date of publication of this standard, followingcalls for the ident
11、ification of patents that may be required for the implementation of the standard,notice of one or more such claims has been received. By publication of this standard, no positionis taken with respect to the validity of this claim or of any rights in connection therewith. The knownpatent holder(s) ha
12、s (have), however, filed a statement of willingness to grant a license underthese rights on reasonable and nondiscriminatory terms and conditions to applicants desiring to ob-tain such a license. Details may be obtained from the publisher. No further patent search is con-ducted by the developer or p
13、ublisher in respect to any standard it processes. No representation ismade or implied that this is the only license that may be required to avoid infringement in the use ofthis standard.INCITS 452-2009/AM1-2010ATA8-ACS Amendment 1 Page 1 of 24 Replace a single row in Table 6Table 6 Block Size By Com
14、mand (part 1 of 2)Insert a single row into Table 9Table 9 Security Command Actions (part 3 of 4)CommandWords Transferred per BlockCFA TRANSLATE SECTOR 256Command LockedDisabled or UnlockedFrozenTRUSTED NON-DATACommand abortedExecutable ExecutableINCITS 452-2009/AM1-2010Page 2 of 24 ATA8-ACS Amendmen
15、t 1Completely replace section 4.25 with the following text:4.25 Trusted Computing feature setThe Trusted Computing feature set provides an interface between a horizontal security product embedded indevices whose behavior may be authorized via interaction with a trusted host system.The following comm
16、ands are mandatory for devices implementing the Trusted Computing feature set:a) TRUSTED SEND;b) TRUSTED SEND DMA;c) TRUSTED RECEIVE; d) TRUSTED RECEIVE DMA; ande) TRUSTED NON-DATA.TRUSTED SEND and TRUSTED SEND DMA may be used interchangeably. The two commands only differ bythe type of data transpor
17、t protocol used (i.e., PIO Data-Out Command or DMA Command). Similarly, TRUSTEDRECEIVE and TRUSTED RECEIVE DMA are interchangeable (i.e., PIO Data-In Command or DMA Command).IDENTIFY DEVICE data word 48 bit 0 indicates whether or not this feature set is supported.The DEVICE CONFIGURATION OVERLAY SET
18、 command provides a mechanism to remove support for thisfeature set.The data streams and subsequent actions resulting from these commands are defined by the security protocolidentified in the command parameters. These protocols may be defined by groups outside of this standard. The intent is to stan
19、dardize the data content so it is identical across both ATA and SCSI interfaces.INCITS 452-2009/AM1-2010ATA8-ACS Amendment 1 Page 3 of 24 Completely replace section 4.26 with the following text:4.26 Write-Read-Verify feature setThe optional Write-Read-Verify feature set allows a host to control read
20、 after write behavior in a device.To enable or disable the feature of Write-Read-Verify, the host issues a SET FEATURES command with one of the following subcommand codes:a) Enable Write-Read-Verify feature setb) Disable Write-Read-Verify feature setIt is possible that the device may experience redu
21、ced performance when the Write-Read-Verify feature set is enabled.These commands are affected by this feature: c) WRITE DMAd) WRITE DMA EXTe) WRITE DMA FUA EXTf) WRITE DMA QUEUEDg) WRITE DMA QUEUED EXTh) WRITE DMA QUEUED FUA EXTi) WRITE FPDMA QUEUEDj) WRITE MULTIPLEk) WRITE MULITIPLE EXTl) WRITE MUL
22、TIPLE FUA EXTm) WRITE SECTOR(S)n) WRITE SECTOR(S) EXTSee 7.52.10 for a description of device behavior when this feature set is supported and enabled.The IDENTIFY DEVICE command shall reflect the supported and enabled or disabled state of this feature set.When the devices volatile write cache is enab
23、led, the device may report command completion with no error to the host even if the data is in the device volatile write cache and not written and verified to the non-volatile media. This is important to reduce the performance degradation when the Write-Read-Verify feature set is enabled.If:a) the v
24、olatile write cache is disabled and any write command is processed by the device;b) a forced unit access write command is processed by the device; orc) a flush cache command is processed by the device,then the device shall only report command completion after the data has been verified.If the Write-
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ANSIINCITS452AMD12010INFORMATIONTECHNOLOGYCATATTACHMENT8CATAATAPICOMMANDSETATA8ACSCAMENDMENT1PDF

链接地址:http://www.mydoc123.com/p-435755.html