1 Approved Documents Included
2 Revision History
2.1 Revision 0 (1 August 2005)
2.2 Revision 1 (3 September 2005)
2.3 Revision 1a (5 September 2005)
2.4 Revision 2 (15 September 2005)
2.5 Revision 3 (19 January 2006)
2.6 Revision 4 (9 March 2006)
2.7 Revision 5 (10 June 2006)
2.8 Revision 5a (14 June 2006)
2.9 Revision 6 (18 July 2006)
2.10 Revision 7 (6 October 2006)
2.11 Revision 7a (7 October 2006)
2.12 Revision 8 (6 January 2007)
2.13 Revision 9 (17 February 2007)
2.14 Revision 10 (21 April 2007)
2.15 Revision 11 (14 May 2007)
Contents
Tables
Figures
Foreword
Introduction
1 Scope
2 Normative references
2.1 General
2.2 Approved references
2.3 References under development
2.4 NIST References
2.5 IETF References
3 Definitions, symbols, abbreviations, and conventions
3.1 Definitions
3.2 Symbols and acronyms
3.3 Keywords
3.4 Conventions
3.5 Bit and byte ordering
3.6 Notation conventions
3.6.1 Notation for byte encoded character strings
3.6.2 Notation for procedure calls
3.6.3 Notation for state diagrams
3.6.4 Notation for binary power multipliers
4 General Concepts
4.1 Introduction
4.2 The request-response model
4.3 The Command Descriptor Block (CDB)
4.3.1 CDB usage and structure
4.3.2 The fixed length CDB formats
4.3.3 The variable length CDB formats
4.3.4 Common CDB fields
4.3.4.1 Operation code
4.3.4.2 Service action
4.3.4.3 Logical block address
4.3.4.4 Transfer length
4.3.4.5 Parameter list length
4.3.4.6 Allocation length
4.3.4.7 Control
4.4 Data field requirements
4.4.1 ASCII data field requirements
4.4.2 Null data field termination and zero padding requirements
4.5 Sense data
4.5.1 Sense data introduction
4.5.2 Descriptor format sense data
4.5.2.1 Descriptor format sense data overview
4.5.2.2 Information sense data descriptor
4.5.2.3 Command-specific information sense data descriptor
4.5.2.4 Sense key specific sense data descriptor
4.5.2.4.1 Sense key specific sense data descriptor introduction
4.5.2.4.2 Field pointer sense key specific data
4.5.2.4.3 Actual retry count sense key specific data
4.5.2.4.4 Progress indication sense key specific data
4.5.2.4.5 Segment pointer sense key specific data
4.5.2.5 Field replaceable unit sense data descriptor
4.5.2.6 Vendor specific sense data descriptors
4.5.3 Fixed format sense data
4.5.4 Current errors
4.5.5 Deferred errors
4.5.6 Sense key and additional sense code definitions
4.6 Secure random numbers
5 Model common to all device types
5.1 Introduction to the model common to all device types
5.2 Important commands for all SCSI device servers
5.2.1 Commands implemented by all SCSI device servers
5.2.2 Commands recommended for all SCSI device servers
5.2.3 Using the INQUIRY command
5.2.4 Using the REPORT LUNS command
5.2.5 Using the TEST UNIT READY command
5.2.6 Using the REQUEST SENSE command
5.3 Implicit head of queue
5.4 Parameter rounding
5.5 Self-test operations
5.5.1 Default self-test
5.5.2 The short and extended self-tests
5.5.3 Self-test modes
5.5.3.1 Self-test modes overview
5.5.3.2 Foreground mode
5.5.3.3 Background mode
5.5.3.4 Features common to foreground and background self-test modes
5.6 Reservations
5.6.1 Persistent Reservations overview
5.6.2 Third party persistent reservations
5.6.3 Exceptions to SPC-2 RESERVE and RELEASE behavior
5.6.4 Preserving persistent reservations and registrations
5.6.4.1 Preserving persistent reservations and registrations through power loss
5.6.4.2 Nonvolatile memory considerations for preserving persistent reservations and registrations
5.6.5 Finding persistent reservations and reservation keys
5.6.5.1 Summary of commands for finding persistent reservations and reservation keys
5.6.5.2 Reporting reservation keys
5.6.5.3 Reporting the persistent reservation
5.6.5.4 Reporting full status
5.6.6 Registering
5.6.7 Registering and moving the reservation
5.6.8 Reserving
5.6.9 Persistent reservation holder
5.6.10 Releasing persistent reservations and removing registrations
5.6.10.1 Summary of service actions that release persistent reservations and remove registrations
5.6.10.2 Releasing
5.6.10.3 Unregistering
5.6.10.4 Preempting
5.6.10.4.1 Overview
5.6.10.4.2 Failed persistent reservation preempt
5.6.10.4.3 Preempting persistent reservations and registration handling
5.6.10.4.4 Removing registrations
5.6.10.5 Preempting and aborting
5.6.10.6 Clearing
5.7 Multiple target port and initiator port behavior
5.8 Target port group access states
5.8.1 Target port group access overview
5.8.2 Asymmetric logical unit access
5.8.2.1 Introduction to asymmetric logical unit access
5.8.2.2 Explicit and implicit asymmetric logical unit access
5.8.2.3 Discovery of asymmetric logical unit access behavior
5.8.2.4 Target port asymmetric access states
5.8.2.4.1 Target port asymmetric access states overview
5.8.2.4.2 Active/optimized state
5.8.2.4.3 Active/non-optimized state
5.8.2.4.4 Standby state
5.8.2.4.5 Unavailable state
5.8.2.4.6 Offline state
5.8.2.5 Transitions between target port asymmetric access states
5.8.2.6 Preference Indicator
5.8.2.7 Implicit asymmetric logical units access management
5.8.2.8 Explicit asymmetric logical units access management
5.8.2.9 Behavior after power on, hard reset, logical unit reset, and I_T nexus loss
5.8.2.10 Behavior of target ports that are not accessible from the service delivery subsystem
5.8.3 Symmetric logical unit access
5.9 Power conditions
5.9.1 Power conditions overview
5.9.2 Power condition state machine
5.9.2.1 Power condition state machine overview
5.9.2.2 PC0:Powered_on state
5.9.2.3 PC1:Active state
5.9.2.4 PC2:Idle state
5.9.2.5 PC3:Standby state
5.10 Medium auxiliary memory
5.11 Application client logging
5.12 Device clocks
5.13 Security Features
5.13.1 Security goals and threat model
5.13.1.1 Overview
5.13.1.2 Security goals
5.13.1.3 Threat model
5.13.1.4 Types of attacks
5.13.1.5 SCSI security considerations
5.13.2 Security associations
5.13.2.1 Principals of security associations
5.13.2.2 SA parameters
5.13.2.3 Creating a security association
5.13.3 Key derivation functions
5.13.3.1 Overview
5.13.3.2 IKEv2-based iterative KDF
5.13.3.3 HMAC-based KDFs
5.13.3.4 AES-XCBC-PRF-128 IKEv2-based iterative KDF
5.13.4 Security algorithm codes
5.14 Identifying information
5.15 Downloading and activating microcode
6 Commands for all device types
6.1 Summary of commands for all device types
6.2 CHANGE ALIASES command
6.2.1 CHANGE ALIASES command introduction
6.2.2 Alias entry format
6.2.3 Alias designation validation
6.2.4 Alias entry protocol independent designations
6.2.4.1 Alias entry protocol independent designations overview
6.2.4.2 NULL DESIGNATION alias format
6.3 EXTENDED COPY command
6.3.1 EXTENDED COPY command introduction
6.3.2 Errors detected before starting processing of the segment descriptors
6.3.3 Errors detected during processing of segment descriptors
6.3.4 Abort task management functions
6.3.5 Descriptor type codes
6.3.6 Target descriptors
6.3.6.1 Target descriptors introduction
6.3.6.2 Identification descriptor target descriptor format
6.3.6.3 Alias target descriptor format
6.3.6.4 Device type specific target descriptor parameters for block device types
6.3.6.5 Device type specific target descriptor parameters for sequential-access device types
6.3.6.6 Device type specific target descriptor parameters for processor device types
6.3.7 Segment descriptors
6.3.7.1 Segment descriptors introduction
6.3.7.2 Segment descriptor processing
6.3.7.3 Block device to stream device operations
6.3.7.4 Stream device to block device operations
6.3.7.5 Block device to block device operations
6.3.7.6 Stream device to stream device operations
6.3.7.7 Inline data to stream device operation
6.3.7.8 Embedded data to stream device operation
6.3.7.9 Stream device to discard operation
6.3.7.10 Verify device operation
6.3.7.11 Block device with offset to stream device operation
6.3.7.12 Stream device to block device with offset operation
6.3.7.13 Block device with offset to block device with offset operation
6.3.7.14 Write filemarks operation
6.3.7.15 Space operation
6.3.7.16 Locate operation
6.3.7.17 Tape device image copy operation
6.3.7.18 Register persistent reservation key operation
6.3.7.19 Third party persistent reservations source I_T nexus
6.4 INQUIRY command
6.4.1 INQUIRY command introduction
6.4.2 Standard INQUIRY data
6.4.3 SCSI Parallel Interface specific INQUIRY data
6.4.4 Vital product data
6.5 LOG SELECT command
6.6 LOG SENSE command
6.7 MANAGEMENT PROTOCOL IN command
6.7.1 MANAGEMENT PROTOCOL IN command description
6.7.2 Management protocol information description
6.7.2.1 Overview
6.7.2.2 CDB description
6.7.2.3 Supported management protocols list description
6.8 MANAGEMENT PROTOCOL OUT command
6.9 MODE SELECT(6) command
6.10 MODE SELECT(10) command
6.11 MODE SENSE(6) command
6.11.1 MODE SENSE(6) command introduction
6.11.2 Current values
6.11.3 Changeable values
6.11.4 Default values
6.11.5 Saved values
6.11.6 Initial responses
6.12 MODE SENSE(10) command
6.13 PERSISTENT RESERVE IN command
6.13.1 PERSISTENT RESERVE IN command introduction
6.13.2 READ KEYS service action
6.13.3 READ RESERVATION service action
6.13.3.1 READ RESERVATION service action introduction
6.13.3.2 Format of PERSISTENT RESERVE IN parameter data for READ RESERVATION
6.13.3.3 Persistent reservations scope
6.13.3.4 Persistent reservations type
6.13.4 REPORT CAPABILITIES service action
6.13.5 READ FULL STATUS service action
6.14 PERSISTENT RESERVE OUT command
6.14.1 PERSISTENT RESERVE OUT command introduction
6.14.2 PERSISTENT RESERVE OUT service actions
6.14.3 Basic PERSISTENT RESERVE OUT parameter list
6.14.4 PERSISTENT RESERVE OUT command with REGISTER AND MOVE service action parameters
6.15 READ ATTRIBUTE command
6.15.1 READ ATTRIBUTE command introduction
6.15.2 ATTRIBUTE VALUES service action
6.15.3 ATTRIBUTE LIST service action
6.15.4 VOLUME LIST service action
6.15.5 PARTITION LIST service action
6.16 READ BUFFER command
6.16.1 READ BUFFER command introduction
6.16.2 Combined header and data mode (00h)
6.16.3 Vendor specific mode (01h)
6.16.4 Data mode (02h)
6.16.5 Descriptor mode (03h)
6.16.6 Echo buffer mode (0Ah)
6.16.7 Echo buffer descriptor mode (0Bh)
6.16.8 Enable expander communications protocol and Echo buffer (1Ah)
6.17 READ MEDIA SERIAL NUMBER command
6.18 RECEIVE COPY RESULTS command
6.18.1 RECEIVE COPY RESULTS command introduction
6.18.2 COPY STATUS service action
6.18.3 RECEIVE DATA service action
6.18.4 OPERATING PARAMETERS service action
6.18.5 FAILED SEGMENT DETAILS service action
6.19 RECEIVE DIAGNOSTIC RESULTS command
6.20 REPORT ALIASES command
6.21 REPORT IDENTIFYING INFORMATION command
6.21.1 REPORT IDENTIFYING INFORMATION command overview
6.21.2 IDENTIFYING INFORMATION parameter data
6.21.3 IDENTIFYING INFORMATION SUPPORTED parameter data
6.22 REPORT LUNS command
6.23 REPORT PRIORITY command
6.24 REPORT SUPPORTED OPERATION CODES command
6.24.1 REPORT SUPPORTED OPERATION CODES command introduction
6.24.2 All_commands parameter data format
6.24.3 One_command parameter data format
6.24.4 Command timeouts descriptor
6.24.4.1 Overview
6.24.4.2 WRITE BUFFER command timeouts descriptor command specific field usage
6.25 REPORT SUPPORTED TASK MANAGEMENT FUNCTIONS command
6.26 REPORT TARGET PORT GROUPS command
6.27 REPORT TIMESTAMP command
6.28 REQUEST SENSE command
6.29 SECURITY PROTOCOL IN command
6.29.1 SECURITY PROTOCOL IN command description
6.29.2 Security protocol information description
6.29.2.1 Overview
6.29.2.2 CDB description
6.29.2.3 Supported security protocols list description
6.29.2.4 Certificate data description
6.29.2.4.1 Certificate overview
6.29.2.4.2 Public Key certificate description
6.29.2.4.3 Attribute certificate description
6.30 SECURITY PROTOCOL OUT command
6.31 SEND DIAGNOSTIC command
6.32 SET IDENTIFYING INFORMATION command
6.33 SET PRIORITY command
6.34 SET TARGET PORT GROUPS command
6.35 SET TIMESTAMP command
6.36 TEST UNIT READY command
6.37 WRITE ATTRIBUTE command
6.38 WRITE BUFFER command
6.38.1 WRITE BUFFER command introduction
6.38.2 Combined header and data mode (00h)
6.38.3 Vendor specific mode (01h)
6.38.4 Data mode (02h)
6.38.5 Download microcode and activate mode (04h)
6.38.6 Download microcode, save, and activate mode (05h)
6.38.7 Download microcode with offsets and activate mode (06h)
6.38.8 Download microcode with offsets, save, and activate mode (07h)
6.38.9 Write data to echo buffer mode (0Ah)
6.38.10 Download microcode with offsets, save, and defer activate mode (0Eh)
6.38.11 Activate deferred microcode mode (0Fh)
6.38.12 Enable expander communications protocol and Echo buffer mode (1Ah)
6.38.13 Disable expander communications protocol mode (1Bh)
6.38.14 Download application log mode (1Ch)
7 Parameters for all device types
7.1 Diagnostic parameters
7.1.1 Diagnostic page format and page codes for all device types
7.1.2 Supported diagnostic pages
7.2 Log parameters
7.2.1 Log page structure and page codes for all device types
7.2.2 Application Client log page
7.2.3 Buffer Over-Run/Under-Run log page
7.2.4 Error Counter log pages
7.2.5 Informational Exceptions log page
7.2.6 Last n Deferred Errors or Asynchronous Events log page
7.2.7 Last n Error Events log page
7.2.8 Non-Medium Error log page
7.2.9 Protocol Specific Port log page
7.2.10 Self-Test Results log page
7.2.11 Start-Stop Cycle Counter log page
7.2.12 Statistics and Performance log pages
7.2.12.1 Statistics and Performance log pages overview
7.2.12.2 General Statistics and Performance log page
7.2.12.3 Group Statistics and Performance (n) log page
7.2.13 Supported Log Pages log page
7.2.14 Supported Log Pages and Subpages log page
7.2.15 Supported Subpages log page
7.2.16 Temperature log page
7.3 Medium auxiliary memory attributes
7.3.1 Attribute format
7.3.2 Attribute identifier values
7.3.2.1 Attribute identifier values overview
7.3.2.2 Device type attributes
7.3.2.3 Medium type attributes
7.3.2.4 Host type attributes
7.4 Mode parameters
7.4.1 Mode parameters overview
7.4.2 Mode parameter list format
7.4.3 Mode parameter header formats
7.4.4 Mode parameter block descriptor formats
7.4.4.1 General block descriptor format
7.4.5 Mode page and subpage formats and page codes
7.4.6 Control mode page
7.4.7 Control Extension mode page
7.4.8 Disconnect-Reconnect mode page
7.4.9 Extended mode page
7.4.10 Extended Device-Type Specific mode page
7.4.11 Informational Exceptions Control mode page
7.4.12 Power Condition mode page
7.4.13 Protocol Specific Logical Unit mode page
7.4.14 Protocol Specific Port mode page
7.5 Protocol specific parameters
7.5.1 Protocol specific parameters introduction
7.5.2 Alias entry protocol specific designations
7.5.2.1 Introduction to alias entry protocol specific designations
7.5.2.2 Fibre Channel specific alias entry designations
7.5.2.2.1 Introduction to Fibre Channel specific alias entry designations
7.5.2.2.2 Fibre Channel world wide port name alias entry designation
7.5.2.2.3 Fibre Channel world wide port name with N_Port checking alias entry designation
7.5.2.3 RDMA specific alias entry designations
7.5.2.3.1 Introduction to RDMA specific alias entry designations
7.5.2.3.2 RDMA target port identifier alias entry designation
7.5.2.3.3 InfiniBand global identifier with target port identifier checking alias entry designation
7.5.2.4 Internet SCSI specific alias entry designations
7.5.2.4.1 Introduction to Internet SCSI specific alias entry designations
7.5.2.4.2 iSCSI name alias entry designation
7.5.2.4.3 iSCSI name with binary IPv4 address alias entry designation
7.5.2.4.4 iSCSI name with IPname alias entry designation
7.5.2.4.5 iSCSI name with binary IPv6 address alias entry designation
7.5.3 EXTENDED COPY protocol specific target descriptors
7.5.3.1 Introduction to EXTENDED COPY protocol specific target descriptors
7.5.3.2 Fibre Channel N_Port_Name EXTENDED COPY target descriptor format
7.5.3.3 Fibre Channel N_Port_ID EXTENDED COPY target descriptor format
7.5.3.4 Fibre Channel N_Port_ID with N_Port_Name checking EXTENDED COPY target descriptor format
7.5.3.5 SCSI Parallel T_L EXTENDED COPY target descriptor format
7.5.3.6 IEEE 1394 EUI-64 EXTENDED COPY target descriptor format
7.5.3.7 RDMA EXTENDED COPY target descriptor format
7.5.3.8 iSCSI binary IPv4 address EXTENDED COPY target descriptor format
7.5.3.9 SAS serial SCSI protocol target descriptor format
7.5.4 TransportID identifiers
7.5.4.1 Overview of TransportID identifiers
7.5.4.2 TransportID for initiator ports using SCSI over Fibre Channel
7.5.4.3 TransportID for initiator ports using a parallel SCSI bus
7.5.4.4 TransportID for initiator ports using SCSI over IEEE 1394
7.5.4.5 TransportID for initiator ports using SCSI over an RDMA interface
7.5.4.6 TransportID for initiator ports using SCSI over iSCSI
7.5.4.7 TransportID for initiator ports using SCSI over SAS Serial SCSI Protocol
7.6 Vital product data parameters
7.6.1 Vital product data parameters overview and page codes
7.6.2 ASCII Information VPD page
7.6.3 Device Identification VPD page
7.6.3.1 Device Identification VPD page overview
7.6.3.2 Device designation descriptor requirements
7.6.3.2.1 Designation descriptors for logical units other than well known logical units
7.6.3.2.2 Designation descriptors for well known logical units
7.6.3.2.3 Designation descriptors for SCSI target ports
7.6.3.2.3.1 Relative target port identifiers
7.6.3.2.3.2 Target port names or identifiers
7.6.3.2.4 Designation descriptors for SCSI target devices
7.6.3.3 Vendor specific designator format
7.6.3.4 T10 vendor ID based designator format
7.6.3.5 EUI-64 based designator format
7.6.3.5.1 EUI-64 based designator format overview
7.6.3.5.2 EUI-64 designator format
7.6.3.5.3 EUI-64 based 12-byte designator format
7.6.3.5.4 EUI-64 based 16-byte designator format
7.6.3.6 NAA designator format
7.6.3.6.1 NAA identifier basic format
7.6.3.6.2 NAA IEEE Extended designator format
7.6.3.6.3 NAA Locally Assigned designator format
7.6.3.6.4 NAA IEEE Registered designator format
7.6.3.6.5 NAA IEEE Registered Extended designator format
7.6.3.7 Relative target port designator format
7.6.3.8 Target port group designator format
7.6.3.9 Logical unit group designator format
7.6.3.10 MD5 logical unit designator format
7.6.3.11 SCSI name string designator format
7.6.4 Extended INQUIRY Data VPD page
7.6.5 Management Network Addresses VPD page
7.6.6 Mode Page Policy VPD page
7.6.7 SCSI Ports VPD page
7.6.8 Software Interface Identification VPD page
7.6.9 Supported VPD Pages
7.6.10 Unit Serial Number VPD page
8 Well known logical units
8.1 Model for well known logical units
8.2 REPORT LUNS well known logical unit
8.3 ACCESS CONTROLS well known logical unit
8.3.1 Access controls model
8.3.1.1 Access controls commands
8.3.1.2 Access controls overview
8.3.1.3 The access control list (ACL)
8.3.1.3.1 ACL overview
8.3.1.3.2 Access identifiers
8.3.1.3.3 Logical unit access control descriptors
8.3.1.4 Managing the ACL
8.3.1.4.1 ACL management overview
8.3.1.4.2 Authorizing ACL management
8.3.1.4.3 Identifying logical units during ACL management
8.3.1.4.4 Tracking changes in logical unit identification
8.3.1.5 Enrolling AccessIDs
8.3.1.5.1 Enrollment states
8.3.1.5.1.1 Summary of enrollment states
8.3.1.5.1.2 Not-enrolled state
8.3.1.5.1.3 Enrolled state
8.3.1.5.1.4 Pending-enrolled state
8.3.1.5.2 ACL LUN conflict resolution
8.3.1.6 Granting and revoking access rights
8.3.1.6.1 Non-proxy access rights
8.3.1.6.2 Proxy access
8.3.1.6.2.1 Proxy tokens
8.3.1.6.2.2 Proxy LUNs
8.3.1.7 Verifying access rights
8.3.1.8 The management identifier key
8.3.1.8.1 Management identifier key usage
8.3.1.8.2 Overriding the management identifier key
8.3.1.8.2.1 The OVERRIDE MGMT ID KEY service action
8.3.1.8.2.2 The override lockout timer
8.3.1.9 Reporting access control information
8.3.1.10 Access controls log
8.3.1.11 Interactions of access controls and other features
8.3.1.11.1 Task set management and access controls
8.3.1.11.2 Existing reservations and ACL changes
8.3.1.12 Access controls information persistence and memory usage requirements
8.3.1.13 Access identifier formats
8.3.1.13.1 Access identifier type
8.3.1.13.2 AccessID access identifiers
8.3.2 ACCESS CONTROL IN command
8.3.2.1 ACCESS CONTROL IN introduction
8.3.2.2 REPORT ACL service action
8.3.2.2.1 REPORT ACL introduction
8.3.2.2.2 REPORT ACL parameter data format
8.3.2.2.2.1 REPORT ACL parameter data introduction
8.3.2.2.2.2 Granted ACL data page format
8.3.2.2.2.3 Granted All ACL data page format
8.3.2.2.2.4 Proxy Tokens ACL data page format
8.3.2.3 REPORT LU DESCRIPTORS service action
8.3.2.3.1 REPORT LU DESCRIPTORS introduction
8.3.2.3.2 REPORT LU DESCRIPTORS parameter data format
8.3.2.4 REPORT ACCESS CONTROLS LOG service action
8.3.2.4.1 REPORT ACCESS CONTROLS LOG introduction
8.3.2.4.2 REPORT ACCESS CONTROLS LOG parameter data format
8.3.2.4.2.1 REPORT ACCESS CONTROLS LOG parameter data introduction
8.3.2.4.2.2 Key Overrides access controls log portion page format
8.3.2.4.2.3 Invalid Keys access controls log portion page format
8.3.2.4.2.4 ACL LUN Conflicts access controls log portion page format
8.3.2.5 REPORT OVERRIDE LOCKOUT TIMER service action
8.3.2.6 REQUEST PROXY TOKEN service action
8.3.3 ACCESS CONTROL OUT command
8.3.3.1 ACCESS CONTROL OUT introduction
8.3.3.2 MANAGE ACL service action
8.3.3.2.1 MANAGE ACL introduction
8.3.3.2.2 The Grant/Revoke ACE page
8.3.3.2.3 The Grant All ACE page
8.3.3.2.4 The Revoke Proxy Token ACE page
8.3.3.2.5 The Revoke All Proxy Tokens ACE page
8.3.3.3 DISABLE ACCESS CONTROLS service action
8.3.3.4 ACCESS ID ENROLL service action
8.3.3.5 CANCEL ENROLLMENT service action
8.3.3.6 CLEAR ACCESS CONTROLS LOG service action
8.3.3.7 MANAGE OVERRIDE LOCKOUT TIMER service action
8.3.3.8 OVERRIDE MGMT ID KEY service action
8.3.3.9 REVOKE PROXY TOKEN service action
8.3.3.10 REVOKE ALL PROXY TOKENS service action
8.3.3.11 ASSIGN PROXY LUN service action
8.3.3.12 RELEASE PROXY LUN service action
8.4 TARGET LOG PAGES well known logical unit
8.5 SECURITY PROTOCOL well known logical unit
8.6 MANAGEMENT PROTOCOL well known logical unit
Annex A
Terminology mapping
Annex B
PERSISTENT RESERVE IN/OUT functionality for RESERVE/RELEASE replacement
B.1 Introduction
B.2 Replacing the reserve/release method with the PERSISTENT RESERVE OUT COMMAND
B.3 Third party reservations
Annex C
Numeric order codes
C.1 Numeric order codes introduction
C.2 Additional sense codes
C.3 Operation codes
C.3.1 Operation codes
C.3.2 Additional operation codes for devices with the EncServ bit set to one
C.3.3 MAINTENANCE (IN) and MAINTENANCE (OUT) service actions
C.3.4 SERVICE ACTION IN and SERVICE ACTION OUT service actions
C.3.5 Variable length CDB service action codes
C.4 Diagnostic page codes
C.5 Log page codes
C.6 Mode page codes
C.7 VPD page codes
C.8 Version descriptor values
C.9 T10 IEEE binary identifiers
Annex D
T10 vendor identification