Deleted Added
full compact
cd.9 (128951) cd.9 (130582)
1.\" Copyright (c) 1997
2.\" John-Mark Gurney. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 11 unchanged lines hidden (view full) ---

20.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26.\" SUCH DAMAGE.
27.\"
1.\" Copyright (c) 1997
2.\" John-Mark Gurney. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 11 unchanged lines hidden (view full) ---

20.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26.\" SUCH DAMAGE.
27.\"
28.\" $FreeBSD: head/share/man/man9/cd.9 128951 2004-05-05 10:47:19Z hmp $
28.\" $FreeBSD: head/share/man/man9/cd.9 130582 2004-06-16 08:33:57Z ru $
29.\"
30.Dd September 2, 2003
31.Dt CD 9
32.Os
33.Sh NAME
34.Nm cd
35.Nd CDROM driver for the CAM SCSI subsystem
36.Sh DESCRIPTION
37The
38.Nm
39device driver provides a read only interface for CDROM drives
40.Tn ( SCSI
41type 5)
42and WORM drives
43.Tn ( SCSI
44type 4)
45that support CDROM type commands.
29.\"
30.Dd September 2, 2003
31.Dt CD 9
32.Os
33.Sh NAME
34.Nm cd
35.Nd CDROM driver for the CAM SCSI subsystem
36.Sh DESCRIPTION
37The
38.Nm
39device driver provides a read only interface for CDROM drives
40.Tn ( SCSI
41type 5)
42and WORM drives
43.Tn ( SCSI
44type 4)
45that support CDROM type commands.
46Some drives don't behave as the driver expects.
46Some drives do not behave as the driver expects.
47See the
48.Sx QUIRKS
49section for information on possible flags.
50.Sh QUIRKS
51Each
52.Tn CD-ROM
53device can have different interpretations of the
54.Tn SCSI

--- 31 unchanged lines hidden (view full) ---

86added to the
87.Xr cd 4
88driver.
89The reason is that the driver does several things to attempt to
90determine whether the drive in question needs 10 byte commands.
91First, it
92issues a CAM Path Inquiry command to determine whether the protocol that
93the drive speaks typically only allows 10 byte commands.
47See the
48.Sx QUIRKS
49section for information on possible flags.
50.Sh QUIRKS
51Each
52.Tn CD-ROM
53device can have different interpretations of the
54.Tn SCSI

--- 31 unchanged lines hidden (view full) ---

86added to the
87.Xr cd 4
88driver.
89The reason is that the driver does several things to attempt to
90determine whether the drive in question needs 10 byte commands.
91First, it
92issues a CAM Path Inquiry command to determine whether the protocol that
93the drive speaks typically only allows 10 byte commands.
94.Po
95ATAPI and USB
94(ATAPI and USB
96are two prominent examples of protocols where you generally only want to
95are two prominent examples of protocols where you generally only want to
97send 10 byte commands.
98.Pc
96send 10 byte commands.)
99Then, if it gets an ILLEGAL REQUEST error back
100from a 6 byte MODE SENSE or MODE SELECT command, it attempts to send the 10
101byte version of the command instead.
102The only reason you would need a
97Then, if it gets an ILLEGAL REQUEST error back
98from a 6 byte MODE SENSE or MODE SELECT command, it attempts to send the 10
99byte version of the command instead.
100The only reason you would need a
103quirk is if your drive uses a protocol (e.g.
101quirk is if your drive uses a protocol (e.g.,
104.Tn SCSI )
105that typically doesn't have a problem with 6 byte commands.
106.El
107.Sh FILES
108.Bl -tag -width /sys/cam/scsi/scsi_cd.c -compact
109.It Pa /sys/cam/scsi/scsi_cd.c
110is the driver source file.
111.El

--- 17 unchanged lines hidden ---
102.Tn SCSI )
103that typically doesn't have a problem with 6 byte commands.
104.El
105.Sh FILES
106.Bl -tag -width /sys/cam/scsi/scsi_cd.c -compact
107.It Pa /sys/cam/scsi/scsi_cd.c
108is the driver source file.
109.El

--- 17 unchanged lines hidden ---