cd.9 (128951) | cd.9 (130582) |
---|---|
1.\" Copyright (c) 1997 2.\" John-Mark Gurney. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 11 unchanged lines hidden (view full) --- 20.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26.\" SUCH DAMAGE. 27.\" | 1.\" Copyright (c) 1997 2.\" John-Mark Gurney. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 11 unchanged lines hidden (view full) --- 20.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26.\" SUCH DAMAGE. 27.\" |
28.\" $FreeBSD: head/share/man/man9/cd.9 128951 2004-05-05 10:47:19Z hmp $ | 28.\" $FreeBSD: head/share/man/man9/cd.9 130582 2004-06-16 08:33:57Z ru $ |
29.\" 30.Dd September 2, 2003 31.Dt CD 9 32.Os 33.Sh NAME 34.Nm cd 35.Nd CDROM driver for the CAM SCSI subsystem 36.Sh DESCRIPTION 37The 38.Nm 39device driver provides a read only interface for CDROM drives 40.Tn ( SCSI 41type 5) 42and WORM drives 43.Tn ( SCSI 44type 4) 45that support CDROM type commands. | 29.\" 30.Dd September 2, 2003 31.Dt CD 9 32.Os 33.Sh NAME 34.Nm cd 35.Nd CDROM driver for the CAM SCSI subsystem 36.Sh DESCRIPTION 37The 38.Nm 39device driver provides a read only interface for CDROM drives 40.Tn ( SCSI 41type 5) 42and WORM drives 43.Tn ( SCSI 44type 4) 45that support CDROM type commands. |
46Some drives don't behave as the driver expects. | 46Some drives do not behave as the driver expects. |
47See the 48.Sx QUIRKS 49section for information on possible flags. 50.Sh QUIRKS 51Each 52.Tn CD-ROM 53device can have different interpretations of the 54.Tn SCSI --- 31 unchanged lines hidden (view full) --- 86added to the 87.Xr cd 4 88driver. 89The reason is that the driver does several things to attempt to 90determine whether the drive in question needs 10 byte commands. 91First, it 92issues a CAM Path Inquiry command to determine whether the protocol that 93the drive speaks typically only allows 10 byte commands. | 47See the 48.Sx QUIRKS 49section for information on possible flags. 50.Sh QUIRKS 51Each 52.Tn CD-ROM 53device can have different interpretations of the 54.Tn SCSI --- 31 unchanged lines hidden (view full) --- 86added to the 87.Xr cd 4 88driver. 89The reason is that the driver does several things to attempt to 90determine whether the drive in question needs 10 byte commands. 91First, it 92issues a CAM Path Inquiry command to determine whether the protocol that 93the drive speaks typically only allows 10 byte commands. |
94.Po 95ATAPI and USB | 94(ATAPI and USB |
96are two prominent examples of protocols where you generally only want to | 95are two prominent examples of protocols where you generally only want to |
97send 10 byte commands. 98.Pc | 96send 10 byte commands.) |
99Then, if it gets an ILLEGAL REQUEST error back 100from a 6 byte MODE SENSE or MODE SELECT command, it attempts to send the 10 101byte version of the command instead. 102The only reason you would need a | 97Then, if it gets an ILLEGAL REQUEST error back 98from a 6 byte MODE SENSE or MODE SELECT command, it attempts to send the 10 99byte version of the command instead. 100The only reason you would need a |
103quirk is if your drive uses a protocol (e.g. | 101quirk is if your drive uses a protocol (e.g., |
104.Tn SCSI ) 105that typically doesn't have a problem with 6 byte commands. 106.El 107.Sh FILES 108.Bl -tag -width /sys/cam/scsi/scsi_cd.c -compact 109.It Pa /sys/cam/scsi/scsi_cd.c 110is the driver source file. 111.El --- 17 unchanged lines hidden --- | 102.Tn SCSI ) 103that typically doesn't have a problem with 6 byte commands. 104.El 105.Sh FILES 106.Bl -tag -width /sys/cam/scsi/scsi_cd.c -compact 107.It Pa /sys/cam/scsi/scsi_cd.c 108is the driver source file. 109.El --- 17 unchanged lines hidden --- |