NVM Express 1.3
4
5.14 Get Log Page command ........................................................................................................... 95
5.15 Identify command .................................................................................................................... 112
5.16 Keep Alive command .............................................................................................................. 139
5.17 NVMe-MI Receive command .................................................................................................. 140
5.18 NVMe-MI Send command ....................................................................................................... 140
5.19 Namespace Attachment command ......................................................................................... 141
5.20 Namespace Management command ...................................................................................... 143
5.21 Set Features command ........................................................................................................... 145
5.22 Virtualization Management command .................................................................................... 163
5.23 Format NVM command – NVM Command Set Specific ......................................................... 165
5.24 Sanitize command – NVM Command Set Specific................................................................. 167
5.25 Security Receive command – NVM Command Set Specific .................................................. 169
5.26 Security Send command – NVM Command Set Specific ....................................................... 171
6 NVM COMMAND SET ................................................................................................. 172
6.1 Namespaces ............................................................................................................................... 173
6.2 Fused Operations ....................................................................................................................... 175
6.3 Command Ordering Requirements ............................................................................................. 175
6.4 Atomic Operations ...................................................................................................................... 176
6.5 End-to-end Protection Information .............................................................................................. 180
6.6 Compare command .................................................................................................................... 180
6.7 Dataset Management command ................................................................................................ 182
6.8 Flush command .......................................................................................................................... 185
6.9 Read command .......................................................................................................................... 185
6.10 Reservation Acquire command ............................................................................................... 188
6.11 Reservation Register command .............................................................................................. 190
6.12 Reservation Release command .............................................................................................. 191
6.13 Reservation Report command ................................................................................................ 192
6.14 Write command ....................................................................................................................... 194
6.15 Write Uncorrectable command ............................................................................................... 197
6.16 Write Zeroes command ........................................................................................................... 198
7 CONTROLLER ARCHITECTURE ..................................................................................... 200
7.1 Introduction ................................................................................................................................. 200
7.2 Command Submission and Completion Mechanism (Informative) ............................................ 200
7.3 Resets ......................................................................................................................................... 207
7.4 Queue Management ................................................................................................................... 208
7.5 Interrupts ..................................................................................................................................... 209
7.6 Controller Initialization and Shutdown Processing ..................................................................... 212
7.7 Asynchronous Event Request Host Software Recommendations (Informative) ........................ 214
7.8 Feature Values ........................................................................................................................... 214
7.9 NVMe Qualified Names .............................................................................................................. 215
7.10 Identifier Format and Layout (Informative) .............................................................................. 216
7.11 Unique Identifier ...................................................................................................................... 218
7.12 Keep Alive ............................................................................................................................... 219
7.13 Updating Controller Doorbell Registers using a Shadow Doorbell Buffer .............................. 220
8 FEATURES ................................................................................................................ 221
8.1 Firmware Update Process .......................................................................................................... 221
8.2 Metadata Handling...................................................................................................................... 222
8.3 End-to-end Data Protection (Optional) ....................................................................................... 223
8.4 Power Management.................................................................................................................... 229
8.5 Virtualization Enhancements (Optional) ..................................................................................... 234
8.6 Doorbell Stride for Software Emulation ...................................................................................... 239
8.7 Standard Vendor Specific Command Format ............................................................................. 239