Avago Technologies MegaRAID Fast Path Software User Manual

Page 261

Advertising
background image

LSI Corporation Confidential

|

July 2011

Page 261

MegaRAID SAS Software User Guide

Chapter 5: MegaRAID Command Tool

|

Drive-Related Options

5.15.17 Set the Mapping Mode of the
Drives to the Selected Controllers

Use the command in the following table to set the mapping mode of the physical
devices connected to the selected controllers.

5.15.18 Secure Erase for Virtual Drives
and Physical Drives

Use the command in the following table to the perform the secure erase operation on a
virtual drive or a physical drive.

The command in this section performs a secure erase. It performs a series of write
operations to a drive that overwrites every user-accessible sector of the drive with
specified patterns.

5.15.19 Perform the Copyback
Operation on the Selected Drive

Use the command in the following table to the perform the copyback operation on the
selected drive.

The copyback feature allows you to copy data from a source drive of a virtual drive to a
destination drive that is not a part of the virtual drive. Copyback is often used to create
or restore a specific physical configuration for a drive group (for example, a specific
arrangement of drive group members on the device I/O buses).

Table 113: Set the Mapping Mode of the Drive to the Selected Controller

Convention

MegaCli -DirectPdMapping -Enbl|-Dsbl|-Dsply
-aN|-a0,1,2|-aALL

Description

Sets the mapping mode of the drives connected to the specified controllers.

Enbl

: Enables the direct physical drive mapping mode.

Dsbl

: Disables the direct physical drive mapping mode.

Dsply

: Displays the current state of the direct physical drive mapping.

Table 114: Secure Erase for Virtual Drives and Physical Drives

Convention

MegaCli -SecureErase Start –EraseType [
[-ErasePattern A] | [–ErasePattern B]] | Stop|
ShowProg| ProgDsply -PhysDrv [E0:S0,E1:S1,...] |
-Lx|-L0,1,2|-LALL -aN|-a0,1,2|-aALL

Description

The SecureErase command performs a series of write operations to a
drive that overwrite every user-accessible sector of the drive with specified
patterns. It can be repeated in multiple passes using different data patterns
for enhanced security.

Advertising