{"id":4978,"date":"2021-04-20T15:48:46","date_gmt":"2021-04-20T22:48:46","guid":{"rendered":"https:\/\/phisonblog.com\/?p=4978"},"modified":"2022-06-14T08:11:09","modified_gmt":"2022-06-14T15:11:09","slug":"using-drive-log-for-ssd-analysis-2","status":"publish","type":"post","link":"https:\/\/phisonblog.com\/de\/using-drive-log-for-ssd-analysis-2\/","title":{"rendered":"Verwenden von Drive Log f\u00fcr die SSD-Analyse"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.9.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.9.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.14.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><\/p>\n<p>Over the past decade, solid-state disks (SSDs) have gradually taken the place of hard drives in many devices. More and more consumers and clients choose SSDs as their storage solution for notebooks, personal computers, and enterprise applications. As such, the need for SSDs to be reliable and secure is becoming more critical. The last thing anyone wants is for a faulty or aging SSD to be responsible for the loss of anyone&#8217;s crucial data. It&#8217;s necessary to monitor the health of SSDs and analyze an SSDs status to reassure a user that an SSD is still reliable and inform users when the life of an SSD is coming to an end.<\/p>\n<p>The standard SSD lifetime and workload analysis tool is S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology.) This tool records drive status attributes, including erase count, bad block count, uncorrectable error count, CRC error count, SSD life remaining, and more. More advanced analysis tools, such as protocol analyzer, UART mode, and drive log, help for debugging and protocol trace analysis when an SSD encounters unexpected errors that are hard to resolve immediately. In some cases, using drive log to clarify issues is simpler and more efficient than using protocol analyzer and UART. It can save an engineer time by not going back and forth between two places, allowing the engineer to focus on drive log analysis to resolve any issue quickly. Therefore, it made sense to Phison to create a drive log as a helpful debug tool, enabling our customers to be more confident in Phison&#8217;s after-sales service.<\/p>\n<h3>\u00a0<\/h3>\n<h3>The structure of drive log<\/h3>\n<p>Drive log saves in the data buffer. Once the host issues a vendor-specific command, such as a FLUSH command or idle, the drive log flushes into NAND flash to the SSD.<br \/>Drive log is comprised of three parts:<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-4979 size-full\" src=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/04\/1020559_1_032621.jpg\" alt=\"\" width=\"560\" height=\"315\" srcset=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/04\/1020559_1_032621.jpg 560w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/04\/1020559_1_032621-480x270.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 560px, 100vw\" \/><\/p>\n<p>\u2022 Public area: Records general and public events.<br \/>\u2022 Private area: Records confidential events.<br \/>\u2022 Non-overwrite area: Records events that, once recorded, can&#8217;t be overwritten even when the public and private areas are full.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"wp-image-6242 alignnone size-full\" src=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/04\/Updated-1020559_2_032621-1.jpg\" alt=\"\" width=\"560\" height=\"315\" srcset=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/04\/Updated-1020559_2_032621-1.jpg 560w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/04\/Updated-1020559_2_032621-1-480x270.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 560px, 100vw\" \/><\/p>\n<p>Record information for host, FTL, and Flash IP save in drive log. The information stores the data by unique key words:<\/p>\n<p style=\"padding-left: 40px;\">\u2022 error event<br \/>\u2022 reset event<br \/>\u2022 abort event<br \/>\u2022 system event<\/p>\n<p>&nbsp;<\/p>\n<p>The record information in FTL has a different variable to log for assert events and other error events. As for the record information of Flash IP, the program error, erase error, and read retry in fail CE, block, and page.<\/p>\n<p>&nbsp;<\/p>\n<div class=\"banner_wrapper\" style=\"height: 83px;\"><div class=\"banner  banner-33199 bottom vert custom-banners-theme-default_style\" style=\"\"><img decoding=\"async\" width=\"1080\" height=\"150\" src=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/08\/Ensuring-Data-Correctness-With-Phisons-GuaranteedFlush\u2122.jpg\" class=\"attachment-full size-full\" alt=\"\" style=\"height: 83px;\" srcset=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/08\/Ensuring-Data-Correctness-With-Phisons-GuaranteedFlush\u2122.jpg 1080w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/08\/Ensuring-Data-Correctness-With-Phisons-GuaranteedFlush\u2122-300x42.jpg 300w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/08\/Ensuring-Data-Correctness-With-Phisons-GuaranteedFlush\u2122-1024x142.jpg 1024w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/08\/Ensuring-Data-Correctness-With-Phisons-GuaranteedFlush\u2122-768x107.jpg 768w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/08\/Ensuring-Data-Correctness-With-Phisons-GuaranteedFlush\u2122-18x3.jpg 18w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/08\/Ensuring-Data-Correctness-With-Phisons-GuaranteedFlush\u2122-610x85.jpg 610w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/08\/Ensuring-Data-Correctness-With-Phisons-GuaranteedFlush\u2122-980x136.jpg 980w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/08\/Ensuring-Data-Correctness-With-Phisons-GuaranteedFlush\u2122-480x67.jpg 480w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><a class=\"custom_banners_big_link\"  href=\"https:\/\/phisonblog.com\/ensuring-data-correctness-with-phisons-guaranteedflush-2\/\"><\/a><div class=\"banner_caption\" style=\"\"><div class=\"banner_caption_inner\"><div class=\"banner_caption_text\" style=\"\">Read:  Ensuring Data Correctness With Phison\u2019s GuaranteedFlush\u2122<\/div><\/div><\/div><\/div><\/div>\n<h3>\u00a0<\/h3>\n<h3>Encryption and decryption of drive log<\/h3>\n<p>There&#8217;s one vendor command to get the drive log and encrypt the log at the same time.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-4981 size-full\" src=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/04\/1020559_3_032621.jpg\" alt=\"\" width=\"560\" height=\"315\" srcset=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/04\/1020559_3_032621.jpg 560w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/04\/1020559_3_032621-480x270.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 560px, 100vw\" \/><\/p>\n<p>After loading an encrypted log into the specific tool, the tool generates two files. One is raw drive log data without decryption, and another is decrypted drive log data. Next, the log data separates by the specific tool according to different requirements, which then displays event information to help an engineer analyze drive behavior and resolve problems.<\/p>\n<h3>\u00a0<\/h3>\n<h3>Phison&#8217;s drive log give customers peace of mind<\/h3>\n<p>Phison has always offered a total SSD solution and services for customers. With the use of drive log, the processing time of RMA is reduced, and customer satisfaction is increased. Drive log is set to become the standard analysis tool in Phison SSDs.<\/p>\n<p>&nbsp;<\/p>\n<div class=\"banner_wrapper\" style=\"height: 83px;\"><div class=\"banner  banner-33150 bottom vert custom-banners-theme-default_style\" style=\"\"><img decoding=\"async\" width=\"1080\" height=\"150\" src=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/08\/Some-Common-Benchmarking-Tools-Used-in-SSD-Production.jpg\" class=\"attachment-full size-full\" alt=\"\" style=\"height: 83px;\" srcset=\"https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/08\/Some-Common-Benchmarking-Tools-Used-in-SSD-Production.jpg 1080w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/08\/Some-Common-Benchmarking-Tools-Used-in-SSD-Production-980x136.jpg 980w, https:\/\/phisonblog.com\/wp-content\/uploads\/2021\/08\/Some-Common-Benchmarking-Tools-Used-in-SSD-Production-480x67.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1080px, 100vw\" \/><a class=\"custom_banners_big_link\"  href=\"https:\/\/phisonblog.com\/some-common-benchmarking-tools-used-in-ssd-production-2\/\"><\/a><div class=\"banner_caption\" style=\"\"><div class=\"banner_caption_inner\"><div class=\"banner_caption_text\" style=\"\">Read: Some Common Benchmarking Tools Used in SSD Production<\/div><\/div><\/div><\/div><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div class=\"SnapLinksContainer\" style=\"margin-left: 0px; margin-top: 0px; display: none;\">\n<div class=\"SL_SelectionRect\">\n<div class=\"SL_SelectionLabel\" style=\"right: 2px; bottom: 2px;\">0 Links<\/div>\n<\/div>\n<p><!-- Used for easily cloning the properly namespaced rect --><\/p>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the past decade, solid-state disks (SSDs) have gradually taken the place of hard drives in many devices. More and more consumers and clients choose SSDs as their storage solution for notebooks, personal computers, and enterprise applications. As such, the need for SSDs to be reliable and secure is becoming more critical. The last thing [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":4983,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[23,8],"tags":[22],"class_list":["post-4978","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-all-posts","category-technology","tag-long-content"],"acf":[],"_links":{"self":[{"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/posts\/4978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/comments?post=4978"}],"version-history":[{"count":1,"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/posts\/4978\/revisions"}],"predecessor-version":[{"id":43022,"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/posts\/4978\/revisions\/43022"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/media\/4983"}],"wp:attachment":[{"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/media?parent=4978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/categories?post=4978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phisonblog.com\/de\/wp-json\/wp\/v2\/tags?post=4978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}