Kingston will be closed Thursday, Friday, Saturday and Sunday in observance of the Thanksgiving Holiday.
All orders placed after 11:00 am (PST) on Wednesday November 25th, will not be processed until Monday November 30th.

We wish you and your Family a Happy Holiday!

常見問題

更多問題

裁切技術與垃圾資料回收是現今 SSD 固態硬碟所採用的技術,為的是要提高其效能和耐久性。
剛開始使用 SSD 固態硬碟時,全部的 NAND 區塊都是空白,因此 SSD 固態硬碟可以在一次的操作中將新資料寫入空白區塊。
隨著使用時間拉長,大部分的區塊將成為存有使用者資料的已使用區塊。
為了將新的資料寫入已使用區塊,SSD 固態硬碟被迫執行讀取 - 修改 - 寫入之週期。讀取 - 修改 - 寫入之週期會損害 SSD 固態硬碟的整體效能,因為必須執行三個動作,而不是單一操作就能結束。
讀取 - 修改-寫入之週期也會造成寫入放大,而損害 SSD 固態硬碟的整體耐久性。

裁切技術與垃圾資料回收兩者可相互合作,透過釋放已使用的區塊,改善 SSD 固態硬碟的效能和耐久性。
垃圾資料回收是 SSD 固態硬碟控制器的內建功能,用於整合儲存在已使用區塊中的資料,以便釋放更多空白區塊。
這個程序是在背景進行處理,而且完全由 SSD 固態硬碟本身執行。
然而,SSD 固態硬碟不會知道哪些區塊存有使用者資料,以及哪些區塊存有使用者已刪除的舊資料。
這就是裁切技術功能的作用所在。裁切技術讓操作系統得以在資料刪除時,通知 SSD 固態硬碟,接著 SSD 固態硬碟就能將已使用之區塊釋放。
若想執行裁切技術,必須使用支援此技術的操作系統和 SSD 固態硬碟。
現今的現代操作系統及 SSD 固態硬碟大多都支援裁切技術,然而大部分的 RAID 設定卻尚未支援。


Kingston SSD 固態硬碟皆有採用裁切技術與垃圾資料回收技術,為了在產品使用壽命中,維持最高的效能及耐久性。


FAQ: KSD-011411-GEN-13
Secure Erase User Guide for Linux
This guide will walk you through securely erasing your Kingston SSD using Linux tools

SATA Secure Erase Procedure

Warning
Please make sure to have a full backup of any important data before you proceed!

Prerequisites
• You must have root privileges.
• You must have your SSD connected to the system as a secondary (non-OS) drive.
• You must have lsscsi and hdparm installed. You may need to install them with your distribution’s package manager.
• Your drive must not be in a security freeze.
• Your drive must not be password protected.

Instructions
1. Find the device name (/dev/sdX) of the drive you wish to erase:
# lsscsi

2. Make sure drive security is not frozen:
# hdparm -I /dev/sdX | grep frozen

If the output shows "frozen" (instead of "not frozen") then you cannot continue to the next step. You must try to remove the security freeze by trying one of the following methods:

Method 1: Put the system to sleep (suspend to RAM) and wake it up. On most distributions the command to suspend is:
# systemctl suspend

Now issue the hdparm command again. If it worked the output will show “not frozen” (instead of “frozen”).
Method 2: Hot plug the drive. This is done by physically unplugging the SATA power cable from the drive and plugging it back in while the system is powered on. You may need to enable hot plug in BIOS. Not all systems support hot plug.

Now issue the hdparm command again. If it worked the output will show “not frozen” (instead of “frozen”).

3. Set a user password on the drive. The password can be anything. Here we are setting the password to “p”:
# hdparm --security-set-pass p /dev/sdX

4. Issue the secure erase command to the drive using the same password:
# hdparm --security-erase p /dev/sdX

This command may take a few minutes to complete. The drive password is removed upon successful completion.
If the secure erase is interrupted or otherwise fails your drive may become security locked. In this case you can remove the security lock using the command below and then try the secure erase procedure again:
# hdparm --security-disable p /dev/sdX

SATA Secure Erase Example



NVMe Secure Erase Procedure

Warning
Please make sure to have a full backup of any important data before you proceed!

Prerequisites
• You must have root privileges.
• You must have your SSD connected to the system as a secondary (non-OS) drive.
• You must have nvme-cli installed. You may need to install it with your distribution’s package manager.
• Your drive must not be password protected.

Instructions
1. Find the device name (/dev/nvmeXn1) of the drive you wish to erase:
# nvme list

2. Issue the format command to the drive. Here we set the secure erase setting to 1 which indicates a user data erase:
# nvme format /dev/nvmeXn1 --ses=1

This command may take a few minutes to complete.


NVMe Secure Erase Example

FAQ: KSM-SE-LIX

聯繫技術支持

Questions about a Kingston product you already own? Ask a Kingston expert.

致電技術支援

Monday-Friday 6 a.m.-6 p.m. PT

+1 (800)435-0640

欲了解COVID-19如何影響我們的企業營運,請按一下此處。

保持聯絡!請註冊電子郵件,以瞭解 Kingston 最新動態和更多訊息。