5.3 Host Commands

Table 5.4 Information to be read by IDENTIFY DEVICE command (8 of 8)

Bit 15-9:

Reserved

Bit 8:

Security level. 0: High, 1: Maximum

Bit 7-6:

Reserved

Bit 5:

1: Enhanced security erase supported

Bit 4:

1: Security counter expired

Bit 3:

1: Security frozen

Bit 2:

1: Security locked

Bit 1:

1: Security enabled

Bit 0:

1: Security supported

(13) IDENTIFY DEVICE DMA (X’EE’)

When this command is not used to transfer data to the host in DMA mode, this command functions in the same way as the Identify Device command.

At command issuance (I/O registers setting contents)

1F7H(CM)

1

1

1

0

1

1

1

0

 

 

 

 

 

 

 

 

 

1F6H(DH)

×

×

×

DV

xx

 

 

 

 

 

 

 

 

 

 

 

 

1F5H(CH)

xx

 

 

 

 

 

 

 

1F4H(CL)

xx

 

 

 

 

 

 

 

1F3H(SN)

xx

 

 

 

 

 

 

 

1F2H(SC)

xx

 

 

 

 

 

 

 

1F1H(FR)

xx

 

 

 

 

 

 

 

 

 

At command completion (I/O registers contents to be read)

 

 

 

 

 

 

 

 

1F7H(ST)

Status information

 

 

 

 

 

 

 

 

 

 

 

 

 

 

1F6H(DH)

×

×

×

DV

xx

 

 

 

 

 

 

 

 

 

 

 

 

1F5H(CH)

xx

 

 

 

 

 

 

 

1F4H(CL)

xx

 

 

 

 

 

 

 

1F3H(SN)

xx

 

 

 

 

 

 

 

1F2H(SC)

xx

 

 

 

 

 

 

 

1F1H(ER)

Error information

 

 

 

 

 

C141-E088-01EN

5-39

Page 112
Image 112
Fujitsu MHK2120AT, MHK2090AT, MHK2060AT manual Information to be read by Identify Device command 8, Identify Device DMA X’EE’