5.3 Host Commands
Table 5.4 Information to be read by IDENTIFY DEVICE command (8 of 8)
Bit | Reserved |
Bit 8: | Security level. 0: High, 1: Maximum |
Bit | Reserved |
Bit 5: | 1: Enhanced security erase supported |
Bit 4: | 1: Security counter expired |
Bit 3: | 1: Security frozen |
Bit 2: | 1: Security locked |
Bit 1: | 1: Security enabled |
Bit 0: | 1: Security supported |
(13) IDENTIFY DEVICE DMA (X’EE’)
When this command is not used to transfer data to the host in DMA mode, this command functions in the same way as the Identify Device command.
At command issuance (I/O registers setting contents)
1F7H(CM) | 1 | 1 | 1 | 0 | 1 | 1 | 1 | 0 |
|
|
|
|
|
|
|
|
|
1F6H(DH) | × | × | × | DV | xx |
|
|
|
|
|
|
|
|
|
|
|
|
1F5H(CH) | xx |
|
|
|
|
|
|
|
1F4H(CL) | xx |
|
|
|
|
|
|
|
1F3H(SN) | xx |
|
|
|
|
|
|
|
1F2H(SC) | xx |
|
|
|
|
|
|
|
1F1H(FR) | xx |
|
|
|
|
|
|
|
|
| |||||||
At command completion (I/O registers contents to be read) |
| |||||||
|
|
|
|
|
|
| ||
1F7H(ST) | Status information |
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
1F6H(DH) | × | × | × | DV | xx |
|
|
|
|
|
|
|
|
|
|
|
|
1F5H(CH) | xx |
|
|
|
|
|
|
|
1F4H(CL) | xx |
|
|
|
|
|
|
|
1F3H(SN) | xx |
|
|
|
|
|
|
|
1F2H(SC) | xx |
|
|
|
|
|
|
|
1F1H(ER) | Error information |
|
|
|
|
|