5.3 Host Commands
C141-E192-01EN 5-93
DEVICE CONFIGURATION IDENTIFY (FR=C2h)
The DEVICE CONFIGURATION IDENTIFY command returns a 512 byte
data structure is shown in Table 5.18. The content of this data structure
indicates the selectable commands, modes, and feature sets that the device is
capable of supporting. If a DEVICE CONFIGURATION SET command has
been issued reducing the capabilities, the response to an IDENTIFY DEVICE
command will reflect the reduced set of capabilities, while the DEVICE
CONFIGURATION IDENTIFY command will reflect the entire set of
selectable capabilities.
If the device has executed a previous DEVICE CONFIGURATION FREEZE
LOCK command since power-up, an aborted error is posted.
DEVICE CONFIGURATION SET (FR=C3h)
The DEVICE CONFIGURATION SET command allows to reduce the set of
optional commands, modes, or feature sets supported by a device as indicated
by a DEVICE CONFIGURATION IDENTIFY command. The format of the
overlay transmitted by the device is described in Table 5.18. As a result to
the limitation of the function by the DEVICE CONFIGURATION SET
command, is reflected in IDENTIFY information. When the bits in these
words are cleared, the device no longer supports the indicated command,
mode, or feature set. If a bit is set in the overlay transmitted by the device
that is not set in the overlay received from a DEVICE CONFIGURATION
IDENTIFY command, no action is taken for that bit. After execution of this
command, the settings are kept for the device power down or reset.
If the restriction of Multiword DMA modes or Ultra DMA modes is
executed, a SET FEATURES command should be issued for the modes
restriction prior the DEVICE CONFIGURATION SET command is issued.
When the Automatic Acoustic Management function is assumed to be a
unsupport, Automatic Acoustic Management is prohibited beforehand by
SET FEATURES command (FR=C2h).
If a DEVICE CONFIGURATION SET command has already modified the
original settings as reported by a DEVICE CONFIGURATION IDENTIFY
command, if DEVICE CONFIGURATION FREEZE LOCK is set, if any of
the bit modification restrictions described are violated, or if a Host Protected
Area has been established by the execution of a SET MAX ADDRESS (EXT)
command, an aborted error is posted.