beautypg.com

FUJITSU MHK2090AT User Manual

Page 112

background image

5.3 Host Commands

C141-E088-03EN

5-39

Table 5.4 Information to be read by IDENTIFY DEVICE command (8 of 8)

Bit 15-9:

Reserved

Bit 8:

Security level. 0: High, 1: Maximum

Bit 7-6:

Reserved

Bit 5:

1: Enhanced security erase supported

Bit 4:

1: Security counter expired

Bit 3:

1: Security frozen

Bit 2:

1: Security locked

Bit 1:

1: Security enabled

Bit 0:

1: Security supported

(13) IDENTIFY DEVICE DMA (X’EE’)

When this command is not used to transfer data to the host in DMA mode, this
command functions in the same way as the Identify Device command.

At command issuance (I/O registers setting contents)

1F7

H

(CM)

1

1

1

0

1

1

1

0

1F6

H

(DH)

Ч

Ч

Ч

DV

xx

1F5

H

(CH)

1F4

H

(CL)

1F3

H

(SN)

1F2

H

(SC)

1F1

H

(FR)

xx

xx

xx

xx

xx

At command completion (I/O registers contents to be read)

1F7

H

(ST)

Status information

1F6

H

(DH)

Ч

Ч

Ч

DV

xx

1F5

H

(CH)

1F4

H

(CL)

1F3

H

(SN)

1F2

H

(SC)

1F1

H

(ER)

xx

xx

xx

xx

Error information

This manual is related to the following products: