FUJITSU MHK2090AT User Manual
Page 112
5.3 Host Commands
C141-E088-03EN
5-39
Table 5.4 Information to be read by IDENTIFY DEVICE command (8 of 8)
Bit 15-9:
Reserved
Bit 8:
Security level. 0: High, 1: Maximum
Bit 7-6:
Reserved
Bit 5:
1: Enhanced security erase supported
Bit 4:
1: Security counter expired
Bit 3:
1: Security frozen
Bit 2:
1: Security locked
Bit 1:
1: Security enabled
Bit 0:
1: Security supported
(13) IDENTIFY DEVICE DMA (X’EE’)
When this command is not used to transfer data to the host in DMA mode, this
command functions in the same way as the Identify Device command.
At command issuance (I/O registers setting contents)
1F7
H
(CM)
1
1
1
0
1
1
1
0
1F6
H
(DH)
Ч
Ч
Ч
DV
xx
1F5
H
(CH)
1F4
H
(CL)
1F3
H
(SN)
1F2
H
(SC)
1F1
H
(FR)
xx
xx
xx
xx
xx
At command completion (I/O registers contents to be read)
1F7
H
(ST)
Status information
1F6
H
(DH)
Ч
Ч
Ч
DV
xx
1F5
H
(CH)
1F4
H
(CL)
1F3
H
(SN)
1F2
H
(SC)
1F1
H
(ER)
xx
xx
xx
xx
Error information