Hitachi HDT725025VLA380 Specifications - Page 8

Advanced Power Management feature set APM

Page 8 highlights

10.6.5 S.M.A.R.T. commands 83 10.6.6 Off-line read scanning 83 10.6.7 Error log 84 10.6.8 Self-test ...84 10.7. Security Mode Feature Set 85 10.7.1 Security mode 85 10.7.2 Security level 85 10.7.3 Passwords 86 10.7.4 Operation example 86 10.7.5 Command table 90 10.8. Host Protected Area Feature 92 10.8.1 Example for operation (In LBA Mode 92 10.8.2 Security extensions 93 10.9. Seek overlap...94 10.10. Write cache function 95 10.11. Reassign function 96 10.11.1 Auto Reassign function 96 10.12. Power-Up in Standby feature set 97 10.13. Advanced Power Management feature set (APM 98 10.14. Automatic Acoustic Management feature set (AAM 99 10.15. Address Offset Feature 100 10.15.1 Enable/Disable Address Offset Mode 100 10.15.2 Identify Device Data 101 10.15.3 Exceptions in Address Offset Mode 101 10.16. 48-bit Address Feature Set 102 10.17. Streaming feature Set 102 10.17.1 Streaming commands 103 10.17.2 Urgent bit 103 10.17.3 Flush to Disk bit 103 10.17.4 Not Sequential bit 103 10.17.5 Read Continuous bit 104 10.17.6 Write Continuous bit 104 10.17.7 Handle Streaming Error bit 104 10.17.8 Streaming Logs 104 10.18. SCT Command Transport Feature Set 104 10.18.1 SCT Command Protocol 105 10.18.2 SCT Command Set 111 11.0. Command protocol 123 11.1. PIO Data In commands 123 11.2. PIO Data Out Commands 124 11.3. Non-data commands 126 11.4. DMA commands 127 12.0. Command descriptions 129 12.1. Check Power Mode (E5h/98h 134 12.2. Configure Stream (51h 135 12.3. Device Configuration Overlay (B1h 137

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291

10.6.5 S.M.A.R.T. commands
............................................................................
83
10.6.6 Off-line read scanning
.............................................................................
83
10.6.7 Error log
...................................................................................................
84
10.6.8 Self-test
....................................................................................................
84
10.7. Security Mode Feature Set
................................................................................
85
10.7.1 Security mode
..........................................................................................
85
10.7.2 Security level
...........................................................................................
85
10.7.3 Passwords
................................................................................................
86
10.7.4 Operation example
...................................................................................
86
10.7.5 Command table
........................................................................................
90
10.8. Host Protected Area Feature
.............................................................................
92
10.8.1 Example for operation (In LBA Mode)
...................................................
92
10.8.2 Security extensions
..................................................................................
93
10.9. Seek overlap
......................................................................................................
94
10.10. Write cache function
.......................................................................................
95
10.11. Reassign function
............................................................................................
96
10.11.1 Auto Reassign function
.........................................................................
96
10.12. Power-Up in Standby feature set
....................................................................
97
10.13. Advanced Power Management feature set (APM)
.........................................
98
10.14. Automatic Acoustic Management feature set (AAM)
....................................
99
10.15. Address Offset Feature
.................................................................................
100
10.15.1 Enable/Disable Address Offset Mode
.................................................
100
10.15.2 Identify Device Data
............................................................................
101
10.15.3
Exceptions in Address Offset Mode
...................................................
101
10.16. 48-bit Address Feature Set
............................................................................
102
10.17. Streaming feature Set
....................................................................................
102
10.17.1 Streaming commands
..........................................................................
103
10.17.2 Urgent bit
.............................................................................................
103
10.17.3 Flush to Disk bit
..................................................................................
103
10.17.4 Not Sequential bit
................................................................................
103
10.17.5 Read Continuous bit
............................................................................
104
10.17.6 Write Continuous bit
...........................................................................
104
10.17.7 Handle Streaming Error bit
.................................................................
104
10.17.8 Streaming Logs
....................................................................................
104
10.18. SCT Command Transport Feature Set
..........................................................
104
10.18.1 SCT Command Protocol
......................................................................
105
10.18.2 SCT Command Set
..............................................................................
111
11.0. Command protocol
...............................................................................................
123
11.1. PIO Data In commands
...................................................................................
123
11.2. PIO Data Out Commands
...............................................................................
124
11.3.
Non-data commands
......................................................................................
126
11.4. DMA commands
.............................................................................................
127
12.0. Command descriptions
.........................................................................................
129
12.1. Check Power Mode (E5h/98h)
.......................................................................
134
12.2. Configure Stream (51h)
..................................................................................
135
12.3. Device Configuration Overlay (B1h)
.............................................................
137