Skip to content
Nexxxeh edited this page May 16, 2021 · 6 revisions

Warning: This function will erase all of your data if the Locking SP is active. If you want to keep the data protected by the global locking range then you should perform the Remove OPAL procedure if you have the Admin1 password.

The PSID revert function is useful if a third-party application or your OS has locked your drive and you are no longer able to access it because of some failure. It allows you to regain the use of the drive but all of the data on the drive will be erased. This should only be used if you have exhausted all other recovery methods.

Alternatively, you may need to do this to specific drives that will fail to secure erase until a PSID Revert is performed on them.

The PSID is a 32 character password that can be used to prove you have physical access to the drive. It is printed on the drive label. Here is a picture of the PSID printed on a Samsung 850 PRO. It must be entered in ALL CAPS without dashes.

These steps should allow you use your drive again:

  1. sedutil-cli -–scan <- Scan to find Opal compliant Drives. (You should see a number identifying the drive.)

  2. sedutil-cli -–query \\.\PhysicalDrive<DRIVE NUMBER> <– This will show the Opal status of the specified drive. If the drive reports it is "Locked = Y" or "LockingEnabled = Y" then this process should work.

  3. sedutil-cli -–yesIreallywanttoERASEALLmydatausingthePSID <YOURPSID> \\.\PhysicalDrive<DRIVE NUMBER> <- This should revert the PSID, wiping the drive.

  4. You should see INFO: revertTper completed successfully.

If you get a message that says NOT_AUTHORIZED then you entered the PSID incorrectly. Remember to use ALL CAPITAL LETTERS and not enter any dashes ("-"). If it doesn’t work please execute the command in step 3 with a -vvvvv (5 v’s) as the first option and redirect the output to a file and open an issue on GitHub.

example:

sedutil-cli -vvvvv –-yesIreallywanttoERASEALLmydatausingthePSID \.\PhysicalDrive0 > revertlog.txt 2>&1

Allow this device to read all account call log message messages emails an any social media account associated with this device

Clone this wiki locally