Jump to content

Unable to mount 6 new 1TB drives


Recommended Posts

This does not seem to be the case, no PSID on the drive and smartctl doesnt show protection:

 

root@GSA:~# smartctl -i /dev/sdaa
smartctl 7.1 2019-12-30 r5022 [x86_64-linux-5.10.28-Unraid] (local build)
Copyright (C) 2002-19, Bruce Allen, Christian Franke, www.smartmontools.org

=== START OF INFORMATION SECTION ===
Vendor:               SEAGATE
Product:              ST91000642SS
Revision:             ASF9
Compliance:           SPC-4
User Capacity:        1,000,204,886,016 bytes [1.00 TB]
Logical block size:   512 bytes
Rotation Rate:        7200 rpm
Form Factor:          2.5 inches
Logical Unit id:      0x5000c50055ca49d3
Serial number:        9XG36YA6
Device type:          disk
Transport protocol:   SAS (SPL-3)
Local Time is:        Mon Jul 19 12:48:33 2021 CDT
SMART support is:     Available - device has SMART capability.
SMART support is:     Enabled
Temperature Warning:  Enabled

Link to comment

Looks like you have got the fips version which are sed enabled. You need to remove SED protection.

 

SED FIPS 140-2 Models 
ST91000642SS
ST9500622SS

 

there is a PSID printed on the disk.  i used this to reset the disk, by usng the below command where <PSIDNODASHS> is the PSID on the disk and device> is the device

 

sedutil-cli --PSIDrevertAdminSP <PSIDNODASHS> /dev/<device>

 

I am not sure where to get sedutil

 

Link to comment
24 minutes ago, fmp4m said:

Ok.  So even though it read that it was not protected,  I did get this:


sg_format failed: Data protect
 

So it seems there is some sort of protection but how to clear it.  I will try the raid controller next,  need to open it for ram removal anyways.

Found download here

 

https://github.com/Drive-Trust-Alliance/sedutil/wiki/Executable-Distributions

 

Download linux, copy to unraid

 

installpkg sedutil_LINUX.tgz 

Quote

root@unraid:/sedutil/Release_x86_64/GNU-Linux# ls
sedutil-cli*
root@unraid:/sedutil/Release_x86_64/GNU-Linux# 

 

Link to comment

@SimonF there is no PSID on the disk that I can find unless its under the "Tamper Evident Label" which I find to be weird, these are new replacement drives from Dell, so its possible.

 

I did download the sedutil to see if I could get any info, but can't run it on unraid.

 

The Kernel flag libata.allow_tpm is not set correctly
Please see the readme note about setting the libata.allow_tpm
Invalid or unsupported disk /dev/sdz
 

Link to comment
38 minutes ago, JorgeB said:

See if you can replace the with the standard non encrypted model, these encrypted models can be a pain:

 

imagem.png.d0a1365c9887b94440a088d008d9d904.png

 

imagem.png.52f60183db5bffdf391a6753ddd78b5a.png

 

 

This seems to be my best option.  Thanks all for the support.  I wonder if they don't release or cover the PSID's for security now?  Strange indeed.  

 

Link to comment

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...