This is an automated archive made by the Lemmit Bot.
The original was posted on /r/homelab by /u/Puzzleheaded-Radio27 on 2026-03-29 02:01:49+00:00.
This has been over a month of work trying to get these drives unlocked, so I wanted to document it for anyone that may run into the same problem.
I had quite a few drives retired from a Tegile without a functional Tegile system. The disks would reject all attempts at formatting or erasing, even with the PSID revert with sedutil, wouldn’t get unlocked with Dell Perc 330/730, perccli or bios. I had run out of all options with countless google searches, and also assisted by copilot/gemini/mistral ai, until I found FlorianHeigl/Tegile_Storage_Info
On the issues page, there’s one clue that leads to Intelliflash OS download. (http://s1/.<insert vendor’s name here>.com/ps/fw/Intelliflash-3_11_0_7.3.iso) The ISO by itself isn’t that useful, but in combination with a compatible system helps work the magic.
1- Download and install OmniOS on your server (OmniOS Community Edition)
2- Set up SSH/SFTP server:
svcadm enable ssh -> enables service
ipadm show-addr -> get ip address if you used DHCP
3- SSH to server as root, copy the intelliflash ISO to your /root folder.
4- Extract necessary tools from ISO:
mkdir -p /mnt/intelliflash
mount -F hsfs /root/Intelliflash-3_11_0_7.3.iso /mnt/intelliflash
cp /mnt/intelliflash/repo/publisher/tegile/file/c0/c001520f0fbb3bb685bd22e9f7e524a406a04237 /root/diskencrypt.gz
cp mnt/intelliflash/repo/publisher/tegile/file/e5/e5d113af2ce2e3087829e16ddf7fdc643d8454f1 /root/libdiskencrypt.so.1.gz
gunzip /root/diskencrypt.gz
gunzip /root/libdiskencrypt.so.1.gz
chmod +x /root/diskencrypt
5- Install GCC and compile a stub binary for some dependencies (which aren’t even needed for our purposes, but diskencrypt doesn’t work if they aren’t there)
pkg install developer/gcc14 cat << ‘EOF’ > /root/stub.c
void zebi_sys_monitor_ereport_create() { return; }
void zebi_sys_monitor_ereport_post() { return; }
void zebi_sys_monitor_init() { return; }
void zebi_sys_monitor_fini() { return; }
EOF
/opt/gcc-14/bin/gcc -shared -fPIC -o /root/libzebisysmon.so /root/stub.c
6- Plug in the disk, and get its CTD name with format command. (something like c5t50011321311654089d0) Ctrl+C to quit format.
7- Run the following commands to unlock your drive:
Step 1 - TCG reset
LD_LIBRARY_PATH=/root /root/diskencrypt tcg-reset <CTD\_NAME>
Step 2 - Secure erase
LD_LIBRARY_PATH=/root LD_PRELOAD=/root/libzebisysmon.so /root/diskencrypt secure-erase <CTD\_NAME>
Step 3 - Verify LD_LIBRARY_PATH=/root LD_PRELOAD=/root/libzebisysmon.so /root/diskencrypt get-status <CTD\_NAME>
As an output you should get these:
Authorization is Supported
Authorization is NOT Enabled
Drive is currently NOT locked.
This is what worked for me, when no other information available on the internet did. Goes without saying that YMMV, and you may even have a better solution that worked for you, and that’s great, please write a competing guide so it may work for others where mine fails. Anyway, I hope it helps someone.

