SEDs flip the script by offloading all encryption to hardware. Every single byte on the drive is encrypted on write and decrypted on read—automatically, with zero overhead. There’s no need for dm-crypt, no userland passphrases, and no kernel-level I/O wrappers slowing you down.

Managing SEDs via nvme-cli
On Power Linux, all SED operations are handled via a plugin inside nvme-cli. This CLI is your primary user interface for provisioning, status, lock/unlock, and password (authentication key) management. These SED primitives are implemented as a nvme plugin named “SED”.
usage: nvme sed <command> [<device>] [<args>]
The '<device>' must be a nvme block device
The following are all implemented sub-commands:
discover Discover SED Opal Locking Features
initialize Initialize a SED Opal Device for locking
revert Revert a SED Opal Device from locking
lock Lock a SED Opal Device
unlock Unlock a SED Opal Device
password Change the SED Opal Device password
version Shows the program version
See 'nvme sed help <command>' for more information on a specific command
The discover sub-command displays both drive capabilities and drive status. In order for SED locking to function, the drive must report both
"Locking supported” and “Locking Feature Enabled” as “Yes”. The “Locked” entry indicates if the drive is locked or unlocked.
# nvme sed discover /dev/nvme0n1
Locking Feature Enabled: No
2. Initializing or enabling a drive for Locking
To set the password on a SED drive and enable it for SED locking:
# nvme sed initialize /dev/nvme0n1
# nvme sed discover /dev/nvme0n1
Locking Feature Enabled: Yes
To lock a drive using the password saved in the kernel SED keyring:
# nvme sed lock /dev/nvme0n1
# nvme sed discover /dev/nvme0n1
Locking Feature Enabled: Yes
# dd count=1 if=/dev/nvme0n1 of=/tmp/data
dd: error reading '/dev/nvme0n1': Input/output error
To lock a drive by manually entering the password:
# nvme sed lock –k /dev/nvme0n1
Password:
Unlock a drive using saved password in SED keyring
# nvme sed unlock /dev/nvme0n1
# dd count=1 if=/dev/nvme0n1 of=/tmp/data
512 bytes copied, 0.000253378 s, 2.0 MB/s
To unlock a drive by manually entering the password:
# nvme sed unlock -k /dev/nvme0n1
5. Changing a drive authentication key or Password
# nvme sed password /dev/nvme0n1
The command will ask for the old (current) password and then prompt for the new password. The new password must be entered twice without any differences.
6. Reverting a drive (non-destructively removing locking)
# nvme sed revert /dev/nvme0n1
# nvme sed discover /dev/nvme0n1
Locking Feature Enabled: No
7. Reverting a drive by erasing
# nvme sed revert -e /dev/nvme0n1
Destructive revert erases drive data. Continue (y/n)? y
# nvme sed discover /dev/nvme0n1
Locking Feature Enabled: No
# nvme sed initialize /dev/nvme0n1
# nvme sed discover /dev/nvme0n1
Locking Feature Enabled: Yes
# nvme sed password /dev/nvme0n1
# nvme sed lock /dev/nvme0n1
# nvme sed discover /dev/nvme0n1
Locking Feature Enabled: Yes
# nvme sed unlock -k /dev/nvme0n1
# nvme sed discover /dev/nvme0n1
Locking Feature Enabled: Yes
# nvme sed lock –k /dev/nvme0n1
# nvme sed unlock –k /dev/nvme0n1
Final thoughts:
With SEDs, encryption isn’t an afterthought; it’s a built-in, always-on defense layer, silently protecting your data from boot to shutdown. Paired with Power Linux and nvme-cli, you get a robust, programmable security solution that’s faster, safer, and easier than ever before.