After enabling disk encryption on the drive and installing all the necessary programs, can I back up that setup to another SSD, or do I have to reinstall everything from scratch on each SSD? If backing up is possible, what is the exact procedure?
Current commands I’m using to enable disk encryption:
since you’re enabling disk encryption, it has an unique ECID, which means it generates per-device encrypted disk images for disk encryption.
although it’s now able to create encrypted images with a generic key, it’s backup/restore script limitation with ROOTFS_ENC devices.
it must to run flash script (from host machine) to deploy devices with disk encryption for using a generic key.
please see-also.. Topic 333135, Topic 291335.
I am working on a deployment process for multiple Jetson Orin devices (Orin NX, JetPack 6.2) and have a question regarding the use of a non-encrypted backup image with disk encryption. My goal is to:
Flash a base JetPack 6 image (non-encrypted) onto a Jetson Orin with an NVMe SSD.
Install necessary software (e.g., TensorRT, OpenCV, CUDA) on this system.
Create a backup image of this non-encrypted system using l4t_backup_restore.sh.
Flash this backup image onto multiple other Jetson Orin devices and enable disk encryption (ROOTFS_ENC=1) during the flashing process.
Based on my discussions and research, I understand that disk encryption generates device-specific images tied to the ECID, which makes restoring encrypted backups to different devices challenging. However, since my backup image is created from a non-encrypted system, I would like to confirm if the following workflow is feasible:
Is it feasible to flash a non-encrypted backup image onto multiple Jetson Orin devices and enable disk encryption during the flashing process using a generic key, as described?
Will the installed software (e.g., TensorRT, OpenCV) in the non-encrypted backup image function correctly after enabling disk encryption on the target devices?
Are there any specific configurations or pitfalls (e.g., ECID issues, EKS setup, or partition alignment) I should be aware of to ensure success?
Does flash.sh with ROOTFS_ENC=1 fully support this use case, or should I rely on l4t_initrd_flash.sh for better compatibility with massflash and generic key encryption?
If this approach is not recommended, what is the best practice for deploying a customized image (with pre-installed software) across multiple Jetson Orin devices with disk encryption enabled?
I’ve reviewed Topic 333135 and Topic 291335, which mention limitations with l4t_backup_restore.sh for encrypted images and the possibility of using a generic key with flash scripts. However, I’d appreciate clarification on applying this to a non-encrypted backup image.
you’ll need to re-flash a target for adding a new, encrypted APP_ENC partition which contains the rest of the file system.
the flashing images must contain the APP partition, which contains the /boot branch of the rootfs (unencrypted), and the APP_ENC partition, which contains the rest of the rootfs (encrypted).