My issues for the “size of system.img.raw is not mulple of 4096” already get rid of this issues. Able to clone but not flash, flash error is QSPI fail.
backup/restore I am successful to clone and restore with no disk encryption. I haven’t try with disk encryption optee.
Do you know is it possible? As I plan to flash 1 device and install all necessary in house software, then clone it and for production to flash all devices with disk encryption
I think we also haven’t verified this usecase, but you can give it a try.
Ideally, the tool does not care what’s inside the image so disk encryption may not make an impact.
I tried with disk encryption by using backup_restore. It’s seems cannot find the key for decrypt.
Attach the UART log below. encrypted_restore.log (88.4 KB)
My end goal would like to clone/backup encrypted disk and flash/restore to all the production unit.
backup.log (92.7 KB)
attached with log above.
I believe i got the correct image in backup_restore/images
as there is QSPI, nvparitionmap.txt and lot of .img i believe
Do you have any details of -u and -v argument for backup_restore?
-u pkc key file
-v sbk key file
there is nothing about -u and -v in README file.
I tried with -v sbk key, as i don’t have pkc key.
the script will giving error of missing pkc key.
hold-on…
it’s bad practice to have a single image for mass-production with disk encryption mechanism.
it’s not support to use generic passphrase, please have unique ECID to enable disk encryption.
according to developer guide, the Jetson Linux reference implementation only generates per-device encrypted disk images.
I understand what you means about best practice or bad practice about the passphrase.
My use case is only to configure once (deploy software) the device and replicate it across all the unit during the production with different encryption key. (not to configure (deploy software) every device after the complete flashing with disk encryption.
Do you know possible or how I can achieve it?