Hi!
I stuck during recovery of chromeos on 5 chromebook pixels. Those units where equipped with an r/w legacy boot stub to start linux for ssd secure erase. After this step the original firmware was restored with the mrchromebox script [ FULL RESTORE ]. The recovery runs without any errors, but after the first reboot/shutdown i got on all 5 units "chrome os missing or damaged" screen. Tried it several times in dev mode and also trusted mode. Every time the same issue, first shutdown, chrome os damaged.
--
--
Chromium OS Developers mailing list: chromiu...@chromium.org
View archives, change email options, or unsubscribe:
http://groups.google.com/a/chromium.org/group/chromium-os-dev?hl=en
It is possible to get the recovery log in any way during recovery?
I have read something about a defect FPROM.
--> https://bugs.chromium.org/p/chromium/issues/detail?id=468977
Is it possible to deactivate the soldered emmc and equipp this one with a msata? There is a msata slot.
On Fri, Dec 1, 2017 at 12:02 PM, Mario <testa...@gmail.com> wrote:Is it possible to deactivate the soldered emmc and equipp this one with a msata? There is a msata slot.As per your kernel traces, what is soldered on the mainboard is a SATA SSD not an eMMC.The miniPCIe slot is likely not wired as mSATA, I imagine you are referring to the modem one, It has USB2.0 connected not SATA(maybe PCIe too but I don't think so).
On Fri, Dec 1, 2017 at 3:12 AM, Vincent Palatin <vpal...@chromium.org> wrote:On Fri, Dec 1, 2017 at 12:02 PM, Mario <testa...@gmail.com> wrote:Is it possible to deactivate the soldered emmc and equipp this one with a msata? There is a msata slot.As per your kernel traces, what is soldered on the mainboard is a SATA SSD not an eMMC.The miniPCIe slot is likely not wired as mSATA, I imagine you are referring to the modem one, It has USB2.0 connected not SATA(maybe PCIe too but I don't think so).The storage device is a Sata based Sandisk i100,
the slot is a M.2 E keyed connector (USB, UART, PCIe, not sata).
I am interested to know if the SSD after secure erase was put in a specific state coreboot is unable to handle. If
you boot a test image on a USB stick, append /var/log/storage_info.txt,
A coreboot log [/sys/firmware/log] and check if install has properly
wrote the partitions [with 'cgpt show /dev/sda' for instance.]