mount -o ro,loop,offset=983564288 chromeos.bin /mnt/chromeroot
mount: wrong fs type, bad option, bad superblock on /dev/loop0, missing codepage or helper program, or other error
In some cases useful info is found in syslog - try dmesg | tail or so.[ 5088.841508] EXT4-fs (loop0): couldn't mount RDWR because of unsupported optional features (ff000000)
sudo tune2fs -l /dev/loop0tune2fs 1.42.12 (29-Aug-2014)Filesystem volume name: ROOT-ALast mounted on: /tmp/tmp.2U8OkKKnnHFilesystem UUID: <none>Filesystem magic number: 0xEF53Filesystem revision #: 1 (dynamic)Filesystem features: ext_attr resize_inode dir_index filetype sparse_super large_file FEATURE_R24 FEATURE_R25 FEATURE_R26 FEATURE_R27 FEATURE_R28 FEATURE_R29 FEATURE_R30 FEATURE_R31Filesystem flags: signed_directory_hashDefault mount options: user_xattr aclFilesystem state: cleanErrors behavior: Remount read-onlyFilesystem OS type: LinuxInode count: 48000Block count: 192000Reserved block count: 0Free blocks: 155960Free inodes: 44073First block: 0Block size: 4096Fragment size: 4096Reserved GDT blocks: 46Blocks per group: 32768Fragments per group: 32768Inodes per group: 8000Inode blocks per group: 500Filesystem created: Fri Apr 28 04:41:37 2017Last mount time: Fri Apr 28 04:59:39 2017Last write time: Fri Apr 28 04:59:39 2017Mount count: 12Maximum mount count: -1Last checked: Thu Nov 19 19:00:00 2009Check interval: 0 (<none>)Reserved blocks uid: 0 (user root)Reserved blocks gid: 0 (group root)First inode: 11Inode size: 256Required extra isize: 32Desired extra isize: 32Default directory hash: half_md4Directory Hash Seed: 0a6b0ba8-b210-432d-9808-0c4e5d24b508# disable the RO ext2 hackdebug_msg "Disabling rootfs ext2 RO bit hack"enable_rw_mount "$ssd_device" "$root_offset_bytes" >"$EXEC_LOG" 2>&1 || err_die "Failed turning off rootfs RO bit. OS may be corrupted. " \ "Message: $(cat "$EXEC_LOG")"# For details, see crosutils.git/common.shenable_rw_mount() { local rootfs="$1" local offset="${2-0}" # Make sure we're checking an ext2 image if ! is_ext2 "$rootfs" $offset; then echo "enable_rw_mount called on non-ext2 filesystem: $rootfs $offset" 1>&2 return 1 fi local ro_compat_offset=$((0x464 + 3)) # Set 'highest' byte # Dash can't do echo -ne, but it can do printf "\NNN" # We could use /dev/zero here, but this matches what would be # needed for disable_rw_mount (printf '\377'). printf '\000' | sudo dd of="$rootfs" seek=$((offset + ro_compat_offset)) \ conv=notrunc count=1 bs=1}--
--
Chromium OS Developers mailing list: chromiu...@chromium.org
View archives, change email options, or unsubscribe:
http://groups.google.com/a/chromium.org/group/chromium-os-dev?hl=en
ChromeosChrootPostinst(9334.41.3)Set boot target to /dev/mmcblk0p3: Partition 3, Slot ASetImageKERNEL_CONFIG: console= loglevel=7 init=/sbin/init cros_secure oops=panic panic=-1 root=/dev/dm-0 rootwait ro dm_verity.error_behavior=3 dm_verity.max_bios=-1 dm_verity.dev_wait=1 dm="1 vroot none ro 1,0 1536000 verity payload=PARTUUID=%U/PARTNROFF=1 hashtree=PARTUUID=%U/PARTNROFF=1 hashstart=1536000 alg=sha1 root_hexdigest=25009619ed1c7b8e4eae62d0d4cc7f794507d4d6 salt=8da0ac678592acf6395953f6dca6310b5682844dc5ae70c2e96c88474c273afa" noinitrd vt.global_cursor_default=0 kern_guid=%U coherent_pool=2M Setting up verity.Filesystem hash verification failedExpected 25009619ed1c7b8e4eae62d0d4cc7f794507d4d6 != actual 9ef77d0723f743c8cd5daadc83865d795eabb729Finished after 36 seconds.SetImage failed.PostInstall Failed
dev_boot_signed_only = 0
Hmm - to answer my own question again - I think I misunderstood 'dev_boot_signed_only'. That's just for booting from USB, not SSD