Hello, so I followed the instructions as given in https://archlinuxarm.org/platforms/armv7/rockchip/asus-chromebook-flip-c100p line by line for my USB 2.0 16GB drive, since my Chromebook is pretty much the same as the C100P internally. I have also enabled the developer settings and usb boot. But when I finally go to the splash screen and press Ctrl+U, I get a loud beep and the screen flashes black for a moment and I get back to the splash screen. Nothing else happens. Ctrl+L also gives me a double beep. I've tried preparing the USB drive twice already with the same result. I also tried enabling the developer-mode BIOS as given in https://www.chromium.org/chromium-os/developer-information-for-chrome-os-devices/samsung-series-5-chromebook#TOC-Developer-mode-BIOS to no avail.
What could be the problem? I searched everywhere I could, but found no working fix.
$this->bbcode_second_pass_code('', '
localhost / # cgpt show /dev/sda
start size part contents
0 1 PMBR
1 1 Pri GPT header
2 32 Pri GPT table
8192 32768 1 Label: "Kernel"
Type: ChromeOS kernel
UUID: 20C2A277-F329-A848-A3CF-BAB53FDBE624
Attr: priority=10 tries=5 successful=1
40960 31317983 2 Label: "Root"
Type: Linux data
UUID: 2AC11346-5BAF-E647-B3C4-E1009AACB634
31358943 32 Sec GPT table
31358975 1 Sec GPT header
')
$this->bbcode_second_pass_code('', '
localhost / # crossystem
arch = arm # Platform architecture
backup_nvram_request = 1 # Backup the nvram somewhere at the next boot. Cleared on success.
battery_cutoff_request = 0 # Cut off battery and shutdown on next boot.
block_devmode = 0 # Block all use of developer mode
clear_tpm_owner_request = 0 # Clear TPM owner on next boot
clear_tpm_owner_done = 1 # Clear TPM owner done
cros_debug = 1 # OS should allow debug features
dbg_reset = 0 # Debug reset mode request (writable)
debug_build = 0 # OS image built for debug features
dev_boot_usb = 1 # Enable developer mode boot from USB/SD (writable)
dev_boot_legacy = 0 # Enable developer mode boot Legacy OSes (writable)
dev_boot_signed_only = 0 # Enable developer mode boot only from official kernels (writable)
dev_default_boot = disk # default boot from legacy or usb (writable)
devsw_boot = 1 # Developer switch position at boot
devsw_cur = 1 # Developer switch current position
disable_dev_request = 0 # Disable virtual dev-mode on next boot
ecfw_act = RW # Active EC firmware
fmap_base = 0x00100000 # Main firmware flashmap physical address
fwb_tries = 0 # Try firmware B count (writable)
fw_vboot2 = 1 # 1 if firmware was selected by vboot2 or 0 otherwise
fwid = Google_Veyron_Speedy.6588.237.0 # Active firmware ID
fwupdate_tries = 0 # Times to try OS firmware update (writable, inside kern_nv)
fw_tried = A # Firmware tried this boot (vboot2)
fw_try_count = 0 # Number of times to try fw_try_next (writable)
fw_try_next = A # Firmware to try next (vboot2,writable)
fw_result = success # Firmware result this boot (vboot2,writable)
fw_prev_tried = A # Firmware tried on previous boot (vboot2)
fw_prev_result = success # Firmware result of previous boot (vboot2)
hwid = SPEEDY G2Q-Z6F-Q2I-A8P # Hardware ID
inside_vm = 0 # Running in a VM?
kern_nv = 0x00000000 # Non-volatile field for kernel use
kernkey_vfy = sig # Type of verification done on kernel key block
loc_idx = 0 # Localization index for firmware screens (writable)
mainfw_act = A # Active main firmware
mainfw_type = developer # Active main firmware type
nvram_cleared = 0 # Have NV settings been lost? Write 0 to clear
oprom_needed = 0 # Should we load the VGA Option ROM at boot?
phase_enforcement = (error) # Board should have full security settings applied
recovery_reason = 0 # Recovery mode reason for current boot
recovery_request = 0 # Recovery mode request (writable)
recovery_subcode = 0 # Recovery reason subcode (writable)
recoverysw_boot = 0 # Recovery switch position at boot
recoverysw_cur = 0 # Recovery switch current position
recoverysw_ec_boot = 0 # Recovery switch position at EC boot
ro_fwid = Google_Veyron_Speedy.6588.92.0 # Read-only firmware ID
sw_wpsw_boot = 0 # Firmware write protect software setting enabled at boot (Baytrail only)
tpm_attack = 0 # TPM was interrupted since this flag was cleared
tpm_fwver = 0x00020003 # Firmware version stored in TPM
tpm_kernver = 0x00030002 # Kernel version stored in TPM
tpm_rebooted = 0 # TPM requesting repeated reboot (vboot2)
try_ro_sync = 0 # try read only software sync
tried_fwb = 0 # Tried firmware B before A this boot
vdat_flags = 0x0000cc56 # Flags from VbSharedData
vdat_timers = LFS=0,0 LF=0,0 LK=1,4159061 # Timer values from VbSharedData
wipeout_request = 0 # Firmware requested factory reset (wipeout)
wpsw_boot = 1 # Firmware write protect hardware switch position at boot
wpsw_cur = 1 # Firmware write protect hardware switch current position
')