summaryrefslogtreecommitdiff
path: root/Makefile
diff options
context:
space:
mode:
authorRandall Spangler <rspangler@chromium.org>2013-05-24 15:40:32 -0700
committerChromeBot <chrome-bot@google.com>2013-06-03 14:32:39 -0700
commita47bda8042f988929d6f981944e75146cbab2dd5 (patch)
tree9e661d70c10ebacb3589da8809ae4273be25e2f0 /Makefile
parentb490e866dc14b55a99e53d14ade4543daeba157a (diff)
downloadchrome-ec-a47bda8042f988929d6f981944e75146cbab2dd5.tar.gz
Make flash_ec capable of writing to an incorrectly-protected STM32
If EC-RO protects itself via the WRPx option bytes, flash_ec will fail to reprogram it. And if EC-RO is broken/unbootable, it won't be able to clear the WRPx option bytes itself when it sees the write protect GPIO is not asserted. Add the -u flag to stm32mon so that it will automatically attempt to unprotect the flash via the option bytes. BUG=chrome-os-partner:19723 BRANCH=none TEST=enable write protect GPIO. Then from console, 'flashwp enable'. Then from the chroot: ./util/flash_ec --board=pit --ro --image=build/pit/ec.RO.flat That should successfully reflash the board. Change-Id: Ic356d29104294d04d5e2a36dc75fd0206b89bd34 Signed-off-by: Randall Spangler <rspangler@chromium.org> Reviewed-on: https://gerrit.chromium.org/gerrit/56659
Diffstat (limited to 'Makefile')
0 files changed, 0 insertions, 0 deletions