From 4d01168b9bcdb8c060604cbd851e4ea13b4aa9b5 Mon Sep 17 00:00:00 2001 From: Aidan MacDonald Date: Mon, 30 May 2022 14:08:02 +0100 Subject: x1000: add flash probe tool to bootloader The flash probe mimics the boot ROM's flash read routines and dumps the manufacturer & device IDs and 16-byte parameter data to a file on the SD card. Change-Id: I3d413bd0cc05a9d7f2285b85454420c3e90274e9 --- bootloader/x1000/recovery.c | 1 + 1 file changed, 1 insertion(+) (limited to 'bootloader/x1000/recovery.c') diff --git a/bootloader/x1000/recovery.c b/bootloader/x1000/recovery.c index c53fa376b9..e6cc041d99 100644 --- a/bootloader/x1000/recovery.c +++ b/bootloader/x1000/recovery.c @@ -68,6 +68,7 @@ static const struct menuitem debug_menu_items[] = { #ifdef HAVE_SCREENDUMP {MENUITEM_ACTION, "Enable screenshots", &screenshot_enable}, #endif + {MENUITEM_ACTION, "Flash info", &show_flash_info}, #ifdef OF_PLAYER_ADDR {MENUITEM_ACTION, "Dump OF player", &dump_of_player}, #endif -- cgit v1.2.3