]> git.sur5r.net Git - openocd/blob - testing/examples/SAM7S256Test/results/607.html
- added svn props for newly added files
[openocd] / testing / examples / SAM7S256Test / results / 607.html
1 <html>
2 <head>
3 <title>Test results for revision 607</title>
4 </head>
5
6 <body>
7 <H1>Test cases</H1>
8 <H2>Test case results</H2>
9 The test results are stored in seperate documents. One document for
10 each subversion number.
11 <table border="1">
12        <tr><td>Test results</td><td>comment</td></tr>
13        <tr><td>607</a></td><td></td></tr>
14        <tr><td><a href="results/template.html">template</a></td><td>Test results template</td></tr>
15 </table>
16
17 <H1>SAM7S64</H1>
18
19 <H2>Connectivity</H2>
20 <table border=1>
21        <tr>
22                <td>ID</td>
23                <td>Target</td>
24                <td>Interface</td>
25                <td>Description</td>
26                <td>Initial state</td>
27                <td>Input</td>
28                <td>Expected output</td>
29                <td>Actual output</td>
30                <td>Pass/Fail</td>
31        </tr>
32        <tr>
33                <td><a name="CON001"/>CON001</td>
34                <td>SAM7S64</td>
35                <td>ZY1000</td>
36                <td>Telnet connection</td>
37                <td>Power on, jtag target attached</td>
38                <td>On console, type<br><code>telnet ip port</code></td>
39                <td><code>Open On-Chip Debugger<br>></code></td>
40                <td><code>Open On-Chip Debugger<br>></code></td>
41                <td>PASS</td>
42        </tr>
43        <tr>
44                <td><a name="CON002"/>CON002</td>
45                <td>SAM7S64</td>
46                <td>ZY1000</td>
47                <td>GDB server connection</td>
48                <td>Power on, jtag target attached</td>
49                <td>On GDB console, type<br><code>target remote ip:port</code></td>
50                <td><code>Remote debugging using 10.0.0.73:3333</code></td>
51                <td><code>Remote debugging using 10.0.0.73:3333</code></td>
52                <td>PASS</td>
53        </tr>
54 </table>
55
56 <H2>Reset</H2>
57 <table border=1>
58        <tr>
59                <td>ID</td>
60                <td>Target</td>
61                <td>Interface</td>
62                <td>Description</td>
63                <td>Initial state</td>
64                <td>Input</td>
65                <td>Expected output</td>
66                <td>Actual output</td>
67                <td>Pass/Fail</td>
68        </tr>
69        <tr>
70                <td><a name="RES001"/>RES001</td>
71                <td>SAM7S64</td>
72                <td>ZY1000</td>
73                <td>Reset halt on a blank target</td>
74                <td>Erase all the content of the flash</td>
75                <td>Connect via the telnet interface and type <br><code>reset halt</code></td>
76                <td>Reset should return without error and the output should contain<br><code>target state: halted<br>pc = 0</code></td>
77                <td>
78                        <code>
79                                JTAG device found: 0x3f0f0f0f (Manufacturer: 0x787, Part: 0xf0f0, Version: 0x3)<br>
80                                nSRST pulls nTRST, falling back to "reset run_and_halt"<br>
81                                target state: halted<br>
82                                target halted in ARM state due to debug request, current mode: Supervisor<br>
83                                cpsr: 0x60000013 pc: 0x00100178
84                        </code>
85                </td>
86                <td>PASS</td>
87        </tr>
88        <tr>
89                <td><a name="RES002"/>RES002</td>
90                <td>SAM7S64</td>
91                <td>ZY1000</td>
92                <td>Reset init on a blank target</td>
93                <td>Erase all the content of the flash</td>
94                <td>Connect via the telnet interface and type <br><code>reset init</code></td>
95                <td>Reset should return without error and the output should contain <br><code>executing reset script 'name_of_the_script'</code></td>
96                <td>
97                        <code>
98                                JTAG device found: 0x3f0f0f0f (Manufacturer: 0x787, Part: 0xf0f0, Version: 0x3)<br>
99                                nSRST pulls nTRST, falling back to "reset run_and_init"<br>
100                                target state: halted<br>
101                                target halted in ARM state due to debug request, current mode: Supervisor<br>
102                                cpsr: 0x600000d3 pc: 0x00003e24<br>
103                                executing reset script 'event/sam7s256_reset.script'
104                        </code>
105                </td>
106                <td>PASS</td>
107        </tr>
108        <tr>
109                <td><a name="RES003"/>RES003</td>
110                <td>SAM7S64</td>
111                <td>ZY1000</td>
112                <td>Reset after a power cycle of the target</td>
113                <td>Reset the target then power cycle the target</td>
114                <td>Connect via the telnet interface and type <br><code>reset halt</code> after the power was detected</td>
115                <td>Reset should return without error and the output should contain<br><code>target state: halted</code></td>
116                <td>
117                        <code>
118                                JTAG device found: 0x3f0f0f0f (Manufacturer: 0x787, Part: 0xf0f0, Version: 0x3)<br>
119                                nSRST pulls nTRST, falling back to "reset run_and_halt"<br>
120                                target state: halted<br>
121                                target halted in ARM state due to debug request, current mode: Supervisor<br>
122                                cpsr: 0x300000d3 pc: 0x00003a38
123                        </code>
124                </td>
125                <td>PASS</td>
126        </tr>
127 </table>
128
129 <H2>JTAG Speed</H2>
130 <table border=1>
131        <tr>
132                <td>ID</td>
133                <td>Target</td>
134                <td>ZY1000</td>
135                <td>Description</td>
136                <td>Initial state</td>
137                <td>Input</td>
138                <td>Expected output</td>
139                <td>Actual output</td>
140                <td>Pass/Fail</td>
141        </tr>
142        <tr>
143                <td><a name="SPD001"/>RES001</td>
144                <td>SAM7S64</td>
145                <td>ZY1000</td>
146                <td>16MHz on normal operation</td>
147                <td>Reset init the target according to RES002 </td>
148                <td>Exercise a memory access over the JTAG, for example <br><code>mdw 0x0 32</code></td>
149                <td>The command should run without any errors. If any JTAG checking errors happen, the test failed</td>
150                <td>
151                        <code>
152                                > jtag_khz 16000<br>
153                                > mdw 0 32<br>
154                                0x00000000: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
155                                0x00000020: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
156                                0x00000040: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
157                                0x00000060: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff
158                        </code>
159                </td>
160                <td>PASS</td>
161        </tr>
162 </table>
163
164 <H2>Debugging</H2>
165 <table border=1>
166        <tr>
167                <td>ID</td>
168                <td>Target</td>
169                <td>Interface</td>
170                <td>Description</td>
171                <td>Initial state</td>
172                <td>Input</td>
173                <td>Expected output</td>
174                <td>Actual output</td>
175                <td>Pass/Fail</td>
176        </tr>
177        <tr>
178                <td><a name="DBG001"/>DBG001</td>
179                <td>SAM7S64</td>
180                <td>ZY1000</td>
181                <td>Load is working</td>
182                <td>Reset init is working, RAM is accesible, GDB server is started</td>
183                <td>On the console of the OS: <br>
184                        <code>arm-elf-gdb test_ram.elf</code><br>
185                        <code>(gdb) target remote ip:port</code><br>
186                        <code>(gdb) load</load>
187                </td>
188                <td>Load should return without error, typical output looks like:<br>
189                        <code>
190                                Loading section .text, size 0x14c lma 0x0<br>
191                                Start address 0x40, load size 332<br>
192                                Transfer rate: 180 bytes/sec, 332 bytes/write.<br>
193                        </code>
194                </td>
195                <td><code>
196                        (gdb) load<br>
197                        Loading section .text, size 0x194 lma 0x200000<br>
198                        Start address 0x200040, load size 404<br>
199                        Transfer rate: 17470 bits/sec, 404 bytes/write.
200                </code></td>
201                <td>PASS</td>
202        </tr>
203        <tr>
204                <td><a name="DBG002"/>DBG002</td>
205                <td>SAM7S64</td>
206                <td>ZY1000</td>
207                <td>Software breakpoint</td>
208                <td>Load the test_ram.elf application, use instructions from GDB001</td>
209                <td>In the GDB console:<br>
210                        <code>
211                                (gdb) monitor arm7_9 sw_bkpts enable<br>
212                                software breakpoints enabled<br>
213                                (gdb) break main<br>
214                                Breakpoint 1 at 0xec: file src/main.c, line 71.<br>
215                                (gdb) continue<br>
216                                Continuing.
217                        </code>
218                </td>
219                <td>The software breakpoint should be reached, a typical output looks like:<br>
220                        <code>
221                                target state: halted<br>
222                                target halted in ARM state due to breakpoint, current mode: Supervisor<br>
223                                cpsr: 0x000000d3 pc: 0x000000ec<br>
224                                <br>
225                                Breakpoint 1, main () at src/main.c:71<br>
226                                71        DWORD a = 1;
227                        </code>
228                </td>
229                <td>
230                        <code>
231                                (gdb) break main<br>
232                                Breakpoint 2 at 0x200134: file src/main.c, line 69.<br>
233                                (gdb) c<br>
234                                Continuing.<br>
235                                target state: halted<br>
236                                target halted in ARM state due to breakpoint, current mode: Supervisor<br>
237                                cpsr: 0x60000013 pc: 0x00200134<br>
238                                <br>
239                                Breakpoint 2, main () at src/main.c:69<br>
240                                69        DWORD a = 1;
241                        </code>
242                </td>
243                <td>PASS</td>
244        </tr>
245        <tr>
246                <td><a name="DBG003"/>DBG003</td>
247                <td>SAM7S64</td>
248                <td>ZY1000</td>
249                <td>Single step in a RAM application</td>
250                <td>Load the test_ram.elf application, use instructions from GDB001, break in main using the instructions from GDB002</td>
251                <td>In GDB, type <br><code>(gdb) step</code></td>
252                <td>The next instruction should be reached, typical output:<br>
253                        <code>
254                                (gdb) step<br>
255                                target state: halted<br>
256                                target halted in ARM state due to single step, current mode: Abort<br>
257                                cpsr: 0x20000097 pc: 0x000000f0<br>
258                                target state: halted<br>
259                                target halted in ARM state due to single step, current mode: Abort<br>
260                                cpsr: 0x20000097 pc: 0x000000f4<br>
261                                72        DWORD b = 2;
262                        </code>
263                </td>
264                <td>
265                                <code>
266                                (gdb) step<br>
267                                target state: halted<br>
268                                target halted in ARM state due to single step, current mode: Abort<br>
269                                cpsr: 0x20000097 pc: 0x000000f0<br>
270                                target state: halted<br>
271                                target halted in ARM state due to single step, current mode: Abort<br>
272                                cpsr: 0x20000097 pc: 0x000000f4<br>
273                                72        DWORD b = 2;
274                        </code>
275                </td>
276                <td>PASS</td>
277        </tr>
278        <tr>
279                <td><a name="DBG004"/>DBG004</td>
280                <td>SAM7S64</td>
281                <td>ZY1000</td>
282                <td>Software break points are working after a reset</td>
283                <td>Load the test_ram.elf application, use instructions from GDB001, break in main using the instructions from GDB002</td>
284                <td>In GDB, type <br><code>
285                        (gdb) monitor reset<br>
286                        (gdb) load<br>
287                        (gdb) continue<br>
288                        </code></td>
289                <td>The breakpoint should be reached, typical output:<br>
290                        <code>
291                                target state: halted<br>
292                                target halted in ARM state due to breakpoint, current mode: Supervisor<br>
293                                cpsr: 0x000000d3 pc: 0x000000ec<br>
294                                <br>
295                                Breakpoint 1, main () at src/main.c:71<br>
296                                71        DWORD a = 1;
297                        </code>
298                </td>
299                <td><code>
300                        (gdb) moni reset<br>
301                        JTAG device found: 0x3f0f0f0f (Manufacturer: 0x787, Part: 0xf0f0, Version: 0x3)<br>
302                        target state: halted<br>
303                        target halted in ARM state due to debug request, current mode: Supervisor<br>
304                        cpsr: 0x600000d3 pc: 0x00003e28<br>
305                        executing reset script 'event/sam7s256_reset.script'<br>
306                        (gdb) load<br>
307                        Loading section .text, size 0x194 lma 0x200000<br>
308                        Start address 0x200040, load size 404<br>
309                        Transfer rate: 20455 bits/sec, 404 bytes/write.<br>
310                        (gdb) continue<br>
311                        Continuing.<br>
312                        target state: halted<br>
313                        target halted in ARM state due to breakpoint, current mode: Supervisor<br>
314                        cpsr: 0x60000013 pc: 0x00200134<br>
315                        <br>
316                        Breakpoint 2, main () at src/main.c:69<br>
317                        69        DWORD a = 1;
318                </code></td>
319                <td>PASS</td>
320        </tr>
321        <tr>
322                <td><a name="DBG005"/>DBG005</td>
323                <td>SAM7S64</td>
324                <td>ZY1000</td>
325                <td>Hardware breakpoint</td>
326                <td>Flash the test_rom.elf application. Make this test after FLA004 has passed</td>
327                <td>Be sure that <code>gdb_memory_map</code> and <code>gdb_flash_program</code> are enabled. In GDB, type <br>
328                        <code>
329                                (gdb) monitor reset<br>
330                                (gdb) load<br>
331                                Loading section .text, size 0x194 lma 0x100000<br>
332                                Start address 0x100040, load size 404<br>
333                                Transfer rate: 179 bytes/sec, 404 bytes/write.<br>
334                                (gdb) monitor arm7_9  force_hw_bkpts enable<br>
335                                force hardware breakpoints enabled<br>
336                                (gdb) break main<br>
337                                Breakpoint 1 at 0x100134: file src/main.c, line 69.<br>
338                                (gdb) continue<br>
339                        </code>
340                </td>
341                <td>The breakpoint should be reached, typical output:<br>
342                        <code>
343                                Continuing.<br>
344                                <br>
345                                Breakpoint 1, main () at src/main.c:69<br>
346                                69        DWORD a = 1;<br>
347                        </code>
348                </td>
349                <td>
350                <code>
351                        (gdb) break main<br>
352                        Breakpoint 1 at 0x100134: file src/main.c, line 69.<br>
353                        (gdb) c<br>
354                        Continuing.<br>
355                        target state: halted<br>
356                        target halted in ARM state due to breakpoint, current mode: Supervisor<br>
357                        cpsr: 0x60000013 pc: 0x00100134<br>
358                        <br>
359                        Breakpoint 1, main () at src/main.c:69<br>
360                        69        DWORD a = 1;
361                </code>
362                </td>
363                <td>PASS</td>
364        </tr>
365        <tr>
366                <td><a name="DBG006"/>DBG006</td>
367                <td>SAM7S64</td>
368                <td>ZY1000</td>
369                <td>Hardware breakpoint is set after a reset</td>
370                <td>Follow the instructions to flash and insert a hardware breakpoint from DBG005</td>
371                <td>In GDB, type <br>
372                        <code>
373                                (gdb) monitor reset<br>
374                                (gdb) monitor reg pc 0x100000<br>
375                                pc (/32): 0x00100000<br>
376                                (gdb) continue
377                        </code><br>
378                        where the value inserted in PC is the start address of the application
379                </td>
380                <td>The breakpoint should be reached, typical output:<br>
381                        <code>
382                                Continuing.<br>
383                                <br>
384                                Breakpoint 1, main () at src/main.c:69<br>
385                                69        DWORD a = 1;<br>
386                        </code>
387                </td>
388                <td>
389                <code>
390                        Continuing.<br>
391                        target state: halted<br>
392                        target halted in ARM state due to single step, current mode: Supervisor<br>
393                        cpsr: 0x60000013 pc: 0x00100040<br>
394                        target state: halted<br>
395                        target halted in ARM state due to breakpoint, current mode: Supervisor<br>
396                        cpsr: 0x60000013 pc: 0x00100134<br>
397                        <br>
398                        Breakpoint 1, main () at src/main.c:69<br>
399                        69        DWORD a = 1;
400                </code><br>
401                <b>Aren't there too many "halted" signs?</b>
402                </td>
403                <td>PASS</td>
404        </tr>
405        <tr>
406                <td><a name="DBG007"/>DBG007</td>
407                <td>SAM7S64</td>
408                <td>ZY1000</td>
409                <td>Single step in ROM</td>
410                <td>Flash the test_rom.elf application and set a breakpoint in main, use DBG005. Make this test after FLA004 has passed</td>
411                <td>Be sure that <code>gdb_memory_map</code> and <code>gdb_flash_program</code> are enabled. In GDB, type <br>
412                        <code>
413                                (gdb) monitor reset<br>
414                                (gdb) load<br>
415                                Loading section .text, size 0x194 lma 0x100000<br>
416                                Start address 0x100040, load size 404<br>
417                                Transfer rate: 179 bytes/sec, 404 bytes/write.<br>
418                                (gdb) monitor arm7_9  force_hw_bkpts enable<br>
419                                force hardware breakpoints enabled<br>
420                                (gdb) break main<br>
421                                Breakpoint 1 at 0x100134: file src/main.c, line 69.<br>
422                                (gdb) continue<br>
423                                Continuing.<br>
424                                <br>
425                                Breakpoint 1, main () at src/main.c:69<br>
426                                69        DWORD a = 1;<br>
427                                (gdb) step
428                        </code>
429                </td>
430                <td>The breakpoint should be reached, typical output:<br>
431                        <code>
432                                target state: halted<br>
433                                target halted in ARM state due to single step, current mode: Supervisor<br>
434                                cpsr: 0x60000013 pc: 0x0010013c<br>
435                                70        DWORD b = 2;<br>
436                        </code>
437                </td>
438                <td><code>
439                        (gdb) step<br>
440                        target state: halted<br>
441                        target halted in ARM state due to single step, current mode: Supervisor<br>
442                        cpsr: 0x60000013 pc: 0x00100138<br>
443                        target state: halted<br>
444                        target halted in ARM state due to single step, current mode: Supervisor<br>
445                        cpsr: 0x60000013 pc: 0x0010013c<br>
446                        70        DWORD b = 2;
447                </code></td>
448                <td>PASS</td>
449        </tr>
450 </table>
451
452 <H2>RAM access</H2>
453 Note: these tests are not designed to test/debug the target, but to test functionalities!
454 <table border=1>
455        <tr>
456                <td>ID</td>
457                <td>Target</td>
458                <td>Interface</td>
459                <td>Description</td>
460                <td>Initial state</td>
461                <td>Input</td>
462                <td>Expected output</td>
463                <td>Actual output</td>
464                <td>Pass/Fail</td>
465        </tr>
466        <tr>
467                <td><a name="RAM001"/>RAM001</td>
468                <td>SAM7S64</td>
469                <td>ZY1000</td>
470                <td>32 bit Write/read RAM</td>
471                <td>Reset init is working</td>
472                <td>On the telnet interface<br>
473                        <code>  > mww ram_address 0xdeadbeef 16<br>
474                                        > mdw ram_address 32
475                        </code>
476                </td>
477                <td>The commands should execute without error. A clear failure is a memory access exception. The result of running the commands should be a list of 16 locations 32bit long containing 0xdeadbeef.<br>
478                        <code>
479                                > mww 0x0 0xdeadbeef 16<br>
480                                > mdw 0x0 32<br>
481                                0x00000000: deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef<br>
482                                0x00000020: deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef<br>
483                                0x00000040: e1a00000 e59fa51c e59f051c e04aa000 00080017 00009388 00009388 00009388<br>
484                                0x00000060: 00009388 0002c2c0 0002c2c0 000094f8 000094f4 00009388 00009388 00009388<br>
485                        </code>
486                </td>
487                <td>
488                <code>
489                        > mww 0x00200000 0xdeadbeef 16<br>
490                        > mdw 0x00200000 32<br>
491                        0x00200000: deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef<br>
492                        0x00200020: deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef<br>
493                        0x00200040: e59f10b4 e3a00902 e5810004 e59f00ac e59f10ac e5810000 e3e010ff e59f00a4<br>
494                        0x00200060: e5810060 e59f10a0 e3e00000 e5810130 e5810124 e321f0db e59fd090 e321f0d7
495                </code>
496                </td>
497                <td>PASS</td>
498        </tr>
499        <tr>
500                <td><a name="RAM002"/>RAM002</td>
501                <td>SAM7S64</td>
502                <td>ZY1000</td>
503                <td>16 bit Write/read RAM</td>
504                <td>Reset init is working</td>
505                <td>On the telnet interface<br>
506                        <code>  > mwh ram_address 0xbeef 16<br>
507                                        > mdh ram_address 32
508                        </code>
509                </td>
510                <td>The commands should execute without error. A clear failure is a memory access exception. The result of running the commands should be a list of 16 locations 16bit long containing 0xbeef.<br>
511                        <code>
512                                > mwh 0x0 0xbeef 16<br>
513                                > mdh 0x0 32<br>
514                                0x00000000: beef beef beef beef beef beef beef beef beef beef beef beef beef beef beef beef<br>
515                                0x00000020: 00e0 0000 021c 0000 0240 0000 026c 0000 0288 0000 0000 0000 0388 0000 0350 0000<br>
516                                >
517                        </code>
518                </td>
519                <td><code>
520                        > mwh 0x00200000 0xbeef 16<br>
521                        > mdh 0x00200000 32<br>
522                        0x00200000: beef beef beef beef beef beef beef beef beef beef beef beef beef beef beef beef<br>
523                        0x00200020: 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
524                </code></td>
525                <td>PASS</td>
526        </tr>
527        <tr>
528                <td><a name="RAM003"/>RAM003</td>
529                <td>SAM7S64</td>
530                <td>ZY1000</td>
531                <td>8 bit Write/read RAM</td>
532                <td>Reset init is working</td>
533                <td>On the telnet interface<br>
534                        <code>  > mwb ram_address 0xab 16<br>
535                                        > mdb ram_address 32
536                        </code>
537                </td>
538                <td>The commands should execute without error. A clear failure is a memory access exception. The result of running the commands should be a list of 16 locations 8bit long containing 0xab.<br>
539                        <code>
540                                > mwb ram_address 0xab 16<br>
541                                > mdb ram_address 32<br>
542                                0x00000000: ab ab ab ab ab ab ab ab ab ab ab ab ab ab ab ab 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<br>
543                                >
544                        </code>
545                </td>
546                <td><code>
547                        > mwb 0x00200000 0xab 16<br>
548                        > mdb 0x00200000 32<br>
549                        0x00200000: ab ab ab ab ab ab ab ab ab ab ab ab ab ab ab ab 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
550                </code></td>
551                <td>PASS</td>
552        </tr>
553 </table>
554
555
556
557 <H2>Flash access</H2>
558 <table border=1>
559        <tr>
560                <td>ID</td>
561                <td>Target</td>
562                <td>Interface</td>
563                <td>Description</td>
564                <td>Initial state</td>
565                <td>Input</td>
566                <td>Expected output</td>
567                <td>Actual output</td>
568                <td>Pass/Fail</td>
569        </tr>
570        <tr>
571                <td><a name="FLA001"/>FLA001</td>
572                <td>SAM7S64</td>
573                <td>ZY1000</td>
574                <td>Flash probe</td>
575                <td>Reset init is working</td>
576                <td>On the telnet interface:<br>
577                        <code>  > flash probe 0</code>
578                </td>
579                <td>The command should execute without error. The output should state the name of the flash and the starting address. An example of output:<br>
580                        <code>flash 'ecosflash' found at 0x01000000</code>
581                </td>
582                <td>
583                <code>
584                        > flash probe 0<br>
585                        flash 'at91sam7' found at 0x00100000
586                </code>
587                </td>
588                <td>PASS</td>
589        </tr>
590        <tr>
591                <td><a name="FLA002"/>FLA002</td>
592                <td>SAM7S64</td>
593                <td>ZY1000</td>
594                <td>flash fillw</td>
595                <td>Reset init is working, flash is probed</td>
596                <td>On the telnet interface<br>
597                        <code>  > flash fillw 0x1000000 0xdeadbeef 16
598                        </code>
599                </td>
600                <td>The commands should execute without error. The output looks like:<br>
601                        <code>
602                                wrote 64 bytes to 0x01000000 in 11.610000s (0.091516 kb/s)
603                        </code><br>
604                        To verify the contents of the flash:<br>
605                        <code>
606                                > mdw 0x1000000 32<br>
607                                0x01000000: deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef<br>
608                                0x01000020: deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef<br>
609                                0x01000040: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
610                                0x01000060: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff
611                        </code>
612                </td>
613                <td><code>
614                        > flash fillw 0x100000 0xdeadbeef 16<br>
615                        wrote 64 bytes to 0x00100000 in 1.110000s (0.957207 kb/s)<br>
616                        > mdw 0x100000 32<br>
617                        0x00100000: deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef<br>
618                        0x00100020: deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef<br>
619                        0x00100040: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
620                        0x00100060: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff
621                </code></td>
622                <td>PASS</td>
623        </tr>
624        <tr>
625                <td><a name="FLA003"/>FLA003</td>
626                <td>SAM7S64</td>
627                <td>ZY1000</td>
628                <td>Flash erase</td>
629                <td>Reset init is working, flash is probed</td>
630                <td>On the telnet interface<br>
631                        <code>  >  flash erase_address 0x1000000 0x2000
632                        </code>
633                </td>
634                <td>The commands should execute without error.<br>
635                        <code>
636                                erased address 0x01000000 length 8192 in 4.970000s
637                        </code>
638                        To check that the flash has been erased, read at different addresses. The result should always be 0xff.
639                        <code>
640                                > mdw 0x1000000 32<br>
641                                0x01000000: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
642                                0x01000020: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
643                                0x01000040: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
644                                0x01000060: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff
645                        </code>
646                </td>
647                <td><code>
648                        > flash erase_address 0x100000 0x2000<br>
649                        erased address 0x00100000 length 8192 in 0.510000s<br>
650                        > mdw 0x100000 32<br>
651                        0x00100000: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
652                        0x00100020: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
653                        0x00100040: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
654                        0x00100060: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
655                        >
656                </code></td>
657                <td>PASS</td>
658        </tr>
659        <tr>
660                <td><a name="FLA004"/>FLA004</td>
661                <td>SAM7S64</td>
662                <td>ZY1000</td>
663                <td>Loading to flash from GDB</td>
664                <td>Reset init is working, flash is probed, connectivity to GDB server is working</td>
665                <td>Start GDB using a ROM elf image, eg: arm-elf-gdb test_rom.elf. <br>
666                                <code>
667                                        (gdb) target remote ip:port<br>
668                                        (gdb) monitor reset<br>
669                                        (gdb) load<br>
670                                        Loading section .text, size 0x194 lma 0x100000<br>
671                                        Start address 0x100040, load size 404<br>
672                                        Transfer rate: 179 bytes/sec, 404 bytes/write.
673                                        (gdb) monitor verify_image path_to_elf_file
674                                </code>
675                </td>
676                <td>The output should look like:<br>
677                        <code>
678                                verified 404 bytes in 5.060000s
679                        </code><br>
680                        The failure message is something like:<br>
681                        <code>Verify operation failed address 0x00200000. Was 0x00 instead of 0x18</code>
682                </td>
683                <td>
684                        <code>
685                                (gdb) load<br>
686                                Loading section .text, size 0x194 lma 0x100000<br>
687                                Start address 0x100040, load size 404<br>
688                                Transfer rate: 1540 bits/sec, 404 bytes/write.<br>
689                                (gdb) monitor verify_image /tftp/10.0.0.9/c:\workspace/ecosboard/ecosboard/phi/openocd/rep/testing/examples/SAM7S256Test/test_rom.elf<br>
690                                verified 404 bytes in 4.860000s
691                        </code>
692                </td>
693                <td>PASS</td>
694        </tr>
695 </table>
696
697 </body>
698 </html>