570b3b344b2919b95d19f27de300992118f4abd8
[openocd.git] / testing / examples / SAM7S256Test / results / 607.html
1 <html>
2 <head>
3 <title>Test results for revision 607</title>
4 </head>
5
6 <body>
7 <H1>Test cases</H1>
8 <H2>Test case results</H2>
9 The test results are stored in seperate documents. One document for
10 each subversion number.
11 <table border="1">
12 <tr><td>Test results</td><td>comment</td></tr>
13 <tr><td>607</a></td><td></td></tr>
14 <tr><td><a href="results/template.html">template</a></td><td>Test results template</td></tr>
15 </table>
16
17 <H1>SAM7S64</H1>
18
19 <H2>Connectivity</H2>
20 <table border=1>
21 <tr>
22 <td>ID</td>
23 <td>Target</td>
24 <td>Interface</td>
25 <td>Description</td>
26 <td>Initial state</td>
27 <td>Input</td>
28 <td>Expected output</td>
29 <td>Actual output</td>
30 <td>Pass/Fail</td>
31 </tr>
32 <tr>
33 <td><a name="CON001"/>CON001</td>
34 <td>SAM7S64</td>
35 <td>ZY1000</td>
36 <td>Telnet connection</td>
37 <td>Power on, jtag target attached</td>
38 <td>On console, type<br><code>telnet ip port</code></td>
39 <td><code>Open On-Chip Debugger<br>></code></td>
40 <td><code>Open On-Chip Debugger<br>></code></td>
41 <td>PASS</td>
42 </tr>
43 <tr>
44 <td><a name="CON002"/>CON002</td>
45 <td>SAM7S64</td>
46 <td>ZY1000</td>
47 <td>GDB server connection</td>
48 <td>Power on, jtag target attached</td>
49 <td>On GDB console, type<br><code>target remote ip:port</code></td>
50 <td><code>Remote debugging using 10.0.0.73:3333</code></td>
51 <td><code>Remote debugging using 10.0.0.73:3333</code></td>
52 <td>PASS</td>
53 </tr>
54 </table>
55
56 <H2>Reset</H2>
57 <table border=1>
58 <tr>
59 <td>ID</td>
60 <td>Target</td>
61 <td>Interface</td>
62 <td>Description</td>
63 <td>Initial state</td>
64 <td>Input</td>
65 <td>Expected output</td>
66 <td>Actual output</td>
67 <td>Pass/Fail</td>
68 </tr>
69 <tr>
70 <td><a name="RES001"/>RES001</td>
71 <td>SAM7S64</td>
72 <td>ZY1000</td>
73 <td>Reset halt on a blank target</td>
74 <td>Erase all the content of the flash</td>
75 <td>Connect via the telnet interface and type <br><code>reset halt</code></td>
76 <td>Reset should return without error and the output should contain<br><code>target state: halted<br>pc = 0</code></td>
77 <td>
78 <code>
79 JTAG device found: 0x3f0f0f0f (Manufacturer: 0x787, Part: 0xf0f0, Version: 0x3)<br>
80 nSRST pulls nTRST, falling back to "reset run_and_halt"<br>
81 target state: halted<br>
82 target halted in ARM state due to debug request, current mode: Supervisor<br>
83 cpsr: 0x60000013 pc: 0x00100178
84 </code>
85 </td>
86 <td>PASS</td>
87 </tr>
88 <tr>
89 <td><a name="RES002"/>RES002</td>
90 <td>SAM7S64</td>
91 <td>ZY1000</td>
92 <td>Reset init on a blank target</td>
93 <td>Erase all the content of the flash</td>
94 <td>Connect via the telnet interface and type <br><code>reset init</code></td>
95 <td>Reset should return without error and the output should contain <br><code>executing reset script 'name_of_the_script'</code></td>
96 <td>
97 <code>
98 JTAG device found: 0x3f0f0f0f (Manufacturer: 0x787, Part: 0xf0f0, Version: 0x3)<br>
99 nSRST pulls nTRST, falling back to "reset run_and_init"<br>
100 target state: halted<br>
101 target halted in ARM state due to debug request, current mode: Supervisor<br>
102 cpsr: 0x600000d3 pc: 0x00003e24<br>
103 executing reset script 'event/sam7s256_reset.script'
104 </code>
105 </td>
106 <td>PASS</td>
107 </tr>
108 <tr>
109 <td><a name="RES003"/>RES003</td>
110 <td>SAM7S64</td>
111 <td>ZY1000</td>
112 <td>Reset after a power cycle of the target</td>
113 <td>Reset the target then power cycle the target</td>
114 <td>Connect via the telnet interface and type <br><code>reset halt</code> after the power was detected</td>
115 <td>Reset should return without error and the output should contain<br><code>target state: halted</code></td>
116 <td>
117 <code>
118 JTAG device found: 0x3f0f0f0f (Manufacturer: 0x787, Part: 0xf0f0, Version: 0x3)<br>
119 nSRST pulls nTRST, falling back to "reset run_and_halt"<br>
120 target state: halted<br>
121 target halted in ARM state due to debug request, current mode: Supervisor<br>
122 cpsr: 0x300000d3 pc: 0x00003a38
123 </code>
124 </td>
125 <td>PASS</td>
126 </tr>
127 </table>
128
129 <H2>JTAG Speed</H2>
130 <table border=1>
131 <tr>
132 <td>ID</td>
133 <td>Target</td>
134 <td>ZY1000</td>
135 <td>Description</td>
136 <td>Initial state</td>
137 <td>Input</td>
138 <td>Expected output</td>
139 <td>Actual output</td>
140 <td>Pass/Fail</td>
141 </tr>
142 <tr>
143 <td><a name="SPD001"/>RES001</td>
144 <td>SAM7S64</td>
145 <td>ZY1000</td>
146 <td>16MHz on normal operation</td>
147 <td>Reset init the target according to RES002 </td>
148 <td>Exercise a memory access over the JTAG, for example <br><code>mdw 0x0 32</code></td>
149 <td>The command should run without any errors. If any JTAG checking errors happen, the test failed</td>
150 <td>
151 <code>
152 > jtag_khz 16000<br>
153 > mdw 0 32<br>
154 0x00000000: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
155 0x00000020: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
156 0x00000040: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
157 0x00000060: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff
158 </code>
159 </td>
160 <td>PASS</td>
161 </tr>
162 </table>
163
164 <H2>Debugging</H2>
165 <table border=1>
166 <tr>
167 <td>ID</td>
168 <td>Target</td>
169 <td>Interface</td>
170 <td>Description</td>
171 <td>Initial state</td>
172 <td>Input</td>
173 <td>Expected output</td>
174 <td>Actual output</td>
175 <td>Pass/Fail</td>
176 </tr>
177 <tr>
178 <td><a name="DBG001"/>DBG001</td>
179 <td>SAM7S64</td>
180 <td>ZY1000</td>
181 <td>Load is working</td>
182 <td>Reset init is working, RAM is accesible, GDB server is started</td>
183 <td>On the console of the OS: <br>
184 <code>arm-elf-gdb test_ram.elf</code><br>
185 <code>(gdb) target remote ip:port</code><br>
186 <code>(gdb) load</load>
187 </td>
188 <td>Load should return without error, typical output looks like:<br>
189 <code>
190 Loading section .text, size 0x14c lma 0x0<br>
191 Start address 0x40, load size 332<br>
192 Transfer rate: 180 bytes/sec, 332 bytes/write.<br>
193 </code>
194 </td>
195 <td><code>
196 (gdb) load<br>
197 Loading section .text, size 0x194 lma 0x200000<br>
198 Start address 0x200040, load size 404<br>
199 Transfer rate: 17470 bits/sec, 404 bytes/write.
200 </code></td>
201 <td>PASS</td>
202 </tr>
203 <tr>
204 <td><a name="DBG002"/>DBG002</td>
205 <td>SAM7S64</td>
206 <td>ZY1000</td>
207 <td>Software breakpoint</td>
208 <td>Load the test_ram.elf application, use instructions from GDB001</td>
209 <td>In the GDB console:<br>
210 <code>
211 (gdb) monitor arm7_9 sw_bkpts enable<br>
212 software breakpoints enabled<br>
213 (gdb) break main<br>
214 Breakpoint 1 at 0xec: file src/main.c, line 71.<br>
215 (gdb) continue<br>
216 Continuing.
217 </code>
218 </td>
219 <td>The software breakpoint should be reached, a typical output looks like:<br>
220 <code>
221 target state: halted<br>
222 target halted in ARM state due to breakpoint, current mode: Supervisor<br>
223 cpsr: 0x000000d3 pc: 0x000000ec<br>
224 <br>
225 Breakpoint 1, main () at src/main.c:71<br>
226 71 DWORD a = 1;
227 </code>
228 </td>
229 <td>
230 <code>
231 (gdb) break main<br>
232 Breakpoint 2 at 0x200134: file src/main.c, line 69.<br>
233 (gdb) c<br>
234 Continuing.<br>
235 target state: halted<br>
236 target halted in ARM state due to breakpoint, current mode: Supervisor<br>
237 cpsr: 0x60000013 pc: 0x00200134<br>
238 <br>
239 Breakpoint 2, main () at src/main.c:69<br>
240 69 DWORD a = 1;
241 </code>
242 </td>
243 <td>PASS</td>
244 </tr>
245 <tr>
246 <td><a name="DBG003"/>DBG003</td>
247 <td>SAM7S64</td>
248 <td>ZY1000</td>
249 <td>Single step in a RAM application</td>
250 <td>Load the test_ram.elf application, use instructions from GDB001, break in main using the instructions from GDB002</td>
251 <td>In GDB, type <br><code>(gdb) step</code></td>
252 <td>The next instruction should be reached, typical output:<br>
253 <code>
254 (gdb) step<br>
255 target state: halted<br>
256 target halted in ARM state due to single step, current mode: Abort<br>
257 cpsr: 0x20000097 pc: 0x000000f0<br>
258 target state: halted<br>
259 target halted in ARM state due to single step, current mode: Abort<br>
260 cpsr: 0x20000097 pc: 0x000000f4<br>
261 72 DWORD b = 2;
262 </code>
263 </td>
264 <td>
265 <code>
266 (gdb) step<br>
267 target state: halted<br>
268 target halted in ARM state due to single step, current mode: Abort<br>
269 cpsr: 0x20000097 pc: 0x000000f0<br>
270 target state: halted<br>
271 target halted in ARM state due to single step, current mode: Abort<br>
272 cpsr: 0x20000097 pc: 0x000000f4<br>
273 72 DWORD b = 2;
274 </code>
275 </td>
276 <td>PASS</td>
277 </tr>
278 <tr>
279 <td><a name="DBG004"/>DBG004</td>
280 <td>SAM7S64</td>
281 <td>ZY1000</td>
282 <td>Software break points are working after a reset</td>
283 <td>Load the test_ram.elf application, use instructions from GDB001, break in main using the instructions from GDB002</td>
284 <td>In GDB, type <br><code>
285 (gdb) monitor reset<br>
286 (gdb) load<br>
287 (gdb) continue<br>
288 </code></td>
289 <td>The breakpoint should be reached, typical output:<br>
290 <code>
291 target state: halted<br>
292 target halted in ARM state due to breakpoint, current mode: Supervisor<br>
293 cpsr: 0x000000d3 pc: 0x000000ec<br>
294 <br>
295 Breakpoint 1, main () at src/main.c:71<br>
296 71 DWORD a = 1;
297 </code>
298 </td>
299 <td><code>
300 (gdb) moni reset<br>
301 JTAG device found: 0x3f0f0f0f (Manufacturer: 0x787, Part: 0xf0f0, Version: 0x3)<br>
302 target state: halted<br>
303 target halted in ARM state due to debug request, current mode: Supervisor<br>
304 cpsr: 0x600000d3 pc: 0x00003e28<br>
305 executing reset script 'event/sam7s256_reset.script'<br>
306 (gdb) load<br>
307 Loading section .text, size 0x194 lma 0x200000<br>
308 Start address 0x200040, load size 404<br>
309 Transfer rate: 20455 bits/sec, 404 bytes/write.<br>
310 (gdb) continue<br>
311 Continuing.<br>
312 target state: halted<br>
313 target halted in ARM state due to breakpoint, current mode: Supervisor<br>
314 cpsr: 0x60000013 pc: 0x00200134<br>
315 <br>
316 Breakpoint 2, main () at src/main.c:69<br>
317 69 DWORD a = 1;
318 </code></td>
319 <td>PASS</td>
320 </tr>
321 <tr>
322 <td><a name="DBG005"/>DBG005</td>
323 <td>SAM7S64</td>
324 <td>ZY1000</td>
325 <td>Hardware breakpoint</td>
326 <td>Flash the test_rom.elf application. Make this test after FLA004 has passed</td>
327 <td>Be sure that <code>gdb_memory_map</code> and <code>gdb_flash_program</code> are enabled. In GDB, type <br>
328 <code>
329 (gdb) monitor reset<br>
330 (gdb) load<br>
331 Loading section .text, size 0x194 lma 0x100000<br>
332 Start address 0x100040, load size 404<br>
333 Transfer rate: 179 bytes/sec, 404 bytes/write.<br>
334 (gdb) monitor arm7_9 force_hw_bkpts enable<br>
335 force hardware breakpoints enabled<br>
336 (gdb) break main<br>
337 Breakpoint 1 at 0x100134: file src/main.c, line 69.<br>
338 (gdb) continue<br>
339 </code>
340 </td>
341 <td>The breakpoint should be reached, typical output:<br>
342 <code>
343 Continuing.<br>
344 <br>
345 Breakpoint 1, main () at src/main.c:69<br>
346 69 DWORD a = 1;<br>
347 </code>
348 </td>
349 <td>
350 <code>
351 (gdb) break main<br>
352 Breakpoint 1 at 0x100134: file src/main.c, line 69.<br>
353 (gdb) c<br>
354 Continuing.<br>
355 target state: halted<br>
356 target halted in ARM state due to breakpoint, current mode: Supervisor<br>
357 cpsr: 0x60000013 pc: 0x00100134<br>
358 <br>
359 Breakpoint 1, main () at src/main.c:69<br>
360 69 DWORD a = 1;
361 </code>
362 </td>
363 <td>PASS</td>
364 </tr>
365 <tr>
366 <td><a name="DBG006"/>DBG006</td>
367 <td>SAM7S64</td>
368 <td>ZY1000</td>
369 <td>Hardware breakpoint is set after a reset</td>
370 <td>Follow the instructions to flash and insert a hardware breakpoint from DBG005</td>
371 <td>In GDB, type <br>
372 <code>
373 (gdb) monitor reset<br>
374 (gdb) monitor reg pc 0x100000<br>
375 pc (/32): 0x00100000<br>
376 (gdb) continue
377 </code><br>
378 where the value inserted in PC is the start address of the application
379 </td>
380 <td>The breakpoint should be reached, typical output:<br>
381 <code>
382 Continuing.<br>
383 <br>
384 Breakpoint 1, main () at src/main.c:69<br>
385 69 DWORD a = 1;<br>
386 </code>
387 </td>
388 <td>
389 <code>
390 Continuing.<br>
391 target state: halted<br>
392 target halted in ARM state due to single step, current mode: Supervisor<br>
393 cpsr: 0x60000013 pc: 0x00100040<br>
394 target state: halted<br>
395 target halted in ARM state due to breakpoint, current mode: Supervisor<br>
396 cpsr: 0x60000013 pc: 0x00100134<br>
397 <br>
398 Breakpoint 1, main () at src/main.c:69<br>
399 69 DWORD a = 1;
400 </code><br>
401 <b>Aren't there too many "halted" signs?</b>
402 </td>
403 <td>PASS</td>
404 </tr>
405 <tr>
406 <td><a name="DBG007"/>DBG007</td>
407 <td>SAM7S64</td>
408 <td>ZY1000</td>
409 <td>Single step in ROM</td>
410 <td>Flash the test_rom.elf application and set a breakpoint in main, use DBG005. Make this test after FLA004 has passed</td>
411 <td>Be sure that <code>gdb_memory_map</code> and <code>gdb_flash_program</code> are enabled. In GDB, type <br>
412 <code>
413 (gdb) monitor reset<br>
414 (gdb) load<br>
415 Loading section .text, size 0x194 lma 0x100000<br>
416 Start address 0x100040, load size 404<br>
417 Transfer rate: 179 bytes/sec, 404 bytes/write.<br>
418 (gdb) monitor arm7_9 force_hw_bkpts enable<br>
419 force hardware breakpoints enabled<br>
420 (gdb) break main<br>
421 Breakpoint 1 at 0x100134: file src/main.c, line 69.<br>
422 (gdb) continue<br>
423 Continuing.<br>
424 <br>
425 Breakpoint 1, main () at src/main.c:69<br>
426 69 DWORD a = 1;<br>
427 (gdb) step
428 </code>
429 </td>
430 <td>The breakpoint should be reached, typical output:<br>
431 <code>
432 target state: halted<br>
433 target halted in ARM state due to single step, current mode: Supervisor<br>
434 cpsr: 0x60000013 pc: 0x0010013c<br>
435 70 DWORD b = 2;<br>
436 </code>
437 </td>
438 <td><code>
439 (gdb) step<br>
440 target state: halted<br>
441 target halted in ARM state due to single step, current mode: Supervisor<br>
442 cpsr: 0x60000013 pc: 0x00100138<br>
443 target state: halted<br>
444 target halted in ARM state due to single step, current mode: Supervisor<br>
445 cpsr: 0x60000013 pc: 0x0010013c<br>
446 70 DWORD b = 2;
447 </code></td>
448 <td>PASS</td>
449 </tr>
450 </table>
451
452 <H2>RAM access</H2>
453 Note: these tests are not designed to test/debug the target, but to test functionalities!
454 <table border=1>
455 <tr>
456 <td>ID</td>
457 <td>Target</td>
458 <td>Interface</td>
459 <td>Description</td>
460 <td>Initial state</td>
461 <td>Input</td>
462 <td>Expected output</td>
463 <td>Actual output</td>
464 <td>Pass/Fail</td>
465 </tr>
466 <tr>
467 <td><a name="RAM001"/>RAM001</td>
468 <td>SAM7S64</td>
469 <td>ZY1000</td>
470 <td>32 bit Write/read RAM</td>
471 <td>Reset init is working</td>
472 <td>On the telnet interface<br>
473 <code> > mww ram_address 0xdeadbeef 16<br>
474 > mdw ram_address 32
475 </code>
476 </td>
477 <td>The commands should execute without error. A clear failure is a memory access exception. The result of running the commands should be a list of 16 locations 32bit long containing 0xdeadbeef.<br>
478 <code>
479 > mww 0x0 0xdeadbeef 16<br>
480 > mdw 0x0 32<br>
481 0x00000000: deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef<br>
482 0x00000020: deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef<br>
483 0x00000040: e1a00000 e59fa51c e59f051c e04aa000 00080017 00009388 00009388 00009388<br>
484 0x00000060: 00009388 0002c2c0 0002c2c0 000094f8 000094f4 00009388 00009388 00009388<br>
485 </code>
486 </td>
487 <td>
488 <code>
489 > mww 0x00200000 0xdeadbeef 16<br>
490 > mdw 0x00200000 32<br>
491 0x00200000: deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef<br>
492 0x00200020: deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef<br>
493 0x00200040: e59f10b4 e3a00902 e5810004 e59f00ac e59f10ac e5810000 e3e010ff e59f00a4<br>
494 0x00200060: e5810060 e59f10a0 e3e00000 e5810130 e5810124 e321f0db e59fd090 e321f0d7
495 </code>
496 </td>
497 <td>PASS</td>
498 </tr>
499 <tr>
500 <td><a name="RAM002"/>RAM002</td>
501 <td>SAM7S64</td>
502 <td>ZY1000</td>
503 <td>16 bit Write/read RAM</td>
504 <td>Reset init is working</td>
505 <td>On the telnet interface<br>
506 <code> > mwh ram_address 0xbeef 16<br>
507 > mdh ram_address 32
508 </code>
509 </td>
510 <td>The commands should execute without error. A clear failure is a memory access exception. The result of running the commands should be a list of 16 locations 16bit long containing 0xbeef.<br>
511 <code>
512 > mwh 0x0 0xbeef 16<br>
513 > mdh 0x0 32<br>
514 0x00000000: beef beef beef beef beef beef beef beef beef beef beef beef beef beef beef beef<br>
515 0x00000020: 00e0 0000 021c 0000 0240 0000 026c 0000 0288 0000 0000 0000 0388 0000 0350 0000<br>
516 >
517 </code>
518 </td>
519 <td><code>
520 > mwh 0x00200000 0xbeef 16<br>
521 > mdh 0x00200000 32<br>
522 0x00200000: beef beef beef beef beef beef beef beef beef beef beef beef beef beef beef beef<br>
523 0x00200020: 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000
524 </code></td>
525 <td>PASS</td>
526 </tr>
527 <tr>
528 <td><a name="RAM003"/>RAM003</td>
529 <td>SAM7S64</td>
530 <td>ZY1000</td>
531 <td>8 bit Write/read RAM</td>
532 <td>Reset init is working</td>
533 <td>On the telnet interface<br>
534 <code> > mwb ram_address 0xab 16<br>
535 > mdb ram_address 32
536 </code>
537 </td>
538 <td>The commands should execute without error. A clear failure is a memory access exception. The result of running the commands should be a list of 16 locations 8bit long containing 0xab.<br>
539 <code>
540 > mwb ram_address 0xab 16<br>
541 > mdb ram_address 32<br>
542 0x00000000: ab ab ab ab ab ab ab ab ab ab ab ab ab ab ab ab 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<br>
543 >
544 </code>
545 </td>
546 <td><code>
547 > mwb 0x00200000 0xab 16<br>
548 > mdb 0x00200000 32<br>
549 0x00200000: ab ab ab ab ab ab ab ab ab ab ab ab ab ab ab ab 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
550 </code></td>
551 <td>PASS</td>
552 </tr>
553 </table>
554
555
556
557 <H2>Flash access</H2>
558 <table border=1>
559 <tr>
560 <td>ID</td>
561 <td>Target</td>
562 <td>Interface</td>
563 <td>Description</td>
564 <td>Initial state</td>
565 <td>Input</td>
566 <td>Expected output</td>
567 <td>Actual output</td>
568 <td>Pass/Fail</td>
569 </tr>
570 <tr>
571 <td><a name="FLA001"/>FLA001</td>
572 <td>SAM7S64</td>
573 <td>ZY1000</td>
574 <td>Flash probe</td>
575 <td>Reset init is working</td>
576 <td>On the telnet interface:<br>
577 <code> > flash probe 0</code>
578 </td>
579 <td>The command should execute without error. The output should state the name of the flash and the starting address. An example of output:<br>
580 <code>flash 'ecosflash' found at 0x01000000</code>
581 </td>
582 <td>
583 <code>
584 > flash probe 0<br>
585 flash 'at91sam7' found at 0x00100000
586 </code>
587 </td>
588 <td>PASS</td>
589 </tr>
590 <tr>
591 <td><a name="FLA002"/>FLA002</td>
592 <td>SAM7S64</td>
593 <td>ZY1000</td>
594 <td>flash fillw</td>
595 <td>Reset init is working, flash is probed</td>
596 <td>On the telnet interface<br>
597 <code> > flash fillw 0x1000000 0xdeadbeef 16
598 </code>
599 </td>
600 <td>The commands should execute without error. The output looks like:<br>
601 <code>
602 wrote 64 bytes to 0x01000000 in 11.610000s (0.091516 kb/s)
603 </code><br>
604 To verify the contents of the flash:<br>
605 <code>
606 > mdw 0x1000000 32<br>
607 0x01000000: deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef<br>
608 0x01000020: deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef<br>
609 0x01000040: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
610 0x01000060: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff
611 </code>
612 </td>
613 <td><code>
614 > flash fillw 0x100000 0xdeadbeef 16<br>
615 wrote 64 bytes to 0x00100000 in 1.110000s (0.957207 kb/s)<br>
616 > mdw 0x100000 32<br>
617 0x00100000: deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef<br>
618 0x00100020: deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef deadbeef<br>
619 0x00100040: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
620 0x00100060: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff
621 </code></td>
622 <td>PASS</td>
623 </tr>
624 <tr>
625 <td><a name="FLA003"/>FLA003</td>
626 <td>SAM7S64</td>
627 <td>ZY1000</td>
628 <td>Flash erase</td>
629 <td>Reset init is working, flash is probed</td>
630 <td>On the telnet interface<br>
631 <code> > flash erase_address 0x1000000 0x2000
632 </code>
633 </td>
634 <td>The commands should execute without error.<br>
635 <code>
636 erased address 0x01000000 length 8192 in 4.970000s
637 </code>
638 To check that the flash has been erased, read at different addresses. The result should always be 0xff.
639 <code>
640 > mdw 0x1000000 32<br>
641 0x01000000: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
642 0x01000020: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
643 0x01000040: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
644 0x01000060: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff
645 </code>
646 </td>
647 <td><code>
648 > flash erase_address 0x100000 0x2000<br>
649 erased address 0x00100000 length 8192 in 0.510000s<br>
650 > mdw 0x100000 32<br>
651 0x00100000: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
652 0x00100020: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
653 0x00100040: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
654 0x00100060: ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff ffffffff<br>
655 >
656 </code></td>
657 <td>PASS</td>
658 </tr>
659 <tr>
660 <td><a name="FLA004"/>FLA004</td>
661 <td>SAM7S64</td>
662 <td>ZY1000</td>
663 <td>Loading to flash from GDB</td>
664 <td>Reset init is working, flash is probed, connectivity to GDB server is working</td>
665 <td>Start GDB using a ROM elf image, eg: arm-elf-gdb test_rom.elf. <br>
666 <code>
667 (gdb) target remote ip:port<br>
668 (gdb) monitor reset<br>
669 (gdb) load<br>
670 Loading section .text, size 0x194 lma 0x100000<br>
671 Start address 0x100040, load size 404<br>
672 Transfer rate: 179 bytes/sec, 404 bytes/write.
673 (gdb) monitor verify_image path_to_elf_file
674 </code>
675 </td>
676 <td>The output should look like:<br>
677 <code>
678 verified 404 bytes in 5.060000s
679 </code><br>
680 The failure message is something like:<br>
681 <code>Verify operation failed address 0x00200000. Was 0x00 instead of 0x18</code>
682 </td>
683 <td>
684 <code>
685 (gdb) load<br>
686 Loading section .text, size 0x194 lma 0x100000<br>
687 Start address 0x100040, load size 404<br>
688 Transfer rate: 1540 bits/sec, 404 bytes/write.<br>
689 (gdb) monitor verify_image /tftp/10.0.0.9/c:\workspace/ecosboard/ecosboard/phi/openocd/rep/testing/examples/SAM7S256Test/test_rom.elf<br>
690 verified 404 bytes in 4.860000s
691 </code>
692 </td>
693 <td>PASS</td>
694 </tr>
695 </table>
696
697 </body>
698 </html>