Hi,I want to flash my dm355_evm's u-boot and ubl by using sfh_DM35x.exe(as what it said on the website:http://wiki.davincidsp.com/index.php?title=Serial_Boot_and_Flash_Loading_Utility).At first ,I set sw7 to 11 and run the command as the website said .below is the procedue:
*****************************************************************************************************
*****************************************************************************************************
sfh_DM35x.exe -nanderase
Ver. 1.10
-----------------------------------------------------
Platform is Windows.
Globally erasing NAND flash.
Attempting to connect to device COM1...
Press any key to end this program at any time.
Waiting for the DM35x...
BOOTME commmand received. Returning ACK and header...
ACK command sent. Waiting for BEGIN command...
Target: BEGIN
BEGIN commmand received. Sending CRC table...
CRC table sent. Waiting for DONE...
DONE received. Sending the UBL...
DONE received. UBL was accepted.
UBL transmitted successfully.
Target: Chip initialization passed!
Target: TI SFT Version: 1.10
Target: Booting Catalog Boot Loader
Target: BootMode = UART
Waiting for SFT on the DM35x...
Target: Starting UART Boot...
Target: BOOTUBL
BOOTUBL commmand received. Returning CMD and command...
CMD value sent. Waiting for DONE...
Target: DONE
DONE received. Command was accepted.
Target: Unprotecting blocks 0x00000001 through 0x00000031.
Target: Erasing block 0x00000001 through 0x00000031.
Target: Erase completed successfully.
Target: Protecting the entire NAND flash.
Target: DONE
Target: DONE
Operation completed successfully.
sfh_DM35x.exe -nandflash ublDM355-nand.bin u-boot-1.2.0-dm355_evm.bin
-----------------------------------------------------
TI Serial Flasher Host Program for DM35x
(C) 2008, Texas Instruments, Inc.
Ver. 1.10
-----------------------------------------------------
Platform is Windows.
Flashing NAND with ublDM355-nand.bin and u-boot-1.2.0-dm355_evm.bin.
Attempting to connect to device COM1...
Press any key to end this program at any time.
Waiting for the DM35x...
BOOTME commmand received. Returning ACK and header...
ACK command sent. Waiting for BEGIN command...
Target: BEGIN
BEGIN commmand received. Sending CRC table...
CRC table sent. Waiting for DONE...
DONE received. Sending the UBL...
DONE received. UBL was accepted.
UBL transmitted successfully.
Target: Chip initialization passed!
Target: TI SFT Version: 1.10
Target: Booting Catalog Boot Loader
Target: BootMode = UART
Waiting for SFT on the DM35x...
Target: Starting UART Boot...
Target: BOOTUBL
BOOTUBL commmand received. Returning CMD and command...
CMD value sent. Waiting for DONE...
Target: DONE
DONE received. Command was accepted.
Sending the UBL image
Waiting for SENDIMG sequence...
SENDIMG received. Returning ACK and header for image data...
ACK command sent. Waiting for BEGIN command...
BEGIN commmand received. Sending the image data...
Image data sent. Waiting for DONE...
DONE received. All bytes of image data received...
Target: Writing UBL to NAND flash
Target: Number of blocks needed for header and data:
0x0x00000001
Target: Attempting to start in block number 0x0x00000001.
Target: Unprotecting blocks 0x00000001 through 0x00000001.
Target: Erasing block 0x00000001 through 0x00000001.
Target: Writing header data to Block 0x00000001, Page 0x00000000
Target: Writing image data to Block 0x00000001, Page 0x00000001
Target: Writing image data to Block 0x00000001, Page 0x00000002
Target: Writing image data to Block 0x00000001, Page 0x00000003
Target: Writing image data to Block 0x00000001, Page 0x00000004
Target: Writing image data to Block 0x00000001, Page 0x00000005
Target: Writing image data to Block 0x00000001, Page 0x00000006
Target: Protecting the entire NAND flash.
Target: DONE
Sending the Application image
Waiting for SENDIMG sequence...
SENDIMG received. Returning ACK and header for image data...
ACK command sent. Waiting for BEGIN command...
BEGIN commmand received. Sending the image data...
Image data sent. Waiting for DONE...
DONE received. All bytes of image data received...
Target: Writing APP to NAND flash
Target: Number of blocks needed for header and data:
0x0x00000001
Target: Attempting to start in block number 0x0x00000019.
Target: Unprotecting blocks 0x00000019 through 0x00000019.
Target: Erasing block 0x00000019 through 0x00000019.
Target: Writing header data to Block 0x00000019, Page 0x00000000
Target: Writing image data to Block 0x00000019, Page 0x00000001
Target: Writing image data to Block 0x00000019, Page 0x00000002
Target: Writing image data to Block 0x00000019, Page 0x00000003
Target: Writing image data to Block 0x00000019, Page 0x00000004
Target: Writing image data to Block 0x00000019, Page 0x00000005
Target: Writing image data to Block 0x00000019, Page 0x00000006
Target: Writing image data to Block 0x00000019, Page 0x00000007
Target: Writing image data to Block 0x00000019, Page 0x00000008
Target: Writing image data to Block 0x00000019, Page 0x00000009
Target: Writing image data to Block 0x00000019, Page 0x0000000A
Target: Writing image data to Block 0x00000019, Page 0x0000000B
Target: Writing image data to Block 0x00000019, Page 0x0000000C
Target: Writing image data to Block 0x00000019, Page 0x0000000D
Target: Writing image data to Block 0x00000019, Page 0x0000000E
Target: Writing image data to Block 0x00000019, Page 0x0000000F
Target: Writing image data to Block 0x00000019, Page 0x00000010
Target: Writing image data to Block 0x00000019, Page 0x00000011
Target: Writing image data to Block 0x00000019, Page 0x00000012
Target: Writing image data to Block 0x00000019, Page 0x00000013
Target: Writing image data to Block 0x00000019, Page 0x00000014
Target: Writing image data to Block 0x00000019, Page 0x00000015
Target: Writing image data to Block 0x00000019, Page 0x00000016
Target: Writing image data to Block 0x00000019, Page 0x00000017
Target: Writing image data to Block 0x00000019, Page 0x00000018
Target: Writing image data to Block 0x00000019, Page 0x00000019
Target: Writing image data to Block 0x00000019, Page 0x0000001A
Target: Writing image data to Block 0x00000019, Page 0x0000001B
Target: Writing image data to Block 0x00000019, Page 0x0000001C
Target: Writing image data to Block 0x00000019, Page 0x0000001D
Target: Writing image data to Block 0x00000019, Page 0x0000001E
Target: Writing image data to Block 0x00000019, Page 0x0000001F
Target: Writing image data to Block 0x00000019, Page 0x00000020
Target: Writing image data to Block 0x00000019, Page 0x00000021
Target: Writing image data to Block 0x00000019, Page 0x00000022
Target: Writing image data to Block 0x00000019, Page 0x00000023
Target: Writing image data to Block 0x00000019, Page 0x00000024
Target: Writing image data to Block 0x00000019, Page 0x00000025
Target: Writing image data to Block 0x00000019, Page 0x00000026
Target: Writing image data to Block 0x00000019, Page 0x00000027
Target: Writing image data to Block 0x00000019, Page 0x00000028
Target: Writing image data to Block 0x00000019, Page 0x00000029
Target: Writing image data to Block 0x00000019, Page 0x0000002A
Target: Writing image data to Block 0x00000019, Page 0x0000002B
Target: Writing image data to Block 0x00000019, Page 0x0000002C
Target: Writing image data to Block 0x00000019, Page 0x0000002D
Target: Writing image data to Block 0x00000019, Page 0x0000002E
Target: Writing image data to Block 0x00000019, Page 0x0000002F
Target: Writing image data to Block 0x00000019, Page 0x00000030
Target: Writing image data to Block 0x00000019, Page 0x00000031
Target: Writing image data to Block 0x00000019, Page 0x00000032
Target: Writing image data to Block 0x00000019, Page 0x00000033
Target: Writing image data to Block 0x00000019, Page 0x00000034
Target: Writing image data to Block 0x00000019, Page 0x00000035
Target: Writing image data to Block 0x00000019, Page 0x00000036
Target: Writing image data to Block 0x00000019, Page 0x00000037
Target: Writing image data to Block 0x00000019, Page 0x00000038
Target: Writing image data to Block 0x00000019, Page 0x00000039
Target: Writing image data to Block 0x00000019, Page 0x0000003A
Target: Writing image data to Block 0x00000019, Page 0x0000003B
Target: Writing image data to Block 0x00000019, Page 0x0000003C
Target: Writing image data to Block 0x00000019, Page 0x0000003D
Target: Writing image data to Block 0x00000019, Page 0x0000003E
Target: Writing image data to Block 0x00000019, Page 0x0000003F
Target: Protecting the entire NAND flash.
Target: DONE
Target: DONE
Operation completed successfully.
*****************************************************************************************************
*****************************************************************************************************
Then, I powered off the board ,turn sw7 to 00,opened hyper-terminal and set it to 115200 n 8 1. when I powered up again ,nothing display on hyber-terminal ,I think it means the u-boot have been flashed to wrong address?am I right?
I read readme.txt of sfh_dm35x.exe and it said :
The entry point of the UBL is assumed to be 0x0100, but this can be changed by using
the -UBLStartAddr option. The entry point and load address of the application default
to 0x81080000 (u-boot defaults). To change these values, use the -APPStartAddr and
-APPLoadAddr option.
Do I need to change the APPStartAddr or UBLStartAddr? If not ,would you please tell me what wrong with my board?