Run Boot Image

Key Revocation Lab (XAPP1344)

Document ID
XAPP1344
Release Date
2022-03-14
Revision
v1.1 English
  1. Set dip-switch SW6 of the ZCU102 board for SD Card Boot Mode (1=ON; 2, 3, 4=OFF).
    Figure 1. SD Card Boot DIP Switches
  2. Copy the BOOT.BIN to the SD Card.
  3. Insert the BOOT.BIN in the SD card slot.
  4. Connect the UART cable.
    Note: The UART cable is connected between the ZCU102 board and computer.
  5. Open any terminal window.
    Note: Tera Term is the terminal window used in this example.
  6. Connect to the COM port (Baud rate:115200, Data Bits:8, Parity:none, Stop Bits:1).
    Note: In the following image the COM port has been assigned as COM3. It might be different depending on the setup. Use the Windows device manager utility to identify the correct the COM port to be connected for UART output of the ZCU102 board.
    Figure 2. Com Port Settings
  7. Power on the board using SW1.

    The UI of the lab application is displayed on the serial terminal, as shown in the following image.

Figure 3. Main Menu

Getting a display on the serial terminal means that the Vitis and lab application setup was correct. The selection menu in the following screen capture is referred to as main menu throughout this application note. Refer to Menu Options for more information on the UI.

Note: This is non-secured boot. The device has not been provisioned for secure boot. This is done in the upcoming sections, which involves programming eFUSEs using the lab application UI.
Important: The lab application UI prints a WARNING message that the boot was non-secure. It also notifies you that the WRITE_EFUSES macro is set to TRUE (eFUSE programming enabled).