This topic focuses on learning some core concepts related to defining custom board definitions for the nRF53 and nRF91-based devices.
Special considerations for the nRF91/nRF53 Series
In terms of custom board definitions, a significant difference between the nRF52 Series and the nRF53/nRF91 Series is the type of architecture and CPU they use. The nRF52 Series implements the Armv7-M and has a Cortex-M4 CPU, whereas the nRF53 and nRF91 Series implements the Armv8-M architecture and has a Cortex-M33 CPU with TrustZone, which supports TF-M.
Series
CPU
Architecture
Number of User Programable Cores
TrustZone
nRF52
Cortex-M4
Armv7-M
1
No
nRF53
Cortex-M33
Armv8-M
2
Yes
nRF91
Cortex-M33
Armv8-M
1
Yes
In addition to TF-M, the nRF53 Series is dual-core with two fully programmable cores. This introduces some challenges when defining a custom board, which we will address in this topic and Exercise 2.
Trusted Firmware-M (TF-M)
Trusted Firmware-M (TF-M) is a blueprint for constructing a Secure Processing Environment (SPE) tailored to Arm M-profile architectures. TF-M relies on the principle of security through separation to safeguard sensitive credentials and code. Additionally, TF-M extends its protective capabilities to applications by offering security services, including Protected Storage, Cryptography, and Attestation.
The Nordic Semiconductor nRF53 and nRF91 Series, implementing the Armv8-M architecture (Arm Cortex-M33), incorporate TrustZone technology, which enforces hardware-based segregation between the Secure and Non-secure Processing Environments, effectively creating distinct Trusted and Non-Trusted build images.
This means that we have two options for boards based on the nRF53 and nRF91 Series. Either:
Option 1 – <Board ID>_ns
Enforce security by separation by utilizing TF-M and have our application run in the Non-Secure Processing Environment and have TF-M run in the Secure Processing Environment.
Option 2 – <Board ID>
Do not enforce security by separation by having our application run as a single image with full access privileges.
Let’s take a board with a board ID <Board ID> as an example: When building for the <Board ID> , you must build for either <Board ID> or <Board ID>_ns .
<Board ID>: The application is built as a single image without security by separation.
<Board ID>_ns: The application will be built as a Non-Secure image. Hence, you will get security by separation as TF-M will automatically be built as the Secure image. The two images will be merged to form a combined image that will be used when programming or updating the device.
Working with the nRF53 Series
The nRF5340 is the only System on Chip (SoC) in the nRF53 Series. It is a wireless ultra-low-power multicore SoC with two fully programmable Arm Cortex-M33 processors: a network core and an application core.
The network core is an Arm Cortex-M33 processor with a reduced feature set, designed for ultra-low-power operation. Use this core for radio communication and for real-time processing tasks involving low-level radio protocol layers.
In nRF Connect SDK/Zephyr, the firmware of the network core should be built using the following build target:
<BoardID>_cpunet
Application core
The application core is a full-featured Arm Cortex-M33 processor including DSP instructions and FPU. Use this core for tasks that require high performance and for application-level logic.
The M33 TrustZone, one of Cortex-M Security Extensions (CMSE), can divide the application MCU into Secure Processing Environment (SPE) and Non-Secure Processing Environment (NSPE). When the MCU boots, it always starts executing from the secure area.
In nRF Connect SDK/Zephyr, the firmware of the application core should be built using one of the following build targets:
<BoardID>_cpuapp for build targets with TF-M disabled.
<BoardID>_cpuapp_ns for build targets that have TF-M enabled and have the SPE firmware alongside the NSPE firmware.
Working with the nRF91 Series
The nRF91 Series is comprised of four members: nRF9160, nRF9161, nRF9131, and nRF9151 System in Packages (SiP). These are cellular ultra-low-power SiPs with only one fully programmable Arm Cortex-M33 core. The other core is dedicated to the Modem firmware; you can only flash it with a precompiled modem firmware binary.
In nRF Connect SDK/Zephyr, the firmware for the nRF91 SIP should be built using one of the following build targets:
<BoardID> for build targets with TF-M disabled.
<BoardID>_ns for build targets that have TF-M enabled and have the SPE firmware alongside the NSPE firmware.
Enabling TF-M in board definition
The custom board directory can be a single folder with both build target files (<BoardID> & <BoardID>_ns) in one folder. We will assume a custom board name of “DevAcademy nRF9161”, which we will create in exercise 2.
In the custom board Kconfig files
1. A single Kconfig.board file to define two Kconfig symbols of type Boolean.
Below is a snippet for a custom board named “DevAcademy nRF9161”.
2. A single Kconfig.defconfig file that should detect the passed build target BOARD_DEVACADEMY_NRF9161_NS or BOARD_DEVACADEMY_NRF9161 .
If BOARD_DEVACADEMY_NRF9161_NS is selected (passed in an application build configuration step or west build), instruct the build system to additionally generate a TF-M image (by enabling BUILD_WITH_TFM), along with the application image. The application image is to be executed in the Non-Secure Processing Environment, and the TF-M image is to be executed in the Secure Execution environment. In addition, the flash and RAM should be adjusted to take TF-M into consideration and generate a merged binary of the two builds (by enabling TFM_FLASH_MERGED_BINARY).
Below is a snippet of a Kconfig.defconfig for the “DevAcademy nRF9161” board.
Copy
ifBOARD_DEVACADEMY_NRF9161 || BOARD_DEVACADEMY_NRF9161_NSconfigBOARDdefault"devacademy_nrf9161"# By default, if we build for a Non-Secure version of the board,# enable building with TF-M as the Secure Execution Environment.configBUILD_WITH_TFMdefaultyifBOARD_DEVACADEMY_NRF9161_NSifBUILD_WITH_TFM# By default, if we build with TF-M, instruct build system to# flash the combined TF-M (Secure) & Zephyr (Non Secure) imageconfigTFM_FLASH_MERGED_BINARYbooldefaultyendif# BUILD_WITH_TFM# For the secure version of the board the firmware is linked at the beginning# of the flash, or into the code-partition defined in DT if it is intended to# be loaded by MCUboot. If the secure firmware is to be combined with a non-# secure image (TRUSTED_EXECUTION_SECURE=y), the secure FW image shall always# be restricted to the size of its code partition.# For the non-secure version of the board, the firmware# must be linked into the code-partition (non-secure) defined in DT, regardless.# Apply this configuration below by setting the Kconfig symbols used by# the linker according to the information extracted from DT partitions.# Workaround for not being able to have commas in macro argumentsDT_CHOSEN_Z_CODE_PARTITION:=zephyr,code-partitionconfigFLASH_LOAD_SIZEdefault$(dt_chosen_reg_size_hex,$(DT_CHOSEN_Z_CODE_PARTITION))dependsonBOARD_DEVACADEMY_NRF9161 && TRUSTED_EXECUTION_SECUREifBOARD_DEVACADEMY_NRF9161_NSconfigFLASH_LOAD_OFFSETdefault$(dt_chosen_reg_addr_hex,$(DT_CHOSEN_Z_CODE_PARTITION))configFLASH_LOAD_SIZEdefault$(dt_chosen_reg_size_hex,$(DT_CHOSEN_Z_CODE_PARTITION))endif# BOARD_DEVACADEMY_NRF9161_NSendif# BOARD_DEVACADEMY_NRF9161 || BOARD_DEVACADEMY_NRF9161_NS
Kconfig
3. Two _defconfig files, basically one for each build target. Therefore, we will have devacademy_nrf9161_ns_defconfig and devacademy_nrf9161_defconfig. In addition to the rules we discussed in Creating board files, we need to do the following.
3.2 In the devacademy_nrf9161_ns_defconfig file , we need to enable both CONFIG_ARM_TRUSTZONE_M to enable TrustZone APIs for the non-secure domain (Application) and also enable CONFIG_TRUSTED_EXECUTION_NONSECURE to imply building Non-Secure firmware. A Non-Secure firmware image will execute in Non-Secure state. Therefore, it shall not access CPU resources (memory areas, peripherals, interrupts etc.) belonging to the Secure domain.
4. Building an application with TF-M, results in building Secure and Non-Secure images. The secure image should be placed in flash0 (or in slot0, if MCUboot bootloader is present). Secure image will use sram0 for system memory.
The Non-Secure image should be placed in slot0_ns, and use sram0_ns for system memory.
Note that the Secure image only requires knowledge of the beginning of the Non-Secure image (not its size).
4.1 Create a partition file for Flash&RAM planning. We could add these directly where these partitions are used, or we can create a separate file and include it in the DTS file for each image; we will use the later method.
An example file devacademy_nrf9161_partition_conf.dtsi is shown below:
Copy
/* * Copyright (c) 2023 Nordic Semiconductor ASA * * SPDX-License-Identifier: Apache-2.0 */&slot0_partition { reg = <0x000100000x40000>;};&slot0_ns_partition { reg = <0x000500000x30000>;};&slot1_partition { reg = <0x000800000x40000>;};&slot1_ns_partition { reg = <0x000c00000x30000>;};/* Default SRAM planning when building for nRF9161 with * ARM TrustZone-M support * - Lowest 88 kB SRAM allocated to Secure image (sram0_s). * - 40 kB SRAM reserved for and used by the modem library * (sram0_modem). This memory is Non-Secure. * - Upper 128 kB allocated to Non-Secure image (sram0_ns). * When building with TF-M, both sram0_modem and sram0_ns * are allocated to the Non-Secure image. */&sram0_s { reg = <0x20000000DT_SIZE_K(88)>;};&sram0_modem { reg = <0x20016000DT_SIZE_K(40)>;};&sram0_ns { reg = <0x20020000DT_SIZE_K(128)>;};
Devicetree
4.2 Create a common Devicetree file devacademy_nrf9161_common.dtsi (see Exercise 2 source code). In the common Devicetree file, you should include the partition file for Flash & RAM planning. You should also create one common pinctrl file devacademy_nrf9161_common-pinctrl.dtsi (see Exercise 2 source code).
Important
For use-cases where Multi-image build is utilized, the partitioning information provided in the Devicetree is ignored (aka the DTS partitioning). Instead, the Partition Mananger controls the partitions. This will be covered in-depth in Lesson 8 – Bootloaders and DFU/FOTA.
4.3 Create a per-image Devicetree file (devacademy_nrf9161.dts and devacademy_nrf9161_ns.dts) to select the chosen nodes for flash and RAM and disable peripherals allocated to the other image.
/* * Copyright (c) 2023 Nordic Semiconductor ASA * * SPDX-License-Identifier: Apache-2.0 *//dts-v1/;#include<nordic/nrf9161ns_laca.dtsi>#include"devacademy_nrf9161_common.dtsi"/ { chosen { zephyr,flash = &flash0; zephyr,sram = &sram0_ns; zephyr,code-partition = &slot0_ns_partition; };};/* Disable UART1, because it is used by default in TF-M */&uart1 { status = "disabled";};
Devicetree
Nordic Developer Academy Privacy Policy
1. Introduction
In this Privacy Policy you will find information on Nordic Semiconductor ASA (“Nordic Semiconductor”) processes your personal data when you use the Nordic Developer Academy.
References to “we” and “us” in this document refers to Nordic Semiconductor.
2. Our processing of personal data when you use the Nordic Developer Academy
2.1 Nordic Developer Academy
Nordic Semiconductor processes personal data in order to provide you with the features and functionality of the Nordic Developer Academy. Creating a user account is optional, but required if you want to track you progress and view your completed courses and obtained certificates. If you choose to create a user account, we will process the following categories of personal data:
Email
Name
Password (encrypted)
Course progression (e.g. which course you have completely or partly completed)
Certificate information, which consists of name of completed course and the validity of the certificate
Course results
During your use of the Nordic Developer Academy, you may also be asked if you want to provide feedback. If you choose to respond to any such surveys, we will also process the personal data in your responses in that survey.
The legal basis for this processing is GDPR article 6 (1) b. The processing is necessary for Nordic Semiconductor to provide the Nordic Developer Academy under the Terms of Service.
2.2 Analytics
If you consent to analytics, Nordic Semiconductor will use Google Analytics to obtain statistics about how the Nordic Developer Academy is used. This includes collecting information on for example what pages are viewed, the duration of the visit, the way in which the pages are maneuvered, what links are clicked, technical information about your equipment. The information is used to learn how Nordic Developer Academy is used and how the user experience can be further developed.
2.2 Newsletter
You can consent to receive newsletters from Nordic from within the Nordic Developer Academy. How your personal data is processed when you sign up for our newsletters is described in the Nordic Semiconductor Privacy Policy.
3. Retention period
We will store your personal data for as long you use the Nordic Developer Academy. If our systems register that you have not used your account for 36 months, your account will be deleted.
4. Additional information
Additional information on how we process personal data can be found in the Nordic Semiconductor Privacy Policy and Cookie Policy.
Nordic Developer Academy Terms of Service
1. Introduction
These terms and conditions (“Terms of Use”) apply to the use of the Nordic Developer Academy, provided by Nordic Semiconductor ASA, org. nr. 966 011 726, a public limited liability company registered in Norway (“Nordic Semiconductor”).
Nordic Developer Academy allows the user to take technical courses related to Nordic Semiconductor products, software and services, and obtain a certificate certifying completion of these courses. By completing the registration process for the Nordic Developer Academy, you are agreeing to be bound by these Terms of Use.
These Terms of Use are applicable as long as you have a user account giving you access to Nordic Developer Academy.
2. Access to and use of Nordic Developer Academy
Upon acceptance of these Terms of Use you are granted a non-exclusive right of access to, and use of Nordic Developer Academy, as it is provided to you at any time. Nordic Semiconductor provides Nordic Developer Academy to you free of charge, subject to the provisions of these Terms of Use and the Nordic Developer Academy Privacy Policy.
To access select features of Nordic Developer Academy, you need to create a user account. You are solely responsible for the security associated with your user account, including always keeping your login details safe.
You will able to receive an electronic certificate from Nordic Developer Academy upon completion of courses. By issuing you such a certificate, Nordic Semiconductor certifies that you have completed the applicable course, but does not provide any further warrants or endorsements for any particular skills or professional qualifications.
Nordic Semiconductor will continuously develop Nordic Developer Academy with new features and functionality, but reserves the right to remove or alter any existing functions without notice.
3. Acceptable use
You undertake that you will use Nordic Developer Academy in accordance with applicable law and regulations, and in accordance with these Terms of Use. You must not modify, adapt, or hack Nordic Developer Academy or modify another website so as to falsely imply that it is associated with Nordic Developer Academy, Nordic Semiconductor, or any other Nordic Semiconductor product, software or service.
You agree not to reproduce, duplicate, copy, sell, resell or in any other way exploit any portion of Nordic Developer Academy, use of Nordic Developer Academy, or access to Nordic Developer Academy without the express written permission by Nordic Semiconductor. You must not upload, post, host, or transmit unsolicited email, SMS, or \”spam\” messages.
You are responsible for ensuring that the information you post and the content you share does not;
contain false, misleading or otherwise erroneous information
infringe someone else’s copyrights or other intellectual property rights
contain sensitive personal data or
contain information that might be received as offensive or insulting.
Such information may be removed without prior notice.
Nordic Semiconductor reserves the right to at any time determine whether a use of Nordic Developer Academy is in violation of its requirements for acceptable use.
Violation of the at any time applicable requirements for acceptable use may result in termination of your account. We will take reasonable steps to notify you and state the reason for termination in such cases.
4. Routines for planned maintenance
Certain types of maintenance may imply a stop or reduction in availability of Nordic Developer Academy. Nordic Semiconductor does not warrant any level of service availability but will provide its best effort to limit the impact of any planned maintenance on the availability of Nordic Developer Academy.
5. Intellectual property rights
Nordic Semiconductor retains all rights to all elements of Nordic Developer Academy. This includes, but is not limited to, the concept, design, trademarks, know-how, trade secrets, copyrights and all other intellectual property rights.
Nordic Semiconductor receives all rights to all content uploaded or created in Nordic Developer Academy. You do not receive any license or usage rights to Nordic Developer Academy beyond what is explicitly stated in this Agreement.
6. Liability and damages
Nothing within these Terms of Use is intended to limit your statutory data privacy rights as a data subject, as described in the Nordic Developer Academy Privacy Policy. You acknowledge that errors might occur from time to time and waive any right to claim for compensation as a result of errors in Nordic Developer Academy. When an error occurs, you shall notify Nordic Semiconductor of the error and provide a description of the error situation.
You agree to indemnify Nordic Semiconductor for any loss, including indirect loss, arising out of or in connection with your use of Nordic Developer Academy or violations of these Terms of Use. Nordic Semiconductor shall not be held liable for, and does not warrant that (i) Nordic Developer Academy will meet your specific requirements, (ii) Nordic Developer Academy will be uninterrupted, timely, secure, or error-free, (iii) the results that may be obtained from the use of Nordic Developer Academy will be accurate or reliable, (iv) the quality of any products, services, information, or other material purchased or obtained by you through Nordic Developer Academy will meet your expectations, or that (v) any errors in Nordic Developer Academy will be corrected.
You accept that this is a service provided to you without any payment and hence you accept that Nordic Semiconductor will not be held responsible, or liable, for any breaches of these Terms of Use or any loss connected to your use of Nordic Developer Academy. Unless otherwise follows from mandatory law, Nordic Semiconductor will not accept any such responsibility or liability.
7. Change of terms
Nordic Semiconductor may update and change the Terms of Use from time to time. Nordic Semiconductor will seek to notify you about significant changes before such changes come into force and give you a possibility to evaluate the effects of proposed changes. Continued use of Nordic Developer Academy after any such changes shall constitute your acceptance of such changes. You can review the current version of the Terms of Use at any time at https://academy.nordicsemi.com/terms-of-service/
8. Transfer of rights
Nordic Semiconductor is entitled to transfer its rights and obligation pursuant to these Terms of Use to a third party as part of a merger or acquisition process, or as a result of other organizational changes.
9. Third Party Services
To the extent Nordic Developer Academy facilitates access to services provided by a third party, you agree to comply with the terms governing such third party services. Nordic Semiconductor shall not be held liable for any errors, omissions, inaccuracies, etc. related to such third party services.
10. Dispute resolution
The Terms of Use and any other legally binding agreement between yourself and Nordic Semiconductor shall be subject to Norwegian law and Norwegian courts’ exclusive jurisdiction.