diff --git a/applications/matter_bridge/sysbuild/ipc_radio/boards/nrf54h20dk_nrf54h20_cpurad.conf b/applications/matter_bridge/sysbuild/ipc_radio/boards/nrf54h20dk_nrf54h20_cpurad.conf new file mode 100644 index 000000000000..a23965d55a41 --- /dev/null +++ b/applications/matter_bridge/sysbuild/ipc_radio/boards/nrf54h20dk_nrf54h20_cpurad.conf @@ -0,0 +1,36 @@ +# +# Copyright (c) 2024 Nordic Semiconductor ASA +# +# SPDX-License-Identifier: LicenseRef-Nordic-5-Clause +# + +# Disable serial and UART interface. +CONFIG_SERIAL=n +CONFIG_UART_CONSOLE=n +CONFIG_LOG=n + +# RAM usage configuration +CONFIG_HEAP_MEM_POOL_SIZE=8192 +CONFIG_MAIN_STACK_SIZE=2048 +CONFIG_SYSTEM_WORKQUEUE_STACK_SIZE=2048 + +# BT configuration +CONFIG_BT=y +CONFIG_BT_HCI_RAW=y +CONFIG_BT_MAX_CONN=1 +CONFIG_BT_CTLR_ASSERT_HANDLER=y +CONFIG_BT_PERIPHERAL=y +CONFIG_BT_CENTRAL=n +CONFIG_BT_BUF_ACL_RX_SIZE=502 +CONFIG_BT_BUF_ACL_TX_SIZE=251 +CONFIG_BT_CTLR_DATA_LENGTH_MAX=251 +CONFIG_BT_CTLR_PHY_2M=n + +# ipc_radio +CONFIG_IPC_RADIO_BT=y +CONFIG_IPC_RADIO_BT_HCI_IPC=y + +# NRF_802154_ENCRYPTION is not enabled by default in the `overlay-802154.conf` file +# that is pulled in by NETCORE_IPC_RADIO_IEEE802154 in application's Kconfig.sysbuild. +# For Wi-Fi builds, this option will not get applied anyway. +CONFIG_NRF_802154_ENCRYPTION=y diff --git a/samples/matter/common/dts/nrf54h20/nrf54h20_ram_allocation.dtsi b/samples/matter/common/dts/nrf54h20/nrf54h20_ram_allocation.dtsi index 4974d98bcfe0..c427b864f06f 100644 --- a/samples/matter/common/dts/nrf54h20/nrf54h20_ram_allocation.dtsi +++ b/samples/matter/common/dts/nrf54h20/nrf54h20_ram_allocation.dtsi @@ -10,9 +10,9 @@ &cpuapp_ram0x_region{ status = "okay"; - reg = <0x2f010000 DT_SIZE_K(512)>; - ranges = <0x0 0x2f010000 0x6e000>; + reg = <0x2f011000 DT_SIZE_K(516)>; + ranges = <0x0 0x2f011000 0x6e000>; cpuapp_data: memory@1000 { - reg = <0x1000 DT_SIZE_K(508)>; + reg = <0x1000 DT_SIZE_K(512)>; }; }; diff --git a/samples/suit/flash_companion/boards/nrf54h20dk_nrf54h20_cpuapp.overlay b/samples/suit/flash_companion/boards/nrf54h20dk_nrf54h20_cpuapp.overlay index 3a8d40954fb0..627634873972 100644 --- a/samples/suit/flash_companion/boards/nrf54h20dk_nrf54h20_cpuapp.overlay +++ b/samples/suit/flash_companion/boards/nrf54h20dk_nrf54h20_cpuapp.overlay @@ -42,7 +42,3 @@ &cpuapp_cpurad_ipc { status = "disabled"; }; - -&prng { - status = "disabled"; -}; diff --git a/samples/suit/smp_transfer/sysbuild/nrf54h20dk_nrf54h20_memory_map.dtsi b/samples/suit/smp_transfer/sysbuild/nrf54h20dk_nrf54h20_memory_map.dtsi index de9395d06a66..151e8ea924db 100644 --- a/samples/suit/smp_transfer/sysbuild/nrf54h20dk_nrf54h20_memory_map.dtsi +++ b/samples/suit/smp_transfer/sysbuild/nrf54h20dk_nrf54h20_memory_map.dtsi @@ -6,24 +6,24 @@ &cpuapp_rx_partitions { /delete-node/ partition@a6000; - cpuapp_slot0_partition: partition@a5000 { - reg = <0xa5000 DT_SIZE_K(256)>; + cpuapp_slot0_partition: partition@a7000 { + reg = <0xa7000 DT_SIZE_K(256)>; }; - cpuapp_recovery_partition: partition@e5000 { - reg = <0xe5000 DT_SIZE_K(72)>; + cpuapp_recovery_partition: partition@e7000 { + reg = <0xe7000 DT_SIZE_K(72)>; }; /* Delete PPR code partition */ /delete-node/ partition@e4000; - cpuppr_code_partition: partition@a5010 { - reg = < 0xa5010 0x10 >; + cpuppr_code_partition: partition@a7010 { + reg = < 0xa7010 0x10 >; }; /* Delete FLPR code partition */ /delete-node/ partition@f4000; - cpuflpr_code_partition: partition@a5020 { - reg = < 0xa5020 0x10 >; + cpuflpr_code_partition: partition@a7020 { + reg = < 0xa7020 0x10 >; }; }; @@ -37,6 +37,6 @@ }; cpurad_recovery_partition: partition@8e000 { - reg = < 0x8e000 DT_SIZE_K(92) >; + reg = < 0x8e000 DT_SIZE_K(100) >; }; }; diff --git a/subsys/CMakeLists.txt b/subsys/CMakeLists.txt index 80023be74eea..89f2fd681702 100644 --- a/subsys/CMakeLists.txt +++ b/subsys/CMakeLists.txt @@ -21,7 +21,10 @@ if(NOT SYSBUILD) endif() endif() -add_subdirectory_ifdef(CONFIG_NRF_SECURITY nrf_security) +if(CONFIG_NRF_SECURITY OR CONFIG_PSA_SSF_CRYPTO_CLIENT) + add_subdirectory(nrf_security) +endif() + add_subdirectory_ifdef(CONFIG_TRUSTED_STORAGE trusted_storage) add_subdirectory(net) diff --git a/subsys/nrf_security/CMakeLists.txt b/subsys/nrf_security/CMakeLists.txt index 07aaa82639a5..060a8be6dc9a 100644 --- a/subsys/nrf_security/CMakeLists.txt +++ b/subsys/nrf_security/CMakeLists.txt @@ -39,7 +39,24 @@ if(CONFIG_BUILD_WITH_TFM) include(${NRF_SECURITY_ROOT}/cmake/config_to_tf-m.cmake) endif() -if(CONFIG_BUILD_WITH_TFM OR CONFIG_PSA_SSF_CRYPTO_CLIENT) +if(CONFIG_PSA_SSF_CRYPTO_CLIENT AND NOT CONFIG_NRF_SECURITY) + zephyr_compile_definitions(MBEDTLS_PSA_CRYPTO_CONFIG) + zephyr_compile_definitions(MBEDTLS_PSA_CRYPTO_CLIENT) + zephyr_compile_definitions(MBEDTLS_PSA_CRYPTO_CONFIG_FILE="ssf_crypto_config_empty.h") + zephyr_compile_definitions(MBEDTLS_CONFIG_FILE="ssf_crypto_config_empty.h") + + zephyr_include_directories( + ${NRF_SECURITY_ROOT}/include + # Oberon PSA headers + ${ZEPHYR_OBERON_PSA_CRYPTO_MODULE_DIR}/include + ${ZEPHYR_OBERON_PSA_CRYPTO_MODULE_DIR}/library + # Mbed TLS (mbedcrypto) PSA headers + ${ARM_MBEDTLS_PATH}/include + ${ARM_MBEDTLS_PATH}/library + ) + + zephyr_sources(${CMAKE_CURRENT_LIST_DIR}/src/ssf_secdom/ssf_crypto.c) +elseif(CONFIG_BUILD_WITH_TFM OR CONFIG_PSA_SSF_CRYPTO_CLIENT) # We enable either TF-M or the SSF client PSA crypto interface but we are # not in the secure image build @@ -88,50 +105,54 @@ else() nrf_security_debug("Building for pure Zephyr") endif() -set(CONFIG_MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG True) - -# Add library for crypto configs (NS/S-only build) -# The name and intent of this comes from TF-M distribution -add_library(psa_crypto_config INTERFACE) +# This check is needed for the cases that CONFIG_PSA_SSF_CRYPTO_CLIENT +# is enabled but the CONFIG_NRF_SECURITY is not enabled +if(CONFIG_NRF_SECURITY) + set(CONFIG_MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG True) -# Add config files required for PSA crypto interface -target_compile_definitions(psa_crypto_config - INTERFACE - -DMBEDTLS_CONFIG_FILE="${CONFIG_MBEDTLS_CFG_FILE}" - -DMBEDTLS_PSA_CRYPTO_CONFIG_FILE="${CONFIG_MBEDTLS_PSA_CRYPTO_CONFIG_FILE}" -) + # Add library for crypto configs (NS/S-only build) + # The name and intent of this comes from TF-M distribution + add_library(psa_crypto_config INTERFACE) -# Add library for crypto configs (S-only or Secure image build) -# The name and intent of this comes from TF-M distribution -add_library(psa_crypto_library_config INTERFACE) + # Add config files required for PSA crypto interface + target_compile_definitions(psa_crypto_config + INTERFACE + -DMBEDTLS_CONFIG_FILE="${CONFIG_MBEDTLS_CFG_FILE}" + -DMBEDTLS_PSA_CRYPTO_CONFIG_FILE="${CONFIG_MBEDTLS_PSA_CRYPTO_CONFIG_FILE}" + ) -# Add config files required for PSA core -target_compile_definitions(psa_crypto_library_config - INTERFACE - -DMBEDTLS_CONFIG_FILE="${CONFIG_MBEDTLS_CFG_FILE}" - -DMBEDTLS_PSA_CRYPTO_CONFIG_FILE="${CONFIG_MBEDTLS_PSA_CRYPTO_CONFIG_FILE}" - -DMBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE="${CONFIG_MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE}" -) + # Add library for crypto configs (S-only or Secure image build) + # The name and intent of this comes from TF-M distribution + add_library(psa_crypto_library_config INTERFACE) -# Add a library for crypto includes for the PSA interface (NS, S-only and TF-M) -# The name and intent of this comes from TF-M distribution -add_library(psa_interface INTERFACE) + # Add config files required for PSA core + target_compile_definitions(psa_crypto_library_config + INTERFACE + -DMBEDTLS_CONFIG_FILE="${CONFIG_MBEDTLS_CFG_FILE}" + -DMBEDTLS_PSA_CRYPTO_CONFIG_FILE="${CONFIG_MBEDTLS_PSA_CRYPTO_CONFIG_FILE}" + -DMBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE="${CONFIG_MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE}" + ) -# Add the includes from nrf_security, Oberon PSA core, and Arm Mbed TLS -# to the psa_interface library -target_include_directories(psa_interface - INTERFACE - # Oberon PSA headers - ${OBERON_PSA_CORE_PATH}/include - ${OBERON_PSA_CORE_PATH}/library - # Mbed TLS (mbedcrypto) PSA headers - ${ARM_MBEDTLS_PATH}/library - ${ARM_MBEDTLS_PATH}/include - ${ARM_MBEDTLS_PATH}/include/library -) + # Add a library for crypto includes for the PSA interface (NS, S-only and TF-M) + # The name and intent of this comes from TF-M distribution + add_library(psa_interface INTERFACE) + + # Add the includes from nrf_security, Oberon PSA core, and Arm Mbed TLS + # to the psa_interface library + target_include_directories(psa_interface + INTERFACE + # Oberon PSA headers + ${OBERON_PSA_CORE_PATH}/include + ${OBERON_PSA_CORE_PATH}/library + # Mbed TLS (mbedcrypto) PSA headers + ${ARM_MBEDTLS_PATH}/library + ${ARM_MBEDTLS_PATH}/include + ${ARM_MBEDTLS_PATH}/include/library + ) -# Finally adding the crypto lib -add_subdirectory(${NRFXLIB_DIR}/crypto crypto_copy) + # Finally adding the crypto lib + add_subdirectory(${NRFXLIB_DIR}/crypto crypto_copy) -# Add mbed TLS Libraries -add_subdirectory(src) + # Add mbed TLS Libraries + add_subdirectory(src) +endif() diff --git a/subsys/nrf_security/Kconfig b/subsys/nrf_security/Kconfig index 0064d04df591..3d4b55f5ea1f 100644 --- a/subsys/nrf_security/Kconfig +++ b/subsys/nrf_security/Kconfig @@ -29,6 +29,12 @@ config NORDIC_SECURITY_BACKEND Note that this will enable nrf_oberon by default. Multiple backends is not supported. +config PSA_SSF_CRYPTO_CLIENT + bool + prompt "PSA crypto provided through SDFW Service Framework (SSF)" + default y + depends on SSF_CLIENT && SSF_PSA_CRYPTO_SERVICE_ENABLED + config NRF_SECURITY bool prompt "Enable nRF Security" if !PSA_PROMPTLESS diff --git a/subsys/nrf_security/Kconfig.psa b/subsys/nrf_security/Kconfig.psa index 264f5fd08f01..ed145f7f7764 100644 --- a/subsys/nrf_security/Kconfig.psa +++ b/subsys/nrf_security/Kconfig.psa @@ -21,8 +21,6 @@ osource "modules/mbedtls/Kconfig.psa" rsource "src/core/Kconfig" -rsource "src/ssf_secdom/Kconfig" - comment "PSA Driver Support" config MBEDTLS_PSA_CRYPTO_DRIVERS diff --git a/subsys/nrf_security/include/ssf_crypto_config_empty.h b/subsys/nrf_security/include/ssf_crypto_config_empty.h new file mode 100644 index 000000000000..21c8283cec4c --- /dev/null +++ b/subsys/nrf_security/include/ssf_crypto_config_empty.h @@ -0,0 +1,7 @@ +/* + * Copyright (c) 2024 Nordic Semiconductor ASA + * + * SPDX-License-Identifier: LicenseRef-Nordic-5-Clause + */ + +/* This is intentionally empty since the SSF doesn't support any configuration yet. */ diff --git a/subsys/nrf_security/src/drivers/Kconfig b/subsys/nrf_security/src/drivers/Kconfig index 5581badb09ae..857a48c99ea2 100644 --- a/subsys/nrf_security/src/drivers/Kconfig +++ b/subsys/nrf_security/src/drivers/Kconfig @@ -11,6 +11,7 @@ config PSA_CRYPTO_DRIVER_OBERON prompt "Oberon PSA driver" if !(TFM_PARTITION_PROTECTED_STORAGE || TFM_CRYPTO_BUILTIN_KEYS) bool default y if ! CRACEN_HW_PRESENT + depends on PSA_CORE_OBERON help This configuration enables the usage of the Oberon PSA driver. @@ -18,6 +19,7 @@ config PSA_CRYPTO_DRIVER_CC3XX prompt "CryptoCell PSA driver" bool depends on HAS_HW_NRF_CC3XX + depends on PSA_CORE_OBERON help This configuration enables the usage of CryptoCell for the supported operations. Disabling this option will result in all crypto operations being handled by @@ -30,6 +32,7 @@ config PSA_CRYPTO_DRIVER_CRACEN bool "Enable the Cracen PSA driver" depends on MBEDTLS_PSA_CRYPTO_C depends on CRACEN_HW_PRESENT + depends on PSA_CORE_OBERON # CRACEN uses the k_event_ API select EVENTS if MULTITHREADING default y diff --git a/subsys/nrf_security/src/ssf_secdom/Kconfig b/subsys/nrf_security/src/ssf_secdom/Kconfig deleted file mode 100644 index 6c707a909ff7..000000000000 --- a/subsys/nrf_security/src/ssf_secdom/Kconfig +++ /dev/null @@ -1,11 +0,0 @@ -# -# Copyright (c) 2024 Nordic Semiconductor -# -# SPDX-License-Identifier: LicenseRef-Nordic-5-Clause -# - -config PSA_SSF_CRYPTO_CLIENT - bool - prompt "PSA crypto provided through SSF" - default y - depends on SSF_CLIENT && SSF_PSA_CRYPTO_SERVICE_ENABLED diff --git a/subsys/sdfw_services/Kconfig b/subsys/sdfw_services/Kconfig index 8247209ddec8..57b3982c80a7 100644 --- a/subsys/sdfw_services/Kconfig +++ b/subsys/sdfw_services/Kconfig @@ -38,6 +38,11 @@ config SSF_CLIENT_SYS_INIT bool "Start SDFW Service Framework client on boot" default y +config SSF_CLIENT_SYS_INIT_PRIORITY + int + default 47 + depends on SSF_CLIENT_SYS_INIT + config SSF_CLIENT_REGISTERED_LISTENERS_MAX int "Maximum number of simultaneous registered listeners" default 1 diff --git a/subsys/sdfw_services/os/ssf_client_zephyr.c b/subsys/sdfw_services/os/ssf_client_zephyr.c index 4d1f30cc7e32..10bd8627fa29 100644 --- a/subsys/sdfw_services/os/ssf_client_zephyr.c +++ b/subsys/sdfw_services/os/ssf_client_zephyr.c @@ -45,10 +45,25 @@ void ssf_client_sem_give(struct ssf_client_sem *sem) } #if CONFIG_SSF_CLIENT_SYS_INIT + +#ifdef CONFIG_IPC_SERVICE_REG_BACKEND_PRIORITY +BUILD_ASSERT(CONFIG_SSF_CLIENT_SYS_INIT_PRIORITY > CONFIG_IPC_SERVICE_REG_BACKEND_PRIORITY, + "SSF_CLIENT_SYS_INIT_PRIORITY must be higher than IPC_SERVICE_REG_BACKEND_PRIORITY"); +#endif + +#ifdef CONFIG_NRF_802154_SER_RADIO_INIT_PRIO +BUILD_ASSERT(CONFIG_SSF_CLIENT_SYS_INIT_PRIORITY < CONFIG_NRF_802154_SER_RADIO_INIT_PRIO, + "SSF_CLIENT_SYS_INIT_PRIORITY must be lower than NRF_802154_SER_RADIO_INIT_PRIO"); +#endif + +BUILD_ASSERT( + CONFIG_SSF_CLIENT_SYS_INIT_PRIORITY > CONFIG_KERNEL_INIT_PRIORITY_DEFAULT, + "SSF_CLIENT_SYS_INIT_PRIORITY must be higher than the IPC ICMSG initialization priority"); + static int client_init(void) { return ssf_client_init(); } -SYS_INIT(client_init, POST_KERNEL, CONFIG_APPLICATION_INIT_PRIORITY); +SYS_INIT(client_init, POST_KERNEL, CONFIG_SSF_CLIENT_SYS_INIT_PRIORITY); #endif diff --git a/subsys/sdfw_services/services/psa_crypto/psa_crypto_service.c b/subsys/sdfw_services/services/psa_crypto/psa_crypto_service.c index 71a180ca4e53..f9a575762e61 100644 --- a/subsys/sdfw_services/services/psa_crypto/psa_crypto_service.c +++ b/subsys/sdfw_services/services/psa_crypto/psa_crypto_service.c @@ -18,18 +18,7 @@ SSF_CLIENT_SERVICE_DEFINE(psa_crypto_srvc, PSA_CRYPTO, cbor_encode_psa_crypto_re psa_status_t ssf_psa_crypto_init(void) { - int err; - struct psa_crypto_req req = { 0 }; - struct psa_crypto_rsp rsp = { 0 }; - - req.psa_crypto_req_msg_choice = psa_crypto_req_msg_psa_crypto_init_req_m_c; - - err = ssf_client_send_request(&psa_crypto_srvc, &req, &rsp, NULL); - if (err != 0) { - return err; - } - - return rsp.psa_crypto_rsp_status; + return PSA_SUCCESS; } psa_status_t ssf_psa_get_key_attributes( diff --git a/subsys/sdfw_services/transport/nrf_rpc/ssf_client_nrf_rpc.c b/subsys/sdfw_services/transport/nrf_rpc/ssf_client_nrf_rpc.c index 89337fddc556..b2a84e491e3f 100644 --- a/subsys/sdfw_services/transport/nrf_rpc/ssf_client_nrf_rpc.c +++ b/subsys/sdfw_services/transport/nrf_rpc/ssf_client_nrf_rpc.c @@ -44,12 +44,6 @@ static void ssf_notification_handler(const struct nrf_rpc_group *group, const ui NRF_RPC_EVT_DECODER(ssf_group, ssf_notif_decoder, CONFIG_SSF_NRF_RPC_NOTIF_ID, ssf_notification_handler, NULL); -static void err_handler(const struct nrf_rpc_err_report *report) -{ - SSF_CLIENT_LOG_ERR("nRF RPC error %d ocurred. See nRF RPC logs for more details.", - report->code); -} - int ssf_client_transport_init(ssf_client_transport_notif_handler handler) { int err; @@ -61,8 +55,12 @@ int ssf_client_transport_init(ssf_client_transport_notif_handler handler) transport_initialized = false; - err = nrf_rpc_init(err_handler); - if (err != 0) { + /* We ignore the nrf_rpc_init on purpose here, the nrf_rpc_init + * will try to initialize all the transports/groups, but we only + * want to check that the ssf_group is initialized. + */ + err = nrf_rpc_init_group(&ssf_group); + if (err < 0) { return -SSF_EINVAL; } diff --git a/tests/benchmarks/multicore/idle/boards/nrf54h20dk_nrf54h20_cpuapp_ram_high_usage.overlay b/tests/benchmarks/multicore/idle/boards/nrf54h20dk_nrf54h20_cpuapp_ram_high_usage.overlay index 1ad3bda2f5b2..7ab4d976c863 100644 --- a/tests/benchmarks/multicore/idle/boards/nrf54h20dk_nrf54h20_cpuapp_ram_high_usage.overlay +++ b/tests/benchmarks/multicore/idle/boards/nrf54h20dk_nrf54h20_cpuapp_ram_high_usage.overlay @@ -5,8 +5,8 @@ */ &cpuapp_ram0x_region { - reg = <0x2f010000 0x91000>; - ranges = <0x0 0x2f010000 0x91000>; + reg = <0x2f011000 0x91000>; + ranges = <0x0 0x2f011000 0x91000>; }; &cpuapp_data { @@ -20,3 +20,11 @@ &usbhs { status = "disabled"; }; + +&cpusec_cpuapp_ipc { + status = "disabled"; +}; + +&cpusec_bellboard { + status = "disabled"; +}; diff --git a/tests/benchmarks/multicore/idle/boards/nrf54h20dk_nrf54h20_cpuapp_ram_low_usage.overlay b/tests/benchmarks/multicore/idle/boards/nrf54h20dk_nrf54h20_cpuapp_ram_low_usage.overlay index 9b9b89f73c24..9dd12e2d1d09 100644 --- a/tests/benchmarks/multicore/idle/boards/nrf54h20dk_nrf54h20_cpuapp_ram_low_usage.overlay +++ b/tests/benchmarks/multicore/idle/boards/nrf54h20dk_nrf54h20_cpuapp_ram_low_usage.overlay @@ -5,8 +5,8 @@ */ &cpuapp_ram0x_region { - reg = <0x2f010000 0x21000>; - ranges = <0x0 0x2f010000 0x21000>; + reg = <0x2f011000 0x21000>; + ranges = <0x0 0x2f011000 0x21000>; }; &cpuapp_data { diff --git a/tests/benchmarks/multicore/idle/boards/nrf54h20dk_nrf54h20_cpurad.overlay b/tests/benchmarks/multicore/idle/boards/nrf54h20dk_nrf54h20_cpurad.overlay new file mode 100644 index 000000000000..795c4fc19128 --- /dev/null +++ b/tests/benchmarks/multicore/idle/boards/nrf54h20dk_nrf54h20_cpurad.overlay @@ -0,0 +1,13 @@ +/* + * Copyright (c) 2024 Nordic Semiconductor ASA + * + * SPDX-License-Identifier: LicenseRef-Nordic-5-Clause + */ + +&cpusec_cpurad_ipc { + status = "disabled"; +}; + +&cpusec_bellboard { + status = "disabled"; +}; diff --git a/tests/subsys/dfu/dfu_target/suit/boards/nrf54h20dk_nrf54h20_cpuapp.overlay b/tests/subsys/dfu/dfu_target/suit/boards/nrf54h20dk_nrf54h20_cpuapp.overlay index 409c2b96fafa..c172e5e3494a 100644 --- a/tests/subsys/dfu/dfu_target/suit/boards/nrf54h20dk_nrf54h20_cpuapp.overlay +++ b/tests/subsys/dfu/dfu_target/suit/boards/nrf54h20dk_nrf54h20_cpuapp.overlay @@ -15,6 +15,14 @@ }; }; +&cpusec_cpuapp_ipc { + status = "disabled"; +}; + +&cpusec_bellboard{ + status = "disabled"; +}; + /* Split DFU partition into a smaller one and DFU caches. */ /delete-node/ &dfu_partition; /delete-node/ &storage_partition; diff --git a/west.yml b/west.yml index b3295d22c6cc..375cd876409c 100644 --- a/west.yml +++ b/west.yml @@ -1,4 +1,4 @@ -# tHe west manifest file (west.yml) for the nRF Connect SDK (NCS). +# The west manifest file (west.yml) for the nRF Connect SDK (NCS). # # The per-workspace west configuration file, ncs/.west/config, # specifies the location of this manifest file like this: @@ -69,7 +69,7 @@ manifest: # https://developer.nordicsemi.com/nRF_Connect_SDK/doc/latest/zephyr/guides/modules.html - name: zephyr repo-path: sdk-zephyr - revision: b2571927ed316e0ae110bffdc5f35311c80511aa + revision: pull/2008/head import: # In addition to the zephyr repository itself, NCS also # imports the contents of zephyr/west.yml at the above @@ -146,7 +146,7 @@ manifest: - name: nrfxlib repo-path: sdk-nrfxlib path: nrfxlib - revision: bcab5c5f72c8953be2a45c4529e4a70e70ffa6ae + revision: pull/1593/head - name: trusted-firmware-m repo-path: sdk-trusted-firmware-m path: modules/tee/tf-m/trusted-firmware-m