Adding a bootloader chain using sysbuild
You can add a bootloader chain to an application in the following ways:
Permanently:
Using
sysbuild.conf
sysbuild Kconfig project configuration files.
Temporarily (for a single build):
Using one-time CMake arguments.
Using
sysbuild_menuconfig
.
While you can use temporary configurations for quickly experimenting with different configurations from build to build, the recommended method is to implement your bootloader chain with permanent configurations.
You can add bootloader chains to nearly any sample in nRF Connect SDK or Zephyr for rapid testing and experimentation.
Choose the bootloader type depending on your application needs. For detailed information about the bootloader support in the nRF Connect SDK and the general architecture, see Secure bootloader chain.
Adding an immutable bootloader
The following sections describe how to add either nRF Secure Immutable Bootloader or MCUboot as an immutable bootloader.
Adding nRF Secure Immutable Bootloader as an immutable bootloader
To build nRF Secure Immutable Bootloader with a Zephyr or nRF Connect SDK sample, enable the SB_CONFIG_SECURE_BOOT_APPCORE
in the application’s sysbuild.conf
file or using the command line:
west build -b nrf52840dk/nrf52840 zephyr/samples/hello_world -- -DSB_CONFIG_SECURE_BOOT_APPCORE=y
See Configuring and building an application for information on how to set the required configuration options temporarily or permanently.
Like other images, you can assign image-specific configurations at build time to further customize the bootloader’s functionality. For details, see Sysbuild (System build) documentation in Zephyr.
To ensure that the immutable bootloader occupies as little flash memory as possible, you can also apply the prj_minimal.conf
configuration:
west build -b nrf52840dk/nrf52840 zephyr/samples/hello_world -- \
-DSB_CONFIG_SECURE_BOOT_APPCORE=y \
-Db0_FILE_SUFFIX=minimal
See Customizing the bootloader for more information about using Kconfig fragments.
Configuring nRF Secure Immutable Bootloader as an immutable bootloader
The following sections describe different configuration options available for nRF Secure Immutable Bootloader as an immutable bootloader.
Adding a custom signature key file
To specify a signature key file for this bootloader, set the SB_CONFIG_SECURE_BOOT_SIGNING_KEY_FILE
option in the application’s sysbuild.conf
file or using the command line:
SB_CONFIG_SECURE_BOOT_SIGNING_KEY_FILE="<path_to>/priv.pem"
-DSB_CONFIG_SECURE_BOOT_SIGNING_KEY_FILE=\"<path_to>/priv.pem\"
Escaped quotations avoid malformed-string warnings from Kconfig.
This option only accepts the private key of an ECDSA key pair, as the build system scripts automatically extract the public key at build time.
The file argument must be a string and is specified in one of the following ways:
The relative path to the file from the application configuration directory (if this is not set, then it will be the same as the application source directory).
The absolute path to the file.
For example, if a directory named _keys
located in /home/user/ncs
contains signing keys, you can provide the path in the following ways:
SB_CONFIG_SECURE_BOOT_SIGNING_KEY_FILE="../../_keys/priv.pem"
Or
SB_CONFIG_SECURE_BOOT_SIGNING_KEY_FILE="/home/user/ncs/_keys/priv.pem"
-DSB_CONFIG_SECURE_BOOT_SIGNING_KEY_FILE=\"../../_keys/priv.pem\"
Or
-DSB_CONFIG_SECURE_BOOT_SIGNING_KEY_FILE=\"/home/user/ncs/_keys/priv.pem\"
Or, if you set an environment variable named NCS
to /home/user/ncs
:
-DSB_CONFIG_SECURE_BOOT_SIGNING_KEY_FILE=\"$NCS/_keys/priv.pem\"
Note
The public key string must contain a list of files where each item can be indicated as follows:
Using the relative path to a file from the application configuration directory. When not specified, it is assumed as the default application source directory.
Using the absolute path to a file.
Environment variables (like $HOME
, $PWD
, or $USER
) and the ~
character on Unix systems are not expanded when setting an absolute path from a sysbuild.conf
file but are expanded correctly in key file paths from the command line that are not given as strings.
You can find specific configuration options for keys with this bootloader in nrf/sysbuild/Kconfig.secureboot
.
See Signature keys for information on how to generate custom keys for a project.
Additionally, the nRF Secure Immutable Bootloader supports the following methods for signing images with private keys:
Uses the
SB_CONFIG_SECURE_BOOT_SIGNING_OPENSSL
Kconfig option.Using a custom command - Uses the
SB_CONFIG_SECURE_BOOT_SIGNING_CUSTOM
Kconfig option.
The OpenSSL method is handled internally by the build system, whereas using custom commands requires more configuration steps.
Checking the public key
You can check that the bootloader image is correctly compiled with the custom signing key by comparing its auto-generated public key against a manual public key dump using OpenSSL.
You can do this with diff
, running the following command from a terminal:
diff build/zephyr/nrf/subsys/bootloader/generated/public.pem <(openssl ec -in priv.pem -pubout)
If there is no file diff output, then the private key has been successfully included in the bootloader image.
Custom signing commands
If you want complete control over the key handling of a project, you can use a custom signing command with nRF Secure Immutable Bootloader. Using a custom signing command removes the need to use of a private key from the build system. This is useful when the private keys are stored, managed, or otherwise processed through a hardware security module (HSM) or an in-house tool.
To use a custom signing command with this bootloader, set the following options in the application’s sysbuild.conf
file or using the command line:
SB_CONFIG_SECURE_BOOT_APPCORE=y
SB_CONFIG_SECURE_BOOT_SIGNING_CUSTOM=y
SB_CONFIG_SECURE_BOOT_SIGNING_PUBLIC_KEY="/path/to/pub.pem"
SB_CONFIG_SECURE_BOOT_SIGNING_COMMAND="my_command"
west build -b nrf52840dk/nrf52840 zephyr/samples/hello_world -- \
-DSB_CONFIG_SECURE_BOOT_APPCORE=y \
-DSB_CONFIG_SECURE_BOOT_SIGNING_CUSTOM=y \
-DSB_CONFIG_SECURE_BOOT_SIGNING_PUBLIC_KEY=\"/path/to/pub.pem\" \
-DSB_CONFIG_SECURE_BOOT_SIGNING_COMMAND=\"my_command\"
Escaped quotations avoid malformed-string warnings from Kconfig.
Note
The public key string must contain a list of files where each item can be indicated as follows:
Using the relative path to a file from the application configuration directory. When not specified, it is assumed as the default application source directory.
Using the absolute path to a file.
See SB_CONFIG_SECURE_BOOT_SIGNING_COMMAND
for specifics about what a usable signing command must do.
The command string can include its own arguments like a typical terminal command, including arguments specific to the build system:
my_command [options] <args ...> <build_system_args ..>
See the description of SB_CONFIG_SECURE_BOOT_SIGNING_COMMAND
for which arguments can be sent to the build system in this way.
Note
Whitespace, hyphens, and other non-alphanumeric characters must be escaped appropriately when setting the string from the command line.
If the custom signing command uses its own options or arguments, it is recommended to define the string in a sysbuild.conf
file to avoid tracking backslashes.
Like public key paths, environment variables are not expanded when using them in a command string set from the file.
Adding MCUboot as an immutable bootloader
To build MCUboot with a Zephyr or nRF Connect SDK sample, enable the SB_CONFIG_BOOTLOADER_MCUBOOT
in the application’s sysbuild.conf
file or using the command line:
west build -b nrf52840dk/nrf52840 zephyr/samples/hello_world -- -DSB_CONFIG_BOOTLOADER_MCUBOOT=y
See Configuring and building an application for information on how to set the required configuration options temporarily or permanently. Like other images, you can assign image-specific configurations at build time to further customize the bootloader’s functionality. For details, see Sysbuild (System build) documentation in Zephyr.
Configuring MCUboot as an immutable bootloader
The following sections describe different configuration options available for MCUboot as an immutable bootloader.
Adding a custom signature key file
You can specify the signature key file for this bootloader by setting the SB_CONFIG_BOOT_SIGNATURE_KEY_FILE
option to the selected private key file.
You can set the option in sysbuild.conf
or using the command line:
SB_CONFIG_BOOT_SIGNATURE_KEY_FILE="priv.pem"
-DSB_CONFIG_BOOT_SIGNATURE_KEY_FILE=\"priv.pem\"
Escaped quotations avoid malformed-string warnings from Kconfig.
The path of the key must be an absolute path, though ${APPLICATION_CONFIG_DIR}
can be used to get the path of the application configuration directory to use keys relative to this directory.
See Signature keys for information on how to generate custom keys for a project.
The key type must also be set correctly:
west build -b nrf52840dk/nrf52840 zephyr/samples/hello_world -- \
-DSB_CONFIG_BOOTLOADER_MCUBOOT=y \
-DSB_CONFIG_BOOT_SIGNATURE_KEY_FILE=\"${APPLICATION_CONFIG_DIR}/../../priv-ecdsa256.pem\" \
-DSB_CONFIG_BOOT_SIGNATURE_TYPE_ECDSA_P256=y
You can find specific configuration options for keys with this bootloader in zephyr/share/sysbuild/images/bootloader/Kconfig
.
Checking the public key
You can extract the public key locally and compare it against MCUboot’s auto-generated file to verify that it is using the custom key:
diff build/mcuboot/zephyr/autogen-pubkey.c <(python3 bootloader/mcuboot/scripts/imgtool.py getpub -k priv.pem)
If there is no file diff output, then the private key was successfully included with the bootloader image.
Adding an upgradable bootloader
MCUboot is the only upgradable bootloader currently available for the nRF Connect SDK. The following section describes how to add it to your secure bootloader chain.
Adding MCUboot as an upgradable bootloader
To use MCUboot as an upgradable bootloader to your application, complete the following steps:
Add nRF Secure Immutable Bootloader as the immutable bootloader.
Add MCUboot to the boot chain by including the
SB_CONFIG_BOOTLOADER_MCUBOOT
Kconfig option with either the build command or in the application’ssysbuild.conf
file:west build -b nrf52840dk/nrf52840 zephyr/samples/hello_world -- \ -DSB_CONFIG_SECURE_BOOT_APPCORE=y \ -DSB_CONFIG_BOOTLOADER_MCUBOOT=y
See Configuring and building an application for information on how to set the required configuration options temporarily or permanently.
Optionally, you can configure MCUboot to use the cryptographic functionality exposed by the immutable bootloader and reduce the flash memory usage for MCUboot to less than 16 kB. To enable this configuration, apply both the
prj_minimal.conf
Kconfig project file and theexternal_crypto.conf
Kconfig fragment for the MCUboot image:west build -b nrf52840dk/nrf52840 zephyr/samples/hello_world -- \ -DSB_CONFIG_SECURE_BOOT_APPCORE=y \ -DSB_CONFIG_BOOTLOADER_MCUBOOT=y \ -Dmcuboot_FILE_SUFFIX=minimal \ -Dmcuboot_EXTRA_CONF_FILE=external_crypto.conf
See Customizing the bootloader for more information about using Kconfig fragments with bootloaders.
The build process generates several Output build files (image files), including MCUboot output build files.
Configuring MCUboot as an upgradable bootloader
The following sections describe different configuration options available for MCUboot as an upgradable bootloader.
Adding a custom signature key file
The process to use specific signature keys with MCUboot used as the upgradable bootloader is the same as when it is used as the immutable one.
Note
Since each bootloader is built with its own signature key, using a different private key with an upgradable bootloader will not cause problems with the secure boot chain. You can also use the same private key for both the immutable and upgradable bootloaders, as long as the key type is supported by both of them.
Generating pre-signed variants
The S1 variant is built as a separate image called s1_image
automatically.
This variant image will use the same application configuration as the base image, with the exception of its placement in memory.
You only have to modify the version set in the CONFIG_FW_INFO_FIRMWARE_VERSION
Kconfig option.
To make s1_image
bootable with nRF Secure Immutable Bootloader, the value of CONFIG_FW_INFO_FIRMWARE_VERSION
for the default image (or MCUboot if using MCUboot as a second-stage bootloader) must be bigger than the one for original image.
Using MCUboot in firmware loader mode
MCUboot supports a firmware loader mode which is supported in sysbuild. This mode allows for a project to consist of an MCUboot image (optionally with serial recovery), a main application which does not support firmware updates, and a secondary application which is dedicated to loading firmware updates. The benefit of this is for having a dedicated application purely for loading firmware updates e.g. over Bluetooth and allowing the size of tha main application to be smaller, helping on devices with limited flash or RAM.
In order to use this mode, a static partition file must be created for the application to designate the addresses and sizes of the main image and firmware loader applications, the firmware loader partition must be named firmware_loader
. The following is an example static partition manager file for the nRF53:
app:
address: 0x10200
region: flash_primary
size: 0xdfe00
mcuboot:
address: 0x0
region: flash_primary
size: 0x10000
mcuboot_pad:
address: 0x10000
region: flash_primary
size: 0x200
mcuboot_primary:
address: 0x10000
orig_span: &id001
- mcuboot_pad
- app
region: flash_primary
size: 0xc0000
span: *id001
mcuboot_primary_app:
address: 0x10200
orig_span: &id002
- app
region: flash_primary
size: 0xbfe00
span: *id002
firmware_loader:
address: 0xd0200
region: flash_primary
size: 0x1fe00
mcuboot_secondary:
address: 0xd0000
orig_span: &id003
- mcuboot_pad
- firmware_loader
region: flash_primary
size: 0x20000
span: *id003
mcuboot_secondary_app:
address: 0xd0200
orig_span: &id004
- firmware_loader
region: flash_primary
size: 0x1fe00
span: *id004
settings_storage:
address: 0xf0000
region: flash_primary
size: 0x10000
pcd_sram:
address: 0x20000000
size: 0x2000
region: sram_primary
The project must also have a sysbuild.cmake
file which includes the firmware loader application in the build, this must be named firmware_loader
:
ExternalZephyrProject_Add(
APPLICATION firmware_loader
SOURCE_DIR <path_to_firmware_loader_application>
)
There must also be a sysbuild.conf
file which selects the required sysbuild options for enabling MCUboot and selecting the firmware loader mode:
SB_CONFIG_BOOTLOADER_MCUBOOT=y
SB_CONFIG_MCUBOOT_MODE_FIRMWARE_UPDATER=y
At least one mode must be set in MCUboot for entering the firmware loader application, supported entrance methods include:
GPIO
Boot mode using retention subsystem
No valid main application
Device reset using dedicated reset pin
For this example, the use of a GPIO when booting will be used. Create a sysbuild
folder and add a sysbuild/mcuboot.conf
Kconfig fragment file to use when building MCUboot with the following:
CONFIG_BOOT_FIRMWARE_LOADER_ENTRANCE_GPIO=y
The project can now be built and flashed and will boot the firmware loader application when the button is held upon device reboot, or the main application will be booted when the device is reset and the button is not held down.