Loading...
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 | # Thingy53 NRF5340 board configuration # Copyright (c) 2021 Nordic Semiconductor ASA # SPDX-License-Identifier: Apache-2.0 if BOARD_THINGY53_NRF5340_CPUAPP || BOARD_THINGY53_NRF5340_CPUAPP_NS config BOARD default "thingy53_nrf5340_cpuapp" # Code Partition: # # For the secure version of the board the firmware is linked at the beginning # of the flash, or into the code-partition defined in DT if it is intended to # be loaded by MCUboot. If the secure firmware is to be combined with a non- # secure image (TRUSTED_EXECUTION_SECURE=y), the secure FW image shall always # be restricted to the size of its code partition. # # For the non-secure version of the board, the firmware # must be linked into the code-partition (non-secure) defined in DT, regardless. # Apply this configuration below by setting the Kconfig symbols used by # the linker according to the information extracted from DT partitions. # SRAM Partition: # # If the secure firmware is to be combined with a non-secure image # (TRUSTED_EXECUTION_SECURE=y), the secure FW image SRAM shall always # be restricted to the secure image SRAM partition (sram-secure-partition). # Otherwise (if TRUSTED_EXECUTION_SECURE is not set) the whole zephyr,sram # may be used by the image. # # For the non-secure version of the board, the firmware image SRAM is # always restricted to the allocated non-secure SRAM partition. # # Workaround for not being able to have commas in macro arguments DT_CHOSEN_Z_CODE_PARTITION := zephyr,code-partition DT_CHOSEN_Z_SRAM_PARTITION := zephyr,sram-secure-partition if BOARD_THINGY53_NRF5340_CPUAPP && TRUSTED_EXECUTION_SECURE config FLASH_LOAD_SIZE default $(dt_chosen_reg_size_hex,$(DT_CHOSEN_Z_CODE_PARTITION)) config SRAM_SIZE default $(dt_chosen_reg_size_int,$(DT_CHOSEN_Z_SRAM_PARTITION),0,K) endif # BOARD_THINGY53_NRF5340_CPUAPP && TRUSTED_EXECUTION_SECURE if BOARD_THINGY53_NRF5340_CPUAPP_NS config FLASH_LOAD_OFFSET default $(dt_chosen_reg_addr_hex,$(DT_CHOSEN_Z_CODE_PARTITION)) config FLASH_LOAD_SIZE default $(dt_chosen_reg_size_hex,$(DT_CHOSEN_Z_CODE_PARTITION)) endif # BOARD_THINGY53_NRF5340_CPUAPP_NS if !TRUSTED_EXECUTION_SECURE choice BT_HCI_BUS_TYPE default BT_RPMSG if BT endchoice config HEAP_MEM_POOL_SIZE default 4096 if BT_RPMSG config BT_HAS_HCI_VS default BT config USB_NRFX_ATTACHED_EVENT_DELAY default 700 if USB_DEVICE_DRIVER config I2C default y config SPI default y config REGULATOR default y endif # !TRUSTED_EXECUTION_SECURE if BOARD_SERIAL_BACKEND_CDC_ACM config USB_DEVICE_PRODUCT default "Thingy:53 Application" config USB_DEVICE_VID default 0x1915 config USB_DEVICE_PID default 0x530C config USB_DEVICE_STACK default y config USB_CDC_ACM default y config UART_CONSOLE default CONSOLE config USB_DEVICE_INITIALIZE_AT_BOOT default y if !MCUBOOT config SHELL_BACKEND_SERIAL_CHECK_DTR default SHELL config USB_DEVICE_REMOTE_WAKEUP default n if LOG # Logger cannot use itself to log choice USB_CDC_ACM_LOG_LEVEL_CHOICE default USB_CDC_ACM_LOG_LEVEL_OFF endchoice # Set USB log level to error only choice USB_DEVICE_LOG_LEVEL_CHOICE default USB_DEVICE_LOG_LEVEL_ERR endchoice # Wait 4000ms at startup for logging config LOG_PROCESS_THREAD_STARTUP_DELAY_MS default 4000 endif # LOG endif # BOARD_SERIAL_BACKEND_CDC_ACM endif # BOARD_THINGY53_NRF5340_CPUAPP || BOARD_THINGY53_NRF5340_CPUAPP_NS if BOARD_THINGY53_NRF5340_CPUNET config BOARD default "thingy53_nrf5340_cpunet" config BT_CTLR default BT config BT_ECC default BT endif # BOARD_THINGY53_NRF5340_CPUNET |