<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>MCUBoot+sysbuild+ns-variant: E: Protect mcuboot flash failed, cancel startup.</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/123779/mcuboot-sysbuild-ns-variant-e-protect-mcuboot-flash-failed-cancel-startup</link><description>Hi. 
 Goal I am creating a new application for the nRF54l15 and want to follow the latest recommendations for project configuration. I need to do DFU over BLE, so I&amp;#39;m trying to add MCUBoot in the chain-of-trust regime, using sysbuild. To get there, I</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Fri, 28 Nov 2025 12:44:49 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/123779/mcuboot-sysbuild-ns-variant-e-protect-mcuboot-flash-failed-cancel-startup" /><item><title>RE: MCUBoot+sysbuild+ns-variant: E: Protect mcuboot flash failed, cancel startup.</title><link>https://devzone.nordicsemi.com/thread/555745?ContentTypeID=1</link><pubDate>Fri, 28 Nov 2025 12:44:49 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:f8d50e0e-7f36-4b3f-a23c-a8d0173f9122</guid><dc:creator>Erlend Isachsen</dc:creator><description>&lt;p&gt;Thanks, I&amp;#39;ll try to check it out. Does the sample work out of the box with this fix, or is additional configuration required?&lt;br /&gt;i.e. zephyr/sysbuild/with_mcuboot for nrf54l15dk/nrf54l15/ns.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MCUBoot+sysbuild+ns-variant: E: Protect mcuboot flash failed, cancel startup.</title><link>https://devzone.nordicsemi.com/thread/555724?ContentTypeID=1</link><pubDate>Fri, 28 Nov 2025 10:41:03 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:51a022a3-ee29-4e18-ad90-62cefa0bdc6c</guid><dc:creator>Menon</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;Sorry for the delay with this issue. Please check the PRs below for the FPROTECT issue:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://github.com/nrfconnect/sdk-mcuboot/pull/576"&gt;https://github.com/nrfconnect/sdk-mcuboot/pull/576&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://github.com/nrfconnect/sdk-nrf/pull/25655"&gt;https://github.com/nrfconnect/sdk-nrf/pull/25655&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Kind Regards,&lt;/p&gt;
&lt;p&gt;Abhijith&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MCUBoot+sysbuild+ns-variant: E: Protect mcuboot flash failed, cancel startup.</title><link>https://devzone.nordicsemi.com/thread/552282?ContentTypeID=1</link><pubDate>Thu, 23 Oct 2025 14:54:12 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:d7c6d6f1-7810-4745-bee0-cec44a364b15</guid><dc:creator>BloPoPs</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;any update on this? Will it be fixed on NCS v3.2.0? I have the same problem on my own custom board using MCUBoot and TF-M. And I cannot remove the TF-M.&lt;/p&gt;
&lt;p&gt;It can also be reproduce following the NCS intermediate course, Lesson 9 Exercise 5, on the nRF54L15DK cpuapp/ns&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MCUBoot+sysbuild+ns-variant: E: Protect mcuboot flash failed, cancel startup.</title><link>https://devzone.nordicsemi.com/thread/552163?ContentTypeID=1</link><pubDate>Wed, 22 Oct 2025 12:47:49 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:3b798e2e-e6ce-46f5-b265-a05c7dfe44b9</guid><dc:creator>Erlend Isachsen</dc:creator><description>&lt;p&gt;Hi.&lt;/p&gt;
&lt;p&gt;The size of MCUBoot alone is what causing the issue in your case, 96 kiB &amp;gt; 64 kiB. Are you using all that space, or can you reduce it?&lt;/p&gt;
&lt;p&gt;I usually find 0xc000 (48 kiB) to be sufficient for mcuboot, and leaves room for debug and logging. If that&amp;#39;s sufficient for you, I would suggest editing pm_static.yml like so:&lt;/p&gt;
&lt;p&gt;&lt;pre class="ui-code" data-mode="text"&gt;mcuboot:
  address: 0x00000000
  size:    0x000c000&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;Setting size to 0x10000 might work as well, although I&amp;#39;m not sure as it sits right at that 64 kiB limit.&lt;/p&gt;
&lt;p&gt;Since that is all you have in your pm_static.yml, the automatic partition manager should resolve the rest of the partitions as well.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MCUBoot+sysbuild+ns-variant: E: Protect mcuboot flash failed, cancel startup.</title><link>https://devzone.nordicsemi.com/thread/552160?ContentTypeID=1</link><pubDate>Wed, 22 Oct 2025 12:37:18 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:c52049e8-e34c-4211-844d-194cabc8ef11</guid><dc:creator>Yannick Bus</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;Our pm_static.yml has only a single entry:&lt;br /&gt;&lt;br /&gt;&lt;pre class="ui-code" data-mode="text"&gt;mcuboot:
  address: 0x00000000
  size:    0x00018000
&lt;/pre&gt;&lt;br /&gt;&lt;br /&gt;as far as i can see from the generated partitions.yml there isnt anything too crazy:&lt;br /&gt;&lt;pre class="ui-code" data-mode="text"&gt;mcuboot:
  address: 0x0
  end_address: 0x18000
  region: flash_primary
  size: 0x18000
mcuboot_pad:
  address: 0x18000
  end_address: 0x18800
  placement:
    align:
      start: 0x1000
    before:
    - mcuboot_primary_app
  region: flash_primary
  size: 0x800
mcuboot_primary:
  address: 0x18000
  end_address: 0x165000
  orig_span: &amp;amp;id001
  - mcuboot_pad
  - app
  region: flash_primary
  size: 0x14d000
  span: *id001
mcuboot_primary_app:
  address: 0x18800
  end_address: 0x165000
  orig_span: &amp;amp;id002
  - app
  region: flash_primary
  size: 0x14c800
  span: *id002
mcuboot_secondary:
  address: 0x0
  device: DT_CHOSEN(nordic_pm_ext_flash)
  end_address: 0x14d000
  placement:
    align:
      start: 0x4
  region: external_flash
  share_size:
  - mcuboot_primary
  size: 0x14d000&lt;/pre&gt;&lt;br /&gt;&lt;br /&gt;The only thing i can think of is that we are using an external flash chip for the mcuboot_secondary?&lt;br /&gt;&lt;br /&gt;Thank you for your reply!&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MCUBoot+sysbuild+ns-variant: E: Protect mcuboot flash failed, cancel startup.</title><link>https://devzone.nordicsemi.com/thread/552156?ContentTypeID=1</link><pubDate>Wed, 22 Oct 2025 12:17:15 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:6e43e3bd-c34b-49a8-a13f-43b681861d5d</guid><dc:creator>Erlend Isachsen</dc:creator><description>&lt;p&gt;Hi. Maybe I can provide some help. If FProtect fails it is likely that your MCUBoot primary partition has a too big offset from the start of the flash. On ns-builds, this will typically be caused by TFM partitions as discussed above. Since you are on a non-ns build, it means something else is taking up that space. For instance, I wouldn&amp;#39;t be surprised if this happens when using MCUBoot as a second stage bootloader.&lt;/p&gt;
&lt;p&gt;If you don&amp;#39;t need flash protection you can use CONFIG_FPROTECT=n (in sysbuild/mcuboot.conf) to disable it as mentioned, although I would not recommend this as it increases the chance of bugs related to flash-writes (FOTA etc.) to brick your device.&lt;/p&gt;
&lt;p&gt;If you need flash protection it would be useful if you can share your pm_static.yml if you have one, or build/partitions.yml. In the latter file, you can check which partitions are before mcuboot_primary. mcuboot_primary address needs to be before 0x10000 on nRF54L15.&lt;/p&gt;
&lt;p&gt;If I&amp;#39;m not mistaken, I believe MCUBoot simply looks for the begining of mcuboot_primary, and tries to protect everything before it (including mcuboot itself), and the maximum fprotect size is 64 kiB (0x10000).&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MCUBoot+sysbuild+ns-variant: E: Protect mcuboot flash failed, cancel startup.</title><link>https://devzone.nordicsemi.com/thread/552153?ContentTypeID=1</link><pubDate>Wed, 22 Oct 2025 11:56:48 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1d6251cd-d246-44d1-a410-0d42f96c62bd</guid><dc:creator>Yannick Bus</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;We are having the same issue as the gentleman above, enabling FProtect for us seems to result in &amp;quot;&amp;lt;err&amp;gt; mcuboot: Protect mcuboot flash failed, cancel startup.&amp;quot; However we are allready on a non-ns build.&lt;br /&gt;&lt;br /&gt;Have there been any updates or workarounds for this issue found in the meantime?&lt;br /&gt;&lt;br /&gt;Kind Regards,&lt;br /&gt;Yannick Bus&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MCUBoot+sysbuild+ns-variant: E: Protect mcuboot flash failed, cancel startup.</title><link>https://devzone.nordicsemi.com/thread/550046?ContentTypeID=1</link><pubDate>Mon, 29 Sep 2025 14:03:21 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1ae0e884-a3c0-4b96-94ad-976d4118e82e</guid><dc:creator>Menon</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;I understand your concern, and I completely agree that this needs to be fixed. I am closely following the issue and will update you as soon as it is resolved. I’m sorry for the delay and apologize for the inconvenience this has caused.&lt;/p&gt;
&lt;p&gt;Kind regards,&lt;br /&gt; Abhijith&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MCUBoot+sysbuild+ns-variant: E: Protect mcuboot flash failed, cancel startup.</title><link>https://devzone.nordicsemi.com/thread/549216?ContentTypeID=1</link><pubDate>Thu, 18 Sep 2025 16:09:02 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:a8965f9f-b582-4950-aff8-6ab75e3ca4cf</guid><dc:creator>Erlend Isachsen</dc:creator><description>&lt;p&gt;Thank you for the update, and thanks for reporting it internally.&lt;/p&gt;
&lt;p&gt;I believe the build would probably succeed using the non-ns variant of the board, and I believe it would also work by disabling FPROTECT. However, this is a very big compromise considering it might make it challenging to get our product certified with regards to the upcoming IoT security regulations such as CRA, where DFU/FOTA will be a requirement and most points under CRA Annex 1 relates to the configurations discussed in this thread. It would also be surprising if such a compromise is required, considering security is one of the&amp;nbsp;&lt;a href="https://www.nordicsemi.com/Products/nRF54L15"&gt;selling points of the nRF54 series&lt;/a&gt;&amp;nbsp;is:&lt;/p&gt;
&lt;p&gt;&amp;quot;&lt;br /&gt;&lt;strong&gt;Advanced security features with physical protection&lt;/strong&gt;&lt;br /&gt; With more &lt;strong&gt;IoT security regulations&lt;/strong&gt;, customers increasingly recognize the value of security. The nRF54L Series enables secure products, integrating features such as &lt;strong&gt;secure boot,&lt;/strong&gt; &lt;strong&gt;secure firmware update&lt;/strong&gt;, &lt;strong&gt;secure storage&lt;/strong&gt;, a &lt;strong&gt;trusted execution environment enabled by TrustZone&lt;/strong&gt;, and a &lt;strong&gt;cryptographic accelerator&lt;/strong&gt;. These features, alongside side-channel leakage protection and tamper detectors, fulfill &lt;strong&gt;essential and rigorous security requirements&lt;/strong&gt;.&lt;br /&gt;&amp;quot;&lt;/p&gt;
&lt;p&gt;Also, I imagine there are very few instances where you would want to use TFM without FPROTECT? I might be missing something, but wouldn&amp;#39;t TFMs security be compromised by the fact that the application can simply modify the TMF? As far as I can tell they go hand in hand.&lt;/p&gt;
&lt;p&gt;So to assist customers planning to use the nRF54 for its secure features, or customers that want to be compliant with existing and future cybersecurity regulations and care about certification, it would be very helpful to have a sample in the nRF Connect SDK that has security enabled by default (possibly two samples, one central device and one peripheral?). As a minimum for compliance with the most central IoT security regulations, it should probably include the following:&lt;/p&gt;
&lt;p&gt;1. Builds for the _ns variant of the nRF54 development kits with TFM.&lt;br /&gt;&amp;nbsp; a. to be compliant with most points under CRA Annex 1.&lt;br /&gt;2. Has secure bluetooth with recommended DFU services enabled.&lt;br /&gt;&amp;nbsp;a. Assuming most customers choosing the 54 series are interesting in using bluetooth.&lt;br /&gt;&amp;nbsp;b. DFU to be compliant with CRA requirements related to security updates and lifecycle support.&lt;br /&gt;3. Uses the key provisioning and KMU for the benefits you mentioned.&lt;/p&gt;
&lt;p&gt;Or whichever configuration you see fit to actually &amp;quot;fulfill essential and rigorous security requirements.&amp;quot; and be compliant with &amp;quot;IoT security regulations&amp;quot;, because that is essentially what I&amp;#39;m trying to achieve. This also ties into the &amp;quot;secure by default configuration&amp;quot; listed under CRA Annex 1.&lt;/p&gt;
&lt;p&gt;I&amp;#39;m referring a lot to CRA considering it is one of the big upcoming IoT security regulations, and it will be become part of the CE requirements in 2027.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MCUBoot+sysbuild+ns-variant: E: Protect mcuboot flash failed, cancel startup.</title><link>https://devzone.nordicsemi.com/thread/548892?ContentTypeID=1</link><pubDate>Tue, 16 Sep 2025 12:40:05 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:819d78b1-56e6-4e79-bc3f-f2dbca1e3f0d</guid><dc:creator>Menon</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;Sorry for the delay in getting back to you. This issue has been reported internally, and we are working on it. I will update you once we have a resolution. The error seems to occur because FPROTECT couldn’t protect the MCUBoot partition for some reason.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://devzone.nordicsemi.com/support-private/support/350677"&gt;There is a similar case&lt;/a&gt;, but the customer there is apparently fine running without the &lt;code&gt;_ns&lt;/code&gt; version of the build configuration.&lt;/p&gt;
&lt;p&gt;Kind regards,&lt;br /&gt; Abhijith&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MCUBoot+sysbuild+ns-variant: E: Protect mcuboot flash failed, cancel startup.</title><link>https://devzone.nordicsemi.com/thread/547869?ContentTypeID=1</link><pubDate>Fri, 05 Sep 2025 08:18:27 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:adb552f0-efce-4d9a-bead-cb7dd58a70b6</guid><dc:creator>Erlend Isachsen</dc:creator><description>&lt;p&gt;Thank you for your detailed answer, it does seem quite challenging to fit NSIB+2xMCUBoot+TFM within the first 64 kiB though, so until I have fully resolved the FPROTECT issue I think I might have to stick with MCUBoot. Regardless I suppose:&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
[quote userid="115767" url="~/f/nordic-q-a/123779/mcuboot-sysbuild-ns-variant-e-protect-mcuboot-flash-failed-cancel-startup/547685"]This design allows MCUboot to be updated later if bugs or security issues are discovered[/quote]
&lt;p&gt;is the core of the it. I have currently configured MCUBoot to use KMU with 3 slots and key revocation, and provision 3 keys during programming, so I would guess that would give most of the other benefits you mentioned using MCUBoot as immutable bootloader?&lt;br /&gt;&lt;br /&gt;Returning to my original issue, it seems it isn&amp;#39;t fully resolved after all. As soon as I enable bluetooth and want to have a secure connection, I get the following error:&lt;br /&gt;&lt;pre class="ui-code" data-mode="powershell"&gt;&amp;lt;err&amp;gt; bt_ecc: Failed to generate ECC key -134
&amp;lt;wrn&amp;gt; bt_smp: Public key not available
&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;And if I try to initialize a pairing, I get:&lt;br /&gt;&lt;pre class="ui-code" data-mode="powershell"&gt;&amp;lt;err&amp;gt; bt_ecc: psa_import_key() returned status -134
&amp;lt;wrn&amp;gt; bt_smp: Received invalid public key
&amp;lt;err&amp;gt; app: Security change failed for [xx:xx:xx:xx:xx:xx (random)]. Error: [1]&lt;/pre&gt;&lt;/p&gt;
&lt;p&gt;Which appears to be the same issue experienced&amp;nbsp;&lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/102485/cannot-store-a-key-in-the-psa-key-storage-err--134"&gt;here&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/121602/failed-to-generate-ecc-key--134-when-build-nrf5340-with-tfm-in-ncs-3-0-1"&gt;here&lt;/a&gt;. The proposed solution in both cases is to ensure that CONFIG_TFM_PROFILE_TYPE_MINIMAL is not set.&lt;/p&gt;
&lt;p&gt;Is there a way to get around this? Any options I can enable to only get the cryptography I need, or provision the keys required?&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MCUBoot+sysbuild+ns-variant: E: Protect mcuboot flash failed, cancel startup.</title><link>https://devzone.nordicsemi.com/thread/547685?ContentTypeID=1</link><pubDate>Wed, 03 Sep 2025 19:49:43 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:64a2d32a-ca76-43c8-b721-0da27496dba5</guid><dc:creator>Menon</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;Good to hear that you figured out the partition side correctly.&lt;/p&gt;
[quote user="Erlend Isachsen"]However, searching through this raised another question. Do you know if there is a reason why the &amp;quot;hello world TFM&amp;quot; has options for NSIB+MCUboot two stage bootloader, and not just MCUboot as immutable bootloader? Are there any benefits to using NSIB+MCUboot as opposed to only MCUboot (appart from being able to upgrade MCUboot). I&amp;#39;m thinking especially with regards to security, KMU etc.[/quote]
&lt;p&gt;The reason the &lt;em&gt;hello_world_tfm&lt;/em&gt; sample on nRF54L uses NSIB + MCUboot is because NSIB anchors the Root of Trust in hardware by storing the boot verification keys in the Key Management Unit (KMU) instead of inside the bootloader binary. See &lt;a href="https://docs.nordicsemi.com/bundle/ncs-latest/page/nrf/app_dev/device_guides/nrf54l/kmu_basics.html"&gt;the documentation here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This ensures the keys cannot be modified by software and can even be rotated or revoked securely if needed. &lt;a href="https://docs.nordicsemi.com/bundle/ncs-latest/page/nrf/app_dev/bootloaders_dfu/mcuboot_nsib/bootloader_signature_keys.html#revoking_private_keys"&gt;See the section Revoking private keys&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;NSIB is very small and fixed, so its main function is to verify that MCUboot is genuine using the KMU keys, and then hand over control. This design allows MCUboot to be updated later if bugs or security issues are discovered, while the trust foundation remains protected in hardware.&lt;/p&gt;
&lt;p&gt;Using only MCUboot would still work, but it would rely only on flash protection, which is not as strong as KMU based security.&lt;/p&gt;
&lt;p&gt;Kind Regards,&lt;/p&gt;
&lt;p&gt;Abhijith&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MCUBoot+sysbuild+ns-variant: E: Protect mcuboot flash failed, cancel startup.</title><link>https://devzone.nordicsemi.com/thread/546326?ContentTypeID=1</link><pubDate>Thu, 21 Aug 2025 10:57:00 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:79ccc7a7-68fa-4b9b-8bdb-fdf1c4612f07</guid><dc:creator>Erlend Isachsen</dc:creator><description>&lt;p&gt;Hi Menon, thank you for your answer.&lt;/p&gt;
&lt;p&gt;The problem seems to be that the size of MCUboot and TFM NVS storage (mcuboot, tfm_its, tfm_otp_nv_counters) shifts the MCUboot primary as far back as 0x16000, which is beyond what fprotect can handle. This is similar to what is discussed in&amp;nbsp;&lt;a href="https://devzone.nordicsemi.com/f/nordic-q-a/120819/nrf54-with-mcuboot?utm_source=chatgpt.com"&gt;this&lt;/a&gt;&amp;nbsp;thread.&lt;/p&gt;
&lt;p&gt;I also figured out that the &amp;quot;hello world TFM&amp;quot; sample actually supports nrf54l15dk/nrf54l14/cpuapp/ns, and had some extra KConfig fragments for sysbuild and the application that handle MCUboot with TFM. While the fragments in that sample are meant for a two-stage bootloader, I noticed the prj_bootloaders.conf had the option CONFIG_TFM_PROFILE_TYPE_MINIMAL=y. I tried to take that over to the &amp;quot;with_mcuboot&amp;quot; sample which made the sample boot with FPROTECT enabled (see attached image for the working build configuration, if anyone else encounters the same problem). With the reduced size, mcuboot_primary ends up at 0xe000 which is just within the limit for FPROTECT on nRF54l15.&lt;/p&gt;
&lt;p&gt;So from this I believe I will be able to extract a pm_static.yml that I can use for my application, and build it with MCUboot and TFM.&lt;/p&gt;
&lt;p&gt;However, searching through this raised another question. Do you know if there is a reason why the &amp;quot;hello world TFM&amp;quot; has options for NSIB+MCUboot two stage bootloader, and not just MCUboot as immutable bootloader? Are there any benefits to using NSIB+MCUboot as opposed to only MCUboot (appart from being able to upgrade MCUboot). I&amp;#39;m thinking especially with regards to security, KMU etc.&lt;/p&gt;
&lt;p&gt;&lt;img style="max-height:240px;max-width:320px;" src="https://devzone.nordicsemi.com/resized-image/__size/640x480/__key/communityserver-discussions-components-files/4/working_5F00_cfg.JPG" alt=" " /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: MCUBoot+sysbuild+ns-variant: E: Protect mcuboot flash failed, cancel startup.</title><link>https://devzone.nordicsemi.com/thread/546314?ContentTypeID=1</link><pubDate>Thu, 21 Aug 2025 09:13:38 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:1e6323f0-8c52-4e4e-a80b-fdfcff538871</guid><dc:creator>Menon</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;Sorry for the delayed response. I have been working on this and was able to see the issue here. It’s not related to your setup. The error you’re seeing is&lt;a href="https://github.com/nrfconnect/sdk-mcuboot/blob/main/boot/zephyr/main.c#L666"&gt; coming from here&lt;/a&gt;, and I believe it’s caused by the fprotect backend. The sample works fine with the build configuration &lt;code&gt;nrf54l15dk/nrf54l15dk/cpuapp&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;Kind regards,&lt;br /&gt; Abhijith&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>