You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Adds more details for architecture of update procedure, as well as
a graph of the process between local and secure domains.
Signed-off-by: Stephen Stauts <stephen.stauts@nordicsemi.no>
Copy file name to clipboardExpand all lines: doc/nrf/app_dev/device_guides/nrf54h/ug_nrf54h20_ironside_update.rst
+49-9Lines changed: 49 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -177,20 +177,60 @@ See the :zephyr:code-sample:`update application <nrf_ironside_update>` sample fo
177
177
.. _ug_nrf54h20_ironside_se_update_architecture:
178
178
179
179
Architecture
180
-
************
180
+
============
181
181
182
-
The structure of the update procedure consists of the following steps:
182
+
The |ISE| update process starts when Application firmware invokes the :ref:`update service <ug_nrf54h20_ironside_se_update_service>` with the address of where the update release package has been written in MRAM.
183
183
184
-
1. The :zephyr:code-sample:`update application <nrf_ironside_update>` runs on the application core and communicates with |ISE| using the :ref:`update service <ug_nrf54h20_ironside_se_update_service>`.
184
+
The diagram below illustrates the process flow between Application, |ISE|, and Secure Domain ROM (SDROM) in performing the firmware update.
185
185
186
-
#. The application invokes the IronSide SE update service and passes the parameters that correspond to the location of the HEX file (blob metadata) of the |ISE| firmware update in memory.
186
+
.. figure:: images/nrf54h20_ironside_update.svg
187
187
188
-
#. The |ISE| validates the update parameters and writes the update metadata to the Secure Information Configuration Registers (SICR).
#. After the service call completes, the IronSide SE firmware updates the internal state of the device.
190
+
Application side
191
+
----------------
191
192
192
-
#. The application prints the return value of the service call and outputs information from the update HEX file.
193
+
The following describes the procedure for an |ISE| update from Application firmware:
193
194
194
-
#. After a reset, the Secure Domain ROM (SDROM) detects the pending update through the SICR registers, verifies the update firmware signature, and installs the new firmware.
195
+
1. Program update image into MRAM.
196
+
#. Call the |ISE| update service with update image location.
197
+
#. Verify update request is acknowledged.
198
+
#. Trigger a reset.
199
+
#. Check version in boot report on startup.
195
200
196
-
Once the operation has completed, you can read the boot report to verify that the update has taken place.
0 commit comments