Skip to content

Commit e808fbf

Browse files
FrancescoSernordicjm
authored andcommitted
doc: 54h documentation improvements
Improved various 54h doc pages. Signed-off-by: Francesco Domenico Servidio <francesco.servidio@nordicsemi.no>
1 parent 52a2d66 commit e808fbf

File tree

4 files changed

+55
-59
lines changed

4 files changed

+55
-59
lines changed

doc/nrf/app_dev/device_guides/nrf54h/ug_nrf54h20_configuration.rst

+12-18
Original file line numberDiff line numberDiff line change
@@ -12,30 +12,28 @@ The nRF54H20 DK uses both devicetree and Kconfig for its hardware and software c
1212
You can find the basics of both devicetree and Kconfig in Zephyr in the :ref:`zephyr:application` section of the Zephyr documentation.
1313
You can also read the :ref:`app_build_system` section describing the |NCS| additions to the Zephyr configuration system.
1414

15-
However, the multicore nature of the nRF54H20 DK required some changes to the way devicetree files are organized.
15+
However, the multicore nature of the nRF54H20 DK required some changes to how devicetree files are organized.
1616

1717
DTS file scheme
1818
***************
1919

20-
.. to review
21-
2220
.. note::
2321
This file scheme is valid only for the nRF54H20 initial limited sampling version of |NCS|.
2422
It is subject to changes or improvements in future releases.
2523

2624
The following is the DTS file structure implemented for all the SoCs of the 54H family:
2725

28-
* Arch-specific DTS files, located in the :file:`../dts/arm/nordic_nrf_next/` and :file:`dts/riscv/nordic_nrf_next folder` directories:
26+
* Arch-specific DTS files, located in the :file:`../dts/arm/nordic_nrf_next/` and :file:`dts/riscv/nordic_nrf_next folder` directories:
2927

30-
* Project-wide files (:file:`haltium_cpu.dtsi` and :file:`haltium_global_*.dtsi`)
31-
* Core-specific files per product (:file:`nrf54h20_cpu*.dtsi`)
28+
* Project-wide files (:file:`haltium_cpu.dtsi` and :file:`haltium_global_*.dtsi`)
29+
* Core-specific files per product (:file:`nrf54h20_cpu*.dtsi`)
3230

33-
* Common directory, located in the :file:`../common/nordic_nrf_next` folder:
31+
* Common directory, located in the :file:`../common/nordic_nrf_next` folder:
3432

35-
* Arch-independent configurations
33+
* Arch-independent configurations
3634
* Common platform overlays
37-
* Common memory and peripherals overlay applicable across products
38-
* Product-specific overlays applicable to all cores
35+
* Common memory and peripherals overlay applicable across products
36+
* Product-specific overlays applicable to all cores
3937
* Project-wide overlays
4038

4139
The following is the include tree for the application core of the nRF54H20 (cpuapp):
@@ -48,26 +46,22 @@ The files shown in the figure are currently hosted in the ``ic-next`` repository
4846
Customizing the DTS configuration
4947
*********************************
5048

51-
.. to review
52-
53-
The output files created in your application build directory are documented in :ref:`zephyr:devicetree-in-out-files`.
49+
You can find documentation for the output files created in your application build directory in :ref:`zephyr:devicetree-in-out-files`.
5450
You can use overlay files to customize this configuration.
5551

5652
To see and test how to use overlays for changing nodes, see the *Lesson 3* of the `nRF Connect SDK Fundamentals course`_ on the Nordic Developer Academy website.
5753

5854
Generated HEX files
5955
*******************
6056

61-
.. to review
62-
6357
When building an application for the nRF54H20 DK, you are building all domain images at once.
64-
During this process, the following :file:`zephyr.hex` images are built:
58+
This process generates the following :file:`zephyr.hex` images:
6559

6660
* Application core application
6761
* PPR core application
6862
* Radio core firmware
6963

70-
Additionally, the following user information configuration registers (UICR) contents (:file:`uicr.hex`) are generated for setup access for domains:
64+
Additionally, the build process generates the following user information configuration registers (UICR) contents (:file:`uicr.hex`) to set up access for domains:
7165

7266
* System Controller UICR
7367
* Application UICR
@@ -77,6 +71,6 @@ Additionally, the following user information configuration registers (UICR) cont
7771
``west flash`` uses :file:`uicr_merged.hex` files that are pre-merged HEX files combining the relevant :file:`zephyr.hex` + :file:`uicr.hex` for a domain that has UICRs.
7872
Flashing both :file:`zephyr.hex` + :file:`uicr.hex` will result in the same configuration.
7973

80-
All of the HEX files need to be flashed into the device.
74+
You must flash all the HEX files into the device.
8175
For more information on building images for the nRF54H20 DK, see :ref:`ug_nrf54h20_gs`.
8276
For additional information on multi-image builds see :ref:`ug_multi_image`.

doc/nrf/app_dev/device_guides/nrf54h/ug_nrf54h20_debugging.rst

+12-11
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,6 @@ Debug configurations
3030
Some applications and samples provide a specific configuration that enables additional debug functionalities.
3131
You can select custom configurations when you are :ref:`configuring the build settings <cmake_options>`.
3232

33-
3433
Debugging single-core applications
3534
**********************************
3635

@@ -79,8 +78,9 @@ To debug a specific core using ``JLinkExe`` do the following:
7978
.. note::
8079
|nrfjprog_deprecation_note|
8180

82-
If just one DK is connected to the machine, defining ``SEGGER-ID`` is not necessary.
83-
If more than one DK is connected to the machine and ``SEGGER-ID`` is undefined, a pop up window will appear where you can manually select the ID of the DK you want to run J-Link on.
81+
If you connect just one DK to the machine, defining ``SEGGER-ID`` is not necessary.
82+
83+
If you connect multiple DKs to the machine and have not defined ``SEGGER-ID``, a pop-up window appears where you can manually select the ID of the DK to run J-Link on.
8484

8585
.. note::
8686
PPR core debugging is not functional in the initial limited sampling.
@@ -112,7 +112,7 @@ Debug logging
112112
*************
113113

114114
You can use the logging system to get more information about the state of your application.
115-
Logs are integrated into various modules and subsystems in the |NCS| and Zephyr.
115+
Various modules and subsystems in the |NCS| and Zephyr integrate logs.
116116
These logs are visible once you configure the logger for your application.
117117

118118
You can also configure log level per logger module to, for example, get more information about a given subsystem.
@@ -147,9 +147,10 @@ A value of ``0`` indicates *no error*, while any other value signifies that an e
147147
Therefore, a device experiencing erratic behavior might still report ``0`` incorrectly.
148148
For example, this may occur if the device is in a boot loop.
149149

150-
151150
Several components report errors through this register.
152-
The first 4 bits of the first byte is reserved for future use and must be ``0``, the second 4 bits of the bootstatus indicate which component reported an error:
151+
The first 4 bits of the first byte must be 0.
152+
These bits are reserved for future use.
153+
The second 4 bits of the ``BOOTSTATUS`` indicate which component reports an error:
153154

154155
* System Controller ROM -> ``0x01``
155156
* Secure Domain ROM -> ``0x02``
@@ -160,17 +161,16 @@ The first 4 bits of the first byte is reserved for future use and must be ``0``,
160161
Each one of these values has a different handling of the remaining bits.
161162
This chapter only describes the semantics for Secure Domain Firmware errors (``0x0B******``).
162163

163-
164164
The second byte describes the boot step within the SDFW booting process that reported the failure.
165165
For more information, see `SDFW Boot Steps`_
166166
The last two bytes contain the lower 16 bits of the error code.
167167

168168
For example, ``0x0BA1FF62`` indicates that the SDFW reported an error in the BICR validate step (``0xA1``) with error message ``0xFF62``, or ``-158``.
169169

170-
SDFW Boot Steps
170+
SDFW boot steps
171171
---------------
172172

173-
The boot steps are defined as follows:
173+
The following are the boot steps definitions:
174174

175175
.. parsed-literal::
176176
:class: highlight
@@ -188,7 +188,8 @@ The boot steps are defined as follows:
188188
#define BOOTSTATUS_STEP_ADAC 0xC0
189189
#define BOOTSTATUS_STEP_SERVICES 0xCF
190190
191-
Errors are not accumulated, as only one error is reported even if multiple boot steps fail.
191+
Errors do not accumulate.
192+
When multiple boot steps fail, the system reports only one error.
192193
The SDFW chooses which error to report if multiple errors occur.
193194
The types of errors that can overwrite other errors are the following:
194195

@@ -198,7 +199,7 @@ The types of errors that can overwrite other errors are the following:
198199
The following is a short description of the failures related to the boot steps:
199200

200201
* ``BOOTSTATUS_STEP_START_GRTC`` - SDFW was unable to initialize the driver used for the GRTC.
201-
* ``BOOTSTATUS_STEP_SDFW_UPDATE`` - SDROM was instructed to install an update before last reset, and is indicating that an error occurred while performing the update.
202+
* ``BOOTSTATUS_STEP_SDFW_UPDATE`` - Before the last reset, the SDROM received instructions to install an update and indicates that an error occurred during the process.
202203
* ``BOOTSTATUS_STEP_BELLBOARD_CONFIG`` - SDFW was unable to apply the static bellboard configuration.
203204
* ``BOOTSTATUS_STEP_SUIT_INIT`` - A SUIT related error occurred.
204205
* ``BOOTSTATUS_STEP_DOMAIN_ALLOCATE`` - An error occurred while allocating global resources.

doc/nrf/app_dev/device_guides/nrf54h/ug_nrf54h20_logging.rst

+17-16
Original file line numberDiff line numberDiff line change
@@ -27,16 +27,16 @@ Similarly to other SoCs from Nordic Semiconductor, to use a UART connection for
2727
nRF54H20 logging using System Trace Macrocell (STM)
2828
***************************************************
2929

30-
nRF54H20 domains contain ARM Coresight System Trace Macrocell (STM) hardware devices for collecting trace data from multiple domains, using either standalone logging or assisted multicore logging.
31-
The STM uses memory-mapped registers to write trace data generated by the domains in the system.
32-
It multiplexes the data as trace protocol data, formatted according to the MIPI System Trace Protocol (STP) v2, and synchronizes the data on a single output, such as a single UART.
30+
nRF54H20 domains include ARM Coresight System Trace Macrocell (STM) hardware, which collects trace data from multiple domains using standalone or assisted multicore logging.
31+
The STM writes trace data generated by the domains using memory-mapped registers.
32+
The STM multiplexes trace protocol data, formatted according to the MIPI System Trace Protocol (STP) v2, and sends it to a single output, like a UART.
3333
This approach has a minimal cost on performance and code size, allowing for a non-intrusive collection of system debug-and-trace information.
3434

3535
The STM implements a frontend of the Zephyr logging subsystem, allowing you to use the standard Zephyr logging API.
3636
For more information on STM, see :ref:`zephyr:logging_cs_stm`.
3737

3838
.. note::
39-
The STM logging feature for the nRF54H20 SoC was tested using the J-Trace PRO V2 Cortex-M, with firmware compiled on ``Mar 28 2024 15:14:04``.
39+
The STM logging feature for the nRF54H20 SoC underwent testing with the J-Trace PRO V2 Cortex-M, using firmware compiled on ``Mar 28 2024 15:14:04``.
4040
Using this feature also requires ``nrfutil-trace`` version 2.10.0 or later.
4141

4242
Embedded Trace Router (ETR)
@@ -45,14 +45,14 @@ Embedded Trace Router (ETR)
4545
The Embedded Trace Router (ETR) is a hardware feature that provides a circular buffer in RAM for trace data.
4646
For more information on ETR, see :ref:`zephyr:logging_cs_stm`.
4747

48-
When using ETR on the nRF54H20 SoC, one of the cores is designated as a *proxy* to manage the trace data.
48+
When using ETR on the nRF54H20 SoC, one of the cores acts as a *proxy* to manage the trace data.
4949

5050
.. note::
51-
Currently, the Application core is the only core that can be designated as proxy.
51+
Currently, only the Application core can act as a proxy.
5252

5353
The proxy core is responsible for handling the data from the ETR and outputting it through the desired transport mechanism (like UART or USB).
5454
The proxy core approach allows for on-chip data processing, offering more flexibility than the Trace Port Interface Unit (TPIU).
55-
However, due to the limited size of the ETR buffer, there is a risk of data loss if not handled promptly.
55+
However, the limited size of the ETR buffer poses a risk of data loss if not handled appropriately.
5656

5757
Standalone logging
5858
==================
@@ -88,7 +88,7 @@ To read the STM log output on the UART, consult the following documentation page
8888
* If you want to use PuTTY, see :ref:`putty`.
8989

9090
.. note::
91-
To use UART in your application, the UART's node must be described in devicetree.
91+
To use UART in your application, define the UART node in the devicetree.
9292
For more details, see :ref:`zephyr:devicetree-intro`.
9393

9494
The following is an example log output::
@@ -125,7 +125,8 @@ The following are the prefixes used to indicate the cores:
125125
Assisted multicore logging
126126
==========================
127127

128-
Assisted multicore logging uses dictionary-based logging to send messages without redundant strings to STM, and is based on the :ref:`zephyr:logging_guide_dictionary` feature of the logging API provided by Zephyr.
128+
Assisted multicore logging uses dictionary-based logging to send messages without redundant strings to STM.
129+
It is based on the :ref:`zephyr:logging_guide_dictionary` feature of the Zephyr logging API.
129130
For more information on assisted multicore logging, see :ref:`zephyr:logging_cs_stm`.
130131

131132
Configuring logging
@@ -139,8 +140,8 @@ For example, the following command uses the snippet when building for the applic
139140

140141
All cores must use the same logging configuration.
141142

142-
After building your application, a dictionary database file named :file:`log_database.json` will be generated in the build directories for each one of the cores the snippet was used on (:file:`build/<app_name>/zephyr/`, where ``<app_name>`` is the name of the application built for each specific core).
143-
This file is crucial for decoding the logs and is updated with every build.
143+
After building your application, the build directories for each core (:file:`build/<app_name>/zephyr/`, where ``<app_name>`` is the application name for each core) will contain a dictionary database file named :file:`log_database.json`.
144+
This file is crucial for decoding the logs and updates with every build.
144145

145146
Reading the logs
146147
----------------
@@ -149,7 +150,7 @@ To read the dictionary-based STM log output, do the following:
149150

150151
1. Set up the log capture.
151152

152-
Use the ``nrfutil trace stm`` command to start capturing logs from the device, specifying the database configuration for each domain ID, as well as the serial port, the baud rate, and the output type::
153+
Use the ``nrfutil trace stm`` command to start capturing logs from the device, specifying the database configuration for each domain ID, along with the serial port, baud rate, and output type::
153154

154155
nrfutil trace stm --database-config <domain_id>:build/<app_name>/zephyr/log_dictionary.json --input-serialport <port> --baudrate 115200 --stdout ascii
155156

@@ -160,13 +161,13 @@ To read the dictionary-based STM log output, do the following:
160161
When using several domains, use a comma (`,`) to separate each domain in the list.
161162
* ``<app_name>`` is the application name.
162163
* ``<port>`` is the serial port used for output.
163-
Use ``nrfutil device list`` to list which serial ports are exposed by the development kit.
164+
Use ``nrfutil device list`` to identify the serial ports exposed by the development kit.
164165
* The output can be either the console (``--stdout ascii``) or a file (the :file:`out.txt` file if ``--output-ascii out.txt``).
165166

166167
#. Capture and decode the logs.
167168

168169
nrfutil will capture the log data from the specified UART port and use the provided dictionary databases to decode the logs into a human-readable format.
169-
The decoded logs are sent to the previously-defined output (either the console or the :file:`out.txt` file in the previous example).
170+
The tool sends the decoded logs to the specified output (either the console or the :file:`out.txt` file in the example).
170171

171172
#. Read the terminal or open the output file to review the decoded log messages.
172173

@@ -199,5 +200,5 @@ When using assisted multicore logging, consider the following:
199200

200201
* Use optimized log macros (having up to 2 word size numeric arguments, like ``LOG_INF("%d %c", (int)x, (char)y)``) to improve the size and speed of logging.
201202
* For memory constrained applications (for example, when running on the PPR or FLPR cores), disable the ``printk()`` function by setting both the :kconfig:option:`CONFIG_PRINTK` and :kconfig:option:`CONFIG_BOOT_BANNER` Kconfig options to ``n`` in your project configuration.
202-
* When working with multiple domains, such as the Secure Domain and Application core, ensure that each database is prefixed with the correct domain ID.
203-
* Some log messages might be dropped due to the limited size of the RAM buffer that stores STM logs.
203+
* When working with multiple domains, such as the Secure Domain and Application core, ensure that each database has the correct domain ID prefix.
204+
* The limited size of the RAM buffer storing STM logs may cause some log messages to drop.

doc/nrf/app_dev/device_guides/nrf54h/ug_nrf54h20_suit_soc_binaries.rst

+14-14
Original file line numberDiff line numberDiff line change
@@ -15,34 +15,34 @@ Updating the nRF54H20 SoC binaries
1515
**********************************
1616

1717
You can update the nRF54H20 SoC binaries in two ways.
18-
Both methods require using the :file:`nordic_top.suit` envelope, which can be found inside the nRF54H20 SOC binaries ZIP file.
18+
Both methods require using the :file:`nordic_top.suit` envelope, available inside the nRF54H20 SoC binaries ZIP package.
1919

2020
The two methods for updating are the following:
2121

22-
* Updating separately from the manufacturer application.
22+
* Updating the SoC binaries without the manufacturer application.
2323

24-
* Updating along with the manufacturer application, by attaching the :file:`nordic_top.suit` envelope to the manufacturer root manifest, updating both the SoC binaries and the manufacturer's application simultaneously.
24+
* Updating along with the manufacturer application by attaching the :file:`nordic_top.suit` envelope to the manufacturer root manifest, updating both the SoC binaries and the manufacturer's application simultaneously.
2525

2626

27-
Updating the nRF54H20 SoC binaries separately from the manufacturer application
28-
===============================================================================
27+
Updating the nRF54H20 SoC binaries without the manufacturer application
28+
=======================================================================
2929

30-
When using this method, two separate updates are performed:
30+
When using this method, you perform two updates:
3131

3232
1. An update using a manufacturer envelope that contains the update candidate.
33-
2. A second update, provided by the :file:`nordic_top.suit` envelope from the SoC binaries bundle.
33+
2. A second update provided by the :file:`nordic_top.suit` envelope from the SoC binaries bundle.
3434

3535
Each envelope contains all the necessary information, allowing the device to differentiate between the two updates.
3636

37-
This approach was chosen for the following benefits:
37+
This approach offers the following benefits:
3838

39-
* A smaller partition is required for storing the update candidate.
39+
* The update candidate requires a smaller partition.
4040
* There is no need to integrate the process of downloading Nordic artifacts into the manufacturer application build process.
41-
* There is no need to update the version and sequence number of the manufacturer root manifest, if only SoC binaries updates are required.
41+
* There is no need to update the version and sequence number of the manufacturer root manifest when you update only the SoC binaries.
4242

4343
However, there are the following limitations:
4444

45-
* Two separate updates are required, which is not supported by all protocols.
45+
* This method requires two updates, which is not supported by all protocols.
4646
* The manufacturer envelope cannot ensure the compatibility of SoC binaries with the manufacturer application.
4747

4848

@@ -53,12 +53,12 @@ When building an application, you can configure the build system to include the
5353

5454
This approach has the following benefits:
5555

56-
* The entire update can be performed by pushing a single image to the device, which may be required by some protocols.
57-
* The manufacturer root manifest can be used to manage dependencies between the manufacturer application and the SoC binaries.
56+
* You can perform the entire update by pushing a single image to the device, which some protocols may require.
57+
* You can use the manufacturer root manifest to manage dependencies between the manufacturer application and the SoC binaries.
5858

5959
This approach has the following drawbacks:
6060

61-
* A larger partition is required to store the update candidate, as both the manufacturer and the SoC binaries must fit within it.
61+
* You need a larger partition to store the update candidate since both the manufacturer application and the SoC binaries must fit within it.
6262
* The manufacturer must integrate the process of downloading Nordic artifacts into the update package creation process.
6363

6464
To build and perform an update using this method, do the following:

0 commit comments

Comments
 (0)