You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: doc/nrf/app_dev/device_guides/nrf54h/ug_nrf54h20_configuration.rst
+12-18
Original file line number
Diff line number
Diff line change
@@ -12,30 +12,28 @@ The nRF54H20 DK uses both devicetree and Kconfig for its hardware and software c
12
12
You can find the basics of both devicetree and Kconfig in Zephyr in the :ref:`zephyr:application` section of the Zephyr documentation.
13
13
You can also read the :ref:`app_build_system` section describing the |NCS| additions to the Zephyr configuration system.
14
14
15
-
However, the multicore nature of the nRF54H20 DK required some changes to the way devicetree files are organized.
15
+
However, the multicore nature of the nRF54H20 DK required some changes to how devicetree files are organized.
16
16
17
17
DTS file scheme
18
18
***************
19
19
20
-
.. to review
21
-
22
20
.. note::
23
21
This file scheme is valid only for the nRF54H20 initial limited sampling version of |NCS|.
24
22
It is subject to changes or improvements in future releases.
25
23
26
24
The following is the DTS file structure implemented for all the SoCs of the 54H family:
27
25
28
-
* Arch-specific DTS files, located in the :file:`../dts/arm/nordic_nrf_next/` and :file:`dts/riscv/nordic_nrf_next folder` directories:
26
+
* Arch-specific DTS files, located in the :file:`../dts/arm/nordic_nrf_next/` and :file:`dts/riscv/nordic_nrf_next folder` directories:
29
27
30
-
* Project-wide files (:file:`haltium_cpu.dtsi` and :file:`haltium_global_*.dtsi`)
31
-
* Core-specific files per product (:file:`nrf54h20_cpu*.dtsi`)
28
+
* Project-wide files (:file:`haltium_cpu.dtsi` and :file:`haltium_global_*.dtsi`)
29
+
* Core-specific files per product (:file:`nrf54h20_cpu*.dtsi`)
32
30
33
-
* Common directory, located in the :file:`../common/nordic_nrf_next` folder:
31
+
* Common directory, located in the :file:`../common/nordic_nrf_next` folder:
34
32
35
-
* Arch-independent configurations
33
+
* Arch-independent configurations
36
34
* Common platform overlays
37
-
* Common memory and peripherals overlay applicable across products
38
-
* Product-specific overlays applicable to all cores
35
+
* Common memory and peripherals overlay applicable across products
36
+
* Product-specific overlays applicable to all cores
39
37
* Project-wide overlays
40
38
41
39
The following is the include tree for the application core of the nRF54H20 (cpuapp):
@@ -48,26 +46,22 @@ The files shown in the figure are currently hosted in the ``ic-next`` repository
48
46
Customizing the DTS configuration
49
47
*********************************
50
48
51
-
.. to review
52
-
53
-
The output files created in your application build directory are documented in :ref:`zephyr:devicetree-in-out-files`.
49
+
You can find documentation for the output files created in your application build directory in :ref:`zephyr:devicetree-in-out-files`.
54
50
You can use overlay files to customize this configuration.
55
51
56
52
To see and test how to use overlays for changing nodes, see the *Lesson 3* of the `nRF Connect SDK Fundamentals course`_ on the Nordic Developer Academy website.
57
53
58
54
Generated HEX files
59
55
*******************
60
56
61
-
.. to review
62
-
63
57
When building an application for the nRF54H20 DK, you are building all domain images at once.
64
-
During this process, the following :file:`zephyr.hex` images are built:
58
+
This process generates the following :file:`zephyr.hex` images:
65
59
66
60
* Application core application
67
61
* PPR core application
68
62
* Radio core firmware
69
63
70
-
Additionally, the following user information configuration registers (UICR) contents (:file:`uicr.hex`) are generated for setup access for domains:
64
+
Additionally, the build process generates the following user information configuration registers (UICR) contents (:file:`uicr.hex`) to set up access for domains:
71
65
72
66
* System Controller UICR
73
67
* Application UICR
@@ -77,6 +71,6 @@ Additionally, the following user information configuration registers (UICR) cont
77
71
``west flash`` uses :file:`uicr_merged.hex` files that are pre-merged HEX files combining the relevant :file:`zephyr.hex` + :file:`uicr.hex` for a domain that has UICRs.
78
72
Flashing both :file:`zephyr.hex` + :file:`uicr.hex` will result in the same configuration.
79
73
80
-
All of the HEX files need to be flashed into the device.
74
+
You must flash all the HEX files into the device.
81
75
For more information on building images for the nRF54H20 DK, see :ref:`ug_nrf54h20_gs`.
82
76
For additional information on multi-image builds see :ref:`ug_multi_image`.
Copy file name to clipboardexpand all lines: doc/nrf/app_dev/device_guides/nrf54h/ug_nrf54h20_debugging.rst
+12-11
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,6 @@ Debug configurations
30
30
Some applications and samples provide a specific configuration that enables additional debug functionalities.
31
31
You can select custom configurations when you are :ref:`configuring the build settings <cmake_options>`.
32
32
33
-
34
33
Debugging single-core applications
35
34
**********************************
36
35
@@ -79,8 +78,9 @@ To debug a specific core using ``JLinkExe`` do the following:
79
78
.. note::
80
79
|nrfjprog_deprecation_note|
81
80
82
-
If just one DK is connected to the machine, defining ``SEGGER-ID`` is not necessary.
83
-
If more than one DK is connected to the machine and ``SEGGER-ID`` is undefined, a pop up window will appear where you can manually select the ID of the DK you want to run J-Link on.
81
+
If you connect just one DK to the machine, defining ``SEGGER-ID`` is not necessary.
82
+
83
+
If you connect multiple DKs to the machine and have not defined ``SEGGER-ID``, a pop-up window appears where you can manually select the ID of the DK to run J-Link on.
84
84
85
85
.. note::
86
86
PPR core debugging is not functional in the initial limited sampling.
@@ -112,7 +112,7 @@ Debug logging
112
112
*************
113
113
114
114
You can use the logging system to get more information about the state of your application.
115
-
Logs are integrated into various modules and subsystems in the |NCS| and Zephyr.
115
+
Various modules and subsystems in the |NCS| and Zephyr integrate logs.
116
116
These logs are visible once you configure the logger for your application.
117
117
118
118
You can also configure log level per logger module to, for example, get more information about a given subsystem.
@@ -147,9 +147,10 @@ A value of ``0`` indicates *no error*, while any other value signifies that an e
147
147
Therefore, a device experiencing erratic behavior might still report ``0`` incorrectly.
148
148
For example, this may occur if the device is in a boot loop.
149
149
150
-
151
150
Several components report errors through this register.
152
-
The first 4 bits of the first byte is reserved for future use and must be ``0``, the second 4 bits of the bootstatus indicate which component reported an error:
151
+
The first 4 bits of the first byte must be 0.
152
+
These bits are reserved for future use.
153
+
The second 4 bits of the ``BOOTSTATUS`` indicate which component reports an error:
153
154
154
155
* System Controller ROM -> ``0x01``
155
156
* Secure Domain ROM -> ``0x02``
@@ -160,17 +161,16 @@ The first 4 bits of the first byte is reserved for future use and must be ``0``,
160
161
Each one of these values has a different handling of the remaining bits.
161
162
This chapter only describes the semantics for Secure Domain Firmware errors (``0x0B******``).
162
163
163
-
164
164
The second byte describes the boot step within the SDFW booting process that reported the failure.
165
165
For more information, see `SDFW Boot Steps`_
166
166
The last two bytes contain the lower 16 bits of the error code.
167
167
168
168
For example, ``0x0BA1FF62`` indicates that the SDFW reported an error in the BICR validate step (``0xA1``) with error message ``0xFF62``, or ``-158``.
169
169
170
-
SDFW Boot Steps
170
+
SDFW boot steps
171
171
---------------
172
172
173
-
The boot steps are defined as follows:
173
+
The following are the boot steps definitions:
174
174
175
175
.. parsed-literal::
176
176
:class: highlight
@@ -188,7 +188,8 @@ The boot steps are defined as follows:
188
188
#define BOOTSTATUS_STEP_ADAC 0xC0
189
189
#define BOOTSTATUS_STEP_SERVICES 0xCF
190
190
191
-
Errors are not accumulated, as only one error is reported even if multiple boot steps fail.
191
+
Errors do not accumulate.
192
+
When multiple boot steps fail, the system reports only one error.
192
193
The SDFW chooses which error to report if multiple errors occur.
193
194
The types of errors that can overwrite other errors are the following:
194
195
@@ -198,7 +199,7 @@ The types of errors that can overwrite other errors are the following:
198
199
The following is a short description of the failures related to the boot steps:
199
200
200
201
* ``BOOTSTATUS_STEP_START_GRTC`` - SDFW was unable to initialize the driver used for the GRTC.
201
-
* ``BOOTSTATUS_STEP_SDFW_UPDATE`` - SDROM was instructed to install an update before last reset, and is indicating that an error occurred while performing the update.
202
+
* ``BOOTSTATUS_STEP_SDFW_UPDATE`` - Before the last reset, the SDROM received instructions to install an update and indicates that an error occurred during the process.
202
203
* ``BOOTSTATUS_STEP_BELLBOARD_CONFIG`` - SDFW was unable to apply the static bellboard configuration.
203
204
* ``BOOTSTATUS_STEP_SUIT_INIT`` - A SUIT related error occurred.
204
205
* ``BOOTSTATUS_STEP_DOMAIN_ALLOCATE`` - An error occurred while allocating global resources.
nRF54H20 domains contain ARM Coresight System Trace Macrocell (STM) hardware devices for collecting trace data from multiple domains, using either standalone logging or assisted multicore logging.
31
-
The STM uses memory-mapped registers to write trace data generated by the domains in the system.
32
-
It multiplexes the data as trace protocol data, formatted according to the MIPI System Trace Protocol (STP) v2, and synchronizes the data on a single output, such as a single UART.
30
+
nRF54H20 domains include ARM Coresight System Trace Macrocell (STM) hardware, which collects trace data from multiple domains using standalone or assisted multicore logging.
31
+
The STM writes trace data generated by the domains using memory-mapped registers.
32
+
The STM multiplexes trace protocol data, formatted according to the MIPI System Trace Protocol (STP) v2, and sends it to a single output, like a UART.
33
33
This approach has a minimal cost on performance and code size, allowing for a non-intrusive collection of system debug-and-trace information.
34
34
35
35
The STM implements a frontend of the Zephyr logging subsystem, allowing you to use the standard Zephyr logging API.
36
36
For more information on STM, see :ref:`zephyr:logging_cs_stm`.
37
37
38
38
.. note::
39
-
The STM logging feature for the nRF54H20 SoC was tested using the J-Trace PRO V2 Cortex-M, with firmware compiled on ``Mar 28 2024 15:14:04``.
39
+
The STM logging feature for the nRF54H20 SoC underwent testing with the J-Trace PRO V2 Cortex-M, using firmware compiled on ``Mar 28 2024 15:14:04``.
40
40
Using this feature also requires ``nrfutil-trace`` version 2.10.0 or later.
41
41
42
42
Embedded Trace Router (ETR)
@@ -45,14 +45,14 @@ Embedded Trace Router (ETR)
45
45
The Embedded Trace Router (ETR) is a hardware feature that provides a circular buffer in RAM for trace data.
46
46
For more information on ETR, see :ref:`zephyr:logging_cs_stm`.
47
47
48
-
When using ETR on the nRF54H20 SoC, one of the cores is designated as a *proxy* to manage the trace data.
48
+
When using ETR on the nRF54H20 SoC, one of the cores acts as a *proxy* to manage the trace data.
49
49
50
50
.. note::
51
-
Currently, the Application core is the only core that can be designated as proxy.
51
+
Currently, only the Application core can act as a proxy.
52
52
53
53
The proxy core is responsible for handling the data from the ETR and outputting it through the desired transport mechanism (like UART or USB).
54
54
The proxy core approach allows for on-chip data processing, offering more flexibility than the Trace Port Interface Unit (TPIU).
55
-
However, due to the limited size of the ETR buffer, there is a risk of data loss if not handled promptly.
55
+
However, the limited size of the ETR buffer poses a risk of data loss if not handled appropriately.
56
56
57
57
Standalone logging
58
58
==================
@@ -88,7 +88,7 @@ To read the STM log output on the UART, consult the following documentation page
88
88
* If you want to use PuTTY, see :ref:`putty`.
89
89
90
90
.. note::
91
-
To use UART in your application, the UART's node must be described in devicetree.
91
+
To use UART in your application, define the UART node in the devicetree.
92
92
For more details, see :ref:`zephyr:devicetree-intro`.
93
93
94
94
The following is an example log output::
@@ -125,7 +125,8 @@ The following are the prefixes used to indicate the cores:
125
125
Assisted multicore logging
126
126
==========================
127
127
128
-
Assisted multicore logging uses dictionary-based logging to send messages without redundant strings to STM, and is based on the :ref:`zephyr:logging_guide_dictionary` feature of the logging API provided by Zephyr.
128
+
Assisted multicore logging uses dictionary-based logging to send messages without redundant strings to STM.
129
+
It is based on the :ref:`zephyr:logging_guide_dictionary` feature of the Zephyr logging API.
129
130
For more information on assisted multicore logging, see :ref:`zephyr:logging_cs_stm`.
130
131
131
132
Configuring logging
@@ -139,8 +140,8 @@ For example, the following command uses the snippet when building for the applic
139
140
140
141
All cores must use the same logging configuration.
141
142
142
-
After building your application, a dictionary database file named :file:`log_database.json` will be generated in the build directories for each one of the cores the snippet was used on (:file:`build/<app_name>/zephyr/`, where ``<app_name>`` is the name of the application built for each specific core).
143
-
This file is crucial for decoding the logs and is updated with every build.
143
+
After building your application, the build directories for each core (:file:`build/<app_name>/zephyr/`, where ``<app_name>`` is the application name for each core) will contain a dictionary database file named :file:`log_database.json`.
144
+
This file is crucial for decoding the logs and updates with every build.
144
145
145
146
Reading the logs
146
147
----------------
@@ -149,7 +150,7 @@ To read the dictionary-based STM log output, do the following:
149
150
150
151
1. Set up the log capture.
151
152
152
-
Use the ``nrfutil trace stm`` command to start capturing logs from the device, specifying the database configuration for each domain ID, as well as the serial port, the baud rate, and the output type::
153
+
Use the ``nrfutil trace stm`` command to start capturing logs from the device, specifying the database configuration for each domain ID, along with the serial port, baud rate, and output type::
@@ -160,13 +161,13 @@ To read the dictionary-based STM log output, do the following:
160
161
When using several domains, use a comma (`,`) to separate each domain in the list.
161
162
* ``<app_name>`` is the application name.
162
163
* ``<port>`` is the serial port used for output.
163
-
Use ``nrfutil device list`` to list which serial ports are exposed by the development kit.
164
+
Use ``nrfutil device list`` to identify the serial ports exposed by the development kit.
164
165
* The output can be either the console (``--stdout ascii``) or a file (the :file:`out.txt` file if ``--output-ascii out.txt``).
165
166
166
167
#. Capture and decode the logs.
167
168
168
169
nrfutil will capture the log data from the specified UART port and use the provided dictionary databases to decode the logs into a human-readable format.
169
-
The decoded logs are sent to the previously-defined output (either the console or the :file:`out.txt` file in the previous example).
170
+
The tool sends the decoded logs to the specified output (either the console or the :file:`out.txt` file in the example).
170
171
171
172
#. Read the terminal or open the output file to review the decoded log messages.
172
173
@@ -199,5 +200,5 @@ When using assisted multicore logging, consider the following:
199
200
200
201
* Use optimized log macros (having up to 2 word size numeric arguments, like ``LOG_INF("%d %c", (int)x, (char)y)``) to improve the size and speed of logging.
201
202
* For memory constrained applications (for example, when running on the PPR or FLPR cores), disable the ``printk()`` function by setting both the :kconfig:option:`CONFIG_PRINTK` and :kconfig:option:`CONFIG_BOOT_BANNER` Kconfig options to ``n`` in your project configuration.
202
-
* When working with multiple domains, such as the Secure Domain and Application core, ensure that each database is prefixed with the correct domain ID.
203
-
* Some log messages might be dropped due to the limited size of the RAM buffer that stores STM logs.
203
+
* When working with multiple domains, such as the Secure Domain and Application core, ensure that each database has the correct domain ID prefix.
204
+
* The limited size of the RAM buffer storing STM logs may cause some log messages to drop.
Copy file name to clipboardexpand all lines: doc/nrf/app_dev/device_guides/nrf54h/ug_nrf54h20_suit_soc_binaries.rst
+14-14
Original file line number
Diff line number
Diff line change
@@ -15,34 +15,34 @@ Updating the nRF54H20 SoC binaries
15
15
**********************************
16
16
17
17
You can update the nRF54H20 SoC binaries in two ways.
18
-
Both methods require using the :file:`nordic_top.suit` envelope, which can be found inside the nRF54H20 SOC binaries ZIP file.
18
+
Both methods require using the :file:`nordic_top.suit` envelope, available inside the nRF54H20 SoC binaries ZIP package.
19
19
20
20
The two methods for updating are the following:
21
21
22
-
* Updating separately from the manufacturer application.
22
+
* Updating the SoC binaries without the manufacturer application.
23
23
24
-
* Updating along with the manufacturer application, by attaching the :file:`nordic_top.suit` envelope to the manufacturer root manifest, updating both the SoC binaries and the manufacturer's application simultaneously.
24
+
* Updating along with the manufacturer application by attaching the :file:`nordic_top.suit` envelope to the manufacturer root manifest, updating both the SoC binaries and the manufacturer's application simultaneously.
25
25
26
26
27
-
Updating the nRF54H20 SoC binaries separately from the manufacturer application
0 commit comments