You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: doc/nrf/app_dev/board_names.rst
+10-7Lines changed: 10 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,12 +46,15 @@ While the board name is always present, other elements, such as the board revisi
46
46
Check the Product Specification of the given SoC for more information about the available CPU clusters.
47
47
48
48
* :ref:`Variant <zephyr:glossary>` - You can use this board qualifier to build for a particular type or configuration of a build for a combination of SoC and CPU cluster.
49
-
In the |NCS|, variants are used for changing the default memory map as well as indicating the usage of Cortex-M Security Extensions (CMSE) (security by separation):
50
-
51
-
* Entry ``nrf52840dongle/nrf52840/bare`` - When you choose this target, the firmware will not account for the onboard USB bootloader (see :ref:`zephyr_board_nrf52840dongle_flashing-option-3` for more details).
52
-
* Entries without ``*/ns`` (for example, ``cpuapp``) - When you choose this target, you build the application core firmware as a single execution environment that does not use CMSE (:ref:`Trusted Firmware-M (TF-M) <ug_tfm>`).
53
-
* Entries with ``*/ns`` (for example, ``cpuapp/ns``) - Recommended for more security.
54
-
When you choose this target, you build the application with CMSE using security by separation.
49
+
In the |NCS|, variants are used for the following purposes:
50
+
51
+
* Changing the default memory map, which applies to the entry for the nRF52840 Dongle with ``*/bare`` (``nrf52840dongle/nrf52840/bare``) - When you choose this target, the firmware will not account for the onboard USB bootloader.
52
+
This corresponds to using the :ref:`flashing option 3 using an external debug probe <zephyr:nrf52840dongle>` for the dongle.
53
+
* Indicating the usage of Cortex-M Security Extensions (CMSE) (security by separation):
54
+
55
+
* Entries without ``*/ns`` (for example, ``cpuapp``) - When you choose this target, you build the application core firmware as a single execution environment that does not use CMSE (:ref:`Trusted Firmware-M (TF-M) <ug_tfm>`).
56
+
* Entries with ``*/ns`` (for example, ``cpuapp/ns``) - Recommended for more security.
57
+
When you choose this target, you build the application with CMSE using security by separation.
55
58
The application core firmware is placed in Non-Secure Processing Environment (NSPE) and uses Secure Processing Environment (SPE) for security features.
56
59
By default, the build system automatically includes :ref:`Trusted Firmware-M (TF-M) <ug_tfm>` in SPE and merges it with NSPE.
57
60
@@ -127,7 +130,7 @@ Also see the :ref:`zephyr:boards` section in the Zephyr documentation.
Copy file name to clipboardExpand all lines: doc/nrf/releases_and_maturity/releases/release-notes-changelog.rst
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -307,7 +307,7 @@ nRF Desktop
307
307
Extra ATT buffers are no longer needed for keyboards as :ref:`nrf_desktop_hids` limits the maximum number of simultaneously processed HID input reports (:ref:`CONFIG_DESKTOP_HIDS_SUBSCRIBER_REPORT_MAX <config_desktop_app_options>`) to ``2`` by default.
308
308
* The nRF Desktop application aligns the defaults of :kconfig:option:`CONFIG_BT_ATT_TX_COUNT` and :kconfig:option:`CONFIG_BT_CONN_TX_MAX` Kconfig options to application needs.
309
309
The options are no longer explicitly set in application configurations.
310
-
* The nRF52840 dongle board target to the ``bare`` varaint to indicate that the application does not use and overwrite the onboard USB bootloader.
310
+
* The nRF52840 Dongle board target to the ``bare`` variant to indicate that the application does not use and overwrite the onboard USB bootloader.
0 commit comments