blob: da967e4f0fd7b565cb169f5ca036d6e1522639c4 [file] [log] [blame]
Paul Beesleyec7988c2019-10-24 11:57:00 +00001Change Log & Release Notes
2==========================
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +02003
4Please note that the Trusted Firmware-A Tests version follows the Trusted
5Firmware-A version for simplicity. At any point in time, TF-A Tests version
6`x.y` aims at testing TF-A version `x.y`. Different versions of TF-A and TF-A
7Tests are not guaranteed to be compatible. This also means that a version
8upgrade on the TF-A-Tests side might not necessarily introduce any new feature.
9
Paul Beesleyec7988c2019-10-24 11:57:00 +000010Version 2.2
11-----------
Madhukar Pappireddy0468ac02019-10-10 02:30:40 -050012
13New features
Paul Beesleyec7988c2019-10-24 11:57:00 +000014^^^^^^^^^^^^
Madhukar Pappireddy0468ac02019-10-10 02:30:40 -050015
16- A wide range of tests are made available in this release to help validate
17 the functionality of TF-A.
18
19- Various improvements to test framework and test suite.
20
21TFTF
Paul Beesleyec7988c2019-10-24 11:57:00 +000022~~~~
Madhukar Pappireddy0468ac02019-10-10 02:30:40 -050023
24- Enhancement to xlat table library synchronous to TF-A code base.
25
26- Enabled strict alignment checks (SCTLR.A & SCTLR.SA) in all images.
27
28- Support for a simple console driver. Currently it serves as a placeholder
29 with empty functions.
30
31- A topology helper API is added in the framework to get parent node info.
32
33- Support for FVP with clusters having upto 8 CPUs.
34
35- Enhanced linker script to separate code and RO data sections.
36
37- Relax SMC calls tests. The SMCCC specification recommends Trusted OSes to
38 mitigate the risk of leaking information by either preserving the register
39 state over the call, or returning a constant value, such as zero, in each
40 register. Tests only allowed the former behaviour and have been extended to
41 allow the latter as well.
42
43- Pointer Authentication enabled on warm boot path with individual APIAKey
44 generation for each CPU.
45
46- New tests:
47
48 - Basic unit tests for xlat table library v2.
49
50 - Tests for validating SVE support in TF-A.
51
52 - Stress tests for dynamic xlat table library.
53
54 - PSCI test to measure latencies when turning ON a cluster.
55
56 - Series of AArch64 tests that stress the secure world to leak sensitive
57 counter values.
58
59 - Test to validate PSCI SYSTEM_RESET call.
60
61 - Basic tests to validate Memory Tagging Extensions are being enabled and
62 ensuring no undesired leak of sensitive data occurs.
63
64- Enhanced tests:
65
66 - Improved tests for Pointer Authentication support. Checks are performed
67 to see if pointer authentication keys are accessible as well as validate
68 if secure keys are being leaked after a PSCI version call or TSP call.
69
70 - Improved AMU test to remove unexecuted code iterating over Group1 counters
71 and fix the conditional check of AMU Group0 counter value.
72
73Secure partitions
Paul Beesleyec7988c2019-10-24 11:57:00 +000074~~~~~~~~~~~~~~~~~
Madhukar Pappireddy0468ac02019-10-10 02:30:40 -050075
76A new Secure Partition Quark is introduced in this release.
77
78Quark
Paul Beesleyec7988c2019-10-24 11:57:00 +000079~~~~~
Madhukar Pappireddy0468ac02019-10-10 02:30:40 -050080
81The Quark test secure partition provided is a simple service which returns a
82magic number. Further, a simple test is added to test if Quark is functional.
83
84Issues resolved since last release
Paul Beesleyec7988c2019-10-24 11:57:00 +000085^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Madhukar Pappireddy0468ac02019-10-10 02:30:40 -050086
87- Bug fix in libc memchr implementation.
88
89- Bug fix in calculation of number of CPUs.
90
91- Streamlined SMC WORKAROUND_2 test and fixed a false fail on Cortex-A76 CPU.
92
93- Pointer Authentication support is now available for secondary CPUs and the
94 corresponding tests are stable in this release.
95
96Known issues and limitations
Paul Beesleyec7988c2019-10-24 11:57:00 +000097^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Madhukar Pappireddy0468ac02019-10-10 02:30:40 -050098
99The sections below list the known issues and limitations of each test image
100provided in this repository. Unless and otherwise stated, issues and limitations
101stated in previous release continue to exist in this release.
102
103TFTF
Paul Beesleyec7988c2019-10-24 11:57:00 +0000104~~~~
Madhukar Pappireddy0468ac02019-10-10 02:30:40 -0500105- Multicore spurious interrupt test is observed to have unstable behavior. As a
106 temporary solution, this test is skipped for AArch64 Juno configurations.
107
108- Generating SVE instructions requires `O3` compilation optimization. Since the
109 current build structure does not allow compilation flag modification for
110 specific files, the function which tests support for SVE has been pre-compiled
111 and added as an assembly file.
112
113
Sandrine Bailleux34da0662019-03-28 09:34:55 +0100114
Paul Beesleyec7988c2019-10-24 11:57:00 +0000115Version 2.1
116-----------
Sandrine Bailleux34da0662019-03-28 09:34:55 +0100117
118New features
Paul Beesleyec7988c2019-10-24 11:57:00 +0000119^^^^^^^^^^^^
Sandrine Bailleux34da0662019-03-28 09:34:55 +0100120
121- Add initial support for testing Secure Partition Client Interface (SPCI)
122 and Secure Partition Run-Time (SPRT) standards.
123
124 Exercise the full communication flow throughout the software stack, involving:
125
126 - A Secure-EL0 test partition as the Trusted World agent.
127
128 - TFTF as the Normal World agent.
129
130 - The Secure Partition Manager (SPM) in TF-A.
131
132- Various stability improvements, code refactoring and clean ups.
133
134TFTF
Paul Beesleyec7988c2019-10-24 11:57:00 +0000135~~~~
Sandrine Bailleux34da0662019-03-28 09:34:55 +0100136
137- Reorganize tests build infrastructure to allow the selection of a subset of
138 tests.
139
140- Reorganize the platform layer for improved clarity and simplicity.
141
142- Sanitise inclusion of drivers header files.
143
144- Enhance the test report format for improved clarity and conciseness.
145
146- Dump CPU registers when hitting an unexpected exception. Previously, this
147 would silently loop forever.
148
149- Import libc from TF-A to better align the two code bases.
150
151- New tests:
152
153 - SPM tests for exercising communication through either the MM or SPCI/SPRT
154 interfaces.
155
156 - SMC calling convention tests.
157
158 - Initial tests for Armv8.3 Pointer Authentication support (experimental).
159
160- New platform ports:
161
162 - `Arm SGI-575`_ FVP.
163
164 - Hikey960 board (experimental).
165
166 - `Arm Neoverse Reference Design N1 Edge (RD-N1-Edge)`_ FVP (experimental).
167
168Secure partitions
Paul Beesleyec7988c2019-10-24 11:57:00 +0000169~~~~~~~~~~~~~~~~~
Sandrine Bailleux34da0662019-03-28 09:34:55 +0100170
171We now have 3 Secure Partitions to test the SPM implementation in TF-A.
172
173Cactus-MM
174'''''''''
175
176The Cactus test secure partition provided in version 2.0 has been renamed into
177"*Cactus-MM*". It is still responsible for testing the SPM implementation based
178on the Arm Management Mode Interface.
179
180Cactus
181''''''
182
183This is a new test secure partition (as the former "*Cactus*" has been renamed
184into "*Cactus-MM*", see above).
185
186Unlike *Cactus-MM*, this image tests the SPM implementation based on the SPCI
187and SPRT draft specifications.
188
189It runs in Secure-EL0 and performs the following tasks:
190
191- Test that TF-A has correctly setup the secure partition environment (access
192 to cache maintenance operations, to floating point registers, etc.)
193
194- Test that TF-A accepts to change data access permissions and instruction
195 permissions on behalf of Cactus for memory regions the latter owns.
196
197- Test communication with SPM through SPCI/SPRT interfaces.
198
199Ivy
200'''
201
202This is also a new test secure partition. It is provided in order to test
203multiple partitions support in TF-A. It is derived from Cactus and essentially
204provides the same services but with different identifiers at the moment.
205
206EL3 payload
Paul Beesleyec7988c2019-10-24 11:57:00 +0000207~~~~~~~~~~~
Sandrine Bailleux34da0662019-03-28 09:34:55 +0100208
209- New platform ports:
210
211 - `Arm SGI-575`_ FVP.
212
213 - `Arm Neoverse Reference Design N1 Edge (RD-N1-Edge)`_ FVP (experimental).
214
215Issues resolved since last release
Paul Beesleyec7988c2019-10-24 11:57:00 +0000216^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Sandrine Bailleux34da0662019-03-28 09:34:55 +0100217
218- The GICv2 spurious IRQ test is no longer Juno-specific. It is now only
219 GICv2-specific.
220
221- The manual tests in AArch32 state now work properly. After investigation,
222 we identified that this issue was not AArch32 specific but concerned any
223 test relying on state information persisting across reboots. It was due to
224 an incorrect build configuration.
225
226- Cactus-MM now successfully links with GNU toolchain 7.3.1.
227
228Known issues and limitations
Paul Beesleyec7988c2019-10-24 11:57:00 +0000229^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Sandrine Bailleux34da0662019-03-28 09:34:55 +0100230
231The sections below lists the known issues and limitations of each test image
232provided in this repository.
233
234TFTF
Paul Beesleyec7988c2019-10-24 11:57:00 +0000235~~~~
Sandrine Bailleux34da0662019-03-28 09:34:55 +0100236
237The TFTF test image might be conceptually sub-divided further in 2 parts: the
238tests themselves, and the test framework they are based upon.
239
240Test framework
Paul Beesleyec7988c2019-10-24 11:57:00 +0000241~~~~~~~~~~~~~~
Sandrine Bailleux34da0662019-03-28 09:34:55 +0100242
243- Some stability issues.
244
245- No mechanism to abort tests when they time out (e.g. this could be
246 implemented using a watchdog).
247
248- No convenient way to include or exclude tests on a per-platform basis.
249
250- Power domains and affinity levels are considered equivalent but they may
251 not necessarily be.
252
253- Need to provide better support to alleviate duplication of test code. There
254 are some recurrent test patterns for which helper functions should be
255 provided. For example, bringing up all CPUs on the platform and executing the
256 same function on all of them, or programming an interrupt and waiting for it
257 to trigger.
258
259- Every CPU that participates in a test must return from the test function. If
260 it does not - e.g. because it powered itself off for testing purposes - then
261 the test framework will wait forever for this CPU. This limitation is too
262 restrictive for some tests.
263
264- No protection against interrupted flash operations. If the target is reset
265 while some data is written to flash, the test framework might behave
266 incorrectly on reset.
267
268- When compiling the code, if the generation of the ``tests_list.c`` and/or
269 ``tests_list.h`` files fails, the build process is not aborted immediately
270 and will only fail later on.
271
272- The directory layout requires further improvements. Most of the test
273 framework code has been moved under the ``tftf/`` directory to better isolate
274 it but this effort is not complete. As a result, there are still some TFTF
275 files scattered around.
276
277- Pointer Authentication testing is experimental and incomplete at this stage.
278 It is only enabled on the primary CPU on the cold boot.
279
280Tests
Paul Beesleyec7988c2019-10-24 11:57:00 +0000281~~~~~
Sandrine Bailleux34da0662019-03-28 09:34:55 +0100282
283- Some tests are implemented for AArch64 only and are skipped on AArch32.
284
285- Some tests are not robust enough:
286
287 - Some tests might hang in some circumstances. For example, they might wait
288 forever for a condition to become true.
289
290 - Some tests rely on arbitrary time delays instead of proper synchronization
291 when executing order-sensitive steps.
292
293 - Some tests have been implemented in a practical manner: they seem to work
294 on actual hardware but they make assumptions that are not guaranteed by
295 the Arm architecture. Therefore, they might fail on some other platforms.
296
297- PSCI stress tests are very unreliable and will often hang. The root cause is
298 not known for sure but this might be due to bad synchronization between CPUs.
299
300- The GICv2 spurious IRQ test sometimes fails with the following error message:
301
302 ``SMC @ lead CPU returned 0xFFFFFFFF 0x8 0xC``
303
304 The root cause is unknown.
305
306- The FWU tests take a long time to complete. This is because they wait for the
307 watchdog to reset the system. On FVP, TF-A configures the watchdog period to
308 about 4 min. This limit is excessive for an automated testing context and
309 leaves the user without feedback and unable to determine if the tests are
310 proceeding properly.
311
312- The test "Target timer to a power down cpu" sometimes fails with the
313 following error message:
314
315 ``Expected timer switch: 4 Actual: 3``
316
317 The root cause is unknown.
318
319FWU images
Paul Beesleyec7988c2019-10-24 11:57:00 +0000320~~~~~~~~~~
Sandrine Bailleux34da0662019-03-28 09:34:55 +0100321
322- The FWU tests do not work on the revC of the Base AEM FVP. They only work on
323 the revB.
324
325- NS-BL1U and NS-BL2U images reuse TFTF-specific code for legacy reasons. This
326 is not a clean design and may cause confusion.
327
328Test secure partitions (Cactus, Cactus-MM, Ivy)
Paul Beesleyec7988c2019-10-24 11:57:00 +0000329~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Sandrine Bailleux34da0662019-03-28 09:34:55 +0100330
331- This is experimental code. It's likely to change a lot as the secure
332 partition software architecture evolves.
333
334- Supported on AArch64 FVP platform only.
335
336All test images
Paul Beesleyec7988c2019-10-24 11:57:00 +0000337~~~~~~~~~~~~~~~
Sandrine Bailleux34da0662019-03-28 09:34:55 +0100338
339- TF-A Tests are derived from a fork of TF-A so:
340
341 - they've got some code in common but lag behind on some features.
342
343 - there might still be some irrelevant references to TF-A.
344
345- Some design issues.
346 E.g. TF-A Tests inherited from the I/O layer of TF-A, which still needs a
347 major rework.
348
349- Cannot build TF-A Tests with Clang. Only GCC is supported.
350
351- The build system does not cope well with parallel building. The user should
352 not attempt to run multiple jobs in parallel with the ``-j`` option of `GNU
353 make`.
354
355- The build system does not properly track build options. A clean build must be
356 performed every time a build option changes.
357
358- UUIDs are not compliant to RFC 4122.
359
360- No floating point support. The code is compiled with GCC flag
361 ``-mgeneral-regs-only``, which prevents the compiler from generating code
362 that accesses floating point registers. This might limit some test scenarios.
363
364- The documentation is too lightweight.
365
366- Missing instruction barriers in some places before reading the system counter
367 value. As a result, the CPU could speculatively read it and any delay loop
368 calculations might be off (because based on stale values). We need to examine
369 all such direct reads of the ``CNTPCT_EL0`` register and replace them with a
370 call to ``syscounter_read()`` where appropriate.
371
Paul Beesleyec7988c2019-10-24 11:57:00 +0000372Version 2.0
373-----------
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200374
375New features
Paul Beesleyec7988c2019-10-24 11:57:00 +0000376^^^^^^^^^^^^
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200377
378This is the first public release of the Trusted Firmware-A Tests source code.
379
380TFTF
Paul Beesleyec7988c2019-10-24 11:57:00 +0000381~~~~
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200382
383- Provides a baremetal test framework to exercise TF-A features through its
384 ``SMC`` interface.
385
386- Integrates easily with TF-A: the TFTF binary is packaged in the FIP image
387 as a ``BL33`` component.
388
389- Standalone binary that runs on the target without human intervention (except
390 for some specific tests that require a manual target reset).
391
392- Designed for multi-core testing. The various sub-frameworks allow maximum
393 parallelism in order to stress the firmware.
394
395- Displays test results on the UART output. This may then be parsed by an
396 external tool and integrated in a continuous integration system.
397
398- Supports running in AArch64 (NS-EL2 or NS-EL1) and AArch32 states.
399
400- Supports parsing a tests manifest (XML file) listing the tests to include in
401 the binary.
402
403- Detects most platform features at run time (e.g. topology, GIC version, ...).
404
405- Provides a topology enumeration framework. Allows tests to easily go through
406 affinity levels and power domain nodes.
407
408- Provides an event framework to synchronize CPU operations in a multi-core
409 context.
410
411- Provides a timer framework. Relies on a single global timer to generate
412 interrupts for all CPUs in the system. This allows tests to easily program
413 interrupts on demand to use as a wake-up event source to come out of CPU
414 suspend state for example.
415
416- Provides a power-state enumeration framework. Abstracts the valid power
417 states supported on the platform.
418
419- Provides helper functions for power management operations (CPU hotplug,
420 CPU suspend, system suspend, ...) with proper saving of the hardware state.
421
422- Supports rebooting the platform at the end of each test for greater
423 independence between tests.
424
425- Supports interrupting and resuming a test session. This relies on storing
426 test results in non-volatile memory (e.g. flash).
427
428FWU images
Paul Beesleyec7988c2019-10-24 11:57:00 +0000429~~~~~~~~~~
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200430
431- Provides example code to exercise the Firmware Update feature of TF-A.
432
433- Tests the robustness of the FWU state machine implemented in the TF-A by
434 sending valid and invalid authentication, copy and image execution requests
435 to the TF-A BL1 image.
436
437EL3 test payload
Paul Beesleyec7988c2019-10-24 11:57:00 +0000438~~~~~~~~~~~~~~~~
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200439
440- Tests the ability of TF-A to load an EL3 payload.
441
442Cactus test secure partition
Paul Beesleyec7988c2019-10-24 11:57:00 +0000443~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200444
445- Tests that TF-A has correctly setup the secure partition environment: it
446 should be allowed to perform cache maintenance operations, access floating
447 point registers, etc.
448
449- Tests the ability of a secure partition to request changing data access
450 permissions and instruction permissions of memory regions it owns.
451
452- Tests the ability of a secure partition to handle StandaloneMM requests.
453
454Known issues and limitations
Paul Beesleyec7988c2019-10-24 11:57:00 +0000455^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200456
457The sections below lists the known issues and limitations of each test image
458provided in this repository.
459
460TFTF
Paul Beesleyec7988c2019-10-24 11:57:00 +0000461~~~~
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200462
463The TFTF test image might be conceptually sub-divided further in 2 parts: the
464tests themselves, and the test framework they are based upon.
465
466Test framework
Paul Beesleyec7988c2019-10-24 11:57:00 +0000467~~~~~~~~~~~~~~
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200468
469- Some stability issues.
470
471- No mechanism to abort tests when they time out (e.g. this could be
472 implemented using a watchdog).
473
474- No convenient way to include or exclude tests on a per-platform basis.
475
476- Power domains and affinity levels are considered equivalent but they may
477 not necessarily be.
478
479- Need to provide better support to alleviate duplication of test code. There
480 are some recurrent test patterns for which helper functions should be
481 provided. For example, bringing up all CPUs on the platform and executing the
482 same function on all of them, or programming an interrupt and waiting for it
483 to trigger.
484
485- Every CPU that participates in a test must return from the test function. If
486 it does not - e.g. because it powered itself off for testing purposes - then
487 the test framework will wait forever for this CPU. This limitation is too
488 restrictive for some tests.
489
490- No protection against interrupted flash operations. If the target is reset
491 while some data is written to flash, the test framework might behave
492 incorrectly on reset.
493
494- When compiling the code, if the generation of the tests_list.c and/or
495 tests_list.h files fails, the build process is not aborted immediately and
496 will only fail later on.
497
498- The directory layout is confusing. Most of the test framework code has been
499 moved under the ``tftf/`` directory to better isolate it but this effort is
500 not complete. As a result, there are still some TFTF files scattered around.
501
502Tests
Paul Beesleyec7988c2019-10-24 11:57:00 +0000503~~~~~
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200504
505- Some tests are implemented for AArch64 only and are skipped on AArch32.
506
507- Some tests are not robust enough:
508
509 - Some tests might hang in some circumstances. For example, they might wait
510 forever for a condition to become true.
511
512 - Some tests rely on arbitrary time delays instead of proper synchronization
513 when executing order-sensitive steps.
514
515 - Some tests have been implemented in a practical manner: they seem to work
516 on actual hardware but they make assumptions that are not guaranteed by
517 the Arm architecture. Therefore, they might fail on some other platforms.
518
519- PSCI stress tests are very unreliable and will often hang. The root cause is
520 not known for sure but this might be due to bad synchronization between CPUs.
521
522- The GICv2 spurious IRQ test is Juno-specific. In reality, it should only be
523 GICv2-specific. It should be reworked to remove any platform-specific
524 assumption.
525
526- The GICv2 spurious IRQ test sometimes fails with the following error message:
527
528 ``SMC @ lead CPU returned 0xFFFFFFFF 0x8 0xC``
529
530 The root cause is unknown.
531
532- The manual tests in AArch32 mode do not work properly. They save some state
533 information into non-volatile memory in order to detect the reset reason but
534 this state does not appear to be retained. As a result, these tests keep
535 resetting infinitely.
536
537- The FWU tests take a long time to complete. This is because they wait for the
538 watchdog to reset the system. On FVP, TF-A configures the watchdog period to
539 about 4 min. This is way too long in an automated testing context. Besides,
540 the user gets not feedback, which may let them think that the tests are not
541 working properly.
542
543- The test "Target timer to a power down cpu" sometimes fails with the
544 following error message:
545
546 ``Expected timer switch: 4 Actual: 3``
547
548 The root cause is unknown.
549
550FWU images
Paul Beesleyec7988c2019-10-24 11:57:00 +0000551~~~~~~~~~~
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200552
Sandrine Bailleux7af6c6d2018-10-22 17:09:07 +0200553- The FWU tests do not work on the revC of the Base AEM FVP. They only work on
554 the revB.
555
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200556- NS-BL1U and NS-BL2U images reuse TFTF-specific code for legacy reasons. This
557 is not a clean design and may cause confusion.
558
559Cactus test secure partition
Paul Beesleyec7988c2019-10-24 11:57:00 +0000560~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200561
562- Cactus is experimental code. It's likely to change a lot as the secure
563 partition software architecture evolves.
564
565- Fails to link with GNU toolchain 7.3.1.
566
567- Cactus is supported on AArch64 FVP platform only.
568
569All test images
Paul Beesleyec7988c2019-10-24 11:57:00 +0000570~~~~~~~~~~~~~~~
Sandrine Bailleux3cd87d72018-10-09 11:12:55 +0200571
572- TF-A Tests are derived from a fork of TF-A so:
573
574 - they've got some code in common but lag behind on some features.
575
576 - there might still be some irrelevant references to TF-A.
577
578- Some design issues.
579 E.g. TF-A Tests inherited from the I/O layer of TF-A, which still needs a
580 major rework.
581
582- Cannot build TF-A Tests with Clang. Only GCC is supported.
583
584- The build system does not cope well with parallel building. The user should
585 not attempt to run multiple jobs in parallel with the ``-j`` option of `GNU
586 make`.
587
588- The build system does not properly track build options. A clean build must be
589 performed every time a build option changes.
590
591- SMCCC v2 is not properly supported.
592
593- UUIDs are not compliant to RFC 4122.
594
595- No floating point support. The code is compiled with GCC flag
596 ``-mgeneral-regs-only``, which prevents the compiler from generating code
597 that accesses floating point registers. This might limit some test scenarios.
598
599- The documentation is too lightweight.
600
601--------------
602
Sandrine Bailleux34da0662019-03-28 09:34:55 +0100603*Copyright (c) 2018-2019, Arm Limited. All rights reserved.*
604
605.. _Arm Neoverse Reference Design N1 Edge (RD-N1-Edge): https://developer.arm.com/products/system-design/reference-design/neoverse-reference-design
606.. _Arm SGI-575: https://developer.arm.com/products/system-design/fixed-virtual-platforms