Server Base System Architecture (SBSA) specification specifies a hardware system architecture based on the Arm 64-bit architecture. Server system software such as operating systems, hypervisors, and firmware rely on this. It addresses processing element features and key aspects of system architecture.
For more information, download the SBSA specification
SBSA Architecture Compliance Suite (ACS) is a collection of self-checking, portable C-based tests. This suite includes a set of examples of the invariant behaviors that are provided by the SBSA specification, so that implementers can verify if these behaviours have been interpreted correctly.
Most of the tests are executed from UEFI Shell by executing the SBSA UEFI shell application. A few tests are executed by running the SBSA ACS Linux application which in turn depends on the SBSA ACS Linux kernel module. The tests can also be executed in a Bare-metal environment. The initialization of the Bare-metal environment is specific to the environment and is out of scope of this document.
Exerciser is a client device wrapped up by PCIe Endpoint. This device is created to meet SBSA requirements for various PCIe capability validation tests. Running the Exerciser tests provides additional test coverage on the platform.
Note: To run the exerciser tests on a UEFI Based platform with Exerciser, the Exerciser PAL API's need to be implemented. For details on the reference Exerciser implementation and support, see the Exerciser.md and Exerciser_API_porting_guide.md
To enable the export of a few kernel APIs that are necessary for PCIe and SMMU tests, Linux kernel module and a kernel patch file are required. These files are available at linux-acs.
Any AARCH64 Enterprise Platform that boots UEFI and Linux OS.
This section details the steps to build standalone SBSA UEFI application and also to build full SBSA image, which includes UEFI, Linux and PMU tests.
For each release prebuilt images are available in the prebuilt_images folder of the master branch. You can choose to use these images or build your own image by following the steps below. If you choose to use the prebuilt image, jump to the test suite execution section below for details on how to run the application.
Before starting the build, ensure that the following requirements are met.
git clone --recursive --branch edk2-stable202402 https://github.com/tianocore/edk2
git clone https://github.com/tianocore/edk2-libc edk2/edk2-libc
git clone https://github.com/ARM-software/sbsa-acs edk2/ShellPkg/Application/sbsa-acs
git clone https://github.com/ARM-software/bsa-acs.git edk2/ShellPkg/Application/bsa-acs
SbsaValLib|ShellPkg/Application/bsa-acs/val/SbsaValLib.inf
SbsaPalLib|ShellPkg/Application/bsa-acs/pal/uefi_acpi/SbsaPalLib.inf
- Add the following to the [components] section of edk2/ShellPkg/ShellPkg.dsc ShellPkg/Application/sbsa-acs/uefi_app/SbsaAvs.inf
tar -xf arm-gnu-toolchain-13.2.rel1-x86_64-aarch64-none-linux-gnu.tar.xz
export GCC49_AARCH64_PREFIX= GCC 13.2 toolchain path pointing to arm-gnu-toolchain-13.2.rel1-x86_64-aarch64-none-linux-gnu/bin/aarch64-none-linux-gnu-
On AArch64 machine
export GCC49_AARCH64_PREFIX=/usr/bin
From inside the edk2 directory in console
export PACKAGES_PATH=$PWD/edk2-libc
source edksetup.sh
make -C BaseTools/Source/C
source ShellPkg/Application/sbsa-acs/tools/scripts/acsbuild.sh
2. Build output
The EFI executable file is generated at
The execution of the compliance suite varies depending on the test environment. These steps assume that the test suite is invoked through the ACS UEFI shell application.
- After [#define ARM_GIC_DEFAULT_PRIORITY 0x80] +#define ARM_GIC_MAX_NUM_INTERRUPT 16384 - Change this in GicV3DxeInitialize Function. -mGicNumInterrupts = ArmGicGetMaxNumInterrupts (mGicDistributorBase); +mGicNumInterrupts = ARM_GIC_MAX_NUM_INTERRUPT;
On a system where a USB port is available and functional, perform the following steps:
shell> Sbsa.efi
On an emulation environment with secondary storage, perform the following steps:
whoami
,gid=whoami
\<name of image>.img /mnt/sbsa.
If loop0 is busy, specify the loop that is freeshell> Sbsa.efi
On an emulation platform where secondary storage is not available, perform the following steps:
shell> Sbsa.efi
Certain PCIe and SMMU tests require Linux operating system.This chapter provides information on building and executing these tests from the Linux application.
This section lists the porting and build steps for the kernel module. The patch for the kernel tree and the Linux PAL are hosted separately on linux-acs repository.
NOTE:
Linux version 6.7 is the recommended version.
Download the below repository to the local
git clone https://gitlab.arm.com/linux-arm/linux-acs
git clone https://github.com/ARM-software/sbsa-acs.git
git clone https://github.com/ARM-software/bsa-acs.git
git clone https://github.com/torvalds/linux.git -b v6.7
Successful completion of above steps will generate Image in
NOTE: The steps mentions Linux version 6.7, as it is latest version which is verified at ACS end.
Successful completion of above steps will generate sbsa_acs.ko in
Successful completion of above steps will generate executable file sbsa in
Before the SBSA ACS Linux application can be run, load the SBSA ACS kernel module using the insmod command.
shell> insmod sbsa_acs.ko
shell> ./sbsa
The Bare-metal build environment is platform specific.
To execute the Bare-metal code from UEFI Shell, checkout to bare-metal branch of SBSA and the build steps to integrate and run the same from UEFI shell are provided in the README.md
For generating SBSA binary to run on Bare-metal environment, perform the following steps
Note: Reference Cmake file for SBSA is present at CMakeLists.txt.
Recommended: CMake v3.17, GCC v12.2
CMake Command Line Options:
-DARM_ARCH_MAJOR = Arch major version. Default value is 9.
-DARM_ARCH_MINOR = Arch minor version. Default value is 0.
-DCROSS_COMPILE = Cross compiler path
-DTARGET = Target platform. Should be same as folder under baremetal/target/
-DBSA_DIR = BSA path for SBSA compilation
On a successful build, .bin, .elf, .img and debug binaries are generated at build/output directory. The output library files will be generated at build/tools/cmake/* of the sbsa-acs directory.
For more details on running the generated binaries on Bare-metal environment, refer README.md
SBSA ACS test suite may run at higher privilege level. An attacker may utilize these tests as a means to elevate privilege which can potentially reveal the platform security assets. To prevent the leakage of secure information, it is strongly recommended that the ACS test suite is run only on development platforms. If it is run on production systems, the system should be scrubbed after running the test suite.
Validating the compliance of certain PCIe rules defined in the SBSA specification requires the PCIe end-point to generate specific stimulus during the runtime of the test. Examples of such stimulus are P2P, PASID, ATC, etc. The tests that requires these stimuli are grouped together in the exerciser module. The exerciser layer is an abstraction layer that enables the integration of hardware capable of generating such stimuli to the test framework. The details of the hardware or Verification IP which enable these exerciser tests are platform specific and are beyond the scope of this document.
The MPAM MSC PCC (ACPI Platform Communication Channel) support has been implemented but not yet verified on any platform. Please raise an issue if any failures or errors are encountered during the ACS run.
Note: To build the ACS with NIST Statistical Test Suite, see the arm SBSA_NIST_User_Guide Document
APIs | Description | Affected tests |
---|---|---|
pal_pcie_dev_p2p_support | Return 0 if the test system PCIe supports peer to peer transaction, else 1 | 856, 857 |
pal_pcie_is_cache_present | Return 1 if the test system supports PCIe address translation cache, else 0 | 852 |
pal_pcie_get_legacy_irq_map | Return 0 if system legacy irq map is filled, else 1 | 850 |
Below exerciser capabilities are required by exerciser test.
Ability to check on BDF and register address seen for each configuration address along with access type.
SBSA Spec Version | ACS Coverage Mapping | SBSA ACS Version | SBSA Tag ID | BSA ACS Version | BSA Tag ID | Pre-Si Support |
---|---|---|---|---|---|---|
SBSA v7.1 | BSA ACS + SBSA ACS | v7.2.0 BETA-0 | v24.03_REL7.2.0_BETA-0 | v1.0.8 | v24.03_SBSA_REL7.2.0_BETA-0 | Yes |
SBSA v7.1 | BSA ACS + SBSA ACS | v7.1.5 | v24.03_REL7.1.5 | v1.0.8 | v24.03_REL1.0.8 | Yes |
SBSA v7.1 | BSA ACS + SBSA ACS | v7.1.4 | v23.12_REL7.1.4 | v1.0.7 | v23.12_REL1.0.7 | Yes |
SBSA v7.1 | BSA ACS + SBSA ACS | v7.1.3 | v23.11_BootFramework | v1.0.6 | v23.11_BootFramework | Yes |
SBSA v7.1 | BSA ACS + SBSA ACS | v7.1.3 | v23.09_REL7.1.3 | v1.0.6 | v23.09_REL1.0.6 | Yes |
SBSA v7.1 | BSA ACS + SBSA ACS | v7.1.2 | v23.07_REL7.1.2 | v1.0.5 | v23.07_REL1.0.5 | Yes |
SBSA v7.1 | BSA ACS + SBSA ACS | v7.1.1 BETA-1 | v23.03_REL7.1.1_BETA-1 | v1.0.4 | v23.03_REL1.0.4 | Yes |
SBSA v7.1 | BSA ACS + SBSA ACS | v7.1.0 BETA-0 | v23.01_REL7.1.0_BETA-0 | v1.0.3 | v23.01_REL1.0.3 | Yes |
SBSA v6.1 | BSA ACS + SBSA ACS | v6.1.0 | v22.10_REL6.1.0 | v1.0.2 | v22.10_REL1.0.2 | Yes |
SBSA v6.0 | SBSA ACS | v3.2 | v22.07_REL3.2 | - | - | Yes |
SBSA v6.0 | SBSA ACS | v3.1 | v21.09_REL3.1 | - | - | Yes |
SBSA v5.0 | SBSA ACS | v2.5 | v20.08_RELv2.5 | - | - | Yes |
SBSA v3.0 | SBSA ACS | v1.6 | v18.12_REL1.7 | - | - | No |
SBSA ACS is distributed under Apache v2.0 License.
Copyright (c) 2018-2024 Arm Limited and Contributors. All rights reserved.