The following table lists the behaviours that are forbidden by the “Pop” model, yet observed on hardware.