xref: /openbmc/linux/tools/memory-model/README (revision e7253313)
1		=====================================
2		LINUX KERNEL MEMORY CONSISTENCY MODEL
3		=====================================
4
5============
6INTRODUCTION
7============
8
9This directory contains the memory consistency model (memory model, for
10short) of the Linux kernel, written in the "cat" language and executable
11by the externally provided "herd7" simulator, which exhaustively explores
12the state space of small litmus tests.
13
14In addition, the "klitmus7" tool (also externally provided) may be used
15to convert a litmus test to a Linux kernel module, which in turn allows
16that litmus test to be exercised within the Linux kernel.
17
18
19============
20REQUIREMENTS
21============
22
23Version 7.52 or higher of the "herd7" and "klitmus7" tools must be
24downloaded separately:
25
26  https://github.com/herd/herdtools7
27
28See "herdtools7/INSTALL.md" for installation instructions.
29
30Note that although these tools usually provide backwards compatibility,
31this is not absolutely guaranteed.  Therefore, if a later version does
32not work, please try using the exact version called out above.
33
34
35==================
36BASIC USAGE: HERD7
37==================
38
39The memory model is used, in conjunction with "herd7", to exhaustively
40explore the state space of small litmus tests.
41
42For example, to run SB+fencembonceonces.litmus against the memory model:
43
44  $ herd7 -conf linux-kernel.cfg litmus-tests/SB+fencembonceonces.litmus
45
46Here is the corresponding output:
47
48  Test SB+fencembonceonces Allowed
49  States 3
50  0:r0=0; 1:r0=1;
51  0:r0=1; 1:r0=0;
52  0:r0=1; 1:r0=1;
53  No
54  Witnesses
55  Positive: 0 Negative: 3
56  Condition exists (0:r0=0 /\ 1:r0=0)
57  Observation SB+fencembonceonces Never 0 3
58  Time SB+fencembonceonces 0.01
59  Hash=d66d99523e2cac6b06e66f4c995ebb48
60
61The "Positive: 0 Negative: 3" and the "Never 0 3" each indicate that
62this litmus test's "exists" clause can not be satisfied.
63
64See "herd7 -help" or "herdtools7/doc/" for more information.
65
66
67=====================
68BASIC USAGE: KLITMUS7
69=====================
70
71The "klitmus7" tool converts a litmus test into a Linux kernel module,
72which may then be loaded and run.
73
74For example, to run SB+fencembonceonces.litmus against hardware:
75
76  $ mkdir mymodules
77  $ klitmus7 -o mymodules litmus-tests/SB+fencembonceonces.litmus
78  $ cd mymodules ; make
79  $ sudo sh run.sh
80
81The corresponding output includes:
82
83  Test SB+fencembonceonces Allowed
84  Histogram (3 states)
85  644580  :>0:r0=1; 1:r0=0;
86  644328  :>0:r0=0; 1:r0=1;
87  711092  :>0:r0=1; 1:r0=1;
88  No
89  Witnesses
90  Positive: 0, Negative: 2000000
91  Condition exists (0:r0=0 /\ 1:r0=0) is NOT validated
92  Hash=d66d99523e2cac6b06e66f4c995ebb48
93  Observation SB+fencembonceonces Never 0 2000000
94  Time SB+fencembonceonces 0.16
95
96The "Positive: 0 Negative: 2000000" and the "Never 0 2000000" indicate
97that during two million trials, the state specified in this litmus
98test's "exists" clause was not reached.
99
100And, as with "herd7", please see "klitmus7 -help" or "herdtools7/doc/"
101for more information.
102
103
104====================
105DESCRIPTION OF FILES
106====================
107
108Documentation/cheatsheet.txt
109	Quick-reference guide to the Linux-kernel memory model.
110
111Documentation/explanation.txt
112	Describes the memory model in detail.
113
114Documentation/recipes.txt
115	Lists common memory-ordering patterns.
116
117Documentation/references.txt
118	Provides background reading.
119
120linux-kernel.bell
121	Categorizes the relevant instructions, including memory
122	references, memory barriers, atomic read-modify-write operations,
123	lock acquisition/release, and RCU operations.
124
125	More formally, this file (1) lists the subtypes of the various
126	event types used by the memory model and (2) performs RCU
127	read-side critical section nesting analysis.
128
129linux-kernel.cat
130	Specifies what reorderings are forbidden by memory references,
131	memory barriers, atomic read-modify-write operations, and RCU.
132
133	More formally, this file specifies what executions are forbidden
134	by the memory model.  Allowed executions are those which
135	satisfy the model's "coherence", "atomic", "happens-before",
136	"propagation", and "rcu" axioms, which are defined in the file.
137
138linux-kernel.cfg
139	Convenience file that gathers the common-case herd7 command-line
140	arguments.
141
142linux-kernel.def
143	Maps from C-like syntax to herd7's internal litmus-test
144	instruction-set architecture.
145
146litmus-tests
147	Directory containing a few representative litmus tests, which
148	are listed in litmus-tests/README.  A great deal more litmus
149	tests are available at https://github.com/paulmckrcu/litmus.
150
151lock.cat
152	Provides a front-end analysis of lock acquisition and release,
153	for example, associating a lock acquisition with the preceding
154	and following releases and checking for self-deadlock.
155
156	More formally, this file defines a performance-enhanced scheme
157	for generation of the possible reads-from and coherence order
158	relations on the locking primitives.
159
160README
161	This file.
162
163scripts	Various scripts, see scripts/README.
164
165
166===========
167LIMITATIONS
168===========
169
170The Linux-kernel memory model (LKMM) has the following limitations:
171
1721.	Compiler optimizations are not accurately modeled.  Of course,
173	the use of READ_ONCE() and WRITE_ONCE() limits the compiler's
174	ability to optimize, but under some circumstances it is possible
175	for the compiler to undermine the memory model.  For more
176	information, see Documentation/explanation.txt (in particular,
177	the "THE PROGRAM ORDER RELATION: po AND po-loc" and "A WARNING"
178	sections).
179
180	Note that this limitation in turn limits LKMM's ability to
181	accurately model address, control, and data dependencies.
182	For example, if the compiler can deduce the value of some variable
183	carrying a dependency, then the compiler can break that dependency
184	by substituting a constant of that value.
185
1862.	Multiple access sizes for a single variable are not supported,
187	and neither are misaligned or partially overlapping accesses.
188
1893.	Exceptions and interrupts are not modeled.  In some cases,
190	this limitation can be overcome by modeling the interrupt or
191	exception with an additional process.
192
1934.	I/O such as MMIO or DMA is not supported.
194
1955.	Self-modifying code (such as that found in the kernel's
196	alternatives mechanism, function tracer, Berkeley Packet Filter
197	JIT compiler, and module loader) is not supported.
198
1996.	Complete modeling of all variants of atomic read-modify-write
200	operations, locking primitives, and RCU is not provided.
201	For example, call_rcu() and rcu_barrier() are not supported.
202	However, a substantial amount of support is provided for these
203	operations, as shown in the linux-kernel.def file.
204
205	a.	When rcu_assign_pointer() is passed NULL, the Linux
206		kernel provides no ordering, but LKMM models this
207		case as a store release.
208
209	b.	The "unless" RMW operations are not currently modeled:
210		atomic_long_add_unless(), atomic_add_unless(),
211		atomic_inc_unless_negative(), and
212		atomic_dec_unless_positive().  These can be emulated
213		in litmus tests, for example, by using atomic_cmpxchg().
214
215	c.	The call_rcu() function is not modeled.  It can be
216		emulated in litmus tests by adding another process that
217		invokes synchronize_rcu() and the body of the callback
218		function, with (for example) a release-acquire from
219		the site of the emulated call_rcu() to the beginning
220		of the additional process.
221
222	d.	The rcu_barrier() function is not modeled.  It can be
223		emulated in litmus tests emulating call_rcu() via
224		(for example) a release-acquire from the end of each
225		additional call_rcu() process to the site of the
226		emulated rcu-barrier().
227
228	e.	Although sleepable RCU (SRCU) is now modeled, there
229		are some subtle differences between its semantics and
230		those in the Linux kernel.  For example, the kernel
231		might interpret the following sequence as two partially
232		overlapping SRCU read-side critical sections:
233
234			 1  r1 = srcu_read_lock(&my_srcu);
235			 2  do_something_1();
236			 3  r2 = srcu_read_lock(&my_srcu);
237			 4  do_something_2();
238			 5  srcu_read_unlock(&my_srcu, r1);
239			 6  do_something_3();
240			 7  srcu_read_unlock(&my_srcu, r2);
241
242		In contrast, LKMM will interpret this as a nested pair of
243		SRCU read-side critical sections, with the outer critical
244		section spanning lines 1-7 and the inner critical section
245		spanning lines 3-5.
246
247		This difference would be more of a concern had anyone
248		identified a reasonable use case for partially overlapping
249		SRCU read-side critical sections.  For more information,
250		please see: https://paulmck.livejournal.com/40593.html
251
252	f.	Reader-writer locking is not modeled.  It can be
253		emulated in litmus tests using atomic read-modify-write
254		operations.
255
256The "herd7" tool has some additional limitations of its own, apart from
257the memory model:
258
2591.	Non-trivial data structures such as arrays or structures are
260	not supported.	However, pointers are supported, allowing trivial
261	linked lists to be constructed.
262
2632.	Dynamic memory allocation is not supported, although this can
264	be worked around in some cases by supplying multiple statically
265	allocated variables.
266
267Some of these limitations may be overcome in the future, but others are
268more likely to be addressed by incorporating the Linux-kernel memory model
269into other tools.
270
271Finally, please note that LKMM is subject to change as hardware, use cases,
272and compilers evolve.
273