We propose an axiomatic generic framework for modelling weak memory. We show how to instantiate this framework for SC, TSO, C++ restricted to release-acquire atomics, and Power. For Power, we compare our model to a preceding operational model in which we found a flaw. To do so, we define an operational model that we show equivalent to our axiomatic model. We also propose a model for ARM. Our testing on this architecture revealed a behaviour later acknowl-edged as a bug by ARM, and more recently 31 additional anomalies. We offer a new simulation tool, called herd, which allows the user to specify the model of his choice in a concise way. Given a specification of a model, the tool becomes a simulator for that model. The tool relies on an axio...
International audienceConcurrent programs running on weak memory models exhibit re-laxed behaviours,...
Software verification is considered to be a hard computational problem vulnerable to the state explo...
Weak memory models provide a complex, system-centric se- mantics for concurrent programs, while tran...
International audienceThere is a joke where a physicist and a mathematician are asked to herd cats. ...
We present here an axiomatic framework, implemented in the Coq proof assistant, for defining weak me...
Weak memory models formalize the inconsistent behaviors that one can expect to observe in multithrea...
Weak memory models are a consequence of the desire on part of architects to preserve all the uniproc...
When a program is compiled and run on a modern architecture, different optimizations may be applied ...
We present Dartagnan, a bounded model checker (BMC) for concurrent programs under weak memory models...
Weak memory models are used to increase the performance of concurrent programs by allowing program i...
This electronic version was submitted by the student author. The certified thesis is available in th...
We present Dartagnan, a bounded model checker (BMC) for concurrent programs under weak memory models...
Weak memory models formalize the unexpected behavior that one can expect to observe in multi-threade...
To improve efficiency of memory accesses, modern multiprocessor architectures implement a whole rang...
Writing concurrent programs with shared memory is often not trivial. Correctly synchronising the thr...
International audienceConcurrent programs running on weak memory models exhibit re-laxed behaviours,...
Software verification is considered to be a hard computational problem vulnerable to the state explo...
Weak memory models provide a complex, system-centric se- mantics for concurrent programs, while tran...
International audienceThere is a joke where a physicist and a mathematician are asked to herd cats. ...
We present here an axiomatic framework, implemented in the Coq proof assistant, for defining weak me...
Weak memory models formalize the inconsistent behaviors that one can expect to observe in multithrea...
Weak memory models are a consequence of the desire on part of architects to preserve all the uniproc...
When a program is compiled and run on a modern architecture, different optimizations may be applied ...
We present Dartagnan, a bounded model checker (BMC) for concurrent programs under weak memory models...
Weak memory models are used to increase the performance of concurrent programs by allowing program i...
This electronic version was submitted by the student author. The certified thesis is available in th...
We present Dartagnan, a bounded model checker (BMC) for concurrent programs under weak memory models...
Weak memory models formalize the unexpected behavior that one can expect to observe in multi-threade...
To improve efficiency of memory accesses, modern multiprocessor architectures implement a whole rang...
Writing concurrent programs with shared memory is often not trivial. Correctly synchronising the thr...
International audienceConcurrent programs running on weak memory models exhibit re-laxed behaviours,...
Software verification is considered to be a hard computational problem vulnerable to the state explo...
Weak memory models provide a complex, system-centric se- mantics for concurrent programs, while tran...