Proceedings of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation 2012
DOI: 10.1145/2254064.2254115
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic synthesis for relaxed memory models

Abstract: Modern architectures implement relaxed memory models which may reorder memory operations or execute them non-atomically. Special instructions called memory fences are provided, allowing control of this behavior.To implement a concurrent algorithm for a modern architecture, the programmer is forced to manually reason about subtle relaxed behaviors and figure out ways to control these behaviors by adding fences to the program. Not only is this process time consuming and error-prone, but it has to be repeated eve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 51 publications
(44 citation statements)
references
References 34 publications
0
44
0
Order By: Relevance
“…To some extent, decidability and verification papers Burckhardt et al 2007;Atig et al 2010Atig et al , 2011Atig et al , 2012Bouajjani et al , 2013Kuperstein et al 2010Kuperstein et al , 2011Liu et al 2012;Abdulla et al 2012Abdulla et al , 2013 do provide some general principles about weak memory, although we find them less directly applicable Adir et al [2003] axiomatic based on discussion with IBM architects; precumulative barriers axiomatic based on documentation; not tested on h/w and single-event axiomatic based on extensive testing; semantics of lwsync stronger than on r+lwsync+sync, weaker on mp+lwsync+addr operational based on discussion with IBM architects and extensive testing; flawed w.r.t. Power h/w on, e.g., mp+lwsync+addr-po-detour (see Fig.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To some extent, decidability and verification papers Burckhardt et al 2007;Atig et al 2010Atig et al , 2011Atig et al , 2012Bouajjani et al , 2013Kuperstein et al 2010Kuperstein et al , 2011Liu et al 2012;Abdulla et al 2012Abdulla et al , 2013 do provide some general principles about weak memory, although we find them less directly applicable Adir et al [2003] axiomatic based on discussion with IBM architects; precumulative barriers axiomatic based on documentation; not tested on h/w and single-event axiomatic based on extensive testing; semantics of lwsync stronger than on r+lwsync+sync, weaker on mp+lwsync+addr operational based on discussion with IBM architects and extensive testing; flawed w.r.t. Power h/w on, e.g., mp+lwsync+addr-po-detour (see Fig.…”
Section: Related Workmentioning
confidence: 99%
“…This problem has been studied before for TSO and its siblings PSO and RMO (e.g., see Kuperstein et al [2010], Bouajjani et al [ , 2013, and Liu et al [2012]), or for previous versions of the Power model .…”
Section: Fences and Propagation On Power And Armmentioning
confidence: 99%
“…We formalize the correspondence to C/C++ in [12, §D]. In the future, this correspondence may open the door to applying technology developed for shared-memory models to eventually consistent systems; promising directions include model checking [3,9], automatic inference of required consistency levels [26] and compositional reasoning [4].…”
Section: Store Correctness and Consistency Axiomsmentioning
confidence: 99%
“…However, the Cilk THE and Chase-Lev work stealing algorithms are not linearizable under TSO [30]. For example, a put() may be delayed in the worker's store buffer and missed by a thief, causing a linearizability violation as the following Chase-Lev execution shows:…”
Section: Linearizability Of Work Stealing Algorithmsmentioning
confidence: 99%
“…Therefore, while adding a fence before the put() completes fixes these violations [30], deployed work stealing implementations do not do so.…”
Section: Linearizability Of Work Stealing Algorithmsmentioning
confidence: 99%