2017
DOI: 10.1007/978-3-662-54580-5_4
|View full text |Cite
|
Sign up to set email alerts
|

Context-Bounded Analysis for POWER

Abstract: Abstract. We propose an under-approximate reachability analysis algorithm for programs running under the POWER memory model, in the spirit of the work on context-bounded analysis intitiated by Qadeer et al. in 2005 for detecting bugs in concurrent programs (supposed to be running under the classical SC model). To that end, we first introduce a new notion of context-bounding that is suitable for reasoning about computations under POWER, which generalizes the one defined by Atig et al. in 2011 for the TSO memory… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 20 publications
(16 citation statements)
references
References 47 publications
0
15
0
1
Order By: Relevance
“…There are a number of existing concurrency model checking tools, none of which, however, apply to ARMv8 or RISC-V. Alglave et al [8] develop a model checking tool based on axiomatic models for some weaker models including RMO and Power, but not ARMv8, and it does not integrate a substantial ISA model. Abdulla et al [3][4][5] describe efficient model-checking algorithms for hardware models (TSO, PSO, and Power), proved sound for Power. They do not handle ARMv8; for their Nidhugg tool, ARM support is called "partial", under-approximating the behaviours [1], and they do not handle a (Power or ARM) ISA model, but a simple calculus.…”
Section: Related Workmentioning
confidence: 99%
“…There are a number of existing concurrency model checking tools, none of which, however, apply to ARMv8 or RISC-V. Alglave et al [8] develop a model checking tool based on axiomatic models for some weaker models including RMO and Power, but not ARMv8, and it does not integrate a substantial ISA model. Abdulla et al [3][4][5] describe efficient model-checking algorithms for hardware models (TSO, PSO, and Power), proved sound for Power. They do not handle ARMv8; for their Nidhugg tool, ARM support is called "partial", under-approximating the behaviours [1], and they do not handle a (Power or ARM) ISA model, but a simple calculus.…”
Section: Related Workmentioning
confidence: 99%
“…We used the files from the sub-categories shown in Table 1; each row shows the corresponding number of files and lines of code. Table 1 shows the results for the SV-COMP16 versions of CBMC [5], CIVL [26], Lazy-CSeq [13,14], the SV-COMP15 version of MU-CSeq [21], 2 and of IMU-CSeq on these benchmarks. We indicate with pass the number of correctly found bugs, with fail the number of unsuccessful analyses including tool crashes, memory limit hits, and timeouts, and with time the average time in seconds to find the bug.…”
Section: Experimental Evaluationmentioning
confidence: 99%
“…The notion of IMU exactly captures the coherence relation that is often used in the description of memory models (see [6,2]). In our setting, we achieve the reordering of the statements that are observed in the relaxed memory models by guessing the timestamps and then checking their consistency with the expected behaviours.…”
Section: Related Work Conclusion and Future Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Given the high complexity for PS 2.0-rlx and the undecidability of PS 2.0-ra, we next consider a bounded version of the reachability problem. To this end, we propose a parametric under-approximation in the spirit of context bounding [9,33,21,26,24,29,1,3]. The aim of context bounding is to restrict the otherwise unbounded interaction between processes, and has been shown experimentally in the case of SC programs to maintain enough behaviour coverage for bug detection [24,29].…”
Section: Introductionmentioning
confidence: 99%