%0 Conference Proceedings %T Proving Opacity via Linearizability: A Sound and Complete Method %+ Brunel University London [Uxbridge] %+ University of Sheffield [Sheffield] %A Armstrong, Alasdair %A Dongol, Brijesh %A Doherty, Simon %< avec comité de lecture %( Lecture Notes in Computer Science %B 37th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE) %C Neuchâtel, Switzerland %Y Ahmed Bouajjani %Y Alexandra Silva %I Springer International Publishing %3 Formal Techniques for Distributed Objects, Components, and Systems %V LNCS-10321 %P 50-66 %8 2017-06-19 %D 2017 %R 10.1007/978-3-319-60225-7_4 %Z Computer Science [cs] %Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]Conference papers %X Transactional memory (TM) is a mechanism that manages thread synchronisation on behalf of a programmer so that blocks of code execute with the illusion of atomicity. The main safety criterion for transactional memory is opacity, which defines conditions for serialising concurrent transactions.Verifying opacity is complex because one must not only consider the orderings between fine-grained (and hence concurrent) transactional operations, but also between the transactions themselves. This paper presents a sound and complete method for proving opacity by decomposing the proof into two parts, so that each form of concurrency can be dealt with separately. Thus, in our method, verification involves a simple proof of opacity of a coarse-grained abstraction, and a proof of linearizability, a better-understood correctness condition. The most difficult part of these verifications is dealing with the fine-grained synchronization mechanisms of a given implementation; in our method these aspects are isolated to the linearizability proof. Our result makes it possible to leverage the many sophisticated techniques for proving linearizability that have been developed in recent years. We use our method to prove opacity of two algorithms from the literature. Furthermore, we show that our method extends naturally to weak memory models by showing that both these algorithms are opaque under the TSO memory model, which is the memory model of the (widely deployed) x86 family of processors. All our proofs have been mechanised, either in the Isabelle theorem prover or the PAT model checker. %G English %Z TC 6 %Z WG 6.1 %2 https://inria.hal.science/hal-01658425/document %2 https://inria.hal.science/hal-01658425/file/446833_1_En_4_Chapter.pdf %L hal-01658425 %U https://inria.hal.science/hal-01658425 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC6 %~ IFIP-WG6-1 %~ IFIP-FORTE %~ IFIP-LNCS-10321