About the Execution of ITS-Tools for QuasiCertifProtocol-COL-02
Execution Summary | |||||
Max Memory Used (MB) |
Time wait (ms) | CPU Usage (ms) | I/O Wait (ms) | Computed Result | Execution Status |
311.060 | 6097.00 | 12259.00 | 283.80 | FTFTFFFFTTFTFTTT | normal |
Execution Chart
We display below the execution chart for this examination (boot time has been removed).
Trace from the execution
Waiting for the VM to be ready (probing ssh)
.............
=====================================================================
Generated by BenchKit 2-3254
Executing tool itstools
Input is QuasiCertifProtocol-COL-02, examination is CTLFireability
Time confinement is 3600 seconds
Memory confinement is 16384 MBytes
Number of cores is 4
Run identifier is r060-smll-149440927900193
=====================================================================
--------------------
content from stdout:
=== Data for post analysis generated by BenchKit (invocation template)
The expected result is a vector of booleans
BOOL_VECTOR
here is the order used to build the result vector(from text file)
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-0
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-1
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-10
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-11
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-12
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-13
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-14
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-15
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-2
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-3
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-4
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-5
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-6
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-7
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-8
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-9
=== Now, execution of the tool begins
BK_START 1496378642069
its-ctl command run as :
/home/mcc/BenchKit/eclipse/plugins/fr.lip6.move.gal.itstools.binaries_1.0.0.201705302212/bin/its-ctl-linux64 --gc-threshold 2000000 --quiet -i /home/mcc/execution/CTLFireability.pnml.gal -t CGAL -ctl /home/mcc/execution/CTLFireability.ctl
No direction supplied, using forward translation only.
Parsed 16 CTL formulae.
Model ,|S| ,Time ,Mem(kb) ,fin. SDD ,fin. DDD ,peak SDD ,peak DDD ,SDD Hom ,SDD cache peak ,DDD Hom ,DDD cachepeak ,SHom cache
reachable,1029,0.058213,6100,793,200,3585,677,199,1680,86,2226,0
Converting to forward existential form...Done !
original formula: (AX(!(((((tsid0.s5_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.s5_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.s5_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (a5.a5[0]>=1 + (((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s6_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s6_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s6_2>=1)))))) * ((!(AF(a4.a4[0]>=1)) + (EF(a4.a4[0]>=1) + (((tsid0.s4_0>=1 + tsid1.s4_1>=1) + tsid2.s4_2>=1) + (Astart.Astart[0]>=1 * (((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s2_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s2_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s2_2>=1)))))) * AF(((((((tsid0.c1_0>=1 * tsidxtsid3.n9_3>=1) * tsidxtsid6.n9_6>=1) * tsidxtsid0.n9_0>=1) + (((tsid1.c1_1>=1 * tsidxtsid4.n9_4>=1) * tsidxtsid7.n9_7>=1) * tsidxtsid1.n9_1>=1)) + (((tsid2.c1_2>=1 * tsidxtsid5.n9_5>=1) * tsidxtsid8.n9_8>=1) * tsidxtsid2.n9_2>=1)) * Astart.Astart[0]>=1))))
=> equivalent forward existential formula: ([(EY(Init) * ((((tsid0.s5_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.s5_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.s5_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (a5.a5[0]>=1 + (((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s6_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s6_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s6_2>=1)))))] = FALSE * ([((Init * !((E(TRUE U a4.a4[0]>=1) + (((tsid0.s4_0>=1 + tsid1.s4_1>=1) + tsid2.s4_2>=1) + (Astart.Astart[0]>=1 * (((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s2_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s2_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s2_2>=1))))))) * !(EG(!(a4.a4[0]>=1))))] = FALSE * [FwdG(Init,!(((((((tsid0.c1_0>=1 * tsidxtsid3.n9_3>=1) * tsidxtsid6.n9_6>=1) * tsidxtsid0.n9_0>=1) + (((tsid1.c1_1>=1 * tsidxtsid4.n9_4>=1) * tsidxtsid7.n9_7>=1) * tsidxtsid1.n9_1>=1)) + (((tsid2.c1_2>=1 * tsidxtsid5.n9_5>=1) * tsidxtsid8.n9_8>=1) * tsidxtsid2.n9_2>=1)) * Astart.Astart[0]>=1)))] = FALSE))
(forward)formula 0,0,0.271687,14124,1,0,18525,3494,1044,16646,434,18783,55865
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-0 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !
***************************************
original formula: EG((EG((((tsid0.s2_0>=1 * tsid0.n3_0>=1) + (tsid1.s2_1>=1 * tsid1.n3_1>=1)) + (tsid2.s2_2>=1 * tsid2.n3_2>=1))) + !(EX(a5.a5[0]>=1))))
=> equivalent forward existential formula: [FwdG(Init,(EG((((tsid0.s2_0>=1 * tsid0.n3_0>=1) + (tsid1.s2_1>=1 * tsid1.n3_1>=1)) + (tsid2.s2_2>=1 * tsid2.n3_2>=1))) + !(EX(a5.a5[0]>=1))))] != FALSE
(forward)formula 1,1,0.284838,14444,1,0,19764,3501,1069,17869,436,19097,59590
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-1 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !
***************************************
original formula: EG((!(EX(a4.a4[0]>=1)) + EF(((((tsid0.s5_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.s5_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.s5_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + a2.a2[0]>=1))))
=> equivalent forward existential formula: [FwdG(Init,(!(EX(a4.a4[0]>=1)) + E(TRUE U ((((tsid0.s5_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.s5_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.s5_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + a2.a2[0]>=1))))] != FALSE
(forward)formula 2,1,0.359972,17128,1,0,26668,3583,1190,24115,450,19339,78017
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-2 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !
***************************************
original formula: !(A(AF(a2.a2[0]>=1) U ((a2.a2[0]>=1 + (((tsid0.s2_0>=1 * tsid0.n3_0>=1) + (tsid1.s2_1>=1 * tsid1.n3_1>=1)) + (tsid2.s2_2>=1 * tsid2.n3_2>=1))) * !(a2.a2[0]>=1))))
=> equivalent forward existential formula: ([FwdG((FwdU(Init,!(((a2.a2[0]>=1 + (((tsid0.s2_0>=1 * tsid0.n3_0>=1) + (tsid1.s2_1>=1 * tsid1.n3_1>=1)) + (tsid2.s2_2>=1 * tsid2.n3_2>=1))) * !(a2.a2[0]>=1)))) * !(((a2.a2[0]>=1 + (((tsid0.s2_0>=1 * tsid0.n3_0>=1) + (tsid1.s2_1>=1 * tsid1.n3_1>=1)) + (tsid2.s2_2>=1 * tsid2.n3_2>=1))) * !(a2.a2[0]>=1)))),!(a2.a2[0]>=1))] != FALSE + [FwdG(Init,!(((a2.a2[0]>=1 + (((tsid0.s2_0>=1 * tsid0.n3_0>=1) + (tsid1.s2_1>=1 * tsid1.n3_1>=1)) + (tsid2.s2_2>=1 * tsid2.n3_2>=1))) * !(a2.a2[0]>=1))))] != FALSE)
(forward)formula 3,1,0.365722,17388,1,0,26895,3583,1240,24395,451,19339,79096
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-3 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !
***************************************
original formula: AF((((tsid2.n2_2>=1 * tsid1.n2_1>=1) * tsid0.n2_0>=1) * a1.a1[0]>=1))
=> equivalent forward existential formula: [FwdG(Init,!((((tsid2.n2_2>=1 * tsid1.n2_1>=1) * tsid0.n2_0>=1) * a1.a1[0]>=1)))] = FALSE
(forward)formula 4,0,0.368391,17516,1,0,26986,3583,1276,24541,451,19339,79732
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-4 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !
***************************************
original formula: EX(((((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s2_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s2_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s2_2>=1)) + !(AF(((tsid0.s4_0>=1 + tsid1.s4_1>=1) + tsid2.s4_2>=1)))))
=> equivalent forward existential formula: ([(EY(Init) * (((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s2_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s2_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s2_2>=1)))] != FALSE + [FwdG(EY(Init),!(((tsid0.s4_0>=1 + tsid1.s4_1>=1) + tsid2.s4_2>=1)))] != FALSE)
(forward)formula 5,1,0.375954,17556,1,0,27536,3583,1311,25125,451,19345,81753
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-5 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !
***************************************
original formula: AG(EG(EF((((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s6_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s6_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s6_2>=1)))))
=> equivalent forward existential formula: [(FwdU(Init,TRUE) * !(EG(E(TRUE U (((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s6_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s6_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s6_2>=1))))))] = FALSE
(forward)formula 6,0,0.383469,17900,1,0,27685,3583,1330,25297,451,19345,82678
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-6 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !
***************************************
original formula: ((!((a3.a3[0]>=1 * AX(((tsid0.s6_0>=1 + tsid1.s6_1>=1) + tsid2.s6_2>=1)))) + (((((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s2_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s2_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s2_2>=1)) + (((a3.a3[0]>=1 * tsid1.n4_1>=1) * tsid2.n4_2>=1) * tsid0.n4_0>=1)) + (a3.a3[0]>=1 * (((tsid0.s2_0>=1 * tsid0.n3_0>=1) + (tsid1.s2_1>=1 * tsid1.n3_1>=1)) + (tsid2.s2_2>=1 * tsid2.n3_2>=1))))) * (!(AF((((((tsidxtsid0.n7_0>=1 * tsidxtsid6.n7_6>=1) * tsidxtsid3.n7_3>=1) * tsid0.Cstart_0>=1) + (((tsidxtsid1.n7_1>=1 * tsidxtsid7.n7_7>=1) * tsidxtsid4.n7_4>=1) * tsid1.Cstart_1>=1)) + (((tsidxtsid2.n7_2>=1 * tsidxtsid8.n7_8>=1) * tsidxtsid5.n7_5>=1) * tsid2.Cstart_2>=1)))) * (!((((tsid0.s2_0>=1 * tsid0.n3_0>=1) + (tsid1.s2_1>=1 * tsid1.n3_1>=1)) + (tsid2.s2_2>=1 * tsid2.n3_2>=1))) + (a4.a4[0]>=1 + (((((tsid0.c1_0>=1 * tsidxtsid3.n9_3>=1) * tsidxtsid6.n9_6>=1) * tsidxtsid0.n9_0>=1) + (((tsid1.c1_1>=1 * tsidxtsid4.n9_4>=1) * tsidxtsid7.n9_7>=1) * tsidxtsid1.n9_1>=1)) + (((tsid2.c1_2>=1 * tsidxtsid5.n9_5>=1) * tsidxtsid8.n9_8>=1) * tsidxtsid2.n9_2>=1))))))
=> equivalent forward existential formula: [FwdG(((Init * (!((a3.a3[0]>=1 * !(EX(!(((tsid0.s6_0>=1 + tsid1.s6_1>=1) + tsid2.s6_2>=1)))))) + (((((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s2_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s2_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s2_2>=1)) + (((a3.a3[0]>=1 * tsid1.n4_1>=1) * tsid2.n4_2>=1) * tsid0.n4_0>=1)) + (a3.a3[0]>=1 * (((tsid0.s2_0>=1 * tsid0.n3_0>=1) + (tsid1.s2_1>=1 * tsid1.n3_1>=1)) + (tsid2.s2_2>=1 * tsid2.n3_2>=1)))))) * (!((((tsid0.s2_0>=1 * tsid0.n3_0>=1) + (tsid1.s2_1>=1 * tsid1.n3_1>=1)) + (tsid2.s2_2>=1 * tsid2.n3_2>=1))) + (a4.a4[0]>=1 + (((((tsid0.c1_0>=1 * tsidxtsid3.n9_3>=1) * tsidxtsid6.n9_6>=1) * tsidxtsid0.n9_0>=1) + (((tsid1.c1_1>=1 * tsidxtsid4.n9_4>=1) * tsidxtsid7.n9_7>=1) * tsidxtsid1.n9_1>=1)) + (((tsid2.c1_2>=1 * tsidxtsid5.n9_5>=1) * tsidxtsid8.n9_8>=1) * tsidxtsid2.n9_2>=1))))),!((((((tsidxtsid0.n7_0>=1 * tsidxtsid6.n7_6>=1) * tsidxtsid3.n7_3>=1) * tsid0.Cstart_0>=1) + (((tsidxtsid1.n7_1>=1 * tsidxtsid7.n7_7>=1) * tsidxtsid4.n7_4>=1) * tsid1.Cstart_1>=1)) + (((tsidxtsid2.n7_2>=1 * tsidxtsid8.n7_8>=1) * tsidxtsid5.n7_5>=1) * tsid2.Cstart_2>=1))))] != FALSE
(forward)formula 7,1,0.418577,18424,1,0,29188,3631,1407,26799,451,19504,87721
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-7 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !
***************************************
original formula: !(AF(EG(((((tsid0.s3_0>=1 * tsid0.n5_0>=1) + (tsid1.s3_1>=1 * tsid1.n5_1>=1)) + (tsid2.s3_2>=1 * tsid2.n5_2>=1)) + (((((tsidxtsid0.n7_0>=1 * tsidxtsid6.n7_6>=1) * tsidxtsid3.n7_3>=1) * tsid0.Cstart_0>=1) + (((tsidxtsid1.n7_1>=1 * tsidxtsid7.n7_7>=1) * tsidxtsid4.n7_4>=1) * tsid1.Cstart_1>=1)) + (((tsidxtsid2.n7_2>=1 * tsidxtsid8.n7_8>=1) * tsidxtsid5.n7_5>=1) * tsid2.Cstart_2>=1))))))
=> equivalent forward existential formula: [FwdG(Init,!(EG(((((tsid0.s3_0>=1 * tsid0.n5_0>=1) + (tsid1.s3_1>=1 * tsid1.n5_1>=1)) + (tsid2.s3_2>=1 * tsid2.n5_2>=1)) + (((((tsidxtsid0.n7_0>=1 * tsidxtsid6.n7_6>=1) * tsidxtsid3.n7_3>=1) * tsid0.Cstart_0>=1) + (((tsidxtsid1.n7_1>=1 * tsidxtsid7.n7_7>=1) * tsidxtsid4.n7_4>=1) * tsid1.Cstart_1>=1)) + (((tsidxtsid2.n7_2>=1 * tsidxtsid8.n7_8>=1) * tsidxtsid5.n7_5>=1) * tsid2.Cstart_2>=1))))))] != FALSE
(forward)formula 8,1,0.42562,18832,1,0,29249,3634,1433,26913,453,19511,88423
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-8 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !
***************************************
original formula: EG(EF((!((((tsid0.s5_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.s5_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.s5_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1))) + ((((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s2_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s2_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s2_2>=1)) * (((((tsid0.s5_0>=1 * tsidxtsid1.n8_1>=1) * tsidxtsid0.n8_0>=1) * tsidxtsid2.n8_2>=1) + (((tsid1.s5_1>=1 * tsidxtsid4.n8_4>=1) * tsidxtsid3.n8_3>=1) * tsidxtsid5.n8_5>=1)) + (((tsid2.s5_2>=1 * tsidxtsid7.n8_7>=1) * tsidxtsid6.n8_6>=1) * tsidxtsid8.n8_8>=1))))))
=> equivalent forward existential formula: [FwdG(Init,E(TRUE U (!((((tsid0.s5_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.s5_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.s5_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1))) + ((((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s2_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s2_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s2_2>=1)) * (((((tsid0.s5_0>=1 * tsidxtsid1.n8_1>=1) * tsidxtsid0.n8_0>=1) * tsidxtsid2.n8_2>=1) + (((tsid1.s5_1>=1 * tsidxtsid4.n8_4>=1) * tsidxtsid3.n8_3>=1) * tsidxtsid5.n8_5>=1)) + (((tsid2.s5_2>=1 * tsidxtsid7.n8_7>=1) * tsidxtsid6.n8_6>=1) * tsidxtsid8.n8_8>=1))))))] != FALSE
(forward)formula 9,1,0.445661,18976,1,0,29383,3649,1471,27247,453,19533,91008
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-9 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !
***************************************
original formula: AX(AX(AF(Astart.Astart[0]>=1)))
=> equivalent forward existential formula: [FwdG(EY(EY(Init)),!(Astart.Astart[0]>=1))] = FALSE
(forward)formula 10,0,0.450865,19236,1,0,29449,3649,1507,27423,456,19564,92676
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-10 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !
***************************************
original formula: AG(((((tsid2.n2_2>=1 * tsid1.n2_1>=1) * tsid0.n2_0>=1) * a1.a1[0]>=1) + !(EG(((tsid0.s6_0>=1 + tsid1.s6_1>=1) + tsid2.s6_2>=1)))))
=> equivalent forward existential formula: [FwdG((FwdU(Init,TRUE) * !((((tsid2.n2_2>=1 * tsid1.n2_1>=1) * tsid0.n2_0>=1) * a1.a1[0]>=1))),((tsid0.s6_0>=1 + tsid1.s6_1>=1) + tsid2.s6_2>=1))] = FALSE
dead was empty
(forward)formula 11,1,0.452437,19248,1,0,29477,3652,1507,27520,456,19567,92772
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-11 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !
***************************************
original formula: EF(EG((((tsid0.Sstart_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.Sstart_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.Sstart_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1))))
=> equivalent forward existential formula: [FwdG(FwdU(Init,TRUE),(((tsid0.Sstart_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.Sstart_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.Sstart_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1)))] != FALSE
dead was empty
(forward)formula 12,0,0.453801,19480,1,0,29481,3652,1523,27533,456,19567,92948
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-12 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !
***************************************
original formula: AF((EX((((tsid0.s6_0>=1 + tsid1.s6_1>=1) + tsid2.s6_2>=1) + (((tsid0.c1_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.c1_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.c1_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1)))) * (((tsid0.Sstart_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.Sstart_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.Sstart_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1))))
=> equivalent forward existential formula: [FwdG(Init,!((EX((((tsid0.s6_0>=1 + tsid1.s6_1>=1) + tsid2.s6_2>=1) + (((tsid0.c1_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.c1_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.c1_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1)))) * (((tsid0.Sstart_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.Sstart_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.Sstart_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1)))))] = FALSE
(forward)formula 13,0,0.462938,19488,1,0,30021,3652,1538,28071,456,19586,94448
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-13 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !
***************************************
original formula: AX((AF((((tsid0.s5_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.s5_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.s5_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1))) + a5.a5[0]>=1))
=> equivalent forward existential formula: [FwdG((EY(Init) * !(a5.a5[0]>=1)),!((((tsid0.s5_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.s5_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.s5_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1))))] = FALSE
(forward)formula 14,0,0.469858,19516,1,0,30713,3652,1549,28685,456,19656,96103
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-14 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !
***************************************
original formula: AG(AF((((((tsid0.c1_0>=1 * tsidxtsid3.n9_3>=1) * tsidxtsid6.n9_6>=1) * tsidxtsid0.n9_0>=1) + (((tsid1.c1_1>=1 * tsidxtsid4.n9_4>=1) * tsidxtsid7.n9_7>=1) * tsidxtsid1.n9_1>=1)) + (((tsid2.c1_2>=1 * tsidxtsid5.n9_5>=1) * tsidxtsid8.n9_8>=1) * tsidxtsid2.n9_2>=1))))
=> equivalent forward existential formula: [FwdG(FwdU(Init,TRUE),!((((((tsid0.c1_0>=1 * tsidxtsid3.n9_3>=1) * tsidxtsid6.n9_6>=1) * tsidxtsid0.n9_0>=1) + (((tsid1.c1_1>=1 * tsidxtsid4.n9_4>=1) * tsidxtsid7.n9_7>=1) * tsidxtsid1.n9_1>=1)) + (((tsid2.c1_2>=1 * tsidxtsid5.n9_5>=1) * tsidxtsid8.n9_8>=1) * tsidxtsid2.n9_2>=1))))] = FALSE
(forward)formula 15,0,0.479217,19736,1,0,30875,3652,1560,28863,456,19656,96902
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-15 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !
***************************************
Exit code :0
BK_STOP 1496378648166
--------------------
content from stderr:
+ export BINDIR=/home/mcc/BenchKit/
+ BINDIR=/home/mcc/BenchKit/
++ pwd
+ export MODEL=/home/mcc/execution
+ MODEL=/home/mcc/execution
+ [[ CTLFireability = StateSpace ]]
+ /home/mcc/BenchKit//runeclipse.sh /home/mcc/execution CTLFireability -its -ltsminpath /home/mcc/BenchKit//lts_install_dir/ -smt
+ ulimit -s 65536
+ java -Dosgi.requiredJavaVersion=1.6 -Xss8m -Xms40m -Xmx8192m -Declipse.pde.launch=true -Dfile.encoding=UTF-8 -classpath /home/mcc/BenchKit//eclipse/plugins/org.eclipse.equinox.launcher_1.3.201.v20161025-1711.jar org.eclipse.equinox.launcher.Main -application fr.lip6.move.gal.application.pnmcc -data /home/mcc/BenchKit//workspace -os linux -ws gtk -arch x86_64 -nl en_US -consoleLog -pnfolder /home/mcc/execution -examination CTLFireability -yices2path /home/mcc/BenchKit//yices/bin/yices -its -ltsminpath /home/mcc/BenchKit//lts_install_dir/ -smt
Jun 02, 2017 4:44:04 AM fr.lip6.move.gal.application.MccTranslator transformPNML
INFO: Parsing pnml file : /home/mcc/execution/model.pnml
Jun 02, 2017 4:44:04 AM fr.lip6.move.gal.pnml.togal.PnmlToGalTransformer transform
INFO: Detected file is not PT type :http://www.pnml.org/version-2009/grammar/symmetricnet
Jun 02, 2017 4:44:06 AM fr.lip6.move.gal.pnml.togal.PnmlToGalTransformer transform
INFO: Load time of PNML (colored model parsed with PNMLFW) : 1870 ms
Jun 02, 2017 4:44:06 AM fr.lip6.move.gal.pnml.togal.HLGALTransformer handlePage
INFO: Transformed 30 places.
Jun 02, 2017 4:44:06 AM fr.lip6.move.gal.pnml.togal.HLGALTransformer handlePage
INFO: Computed order using colors.
Jun 02, 2017 4:44:06 AM fr.lip6.move.gal.pnml.togal.HLGALTransformer handlePage
INFO: sort/places :tsidxtsid->n9,n8,n7,
Dot->malicious_reservoir,CstopAbort,SstopAbort,AstopAbort,a5,a4,a3,a2,a1,Astart,AstopOK,
tsid->n6,n5,n4,n3,n2,n1,c1,Cstart,Sstart,s2,s3,s4,s5,s6,SstopOK,CstopOK,
Jun 02, 2017 4:44:06 AM fr.lip6.move.gal.pnml.togal.HLGALTransformer handlePage
INFO: Transformed 26 transitions.
Jun 02, 2017 4:44:06 AM fr.lip6.move.gal.pnml.togal.PnmlToGalTransformer transform
INFO: Computed order based on color domains.
Jun 02, 2017 4:44:06 AM fr.lip6.move.gal.application.MccTranslator applyOrder
INFO: Applying decomposition
Jun 02, 2017 4:44:06 AM fr.lip6.move.gal.instantiate.CompositeBuilder decomposeWithOrder
INFO: Decomposing Gal with order
Jun 02, 2017 4:44:06 AM fr.lip6.move.gal.instantiate.GALRewriter flatten
INFO: Flatten gal took : 75 ms
Jun 02, 2017 4:44:07 AM fr.lip6.move.gal.instantiate.CompositeBuilder rewriteArraysToAllowPartition
INFO: Rewriting arrays n9, n8, n7, n6, n5, n4, n3, n2, n1, c1, Cstart, Sstart, s2, s3, s4, s5, s6, SstopOK, CstopOK to variables to allow decomposition.
Jun 02, 2017 4:44:07 AM fr.lip6.move.gal.instantiate.Instantiator fuseIsomorphicEffects
INFO: Removed a total of 20 redundant transitions.
Jun 02, 2017 4:44:07 AM fr.lip6.move.serialization.SerializationUtil systemToFile
INFO: Time to serialize gal into /home/mcc/execution/CTLFireability.pnml.gal : 13 ms
Jun 02, 2017 4:44:07 AM fr.lip6.move.serialization.SerializationUtil serializePropertiesForITSCTLTools
INFO: Time to serialize properties into /home/mcc/execution/CTLFireability.ctl : 3 ms
Jun 02, 2017 4:44:08 AM fr.lip6.move.gal.itstools.Runner runTool
INFO: Standard error output from running tool CommandLine [args=[/home/mcc/BenchKit/eclipse/plugins/fr.lip6.move.gal.itstools.binaries_1.0.0.201705302212/bin/its-ctl-linux64, --gc-threshold, 2000000, --quiet, -i, /home/mcc/execution/CTLFireability.pnml.gal, -t, CGAL, -ctl, /home/mcc/execution/CTLFireability.ctl], workingDir=/home/mcc/execution]
built 25 ordering constraints for composite.
Reverse transition relation is NOT exact ! Due to transitions malC1, malS6, malS5, malS4, malS3, malS2, malS1, malA5, malA3, malA4, malA2, malA1, Intersection with reachable at each step enabled. (destroyed/reverse/intersect/total) :0/30/12/42
Sequence of Actions to be Executed by the VM
This is useful if one wants to reexecute the tool in the VM from the submitted image disk.
set -x
# this is for BenchKit: configuration of major elements for the test
export BK_INPUT="QuasiCertifProtocol-COL-02"
export BK_EXAMINATION="CTLFireability"
export BK_TOOL="itstools"
export BK_RESULT_DIR="/tmp/BK_RESULTS/OUTPUTS"
export BK_TIME_CONFINEMENT="3600"
export BK_MEMORY_CONFINEMENT="16384"
# this is specific to your benchmark or test
export BIN_DIR="$HOME/BenchKit/bin"
# remove the execution directoty if it exists (to avoid increse of .vmdk images)
if [ -d execution ] ; then
rm -rf execution
fi
tar xzf /home/mcc/BenchKit/INPUTS/QuasiCertifProtocol-COL-02.tgz
mv QuasiCertifProtocol-COL-02 execution
# this is for BenchKit: explicit launching of the test
cd execution
echo "====================================================================="
echo " Generated by BenchKit 2-3254"
echo " Executing tool itstools"
echo " Input is QuasiCertifProtocol-COL-02, examination is CTLFireability"
echo " Time confinement is $BK_TIME_CONFINEMENT seconds"
echo " Memory confinement is 16384 MBytes"
echo " Number of cores is 4"
echo " Run identifier is r060-smll-149440927900193"
echo "====================================================================="
echo
echo "--------------------"
echo "content from stdout:"
echo
echo "=== Data for post analysis generated by BenchKit (invocation template)"
echo
if [ "CTLFireability" = "UpperBounds" ] ; then
echo "The expected result is a vector of positive values"
echo NUM_VECTOR
elif [ "CTLFireability" != "StateSpace" ] ; then
echo "The expected result is a vector of booleans"
echo BOOL_VECTOR
else
echo "no data necessary for post analysis"
fi
echo
if [ -f "CTLFireability.txt" ] ; then
echo "here is the order used to build the result vector(from text file)"
for x in $(grep Property CTLFireability.txt | cut -d ' ' -f 2 | sort -u) ; do
echo "FORMULA_NAME $x"
done
elif [ -f "CTLFireability.xml" ] ; then # for cunf (txt files deleted;-)
echo echo "here is the order used to build the result vector(from xml file)"
for x in $(grep '
echo "FORMULA_NAME $x"
done
fi
echo
echo "=== Now, execution of the tool begins"
echo
echo -n "BK_START "
date -u +%s%3N
echo
timeout -s 9 $BK_TIME_CONFINEMENT bash -c "/home/mcc/BenchKit/BenchKit_head.sh 2> STDERR ; echo ; echo -n \"BK_STOP \" ; date -u +%s%3N"
if [ $? -eq 137 ] ; then
echo
echo "BK_TIME_CONFINEMENT_REACHED"
fi
echo
echo "--------------------"
echo "content from stderr:"
echo
cat STDERR ;