fond
Model Checking Contest @ Petri Nets 2017
7th edition, Zaragoza, Spain, June 27, 2017
Execution of r140-smll-149479233800193
Last Updated
June 27, 2017

About the Execution of ITS-Tools for S_QuasiCertifProtocol-COL-02

Execution Summary
Max Memory
Used (MB)
Time wait (ms) CPU Usage (ms) I/O Wait (ms) Computed Result Execution
Status
296.440 5815.00 10678.00 228.20 FTFTFFFFTTFTFTTT normal

Execution Chart

We display below the execution chart for this examination (boot time has been removed).

Trace from the execution

Waiting for the VM to be ready (probing ssh)
.................
=====================================================================
Generated by BenchKit 2-3254
Executing tool itstools
Input is S_QuasiCertifProtocol-COL-02, examination is CTLFireability
Time confinement is 3600 seconds
Memory confinement is 16384 MBytes
Number of cores is 4
Run identifier is r140-smll-149479233800193
=====================================================================


--------------------
content from stdout:

=== Data for post analysis generated by BenchKit (invocation template)

The expected result is a vector of booleans
BOOL_VECTOR

here is the order used to build the result vector(from text file)
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-0
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-1
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-10
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-11
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-12
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-13
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-14
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-15
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-2
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-3
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-4
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-5
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-6
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-7
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-8
FORMULA_NAME QuasiCertifProtocol-COL-02-CTLFireability-9

=== Now, execution of the tool begins

BK_START 1496392839425


its-ctl command run as :

/home/mcc/BenchKit/eclipse/plugins/fr.lip6.move.gal.itstools.binaries_1.0.0.201705302212/bin/its-ctl-linux64 --gc-threshold 2000000 --quiet -i /home/mcc/execution/CTLFireability.pnml.gal -t CGAL -ctl /home/mcc/execution/CTLFireability.ctl
No direction supplied, using forward translation only.
Parsed 16 CTL formulae.
Model ,|S| ,Time ,Mem(kb) ,fin. SDD ,fin. DDD ,peak SDD ,peak DDD ,SDD Hom ,SDD cache peak ,DDD Hom ,DDD cachepeak ,SHom cache
reachable,1029,0.081065,6176,793,200,3573,677,199,1668,86,2214,0


Converting to forward existential form...Done !
original formula: (AX(!(((((tsid0.s5_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.s5_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.s5_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (a5.a5[0]>=1 + (((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s6_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s6_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s6_2>=1)))))) * ((!(AF(a4.a4[0]>=1)) + (EF(a4.a4[0]>=1) + (((tsid0.s4_0>=1 + tsid1.s4_1>=1) + tsid2.s4_2>=1) + (Astart.Astart[0]>=1 * (((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s2_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s2_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s2_2>=1)))))) * AF(((((((tsid0.c1_0>=1 * tsidxtsid3.n9_3>=1) * tsidxtsid6.n9_6>=1) * tsidxtsid0.n9_0>=1) + (((tsid1.c1_1>=1 * tsidxtsid4.n9_4>=1) * tsidxtsid7.n9_7>=1) * tsidxtsid1.n9_1>=1)) + (((tsid2.c1_2>=1 * tsidxtsid5.n9_5>=1) * tsidxtsid8.n9_8>=1) * tsidxtsid2.n9_2>=1)) * Astart.Astart[0]>=1))))
=> equivalent forward existential formula: ([(EY(Init) * ((((tsid0.s5_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.s5_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.s5_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (a5.a5[0]>=1 + (((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s6_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s6_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s6_2>=1)))))] = FALSE * ([((Init * !((E(TRUE U a4.a4[0]>=1) + (((tsid0.s4_0>=1 + tsid1.s4_1>=1) + tsid2.s4_2>=1) + (Astart.Astart[0]>=1 * (((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s2_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s2_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s2_2>=1))))))) * !(EG(!(a4.a4[0]>=1))))] = FALSE * [FwdG(Init,!(((((((tsid0.c1_0>=1 * tsidxtsid3.n9_3>=1) * tsidxtsid6.n9_6>=1) * tsidxtsid0.n9_0>=1) + (((tsid1.c1_1>=1 * tsidxtsid4.n9_4>=1) * tsidxtsid7.n9_7>=1) * tsidxtsid1.n9_1>=1)) + (((tsid2.c1_2>=1 * tsidxtsid5.n9_5>=1) * tsidxtsid8.n9_8>=1) * tsidxtsid2.n9_2>=1)) * Astart.Astart[0]>=1)))] = FALSE))
(forward)formula 0,0,0.349203,14040,1,0,18511,3474,1045,16614,433,18581,55810
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-0 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !

***************************************

original formula: EG((EG((((tsid0.s2_0>=1 * tsid0.n3_0>=1) + (tsid1.s2_1>=1 * tsid1.n3_1>=1)) + (tsid2.s2_2>=1 * tsid2.n3_2>=1))) + !(EX(a5.a5[0]>=1))))
=> equivalent forward existential formula: [FwdG(Init,(EG((((tsid0.s2_0>=1 * tsid0.n3_0>=1) + (tsid1.s2_1>=1 * tsid1.n3_1>=1)) + (tsid2.s2_2>=1 * tsid2.n3_2>=1))) + !(EX(a5.a5[0]>=1))))] != FALSE
(forward)formula 1,1,0.362228,14376,1,0,19749,3482,1070,17833,435,18878,59535
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-1 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !

***************************************

original formula: EG((!(EX(a4.a4[0]>=1)) + EF(((((tsid0.s5_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.s5_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.s5_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + a2.a2[0]>=1))))
=> equivalent forward existential formula: [FwdG(Init,(!(EX(a4.a4[0]>=1)) + E(TRUE U ((((tsid0.s5_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.s5_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.s5_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + a2.a2[0]>=1))))] != FALSE
(forward)formula 2,1,0.444486,17068,1,0,26660,3564,1191,24074,449,19100,77977
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-2 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !

***************************************

original formula: !(A(AF(a2.a2[0]>=1) U ((a2.a2[0]>=1 + (((tsid0.s2_0>=1 * tsid0.n3_0>=1) + (tsid1.s2_1>=1 * tsid1.n3_1>=1)) + (tsid2.s2_2>=1 * tsid2.n3_2>=1))) * !(a2.a2[0]>=1))))
=> equivalent forward existential formula: ([FwdG((FwdU(Init,!(((a2.a2[0]>=1 + (((tsid0.s2_0>=1 * tsid0.n3_0>=1) + (tsid1.s2_1>=1 * tsid1.n3_1>=1)) + (tsid2.s2_2>=1 * tsid2.n3_2>=1))) * !(a2.a2[0]>=1)))) * !(((a2.a2[0]>=1 + (((tsid0.s2_0>=1 * tsid0.n3_0>=1) + (tsid1.s2_1>=1 * tsid1.n3_1>=1)) + (tsid2.s2_2>=1 * tsid2.n3_2>=1))) * !(a2.a2[0]>=1)))),!(a2.a2[0]>=1))] != FALSE + [FwdG(Init,!(((a2.a2[0]>=1 + (((tsid0.s2_0>=1 * tsid0.n3_0>=1) + (tsid1.s2_1>=1 * tsid1.n3_1>=1)) + (tsid2.s2_2>=1 * tsid2.n3_2>=1))) * !(a2.a2[0]>=1))))] != FALSE)
(forward)formula 3,1,0.450887,17328,1,0,26887,3564,1241,24354,450,19100,79056
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-3 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !

***************************************

original formula: AF((((tsid2.n2_2>=1 * tsid1.n2_1>=1) * tsid0.n2_0>=1) * a1.a1[0]>=1))
=> equivalent forward existential formula: [FwdG(Init,!((((tsid2.n2_2>=1 * tsid1.n2_1>=1) * tsid0.n2_0>=1) * a1.a1[0]>=1)))] = FALSE
(forward)formula 4,0,0.453814,17464,1,0,26978,3564,1277,24500,450,19100,79692
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-4 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !

***************************************

original formula: EX(((((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s2_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s2_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s2_2>=1)) + !(AF(((tsid0.s4_0>=1 + tsid1.s4_1>=1) + tsid2.s4_2>=1)))))
=> equivalent forward existential formula: ([(EY(Init) * (((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s2_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s2_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s2_2>=1)))] != FALSE + [FwdG(EY(Init),!(((tsid0.s4_0>=1 + tsid1.s4_1>=1) + tsid2.s4_2>=1)))] != FALSE)
(forward)formula 5,1,0.46218,17492,1,0,27528,3564,1312,25084,450,19103,81713
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-5 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !

***************************************

original formula: AG(EG(EF((((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s6_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s6_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s6_2>=1)))))
=> equivalent forward existential formula: [(FwdU(Init,TRUE) * !(EG(E(TRUE U (((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s6_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s6_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s6_2>=1))))))] = FALSE
(forward)formula 6,0,0.469646,17848,1,0,27671,3564,1331,25258,450,19103,82648
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-6 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !

***************************************

original formula: ((!((a3.a3[0]>=1 * AX(((tsid0.s6_0>=1 + tsid1.s6_1>=1) + tsid2.s6_2>=1)))) + (((((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s2_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s2_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s2_2>=1)) + (((a3.a3[0]>=1 * tsid1.n4_1>=1) * tsid2.n4_2>=1) * tsid0.n4_0>=1)) + (a3.a3[0]>=1 * (((tsid0.s2_0>=1 * tsid0.n3_0>=1) + (tsid1.s2_1>=1 * tsid1.n3_1>=1)) + (tsid2.s2_2>=1 * tsid2.n3_2>=1))))) * (!(AF((((((tsidxtsid0.n7_0>=1 * tsidxtsid6.n7_6>=1) * tsidxtsid3.n7_3>=1) * tsid0.Cstart_0>=1) + (((tsidxtsid1.n7_1>=1 * tsidxtsid7.n7_7>=1) * tsidxtsid4.n7_4>=1) * tsid1.Cstart_1>=1)) + (((tsidxtsid2.n7_2>=1 * tsidxtsid8.n7_8>=1) * tsidxtsid5.n7_5>=1) * tsid2.Cstart_2>=1)))) * (!((((tsid0.s2_0>=1 * tsid0.n3_0>=1) + (tsid1.s2_1>=1 * tsid1.n3_1>=1)) + (tsid2.s2_2>=1 * tsid2.n3_2>=1))) + (a4.a4[0]>=1 + (((((tsid0.c1_0>=1 * tsidxtsid3.n9_3>=1) * tsidxtsid6.n9_6>=1) * tsidxtsid0.n9_0>=1) + (((tsid1.c1_1>=1 * tsidxtsid4.n9_4>=1) * tsidxtsid7.n9_7>=1) * tsidxtsid1.n9_1>=1)) + (((tsid2.c1_2>=1 * tsidxtsid5.n9_5>=1) * tsidxtsid8.n9_8>=1) * tsidxtsid2.n9_2>=1))))))
=> equivalent forward existential formula: [FwdG(((Init * (!((a3.a3[0]>=1 * !(EX(!(((tsid0.s6_0>=1 + tsid1.s6_1>=1) + tsid2.s6_2>=1)))))) + (((((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s2_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s2_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s2_2>=1)) + (((a3.a3[0]>=1 * tsid1.n4_1>=1) * tsid2.n4_2>=1) * tsid0.n4_0>=1)) + (a3.a3[0]>=1 * (((tsid0.s2_0>=1 * tsid0.n3_0>=1) + (tsid1.s2_1>=1 * tsid1.n3_1>=1)) + (tsid2.s2_2>=1 * tsid2.n3_2>=1)))))) * (!((((tsid0.s2_0>=1 * tsid0.n3_0>=1) + (tsid1.s2_1>=1 * tsid1.n3_1>=1)) + (tsid2.s2_2>=1 * tsid2.n3_2>=1))) + (a4.a4[0]>=1 + (((((tsid0.c1_0>=1 * tsidxtsid3.n9_3>=1) * tsidxtsid6.n9_6>=1) * tsidxtsid0.n9_0>=1) + (((tsid1.c1_1>=1 * tsidxtsid4.n9_4>=1) * tsidxtsid7.n9_7>=1) * tsidxtsid1.n9_1>=1)) + (((tsid2.c1_2>=1 * tsidxtsid5.n9_5>=1) * tsidxtsid8.n9_8>=1) * tsidxtsid2.n9_2>=1))))),!((((((tsidxtsid0.n7_0>=1 * tsidxtsid6.n7_6>=1) * tsidxtsid3.n7_3>=1) * tsid0.Cstart_0>=1) + (((tsidxtsid1.n7_1>=1 * tsidxtsid7.n7_7>=1) * tsidxtsid4.n7_4>=1) * tsid1.Cstart_1>=1)) + (((tsidxtsid2.n7_2>=1 * tsidxtsid8.n7_8>=1) * tsidxtsid5.n7_5>=1) * tsid2.Cstart_2>=1))))] != FALSE
(forward)formula 7,1,0.518043,18372,1,0,29169,3609,1408,26763,450,19277,87691
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-7 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !

***************************************

original formula: !(AF(EG(((((tsid0.s3_0>=1 * tsid0.n5_0>=1) + (tsid1.s3_1>=1 * tsid1.n5_1>=1)) + (tsid2.s3_2>=1 * tsid2.n5_2>=1)) + (((((tsidxtsid0.n7_0>=1 * tsidxtsid6.n7_6>=1) * tsidxtsid3.n7_3>=1) * tsid0.Cstart_0>=1) + (((tsidxtsid1.n7_1>=1 * tsidxtsid7.n7_7>=1) * tsidxtsid4.n7_4>=1) * tsid1.Cstart_1>=1)) + (((tsidxtsid2.n7_2>=1 * tsidxtsid8.n7_8>=1) * tsidxtsid5.n7_5>=1) * tsid2.Cstart_2>=1))))))
=> equivalent forward existential formula: [FwdG(Init,!(EG(((((tsid0.s3_0>=1 * tsid0.n5_0>=1) + (tsid1.s3_1>=1 * tsid1.n5_1>=1)) + (tsid2.s3_2>=1 * tsid2.n5_2>=1)) + (((((tsidxtsid0.n7_0>=1 * tsidxtsid6.n7_6>=1) * tsidxtsid3.n7_3>=1) * tsid0.Cstart_0>=1) + (((tsidxtsid1.n7_1>=1 * tsidxtsid7.n7_7>=1) * tsidxtsid4.n7_4>=1) * tsid1.Cstart_1>=1)) + (((tsidxtsid2.n7_2>=1 * tsidxtsid8.n7_8>=1) * tsidxtsid5.n7_5>=1) * tsid2.Cstart_2>=1))))))] != FALSE
(forward)formula 8,1,0.52838,18712,1,0,29231,3613,1434,26878,452,19289,88393
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-8 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !

***************************************

original formula: EG(EF((!((((tsid0.s5_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.s5_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.s5_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1))) + ((((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s2_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s2_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s2_2>=1)) * (((((tsid0.s5_0>=1 * tsidxtsid1.n8_1>=1) * tsidxtsid0.n8_0>=1) * tsidxtsid2.n8_2>=1) + (((tsid1.s5_1>=1 * tsidxtsid4.n8_4>=1) * tsidxtsid3.n8_3>=1) * tsidxtsid5.n8_5>=1)) + (((tsid2.s5_2>=1 * tsidxtsid7.n8_7>=1) * tsidxtsid6.n8_6>=1) * tsidxtsid8.n8_8>=1))))))
=> equivalent forward existential formula: [FwdG(Init,E(TRUE U (!((((tsid0.s5_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.s5_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.s5_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1))) + ((((malicious_reservoir.malicious_reservoir[0]>=1 * tsid0.s2_0>=1) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid1.s2_1>=1)) + (malicious_reservoir.malicious_reservoir[0]>=1 * tsid2.s2_2>=1)) * (((((tsid0.s5_0>=1 * tsidxtsid1.n8_1>=1) * tsidxtsid0.n8_0>=1) * tsidxtsid2.n8_2>=1) + (((tsid1.s5_1>=1 * tsidxtsid4.n8_4>=1) * tsidxtsid3.n8_3>=1) * tsidxtsid5.n8_5>=1)) + (((tsid2.s5_2>=1 * tsidxtsid7.n8_7>=1) * tsidxtsid6.n8_6>=1) * tsidxtsid8.n8_8>=1))))))] != FALSE
(forward)formula 9,1,0.558661,18912,1,0,29357,3628,1472,27225,452,19311,91031
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-9 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !

***************************************

original formula: AX(AX(AF(Astart.Astart[0]>=1)))
=> equivalent forward existential formula: [FwdG(EY(EY(Init)),!(Astart.Astart[0]>=1))] = FALSE
(forward)formula 10,0,0.566175,19172,1,0,29423,3628,1508,27401,455,19342,92699
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-10 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !

***************************************

original formula: AG(((((tsid2.n2_2>=1 * tsid1.n2_1>=1) * tsid0.n2_0>=1) * a1.a1[0]>=1) + !(EG(((tsid0.s6_0>=1 + tsid1.s6_1>=1) + tsid2.s6_2>=1)))))
=> equivalent forward existential formula: [FwdG((FwdU(Init,TRUE) * !((((tsid2.n2_2>=1 * tsid1.n2_1>=1) * tsid0.n2_0>=1) * a1.a1[0]>=1))),((tsid0.s6_0>=1 + tsid1.s6_1>=1) + tsid2.s6_2>=1))] = FALSE
dead was empty
(forward)formula 11,1,0.568873,19180,1,0,29452,3634,1508,27499,455,19348,92795
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-11 TRUE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is TRUE !

***************************************

original formula: EF(EG((((tsid0.Sstart_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.Sstart_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.Sstart_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1))))
=> equivalent forward existential formula: [FwdG(FwdU(Init,TRUE),(((tsid0.Sstart_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.Sstart_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.Sstart_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1)))] != FALSE
dead was empty
(forward)formula 12,0,0.570875,19420,1,0,29456,3634,1524,27512,455,19348,92971
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-12 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !

***************************************

original formula: AF((EX((((tsid0.s6_0>=1 + tsid1.s6_1>=1) + tsid2.s6_2>=1) + (((tsid0.c1_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.c1_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.c1_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1)))) * (((tsid0.Sstart_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.Sstart_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.Sstart_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1))))
=> equivalent forward existential formula: [FwdG(Init,!((EX((((tsid0.s6_0>=1 + tsid1.s6_1>=1) + tsid2.s6_2>=1) + (((tsid0.c1_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.c1_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.c1_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1)))) * (((tsid0.Sstart_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.Sstart_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.Sstart_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1)))))] = FALSE
(forward)formula 13,0,0.584509,19420,1,0,29996,3634,1539,28048,455,19365,94471
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-13 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !

***************************************

original formula: AX((AF((((tsid0.s5_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.s5_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.s5_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1))) + a5.a5[0]>=1))
=> equivalent forward existential formula: [FwdG((EY(Init) * !(a5.a5[0]>=1)),!((((tsid0.s5_0>=1 * malicious_reservoir.malicious_reservoir[0]>=1) + (tsid1.s5_1>=1 * malicious_reservoir.malicious_reservoir[0]>=1)) + (tsid2.s5_2>=1 * malicious_reservoir.malicious_reservoir[0]>=1))))] = FALSE
(forward)formula 14,0,0.594437,19444,1,0,30688,3634,1550,28658,455,19435,96126
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-14 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !

***************************************

original formula: AG(AF((((((tsid0.c1_0>=1 * tsidxtsid3.n9_3>=1) * tsidxtsid6.n9_6>=1) * tsidxtsid0.n9_0>=1) + (((tsid1.c1_1>=1 * tsidxtsid4.n9_4>=1) * tsidxtsid7.n9_7>=1) * tsidxtsid1.n9_1>=1)) + (((tsid2.c1_2>=1 * tsidxtsid5.n9_5>=1) * tsidxtsid8.n9_8>=1) * tsidxtsid2.n9_2>=1))))
=> equivalent forward existential formula: [FwdG(FwdU(Init,TRUE),!((((((tsid0.c1_0>=1 * tsidxtsid3.n9_3>=1) * tsidxtsid6.n9_6>=1) * tsidxtsid0.n9_0>=1) + (((tsid1.c1_1>=1 * tsidxtsid4.n9_4>=1) * tsidxtsid7.n9_7>=1) * tsidxtsid1.n9_1>=1)) + (((tsid2.c1_2>=1 * tsidxtsid5.n9_5>=1) * tsidxtsid8.n9_8>=1) * tsidxtsid2.n9_2>=1))))] = FALSE
(forward)formula 15,0,0.601422,19636,1,0,30850,3634,1561,28836,455,19435,96925
FORMULA QuasiCertifProtocol-COL-02-CTLFireability-15 FALSE TECHNIQUES DECISION_DIAGRAMS TOPOLOGICAL USE_NUPN
Formula is FALSE !

***************************************

Exit code :0

BK_STOP 1496392845240

--------------------
content from stderr:

+ export BINDIR=/home/mcc/BenchKit/
+ BINDIR=/home/mcc/BenchKit/
++ pwd
+ export MODEL=/home/mcc/execution
+ MODEL=/home/mcc/execution
+ [[ CTLFireability = StateSpace ]]
+ /home/mcc/BenchKit//runeclipse.sh /home/mcc/execution CTLFireability -its -ltsminpath /home/mcc/BenchKit//lts_install_dir/ -smt
+ ulimit -s 65536
+ java -Dosgi.requiredJavaVersion=1.6 -Xss8m -Xms40m -Xmx8192m -Declipse.pde.launch=true -Dfile.encoding=UTF-8 -classpath /home/mcc/BenchKit//eclipse/plugins/org.eclipse.equinox.launcher_1.3.201.v20161025-1711.jar org.eclipse.equinox.launcher.Main -application fr.lip6.move.gal.application.pnmcc -data /home/mcc/BenchKit//workspace -os linux -ws gtk -arch x86_64 -nl en_US -consoleLog -pnfolder /home/mcc/execution -examination CTLFireability -yices2path /home/mcc/BenchKit//yices/bin/yices -its -ltsminpath /home/mcc/BenchKit//lts_install_dir/ -smt
Jun 02, 2017 8:40:41 AM fr.lip6.move.gal.application.MccTranslator transformPNML
INFO: Parsing pnml file : /home/mcc/execution/model.pnml
Jun 02, 2017 8:40:41 AM fr.lip6.move.gal.pnml.togal.PnmlToGalTransformer transform
INFO: Detected file is not PT type :http://www.pnml.org/version-2009/grammar/symmetricnet
Jun 02, 2017 8:40:43 AM fr.lip6.move.gal.pnml.togal.PnmlToGalTransformer transform
INFO: Load time of PNML (colored model parsed with PNMLFW) : 1776 ms
Jun 02, 2017 8:40:43 AM fr.lip6.move.gal.pnml.togal.HLGALTransformer handlePage
INFO: Transformed 30 places.
Jun 02, 2017 8:40:43 AM fr.lip6.move.gal.pnml.togal.HLGALTransformer handlePage
INFO: Computed order using colors.
Jun 02, 2017 8:40:43 AM fr.lip6.move.gal.pnml.togal.HLGALTransformer handlePage
INFO: sort/places :tsidxtsid->n9,n8,n7,
Dot->malicious_reservoir,CstopAbort,SstopAbort,AstopAbort,a5,a4,a3,a2,a1,Astart,AstopOK,
tsid->n6,n5,n4,n3,n2,n1,c1,Cstart,Sstart,s2,s3,s4,s5,s6,SstopOK,CstopOK,

Jun 02, 2017 8:40:43 AM fr.lip6.move.gal.pnml.togal.HLGALTransformer handlePage
INFO: Transformed 26 transitions.
Jun 02, 2017 8:40:43 AM fr.lip6.move.gal.pnml.togal.PnmlToGalTransformer transform
INFO: Computed order based on color domains.
Jun 02, 2017 8:40:43 AM fr.lip6.move.gal.application.MccTranslator applyOrder
INFO: Applying decomposition
Jun 02, 2017 8:40:43 AM fr.lip6.move.gal.instantiate.CompositeBuilder decomposeWithOrder
INFO: Decomposing Gal with order
Jun 02, 2017 8:40:43 AM fr.lip6.move.gal.instantiate.GALRewriter flatten
INFO: Flatten gal took : 69 ms
Jun 02, 2017 8:40:44 AM fr.lip6.move.gal.instantiate.CompositeBuilder rewriteArraysToAllowPartition
INFO: Rewriting arrays n9, n8, n7, n6, n5, n4, n3, n2, n1, c1, Cstart, Sstart, s2, s3, s4, s5, s6, SstopOK, CstopOK to variables to allow decomposition.
Jun 02, 2017 8:40:44 AM fr.lip6.move.gal.instantiate.Instantiator fuseIsomorphicEffects
INFO: Removed a total of 20 redundant transitions.
Jun 02, 2017 8:40:44 AM fr.lip6.move.serialization.SerializationUtil systemToFile
INFO: Time to serialize gal into /home/mcc/execution/CTLFireability.pnml.gal : 14 ms
Jun 02, 2017 8:40:44 AM fr.lip6.move.serialization.SerializationUtil serializePropertiesForITSCTLTools
INFO: Time to serialize properties into /home/mcc/execution/CTLFireability.ctl : 3 ms
Jun 02, 2017 8:40:45 AM fr.lip6.move.gal.itstools.Runner runTool
INFO: Standard error output from running tool CommandLine [args=[/home/mcc/BenchKit/eclipse/plugins/fr.lip6.move.gal.itstools.binaries_1.0.0.201705302212/bin/its-ctl-linux64, --gc-threshold, 2000000, --quiet, -i, /home/mcc/execution/CTLFireability.pnml.gal, -t, CGAL, -ctl, /home/mcc/execution/CTLFireability.ctl], workingDir=/home/mcc/execution]
built 25 ordering constraints for composite.
Reverse transition relation is NOT exact ! Due to transitions malC1, malS6, malS5, malS4, malS3, malS2, malS1, malA5, malA3, malA4, malA2, malA1, Intersection with reachable at each step enabled. (destroyed/reverse/intersect/total) :0/30/12/42

Sequence of Actions to be Executed by the VM

This is useful if one wants to reexecute the tool in the VM from the submitted image disk.

set -x
# this is for BenchKit: configuration of major elements for the test
export BK_INPUT="S_QuasiCertifProtocol-COL-02"
export BK_EXAMINATION="CTLFireability"
export BK_TOOL="itstools"
export BK_RESULT_DIR="/tmp/BK_RESULTS/OUTPUTS"
export BK_TIME_CONFINEMENT="3600"
export BK_MEMORY_CONFINEMENT="16384"

# this is specific to your benchmark or test

export BIN_DIR="$HOME/BenchKit/bin"

# remove the execution directoty if it exists (to avoid increse of .vmdk images)
if [ -d execution ] ; then
rm -rf execution
fi

tar xzf /home/mcc/BenchKit/INPUTS/S_QuasiCertifProtocol-COL-02.tgz
mv S_QuasiCertifProtocol-COL-02 execution

# this is for BenchKit: explicit launching of the test

cd execution
echo "====================================================================="
echo " Generated by BenchKit 2-3254"
echo " Executing tool itstools"
echo " Input is S_QuasiCertifProtocol-COL-02, examination is CTLFireability"
echo " Time confinement is $BK_TIME_CONFINEMENT seconds"
echo " Memory confinement is 16384 MBytes"
echo " Number of cores is 4"
echo " Run identifier is r140-smll-149479233800193"
echo "====================================================================="
echo
echo "--------------------"
echo "content from stdout:"
echo
echo "=== Data for post analysis generated by BenchKit (invocation template)"
echo
if [ "CTLFireability" = "UpperBounds" ] ; then
echo "The expected result is a vector of positive values"
echo NUM_VECTOR
elif [ "CTLFireability" != "StateSpace" ] ; then
echo "The expected result is a vector of booleans"
echo BOOL_VECTOR
else
echo "no data necessary for post analysis"
fi
echo
if [ -f "CTLFireability.txt" ] ; then
echo "here is the order used to build the result vector(from text file)"
for x in $(grep Property CTLFireability.txt | cut -d ' ' -f 2 | sort -u) ; do
echo "FORMULA_NAME $x"
done
elif [ -f "CTLFireability.xml" ] ; then # for cunf (txt files deleted;-)
echo echo "here is the order used to build the result vector(from xml file)"
for x in $(grep '' CTLFireability.xml | cut -d '>' -f 2 | cut -d '<' -f 1 | sort -u) ; do
echo "FORMULA_NAME $x"
done
fi
echo
echo "=== Now, execution of the tool begins"
echo
echo -n "BK_START "
date -u +%s%3N
echo
timeout -s 9 $BK_TIME_CONFINEMENT bash -c "/home/mcc/BenchKit/BenchKit_head.sh 2> STDERR ; echo ; echo -n \"BK_STOP \" ; date -u +%s%3N"
if [ $? -eq 137 ] ; then
echo
echo "BK_TIME_CONFINEMENT_REACHED"
fi
echo
echo "--------------------"
echo "content from stderr:"
echo
cat STDERR ;