German.CTC
Safety properties
Below are the safety properties we want to verify, in negated form.
Control properties:
∃ z1,z2. z1≠z2 ∧ ( CacheState[z1] = Exclusive ∧ CacheState[z2] ≠ Invalid )
Data properties:
Exgntd = False ∧ MemData ≠ AuxData
∃ z. ( CacheState[z] ≠ Invalid ∧ CacheData[z] ≠ AuxData )
Options used
-brab 2
Inferred invariants
All invariants are shown in their negated form, where
#1 and #2
are distinct existentially quantified variables.
CacheState[#1] = Exclusive && Shrset[#2] = True
Chan2Cmd[#1] = Gnte && Shrset[#2] = True
CacheState[#1] = Exclusive && Invset[#2] = True
Chan2Cmd[#1] = Gnte && Invset[#2] = True
Exgntd = True && Chan2Cmd[#1] = Gnts
Chan2Cmd[#2] = Inv && CacheState[#1] = Exclusive
Chan2Cmd[#1] = Gnte && Chan2Cmd[#2] = Inv
Chan3Cmd[#2] = Invack && CacheState[#1] = Exclusive
Chan2Cmd[#1] = Gnte && Chan3Cmd[#2] = Invack
Chan2Cmd[#1] = Inv && Invset[#1] = True
Chan3Cmd[#1] = Invack && Invset[#1] = True
Curcmd = Empty && Chan2Cmd[#1] = Inv
Chan2Cmd[#1] = Inv && Chan3Cmd[#1] = Invack
Invset[#1] = True && Shrset[#1] = False
Exgntd = False && Curcmd = Reqs && Chan2Cmd[#1] = Inv
Curcmd = Empty && Chan3Cmd[#1] = Invack
Chan2Cmd[#1] = Inv && Shrset[#1] = False
Exgntd = False && Curcmd = Reqs && Chan3Cmd[#1] = Invack
Chan3Cmd[#1] = Invack && Shrset[#1] = False
Chan2Cmd[#1] = Gnts && Chan3Cmd[#1] = Invack
Chan3Cmd[#1] = Invack && CacheState[#1] <> Invalid
Chan2Cmd[#1] = Gnts && Shrset[#1] = False
Chan3Cmd[#1] = Invack && CacheState[#1] = Exclusive
Chan2Cmd[#1] = Gnte && CacheState[#1] = Exclusive
Chan2Cmd[#1] = Gnts && CacheState[#1] = Exclusive
CacheState[#1] <> Invalid && Shrset[#1] = False
Exgntd = False && CacheState[#1] = Exclusive
You can find the list of all invariants that can be extracted from BRAB here (also in negated form), this collection being inductive.
Search graph
The algorithm starts from the formula located at the bottom,
inside a red
octagon. Variables #1, #2,
… that appear
in the nodes are distinct skolem variables so we show a formula
φ(#1, #2) as equivalent to ∃
z1, z2.
z1 ≠ z2 ∧ φ(z1,
z2). Plain black edges represent
pre-image relations and are annotated by the transition instance that
was considered. Black circles denote nodes that were obtained by
pre-image computation and were not covered by already visited
nodes. The nodes circled in gray are the one that were not
useful because they were subsumed by formulas pointed by the
gray dashed
arrows. Approximations are shown
in blue rectangles. Each approximation originates from the node that
connects its rectangle with a bold dashed blue edge.