Automatically Verifying Railway Interlockings using SAT-based Model Checking Electronic Communications of the EASST Volume 35 (2010) Proceedings of the 10th International Workshop on Automated Verification of Critical Systems (AVoCS 2010) Automatically Verifying Railway Interlockings using SAT-based Model Checking Phillip James and Markus Roggenbach 17 pages Guest Editors: Jens Bendisposto, Michael Leuschel, Markus Roggenbach Managing Editors: Tiziana Margaria, Julia Padberg, Gabriele Taentzer ECEASST Home Page: http://www.easst.org/eceasst/ ISSN 1863-2122 http://www.easst.org/eceasst/ ECEASST Automatically Verifying Railway Interlockings using SAT-based Model Checking Phillip James1∗ and Markus Roggenbach1 Swansea University1, Wales, UK Abstract: In this paper, we demonstrate the successful application of various SAT- based model checking techniques to verify train control systems. Starting with a propositional model for a control system, we show how execution of the system can be modelled via a finite automaton. We give algorithms to perform SAT-based model checking over such an automaton. In order to tackle state-space explosion we propose slicing. Finally we comment on results obtained by applying these methods to verify two real-world railway interlocking systems. Keywords: Model Checking, Interlocking, Ladder Logic, Railway, SAT, Slicing. 1 Introduction Formal verification of railway control software has been identified to be one of the “grand chal- lenges” [Jac04] of Computer Science. Various formal methods have been applied to this area, including algebraic specification, e.g., [Bjø09], process-algebraic modelling and verification, e.g., [Win02], and also model-oriented specification, where e.g., the B method has been used in order to verify part of the Paris Metro railway [BG00]. In partnership with Invensys, an in- ternationally established company specialising in railway control systems, we explore various verification approaches based on SAT solving [BHMW09]. The aim is to explore and develop technologies that, at a later date, might be integrated into Invensys’ design process. Continuing work by Kanso et al. [KMS08] we verify interlockings of real-world train stations with respect to safety conditions. Our modelling language is propositional logic, see Figure 1: The physical layout of the train station together with an abstract safety condition, e.g., ‘trains are separated by at least one empty track segment’, yields a concrete safety condition ϕ . The initial configuration of a train station is characterised by some initialisation formula I. The control program (in ladder logic, an IEC standard [IEC03]) of the interlocking system is translated into a transition formula T . All the above translations have been automated in [KMS08]. Using an inductive approach, namely I(Z) ⇒ ϕ(Z) and T (Z,Z′)∧ϕ(Z) ⇒ ϕ(Z′), Kanso et al. [KMS08] successfully verify a medium sized real-world interlocking. Some of the required safety proper- ties are automatically proven using a SAT solver [Kul08], however in some cases the SAT solver produces counter examples. These take the from of a pair of states, namely interpretations of Z and Z′, which violate the safety property. In the context of the interlocking under discussion, these counter examples were excluded via manual analysis: it was claimed that they concern unreachable states. For inclusion into the standard development process of interlockings, Inven- sys requires further automation of the verification, namely the exclusion of the supposed to be ∗ Acknowledging the support of Invensys Rail. 1 / 17 Volume 35 (2010) Automatically Verifying Railway Interlockings using SAT-based Model Checking For all track points... Safety Condition 𝜑 𝑍 Railway Topology Informal Safety Condition Automated Verification Interlocking Ladder Logic |a| |c| |e| |d| (b) Initial Condition - 𝐼(𝑍) and Transition Formula - 𝑇 𝑍, 𝑍′ 𝑍, 𝑍′ : 𝑅𝑒𝑝𝑟𝑒𝑠𝑒𝑛𝑡 𝑠𝑦𝑠𝑡𝑒𝑚 𝑠𝑡𝑎𝑡𝑒𝑠. T104 T101 T102 T103 Figure 1: The basic verification setting. unreachable states and the production of error traces if a safety property does not hold. In order to accommodate these requirements, we develop and experiment with verification approaches based on ideas used in bounded model checking. Here, we deliberately stay within Boolean modelling: first, it is natural in the given context – the ladder logic program contains only Boolean variables; second, it allows the direct use of SAT solvers for verification. In order to deal with real-world interlockings, we develop a slicing technique. To this end we re-use an algorithm first stated by [GKV95, FH98] and prove that it is correct w.r.t. our specific setting. In practice, slicing reduces the problem size by approximately a factor of five. This reduction has proven to be enough to automatically verify, using various techniques, two interlockings of medium complexity: either the safety condition could be proven, or an error trace was produced. In [ZRK03, FH98] alternative approaches for the verification of ladder logic programs are provided. In [ZRK03] a translation from ladder logic into timed automata is defined, before using the Uppaal model checker [upp10] for verification. Due to state-space explosion their approach is limited to “small” programs. Secondly, in [FH98] an inductive verification approach is taken to verify ladder logic interlockings. This paper is organised as follows: In Section 2, we introduce the basics of railway interlock- ings. Section 3 introduces a pelican crossing as a small example system. In Sections 4 and 5 we give a modelling of interlockings through propositional logic and automata. Section 6 introduces the model checking approaches we apply, with Section 7 giving a method to tackle state-space explosion. Finally, Section 8 shows the results gained from verifying two real-world interlock- ings. The results given in this paper are based on [Jam10] and have already been presented at CALCO-Jnr [JR10], a workshop for young researchers which encourages re-submission of papers to proper scientific events. Proc. AVoCS 2010 2 / 17 ECEASST 2 Interlockings An interlocking provides a safety layer for a railway. It interfaces with both the physical track layout and the human (or computerised) controller. The controller issues requests, such as to move a point. On such a request the interlocking will determine whether it is safe for the opera- tion to be permitted. If it is safe then the interlocking will issue requests to change the physical track layout, informing the controller of the change. Whereas if it is unsafe to perform the oper- ation the interlocking will not allow the physical track layout to be changed, and will report back to the controller that the operation has not taken place as it would yield an unsafe situation. Here, we consider Westrace [wes10] interlockings. A Westrace interlocking has the following typical control flow: initialise while True do read (Input) %% read (*) State’ <- Program(Input, State) %% process write (Output) & State <- State’ %% update After initialisation, there is a non terminating loop consisting of three steps: (1) Reading of Input, where Input includes requests from signallers and data from physical track sensors. (2) Internal processing: this depends on the Input as well as on the current State of the controller. Using these the next state State’ is computed. (3) Committing of Output, which includes passing information back to the signaller, commands to change the physical track layout, as well as an update of the State of the controller. In the context of Westrace interlockings, Input, Output, State, and State’ are sets of Boolean variables, where Output is a subset of State’. The current configuration of the controller is given by the values of all variables in the sets Input and State. The process step then depends on the current configuration. The Westrace interlocking realises this controller in hardware (cycle time of approximately 1 sec), where the steps initialise and process depend on the installed control software written in ladder logic – see Section 4. The initialise step performs the following: set_to_false (Input) State’ <- Program(Input, State) State <- State’ First, all Input variables are set to false, then the process step is executed once, finally State is updated. 3 Pelican crossing example As a running example we study a pelican crossing. Such a system is found on many road net- works throughout the world. The basic idea is that a pelican crossing allows pedestrians to safely cross a flow of traffic. To this end, a pelican crossing consists of the following components: four traffic lights - two for pedestrians, two for the traffic, where for simplicity we assume that all 3 / 17 Volume 35 (2010) Automatically Verifying Railway Interlockings using SAT-based Model Checking these traffic lights can only show red or green. The pedestrian traffic lights emit an audio signal when they show green and have an input button which a pedestrian can press in order to request the green signal. In order to program our system, we use the following Boolean variables, distinguished into input, output, and state variables. There is only one input variable, namely pressed. This variable becomes true if a pedestrian presses the button at either pedestrian light. We use the suffix g to indicate that a traffic light shows green, and the suffix r to indicate that a traffic light shows red. There are four traffic lights, namely pla and plb for pedestrians, and tla and tlb for traffic. Thus, overall there are eight output variables for lights, namely pla g, pla r, plb g, plb r, tla g, tla r, tlb g, and tlb r. When one of these variables is true, the corresponding light is on. There is also one output variable audio. When audio is true then the audio signal is sounding. Finally there are two state variables, req which “remembers” the value of pressed, and crossing which indicates that pedestrians may cross the road. [ crossing′ ⇐⇒ (req∧¬crossing), req′ ⇐⇒ (pressed∧¬req), tla g′ ⇐⇒ ((¬crossing′)∧(¬pressed∨req′)), tlb g′ ⇐⇒ ((¬crossing′)∧(¬pressed∨req′)), tla r′ ⇐⇒ crossing′, tlb r′ ⇐⇒ crossing′, pla g′ ⇐⇒ crossing′, plb g′ ⇐⇒ crossing′, pla r′ ⇐⇒ (¬crossing′), plb r′ ⇐⇒ (¬crossing′), audio′ ⇐⇒ crossing′ ] Figure 2: A ladder logic formula for the control program of a pelican crossing. Figure 2 presents the control program of our pelican crossing. It uses unprimed variables to store the configuration of the controller before the process step. Primed variables store the values of state variables after the process step. We can also say: if the unprimed variables represent the configuration at (*), then the primed variables represent the configuration at (*) in the next cycle of the control loop. As an example of how to interpret the control program, consider the first line of Figure 2, namely “crossing′ ⇐⇒ (req∧¬crossing)”. This can be read as: if there was a request req in the last control cycle, and pedestrians were not able to cross the road, then at the end of the current cycle pedestrians will be able to cross the road. Its second line says: In the next cycle req will be true if a pedestrian pressed the button before starting this cycle (indicated by pressed) and in the previous cycle there was no request. The remainder of the program can be read similarly. 4 Ladder logic formulae Ladder logic is a graphical programming language specified in the IEC standard 61131 [IEC03]. Westrace interlockings are programmed with ladder logic. A ladder logic program can be equiv- alently translated into a subset of propositional logic. We call this subset ladder logic formulae Proc. AVoCS 2010 4 / 17 ECEASST (see below for its definition). This translation is straightforward: it replaces graphical symbols by logical operators, a process which has been automated in [Kan08]1. For the rest of the paper we only deal with this representation in propositional logic. Figure 2 gives a concrete instance using a practical shorthand notation. Ladder logic formulae have several underlying syntactical restrictions. These restrictions be- come important later for slicing. In order to describe their syntax we use the following notations: The function vars returns for a given propositional formula ϕ the set of propositional variables appearing in ϕ . We use “prime” to generate a fresh variable. V ′ ={v′ |v ∈V} denotes the set of all fresh variables obtained from a set of variables V . A ladder logic program is formulated relatively to a finite set of input variables I and a finite set of state variables C, such that I ∩C = /0. It may also refer to primed state variables C′, which represent the newly computed values within a control cycle. Definition 1 (Ladder logic formulae) A ladder logic formula ψ (relative to a set of input vari- ables I and a set of state variables C) is a propositional formula ψ ≡ ((c′1 ⇔ ψ1)∧(c ′ 2 ⇔ ψ2)∧···∧(c ′ n ⇔ ψn)) where n ≥ 0 and the ψi, 1 ≤ i ≤ n, are propositional formulae, such that the following conditions hold: • for all 1 ≤ i ≤ n : c′i ∈C ′. • for all 1 ≤ i, j ≤ n : if i 6= j then c′i 6= c ′ j. • for all 1 ≤ i ≤ n : vars(ψi)⊆ I ∪{c′1,...c ′ i−1}∪{ci,...cn}. If n = 0, as usual ψ ≡ True. Such an empty program proves useful in the context of slicing. A ladder logic program prescribes the computation that takes place in the process step of the control loop. The equivalence (⇔) can be interpreted as assignment. The above conditions ensure that only primed state variables can be assigned to; a primed state variable is assigned to at most once; a primed state variable can only depend on input variables, primed state variables, or state variables. Here either the unprimed or the primed version of a state variable can be used, depending on the index i. For a ladder logic formula we often write ψ ≡ [R1,R2,...,Rn] where Ri ≡ c′i ⇔ ψi, for 1 ≤ i ≤ n, for some n ≥ 0. The subformulae Ri are called rungs. 5 Representation of an interlocking as an automaton We capture the dynamics of a Westrace interlocking by defining an automaton relative to a given ladder logic formula. Consider the control loop in Section 2: a state in the automaton represents a configuration of the controller and a transition p→q represents one execution of the loop. That is, if p represents the configuration of the controller at (*), then q represents the configuration of the controller at (*) one cycle later. 1 A similar modelling approach has been taken in [FH98]. 5 / 17 Volume 35 (2010) Automatically Verifying Railway Interlockings using SAT-based Model Checking In order to define the transition relation via ladder logic formulae, we define paired valuations. In the definition we use I′ to represent new inputs to the controller and the function unprime to remove the prime from a variable. Definition 2 (Paired valuations) Given a finite set of input variables I, a finite set of state variables C, and valuations µ, µ′ : (I ∪C) →{0,1} we define the paired valuation µ ; µ′ : (I ∪ C∪I′∪C′)→{0,1} where µ ; µ ′(x) = { µ(x) if x ∈ I ∪C µ ′(unprime(x)) if x ∈ I′∪C′. We now define an automaton for a ladder logic formula: Definition 3 (Automaton) Given a ladder logic formula ψ over I∪C, we define the automaton A(ψ) = (S,S0,→) where • S ={µ |µ : I ∪C →{0,1}} is the set of states, • µ → µ′ if µ ; µ′ |= ψ defines the transitions, and • S0 ={µ′ |∃µ : µ |=¬I, µ ; µ′ |= ψ} gives the set of initial states. Here, ¬I expands to ∧ i∈I ¬i for all i ∈ I. Remark 1 The automaton A(ψ) is non deterministic as ψ does not impose any conditions on the variables in I′: The controller is not allowed to refuse any input. The automaton might have more than one start state as the computation of the set of initial states only sets the input variables I, the state variables C can take any value. Finally, the automaton A(ψ) is finite; it has 2|I∪C| states. This automaton faithfully models the behaviour of the interlocking. The set of initial states S0 of the automaton represents all possible configurations of the interlocking when reaching point (*) for the first time. As one transition corresponds to one execution of the loop, the traces of configurations observed at (*) directly correspond to the state sequences of the automaton. Naturally, such a controller should never stop. In our formalisation of a Westrace interlocking we can prove this: Theorem 1 Let ψ be a ladder logic formula. Let µ be a state in A(ψ). Then there exists a state µ ′ such that µ ; µ′ |= ψ , i.e. it holds that µ → µ′. Proof. (Sketch) By induction on size n of a ladder logic formula. Assume the claim holds for length i. Given an evaluation µi for Vi = I ∪{c′1,...,c ′ i−1}∪{ci,...,cn} we set µi+1(x) = µi(x) for x ∈Vi, µi+1(c′i) = 1 if µi |= ψi and µi+1(c ′ i) = 0 if µi 6|= ψi. Finally set µ ′(c) = µn(c) for all c ∈C. A paired valuation µ ; µ′ is reachable with respect to an automaton A(ψ) = (S,S0,→), if there exists a series of transitions µ0 → µ1 →···→ µ → µ′ with µ0 ∈ S0. Proc. AVoCS 2010 6 / 17 ECEASST Figure 3: An automaton modelling of the ladder logic program for a pelican crossing. Figure 3 illustrates the reachable states of the automaton constructed from the pelican crossing ladder logic formula in Figure 2. Here, initial states are represented via double circles, and some variable values have been excluded for ease of reading. 5.1 Safety conditions A typical safety property in our pelican crossing example would be: “A traffic light always shows a single aspect”. Using the vocabulary for the control program, we capture this property by the following propositional formula: SingleAspect ≡ (tla g∨tla r)∧¬(tla g∧tla r)∧(tlb g∨tlb r)∧¬(tlb g∧tlb r). I.e., “For both traffic lights, namely tla and tlb, it holds that they always show a signal, however, they never show green and red at the same time.” Experience with Westrace interlockings has shown that the safety properties arising in practice speak about at most two consecutive configurations at (*) of the control program depicted in Section 2 (here the above example speaks only about one configuration). This justifies the following definition: Definition 4 (Safety condition) A safety condition ϕ for a ladder logic formula ψ over variables I ∪C is a propositional formula over variables I ∪C∪C′. In this definition we exclude variables from the set I′ as the controller has no influence over any input values. 5.2 The verification problem With these notions at hand we can state our verification problem: Given a ladder logic formula ψ and a safety condition ϕ , we say that ψ is safe w.r.t. ϕ , A(ψ) |= ϕ, 7 / 17 Volume 35 (2010) Automatically Verifying Railway Interlockings using SAT-based Model Checking iff µ ; µ′ |= ϕ for all reachable paired valuations µ ; µ′ in A(ψ). The exclusion of non-reachable states from the verification problem is motivated by the veri- fication results in [KMS08] – see Section 1 – and comes as a direct request from Invensys. Our Pelican crossing program is safe w.r.t. SingleAspect only thanks to the exclusion of non-reachable states. For example, let µ, µ′ and µ′′ be states with µ = {crossing = 1, req = 1, pressed = 1, tla g = 1, tlb g = 1, tla r = 0, tlb r = 0, pla g = 0, plb g = 0, pla r = 1, plb r = 1, audio=0}, µ ′ = {crossing = 0, req = 0, pressed = 0, tla g = 0, tlb g = 0, tla r = 0, tlb r = 0, pla g = 0, plb g = 0, pla r = 1, plb r = 1, audio=0} and µ′′ any arbitrary successor of µ′ (its existence is guaranteed by Theorem 1). µ ; µ′ is safe, i.e. µ ; µ′ |= SingleAspect, there is a transition from µ′ to µ′′, however, µ′ ; µ′′ is not safe, i.e. µ′ ; µ′′ 6|= SingleAspect. But µ ; µ′ is not reachable to begin with, see Figure 3. It is obvious how to extend our setting to safety properties that involve k > 2 configurations of the interlocking: instead of paired valuations one has to define k-tuples of valuations; a safety property ϕ can speak about k different copies of each variable in I ∪C; and ψ is safe if all reachable k-tuples of consecutive states satisfy the safety condition ϕ. 6 Applying model checking to ladder logic In this section we discuss two verification techniques based on SAT solving: bounded model checking [BCCZ99] and temporal induction [SSS00]. To allow us to apply these techniques, we firstly have to give a representation of the state sequences of the automaton under consideration. 6.1 Representing state sequences Given a set I of input variables and a set C of state variables, we define variable sets Wi = C(i)∪I(i) with C(i) = {c(i) |c ∈ C} and I(i) = {x(i) |x ∈ I} for i ∈ Z. Here we use the superscript (i) to produce fresh variables. We write [Wi/(I ∪C)] to denote the substitution where all superscripts are removed, and [Wi+1/(I′∪C′)] for the substitution where all superscripts are replaced by primes. A sequence W0,W1,W2,... of these variable sets is capable to “store” a state sequence of an automaton A(ψ): Definition 5 (Series of transitions) Let ψ be a ladder logic formula. We define the propositional formulae Init ≡ ( ∧ i∈I(−1) ¬i)∧T (W−1,W0) Tn ≡ ∧ 0≤i≤n−1 T (Wi,Wi+1) where n ≥ 0 and T (Wi,Wi+1)≡ ψ [Wi/(I ∪C)][Wi+1/(I′∪C′)]. Given a ladder logic formula ψ , then the formula Init∧Tn is “satisfied” exactly by all state sequences s0,s1,...,sn of A(ψ). More formally: Given a state sequence s0,s1,...,sn we construct an valuation µ : W−1 ∪W0 ∪···∪Wn → {1,0}, where state s j gives the interpretation of Wj for 0 ≤ j ≤ n, i.e. µ(i( j)) = s j(i), i ∈ I, and µ(c( j)) = s j(c), c ∈ C; µ(i(−1)) = 0, i ∈ I, and µ(c(−1)) such that we reach s0 via ψ. For this µ holds: µ |= Init∧Tn. Conversely, given a µ with µ |= Init∧Tn one can decompose it to a state sequences s0,s1,...,sn of A(ψ). With these notations in place, we can define safety at a specific point in a sequence W0,W1,W2,.... Proc. AVoCS 2010 8 / 17 ECEASST Definition 6 (Safety at step n) Let ϕ be a safety condition for a ladder logic formula ψ. We define the propositional formula ϕn ≡ ϕ [Wn−1/(I ∪C)][Wn/(I′∪C′)], where n > 0. 6.2 Bounded model checking Widely used within industrial applications [CESS08, ADK+05], bounded model checking re- stricts the search space by a bound which states how many transitions of the automaton should maximally be considered for the verification process. Using the formulae Initial ≡ Init∧T1 ⇒ ϕ1 Transitionn ≡ Tn ⇒ ϕn, for n > 0 the algorithm shown in Figure 4 performs a forwards iteration of the state-space. Given an au- tomaton A(ψ) and safety condition ϕ , the algorithm will check: (1) that ϕ holds on all transitions leaving the initial states of the automaton, and that (2) ϕ holds for up to K transitions from an initial state of the automaton. if ¬Initial is satisfiable return error trace j ← 2 while j ≤ K do if ¬Transition j is satisfiable return error trace j ← j + 1 return ”K-Safe” Figure 4: K-step forwards iteration algorithm. The algorithm in Figure 4 calls a SAT solver once in every iteration. In practice, the algorithm performs better when multiple calls to the SAT solver are combined into one call, namely for l > 1, “¬Transition j satisfiable”, . . . , “Transition j+l satisfiable”, are combined to one call, namely “¬(Transition j ∧···∧Transition j+l) satisfiable”. Practical results from the pelican crossing example, show that verification times are less than one second2. With inductive verification, see [Kan08], verification of the safety condition given in Section 5.1 fails for the induction step. With the proposed bounded model checking approach, we were able to show that this was in fact due to unreachable states. That is, a bound size of k = 6 is required when using the given algorithm. Then via inspecting the state space given in Figure 3 we see that a bound of 6 covers all states. 6.3 Unbounded model checking Temporal induction [SSS00] is a method that is based on strengthening the inductive approach as e.g., given by Kanso [Kan08]. As the name suggests, the verification method still consists of 2 All results presented in this paper are based on tests carried out using a 64-bit computer, with a 3GHz quad-core processor and 8 GBytes of memory. 9 / 17 Volume 35 (2010) Automatically Verifying Railway Interlockings using SAT-based Model Checking two proof steps, namely a base case and an inductive step. These proof steps are however used differently: the (negation of the) base case is checked for satisfiability, and the (negation of the) inductive step is checked for unsatisfiability. Our presentation follows [ES03]. We define properties of a state sequence encoded by W0,W1,...,Wn: LFn ≡ ( ∧ 0≤k