Comment:
Migration of unmigrated content due to installation of a new plugin
Set Data
hidden
true
name
reftab
4
Tabsetup
0
1. Principle and Rational
1
2. Examples
2
3. Inputs
3
4. Resources
4
5. Lessons Learned
Div
id
tabs-1
1. Principle
Floatbox
Include Page
Principles List
Principles List
Excerpt
Include in the software design the capability for commanding modification of the software, and for preventing unwanted modifications.
1.1 Rationale
There is often a need for modification of the software or data components after delivery to correct faults, improve performance, maintain hardware functionality or other attributes, or adapt to a changed environment. The capability is needed in-flight via the uplink command function and prior to launch via the umbilical link. Additionally, software that is modifiable during operation should be protected from unintended modifications including those caused by single event effects, and hardware problems.
Div
id
tabs-2
2. Examples and Discussion
This design principle includes the following four aspects:
The capability to command an upload of code (portions or in total), and the data, ought to be limited to a single target memory device under user/ground control and monitoring at a time. If dual memory units are incorporated in the design, under no circumstances are the prime and redundant memories to be modified concurrently, or before the operational performance of the change is properly assured in a single unit. Care must be taken during the operation to ensure that the code being replaced is not executing at the time of its replacement.
The capability to verify that an uploaded code or data portion is correct before placing it into service. Typically this is done via direct memory compares of the software version ID and checksum during the upload process and during power on self-test/built in test.
The design should avoid use of self-modifying code. Self-modifying code is error-prone as well as difficult to read, test, and maintain.
The capability to detect inadvertent modification of a memory segment. Inadvertent modification of memory can be caused by unintended over-writing of code areas, execution in data areas, unused areas, and other areas not intended for execution. Wherever possible, features of the processor and/or operating system should be used to protect against incorrect memory use (for example, disabling the “write enable” switch such that writing to protected memory areas causes interrupts). Initializing unused memory to illegal instructions that cause interrupts when executed is a software technique that may also be used. Techniques such as partitioning of code and data help minimize the potential for unintended modification. Such techniques provide isolation between functionally independent software elements and may even reduce the verification effort and increase its fidelity.
Div
id
tabs-3
3. Inputs
Show If
group
confluence-users
Panel
titleColor
red
title
Visible to editors only
Excerpts from three documents are included below but no information on the documents that the excerpts were taken from is available. These documents should be properly referenced.
3.1 ARC
3.7.2.4.3 Protection from Unintended Software Modification The flight software architecture should be designed to protect flight software that is intended to be modifiable during flight from unintended modifications.
3.7.2.1 Software Modifiability The flight software design shall provide the capability to upload new software and replace old modules during the mission.
3.7.2.5 Protection Against Incorrect Memory Use Software shall be designed to protect against incorrect use of memory with the following considerations:
a. Execution in data areas, unused areas, and areas not intended for execution. b. Unintended over-writing of code areas. c. The updating of code/software be limited to a single target memory device under user ground control and monitoring at a time. If dual memory units are incorporated in the design, under no circumstances are the prime and redundant memories to be modified concurrently, or before the operational performance of the change is properly assured in a single unit.
3.2 GSFC
None
3.3 JPL
4.11.4.3 Protection from unintended software modification - Flight software that is modifiable during flight shall be protected from unintended modifications including those caused by operations errors, single event effects, and hardware problems. Note: Protection is typically provided by intentionally enabling a write operation before modifying the software; at all other times, write operations are disabled to protect the software from unintended modifications. Unintended modifications can be introduced through configuration management, design, and operations flaws as well as physics.
4.1.7.3 Capability to re-load flight software - The design shall include the capability to re-load flight software in-flight via the uplink command function, and prior to launch via the umbilical link.
3.4 MSFC
4.12.1.3 Flight software loads, updates and sequence memory loads shall be capable of verification after upload. Rationale: To ensure the integrity of the process, all updates to the program of reprogrammable devices, e.g., flight software loads/updates and sequence memory loads, must be verified by a memory readout or checksum readout. Depending on the application and mission/system consequence, single or multiple readouts may be considered. Program here refers to both loading software and configuration files.
4.12.1.5 Software shall be designed to protect against incorrect use of memory. Note: Incorrect use of memory such as execution in data areas, unused areas, and other areas not intended for execution, unintended over-writing of code areas. Wherever possible, features of the processor and/or operating system should be utilized to protect against incorrect memory use. For example, disabling the “write enable” switch such that writing to protected memory areas causes interrupts. Software techniques may also be used such as initializing unused memory to illegal instructions that cause interrupts when executed.
Rationale: Techniques such as partitioning of code and data help minimize the potential for unintended modification. It is a technique for providing isolation between functionally independent software elements and may even reduce the verification effort and increase its fidelity.
4.12.1.7 The software design shall provide the capability to upload software. Rationale: Software design should include the functionality and capability to allow modification of the software or data components after delivery to correct faults, improve performance, maintain hardware functionality or other attributes, or adapt to a changed environment.
4.12.1.9 Flight software shall report the software version ID and checksum value as part of the power on self test and/or built in test status. Rationale: Validate that the correct software version is loaded into the electronic component
a. No self-modifying code to be used in flight software.
Rationale: Self-modifying code is error-prone as well as difficult to read, test, and maintain.
4.12.3.9 Flight software shall detect inadvertent memory modification and recover to a known safe state. Rationale: Memory modifications may occur due to radiation-induced errors, uplink errors, configuration errors, or other causes, so the computing system must be able to detect the problem and recover to a safe state. For example, there have been cases aboard the International Space Station in which the computing system’s memory check sum function detected incorrect data loads and enabled isolation and safe recovery. Memory correction features may be used to enable such a recovery. As an example, computing systems may implement error detection and correction, software executable and data load authentication, periodic memory scrub and space partitioning to provide protection against inadvertent memory modification.
Div
id
tabs-4
4. Resources
4.1 References
refstable-topic
Show If
group
confluence-users
Panel
titleColor
red
title
Visible to editors only
Enter the necessary modifications to be made in the table below:
SWEREFs to be added
SWEREFS to be deleted
SWEREFs called out in the text: 439, 679
SWEREFs NOT called out in text but listed as germane: NONE
Include Page
REF RPT p08
REF RPT p08
Div
id
tabs-5
5. Lessons Learned
5.1 NASA Lessons Learned
Lessons that appear in the NASA LLIS
Swerefn
refnum
439
or Center Lessons Learned Databases.
Provide In-flight Capability to Modify Mission Plans During All Operations (2004). Lesson Learned 1480:
Swerefn
refnum
679
"The Mars Exploration Rover (MER) flight system had the ability to update EDL parameters during Approach, and the mission design furnished an operational plan, process, and tools for performing the updates. These capabilities permitted JPL to respond to new data on the Mars atmospheric density by modifying the timing of the MER parachute release, assuring mission success. Maintain an operational capability to code critical parameters in flight software and to update them during the latter stages of encounter/EDL."