bannerc

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migration of unmigrated content due to installation of a new plugin
Set Data
hiddentrue
namereftab
4
Tabsetup
01. Principle and Rational
12. Examples
23. Inputs
34. Resources
45. Lessons Learned
Div
idtabs-1

1. Principle

Floatbox

Include Page
Principles List
Principles List

Excerpt

Include in the software design the capability for commanding modification of the software, and for preventing unwanted modifications.

1.1 Rationale

There is often a need for modification of the software or data components after delivery to correct faults, improve performance, maintain hardware functionality or other attributes, or adapt to a changed environment. The capability is needed in-flight via the uplink command function and prior to launch via the umbilical link. Additionally, software that is modifiable during operation should be protected from unintended modifications including those caused by single event effects, and hardware problems.






Div
idtabs-2

2. Examples and Discussion

This design principle includes the following four aspects:

  1. The capability to command an upload of code (portions or in total), and the data, ought to be limited to a single target memory device under user/ground control and monitoring at a time.
    If dual memory units are incorporated in the design, under no circumstances are the prime and redundant memories to be modified concurrently, or before the operational performance of the change is properly assured in a single unit. Care must be taken during the operation to ensure that the code being replaced is not executing at the time of its replacement.

  2. The capability to verify that an uploaded code or data portion is correct before placing it into service.
    Typically this is done via direct memory compares of the software version ID and checksum during the upload process and during power on self-test/built in test.

  3. The design should avoid use of self-modifying code.
    Self-modifying code is error-prone as well as difficult to read, test, and maintain.

  4. The capability to detect inadvertent modification of a memory segment.
    Inadvertent modification of memory can be caused by unintended over-writing of code areas, execution in data areas, unused areas, and other areas not intended for execution. Wherever possible, features of the processor and/or operating system should be used to protect against incorrect memory use (for example, disabling the “write enable” switch such that writing to protected memory areas causes interrupts). Initializing unused memory to illegal instructions that cause interrupts when executed is a software technique that may also be used. Techniques such as partitioning of code and data help minimize the potential for unintended modification. Such techniques provide isolation between functionally independent software elements and may even reduce the verification effort and increase its fidelity.
Div
idtabs-3

3. Inputs

Show If
groupconfluence-users
Panel
titleColorred
titleVisible to editors only

Excerpts from three documents are included below but no information on the documents that the excerpts were taken from is available. These documents should be properly referenced.

3.1 ARC

  • 3.7.2.4.3 Protection from Unintended Software Modification
    The flight software architecture should be designed to protect flight software that is intended to be modifiable during flight from unintended modifications.

  • 3.7.2.1 Software Modifiability
    The flight software design shall provide the capability to upload new software and replace old modules during the mission.

  • 3.7.2.5 Protection Against Incorrect Memory Use
    Software shall be designed to protect against incorrect use of memory with the following considerations:

         a. Execution in data areas, unused areas, and areas not intended for execution.
         b. Unintended over-writing of code areas.
         c. The updating of code/software be limited to a single target memory device under user ground control and monitoring at a time. If dual memory units are incorporated in the design, under no circumstances are the prime and redundant memories to be modified concurrently, or before the operational performance of the change is properly assured in a single unit.

3.2 GSFC

None

3.3 JPL

  • 4.11.4.3 Protection from unintended software modification - Flight software that is modifiable during flight shall be protected from unintended modifications including those caused by operations errors, single event effects, and hardware problems.
    Note: Protection is typically provided by intentionally enabling a write operation before modifying the software; at all other times, write operations are disabled to protect the software from unintended modifications. Unintended modifications can be introduced through configuration management, design, and operations flaws as well as physics.

  • 4.1.7.3 Capability to re-load flight software - The design shall include the capability to re-load flight software in-flight via the uplink command function, and prior to launch via the umbilical link.

3.4 MSFC

  • 4.12.1.3 Flight software loads, updates and sequence memory loads shall be capable of verification after upload.
    Rationale: To ensure the integrity of the process, all updates to the program of reprogrammable devices, e.g., flight software loads/updates and sequence memory loads, must be verified by a memory readout or checksum readout. Depending on the application and mission/system consequence, single or multiple readouts may be considered. Program here refers to both loading software and configuration files.

  • 4.12.1.5 Software shall be designed to protect against incorrect use of memory.
    Note: Incorrect use of memory such as execution in data areas, unused areas, and other areas not intended for execution, unintended over-writing of code areas. Wherever possible, features of the processor and/or operating system should be utilized to protect against incorrect memory use. For example, disabling the “write enable” switch such that writing to protected memory areas causes interrupts. Software techniques may also be used such as initializing unused memory to illegal instructions that cause interrupts when executed.

    Rationale: Techniques such as partitioning of code and data help minimize the potential for unintended modification. It is a technique for providing isolation between functionally independent software elements and may even reduce the verification effort and increase its fidelity.

  • 4.12.1.7 The software design shall provide the capability to upload software.
    Rationale: Software design should include the functionality and capability to allow modification of the software or data components after delivery to correct faults, improve performance, maintain hardware functionality or other attributes, or adapt to a changed environment.

  • 4.12.1.9 Flight software shall report the software version ID and checksum value as part of the power on self test and/or built in test status.
    Rationale: Validate that the correct software version is loaded into the electronic component

         a. No self-modifying code to be used in flight software.

    Rationale: Self-modifying code is error-prone as well as difficult to read, test, and maintain.

  • 4.12.3.9 Flight software shall detect inadvertent memory modification and recover to a known safe state.
    Rationale: Memory modifications may occur due to radiation-induced errors, uplink errors, configuration errors, or other causes, so the computing system must be able to detect the problem and recover to a safe state. For example, there have been cases aboard the International Space Station in which the computing system’s memory check sum function detected incorrect data loads and enabled isolation and safe recovery. Memory correction features may be used to enable such a recovery. As an example, computing systems may implement error detection and correction, software executable and data load authentication, periodic memory scrub and space partitioning to provide protection against inadvertent memory modification.
Div
idtabs-4

4. Resources

4.1 References

refstable-topic



Show If
groupconfluence-users
Panel
titleColorred
titleVisible to editors only

Enter the necessary modifications to be made in the table below:

SWEREFs to be addedSWEREFS to be deleted


SWEREFs called out in the text: 439, 679

SWEREFs NOT called out in text but listed as germane: NONE


Include Page
REF RPT p08
REF RPT p08
Div
idtabs-5

5. Lessons Learned

5.1 NASA Lessons Learned

Lessons that appear in the NASA LLIS

Swerefn
refnum439
or Center Lessons Learned Databases.

  • Provide In-flight Capability to Modify Mission Plans During All Operations (2004)Lesson Learned 1480:
    Swerefn
    refnum679
     "The Mars Exploration Rover (MER) flight system had the ability to update EDL parameters during Approach, and the mission design furnished an operational plan, process, and tools for performing the updates. These capabilities permitted JPL to respond to new data on the Mars atmospheric density by modifying the timing of the MER parachute release, assuring mission success. Maintain an operational capability to code critical parameters in flight software and to update them during the latter stages of encounter/EDL."