Freedom from interference

Freedom from interference

Freedom from interference is currently a buzzword in automotive industry and also a ISO26262 peculiarity, since is not part of IEC61508 vocabulary. Why is it so? Simply because of software complexity deployed in automotive and due to increasingly higher need to deal with failures that could emerge out of it (software).

Let's start with the basics. As per its definition (part one - 1.49) it is used to prevent cascading failures. What are they? Failures occuring in one element (be it SW or HW component) and affecting or propagating to another one. Careful! They are not dual-point failures! Dual point is when both elements are faulty and they become active (can lead to violation of safety goal) only when the two elements interact (for instance when a OS task is "mistakely" reading a value from a "corrupted" RAM location).

ISO26262 has a different approach than IEC61508 in that it does not consider elements, or safety (instrumented) systems, hosting different mixed SIL functions. Actually for IEC61508 "mixed-SIL" systems is simply a matter of hardware (even the guidelines for different SIL sub-systems implementing a single safety function, are given in part 2, Hardware implementation). Therefore it talks about dependent failures only in the context of safety and non-safety-related failures (also in part two) and demands that software requirements for the highest SIL level shall apply, in case of mixed-SIL system. It leaves indeed a backdoor open, by mentioning that, when not possible to separate them in HW, then "sufficient independence" has to be shown (see below)

ISO26262 expands exactly on this "backdoor", by slightly changing the existing failure classification and suggesting some informative (in an Annex) guidelines on how to show qualitative evidence of independence. It brings in the notion of cascading failures, as being complementary failure types to common cause failures, both of them being sub-categories of dependent failures. In contrast to ISO26262, which treats common cause failure as any event or root cause which can make two separate elements fail, IEC61508 regards common cause failures at system level, mainly as system failures making a redundant or multi-channel architecture to fail. Dependent failures are, in case of IEC61508, a type of "animal" similar to ISO26262 cascading failures. In order to make things visually better to perceive and maybe more descriptive, I made the table below

To further simplify them I made this other one:

I wrote this with the hope to clear out some of the confusions that the terminology can create, since I support the view that once you don't know exactly the terms are you talking about, is difficult to construct a safety argument. A step further, beyond that, would be to see some real-world examples on how to tackle those failure types. For those which can be quantitatively estimated, the IEC61508 provides pretty thorough guidelines on how to analyse them, but what about the qualitatively estimated ones? Can you perform tests to check freedom from interference? Can you prove "sufficient" independence via analysis? Then when would you know that you gathered "sufficient" proof? Based on the guidelines in ISO26262-6 (Annex D) AUTOSAR safety measures are a good way to go. It provides a detailed fault model for each of the cascading failures identified by ISO26262 (timing & execution, memory, exchange of information), as well as a software analysis method.











Sascha Kobus

"A goal without a plan is just a wish." (Antoine de Saint-Exupéry)

5 年

Hey Bogdan, I like your article very much. I’m currently also working on freedom from interference according to 26262:2018. While working the following question came up: Can we see a fault caused by QM and detected by a μC measure as one part of a multi-point fault? If “yes” the fault reaction to bring the system into safe state (for example via an external Watchdog) and its correct functionality only needs to be checked once per driving cycle because we are just talking about a latent fault in case the external watchdog doesn’t work. If “no” the fault would need an ensured fault reaction within the FTTI. That means all affected elements would need to be diagnosed within the FTTI and a fault of these elements would not be seen as latent. I’m very interesting in your opinion on this matter Regards, Sascha

回复
Bogdan Gradinaru

Safety Manager | Certified in Cybersecurity

6 年

Definitely that every design for independence shall consider both, HW and SW, this is why I put in the tables that Iec 61508 does not exclude SW dependent faults (in the first one I quoted de "backdoor" and in the second one I mentioned that they could only be "qualitatively" proven, so including SW. It is only that iec61508 does not provide any guidelines, be it so trivial as in ISO 26262, to help assessing dependent failures, and moreover talks about MIXED-SIL system mainly in HW context

There are multiple techniques derived from IEC61508 to satisfy the requirements of ‘Design for Independence’ such as Softwares Criticality Analysis.Any Design for Independence technique must consider both HW and SW together not just HW.

回复

要查看或添加评论,请登录

Bogdan Gradinaru的更多文章

  • How I cracked my Comptia Security+

    How I cracked my Comptia Security+

    After weeks of hard work and studying, I managed to pass #comptia #securityplus certification. It is indeed an entry…

    4 条评论
  • Safeware - by Nancy Leveson

    Safeware - by Nancy Leveson

    This is a groundwork and on of the most comprehensive books published in the last decades about system safety…

    7 条评论
  • Software Reliability - Principles and practices by Glenford Myers

    Software Reliability - Principles and practices by Glenford Myers

    Style of this book is similar to another one, by the same author, Glenford Myers, also reviewed some while ago in this…

    3 条评论
  • The Mythical Man-Month by Fred Brooks

    The Mythical Man-Month by Fred Brooks

    This book is essentially not about any safety or quality standard, nor is quoted in IEC61508, but is about project…

    5 条评论
  • Safety critical systems

    Safety critical systems

    The book I plan to shortly review now is not quoted or referred by the IEC61508 nowhere, but there are instead plenty…

    4 条评论
  • Software Engineering by Ian Sommerville

    Software Engineering by Ian Sommerville

    Hard to say what this book exactly is about, because ..

    3 条评论
  • Software Reuse and Reverse engineering in practice

    Software Reuse and Reverse engineering in practice

    The book is mentioned only once as a reference for one single technique from IEC61508, part 7 (Overview of techniques…

    4 条评论
  • The Art of Software Testing by Glenford Myers

    The Art of Software Testing by Glenford Myers

    Why this book and does it have special? This is a book which every test manager should keep under his pillow. In a…

    1 条评论
  • Software design for Real-time Systems by J.E. Cooling

    Software design for Real-time Systems by J.E. Cooling

    Why this book and does it have special? This book is actually a forerunner of Software Engineering for Real-Time…

    12 条评论
  • Safety for driverless industrial trucks

    Safety for driverless industrial trucks

    Technology, as well as process and environment requirements, for self-driving industrial trucks, so called AGVs, are…

    5 条评论

社区洞察

其他会员也浏览了