You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
:note: Use the failure initiators to ensure a structured analysis. If a failure doesn't apply, please fill in a short description in the violation cause of the analysis so it could be recognized that the analysis is done. If there are additional failure initiators needed, please enlarge the list of fault models.
26
+
.. note:: Use the failure initiators to ensure a structured analysis. If a failure doesn't apply, please fill in a short description in the violation cause of the analysis so it could be recognized that the analysis is done. If there are additional failure initiators needed, please enlarge the list of fault models.
27
+
28
+
.. note:: A ASIL related message is trustable in that manner that it is not corrupted, repeated, lost, delayed, masqueraded or addressed incorrectly.
29
+
27
30
28
31
**Purpose**
29
32
@@ -35,14 +38,16 @@ DFA failure initiators
35
38
36
39
2.1 Shared resources
37
40
38
-
.. list-table:: DFA shared resources
41
+
.. note:: Shared libraries are only than to be considered as a shared resource if the feature and the related safety mechanisms are using this specific library. If the library is not used by the feature or the related safety mechanisms, it is not a shared resource.
42
+
43
+
.. list-table:: DFA shared resources (used for Platform Feature DFA)
39
44
:header-rows: 1
40
45
:widths: 10,30,30,30
41
46
42
47
* - ID
43
48
- Violation cause shared resources
44
49
- Simplification
45
-
- Importance (can be used for priorisation)
50
+
- Importance (can be used for prioritization)
46
51
* - SR_01_01
47
52
- Reused software modules
48
53
-
@@ -105,7 +110,7 @@ DFA failure initiators
105
110
-
106
111
- Medium
107
112
* - CO_01_05
108
-
- Asymmetric information sent from a sender to multiple receivers, so that not all defined receivers have the same informations
113
+
- Asymmetric information sent from a sender to multiple receivers, so that not all defined receivers have the same information's
109
114
-
110
115
- Medium
111
116
* - CO_01_06
@@ -127,7 +132,7 @@ DFA failure initiators
127
132
* - ID
128
133
- Violation cause shared information inputs
129
134
- Simplification
130
-
- Importance (can be used for priorisation)
135
+
- Importance (can be used for prioritization)
131
136
* - SI_01_02
132
137
- Configuration data
133
138
-
@@ -155,7 +160,7 @@ DFA failure initiators
155
160
* - ID
156
161
- Violation cause unintended impact
157
162
- Simplification
158
-
- Importance (can be used for priorisation)
163
+
- Importance (can be used for prioritization)
159
164
* - UI_01_01
160
165
- Memory miss-allocation and leaks
161
166
-
@@ -210,7 +215,7 @@ DFA failure initiators
210
215
211
216
:note: Section shall be applied only once to analyse all dependencies of the features. Results shall be checked during of the analysis of new features if this is applicable to the feature.
212
217
213
-
.. list-table:: DFA development failure initiators
218
+
.. list-table:: DFA development failure initiators (Feature Platform DFA)
Copy file name to clipboardExpand all lines: process/process_areas/safety_analysis/guidance/fault_models_guideline.rst
+88-84Lines changed: 88 additions & 84 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,90 +23,94 @@ Fault Models
23
23
|Fault Model for sequence diagrams
24
24
25
25
26
-
:note: Use the fault models to ensure a structured analysis. If a fault model doesn't apply, please fill in a short description in the violation cause of the analysis so it could be recognized that the analysis is done. If there are additional fault models needed, please enlarge the list of fault models.
26
+
.. note:: Use the fault models to ensure a structured analysis. If a fault model doesn't apply, please fill in a short description in the violation cause of the analysis so it could be recognized that the analysis is done. If there are additional fault models needed, please enlarge the list of fault models.
27
27
28
28
29
-
.. list-table:: Fault Models for sequence diagrams
30
-
:header-rows: 1
31
-
:widths: 15,6,30,30,15
29
+
.. note:: A ASIL related message is trustable in that manner that it is not corrupted, repeated, lost, delayed, masqueraded or addressed incorrectly.
32
30
33
-
* - Element
34
-
- ID
35
-
- Failure Mode
36
-
- Simplification
37
-
- Importance (can be used for priorisation)
38
-
* - message
39
-
- MF_01_01
40
-
- message is not received
41
-
- MF_01_05
42
-
- High
43
-
* - message
44
-
- MF_01_02
45
-
- message received too late
46
-
- relevant only if delay is a realistic fault
47
-
- Medium
48
-
* - message
49
-
- MF_01_03
50
-
- message received too early
51
-
- usually not a problem
52
-
- Low
53
-
* - message
54
-
- MF_01_04
55
-
- message not received correctly by all recipients (different messages or messages partly lost)
56
-
- only relevant if the same message goes to multiple recipients
57
-
- High
58
-
* - message
59
-
- MF_01_05
60
-
- message is corrupted
61
-
-
62
-
- High
63
-
* - message
64
-
- MF_01_06
65
-
- message is not sent
66
-
-
67
-
- High
68
-
* - message
69
-
- MF_01_07
70
-
- message is unintended sent
71
-
-
72
-
- High
73
-
* - duration/time constraint
74
-
- CO_01_01
75
-
- minimum constraint boundary is violated
76
-
-
77
-
- Medium
78
-
* - duration/time constraint
79
-
- CO_01_02
80
-
- maximum constraint boundary is violated
81
-
-
82
-
- High
83
-
* - execution
84
-
- EX_01_01
85
-
- Process calculates wrong result(s)
86
-
- MF_01_05 or MF_01_04
87
-
- High
88
-
* - execution
89
-
- EX_01_02
90
-
- processing too slow
91
-
- relevant only if timing is considered
92
-
- Medium
93
-
* - execution
94
-
- EX_01_03
95
-
- processing too fast
96
-
- relevant only if timing is considered
97
-
- Medium
98
-
* - execution
99
-
- EX_01_04
100
-
- loss of execution
101
-
-
102
-
- High
103
-
* - execution
104
-
- EX_01_05
105
-
- processing changes to arbitrary process
106
-
-
107
-
- Medium
108
-
* - execution
109
-
- EX_01_06
110
-
- processing is not complete (infinite loop)
111
-
-
112
-
- High
31
+
32
+
Fault Models for sequence diagrams
33
+
.. list-table:: Fault Models for sequence diagrams
34
+
:header-rows: 1
35
+
:widths: 15,6,30,30,15
36
+
37
+
* - Element
38
+
- ID
39
+
- Failure Mode
40
+
- Simplification
41
+
- Importance (can be used for priorisation)
42
+
* - message
43
+
- MF_01_01
44
+
- message is not received
45
+
- MF_01_05
46
+
- High
47
+
* - message
48
+
- MF_01_02
49
+
- message received too late
50
+
- relevant only if delay is a realistic fault
51
+
- Medium
52
+
* - message
53
+
- MF_01_03
54
+
- message received too early
55
+
- usually not a problem
56
+
- Low
57
+
* - message
58
+
- MF_01_04
59
+
- message not received correctly by all recipients (different messages or messages partly lost)
60
+
- only relevant if the same message goes to multiple recipients
Copy file name to clipboardExpand all lines: process/process_areas/safety_analysis/guidance/safety_analysis_guideline.rst
+9-5Lines changed: 9 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,15 +31,15 @@ Detailed description which steps are need for a safety analysis. In general the
31
31
#. Analyse the dependencies between features by performing a **single platform feature DFA** that references all platform feature static architecture diagrams, highlighting potential shared use of modules.
32
32
#. Monitor the results of the platform feature DFA and log any issues in the Issue Tracking system with the ``safety`` label.
33
33
#. Verify the platform feature DFA results by using :need:`gd_chklst__safety_analysis`.
34
-
#. Platform feature DFA are completed when the verification is done, no issues are open and the status is "valid".
34
+
#. Platform feature DFA is completed when the verification is done, no issues are open and the status is "valid". The verification criteria is that it can be proven that a function and the corresponding safety monitoring are not both affected.
35
35
#. To analyse the Feature Architecture a FMEA and a DFA shall be executed. The results of the platform feature DFA shall be used as an input.
36
36
#. Monitor the results of the FMEA and DFA and log any issues in the Issue Tracking system with the ``safety`` label.
37
37
#. Verify the FMEA and DFA results by using :need:`gd_chklst__safety_analysis`..
38
38
#. Feature FMEA and DFA are completed when the verification is done, no issues are open and the status is "valid".
39
39
#. To analyse the Component Architecture a FMEA and a DFA shall be executed. The results of the feature FMEA and DFA shall be used as an input.
40
40
#. Monitor the results of the FMEA and DFA and log any issues in the Issue Tracking system with the ``safety`` label.
41
-
#. Verify the FMEA and DFA results by using :need:`gd_chklst__safety_analysis`..
42
-
#. Component FMEA and DFA are completed when the verification is done, no issues are open and the status is "valid".
41
+
#. Verify the FMEA and DFA results by using :need:`gd_chklst__safety_analysis`.
42
+
#. Component FMEA and DFA are completed when the verification is done, no issues are open and the status is "valid". The verification criteria is that it can be proven that a function and the corresponding safety monitoring are not both affected.
43
43
44
44
45
45
A example for the safety analysis (FMEA and DFA) is shown in the :ref:`examples_fmea_dfa`.
@@ -57,7 +57,7 @@ The analysis considers single faults that can mitigate a safety requirement.
57
57
58
58
* For each dynamic diagram, assign the faults by ID from the fault model and document it as a sphinx-needs directive.
59
59
* Document the resulting failure mode and effect and link to a safety requirement that mitigates the violation.
60
-
* Document safety mitigation to avoid or control the failure.
60
+
* Document safety mitigation to avoid or control the failure. If it can't be shown that a element is completely deterministic and testable, an additional safety mechanisms is needed.
61
61
* The attributes of the template are described in :ref:`process_requirements_safety_analysis_attributes`.
62
62
* Judge if this is sufficient.
63
63
* If not, request to update the diagram and the requirements with additional safety mitigation to come to a sufficient outcome by creating an issue.
@@ -66,6 +66,8 @@ The analysis considers single faults that can mitigate a safety requirement.
66
66
* Continue the analysis until all fault models are checked.
67
67
* The verification is done by applying the FMEA checklist :need:`gd_chklst__safety_analysis`.
68
68
69
+
.. note:: If there are changes they have to be analysed with a impact analysis :need:`gd_temp__change__impact_analysis`. If needed the safety analysis has to be updated accordingly. Therefore all necessary steps have to be repeated.
70
+
69
71
Step-by-Step-approach DFA:
70
72
^^^^^^^^^^^^^^^^^^^^^^^^^^
71
73
@@ -78,8 +80,10 @@ So it could be shown that the analysis was done and no fault model is applicable
78
80
* For each failure initiator assign the violation by ID from the DFA failure initiators and document it as a sphinx-needs directive.
79
81
* Document the resulting violation causes and effect and link to a safety requirement that mitigates the violation.
80
82
* The attributes of the template are described in :ref:`process_requirements_safety_analysis_attributes`.
81
-
* Judge if the mitigation is sufficient. If not, request to update the requirements with additional safety mitigation to come to a sufficient outcome.
83
+
* Judge if the mitigation is sufficient. If not, request to update the requirements with additional safety mitigation to come to a sufficient outcome. If it can't be shown that a element is completely deterministic and testable, an additional safety mechanisms is needed.
82
84
* The analysis is finished, if for each identified violation a mitigation exists.
83
85
* Unless the attribute "sufficient" is "yes", mitigation and argument attribute can be still empty.
84
86
* Continue the analysis until all failure initiators are checked.
85
87
* The verification is done by applying the safety analysis checklist :need:`gd_chklst__safety_analysis`.
88
+
89
+
.. note:: If there are changes they have to be analysed with a impact analysis :need:`gd_temp__change__impact_analysis`. If needed the safety analysis has to be updated accordingly. Therefore all necessary steps have to be repeated.
0 commit comments