In creating a functional Safety Element out of
Context (SEooC) concept and doing the functional safety analysis, TI generates a series of
assumptions on system level design, functional safety concept, and requirements. These
assumptions (sometimes called Assumptions of Use) are listed below. Additional assumptions
about the detailed implementation of safety mechanisms are separately located in Section 6.3.
The MSPM0Lx22x-Q1 Functional Safety Analysis was done under the following system assumptions:
- [SA_1] The MSPM0Lx22x-Q1 MCU has interfaces to external sensors.
- [SA_2] The MSPM0Lx22x-Q1 MCU has interfaces to external actuators.
- [SA_3] The MSPM0Lx22x-Q1 MCU has interfaces to communicate with an external host controller.
- [SA_4] The MSPM0Lx22x-Q1 MCU has a programmable CPU to execute a controller function taking sensor inputs and controlling an actuator.
- [SA_5] The system integrator reviews the
recommended diagnostics in the safety analysis report (FMEDA) and safety manual and
determines the appropriate diagnostics to include in the system. These diagnostics are
implemented according to the device safety manual and data sheet.
- [SA_6] The external power supply provides the appropriate power on for each of the power inputs. These rails are monitored for deviations outside the device specifications and a reset asserts, if the voltage is outside the range.
- [SA_7] The MSPM0Lx22x-Q1 MCU monitors failures on the external clock (if present).
- [SA_8] The MSPM0Lx22x-Q1 MCU monitors failures on external sensors.
- [SA_9] The MSPM0Lx22x-Q1 MCU monitors failures on external actuators.
- [SA_10] In case of internal errors in the
MSPM0Lx22x-Q1 MCU or the interfacing sensors and actuators,
the MSPM0Lx22x-Q1 MCU can be reset. The host controller monitors
communication loss and determines that the MSPM0Lx22x-Q1 MCU is
in a faulted state.
- [SA_11] The system integrator provisions an actuator disable-mechanism controller by the host controller.
- [SA_12] The system is assumed to require architectural metrics (random fault) complying to (up to) ASIL-B.
- [SA_14] The system is assumed to have a FTTI > 10ms.
- [SA_15] The system integrator connects VBAT and VDD power pins to the same power source.
- [SA_16] The system integrator considers all potential failure modes and mitigation
measures associated with communication interfaces while implementing any end-to-end
communication protection diagnostics techniques.
- [SA_16] The DEBUG function is considered
as not safety critical.
- [SA_17] The RTC function is considered as
not safety critical.
- [SA_18] The AES function is considered as
not safety critical.
- [SA_19] The TRNG function is considered as
not safety critical.
- [SA_20] The TAMPER function is considered
as not safety critical.
- [SA_21] The BACKUP function is considered
as not safety critical.
- [SA_22] The LCD function is considered as
not safety critical.
- [SA_23] The KEYSTORE function is
considered as not safety critical.
- [SA_24] The QM IPs are not used in
safety-critical applications.
- [SA_25] TI assumes that the internal low
power modes are not used in safety-critical applications.
- [SA_26] The system integrator considers
all potential failure modes and mitigation measures associated with communication
interfaces while implementing any end-to-end communication protection diagnostics
techniques.
- [COEX0] The following components are
assumed not safety related (NSR components):
- RTC
- TRNG
- AES
- TAMPER
- BACKUP RAM
- LCD
- KEYSTORE
- DFT
- DEBUG
- [COEX1] TI recommends that unused components are disabled in the application software.
- [COEX2] TI recommends that the unused interrupt sources of components are disabled.
- [COEX3] TI recommends that DMA unused triggers of components are disabled.
- [COEX4] TI recommends that unused fault inputs in timers are disabled.
- [COEX5] If external safety mechanisms are used, the system integrator is responsible for completing a dependent failure analysis at the system level.
- [COEX6] TI assumes that the NSR components are not used in the safety context.
- [COEX7] TI recommends that debug is disabled in safety-critical applications.
- [COEX8] TI recommends that a default interrupt service routine is coded for even the unused interrupts.
- [COEX9] TI recommends that the application does not use IPs as the trigger source of other IPs when those IPs are not safety related.
- [COEX10] TI recommends that the application does not program flash during safety-critical tasks.
There are some safety mechanisms required to cover
dependent failures, refer to section on Section 6.3.63 for more details.
During integration activities these assumptions of use and integration guidelines described for
this component shall be considered. Use caution if one of the above functional safety
assumptions on this component cannot be met, as some identified gaps can be unresolvable at
the system level.