Спасибо AS, дал ссылку. Страшно читать. http://www.embedded.com/showArticle.jhtml?articleID=55300689
No one wants a pacemaker, but if you had one, wouldn't you want it to be reliable? Jack shares more horror stories and lessons... The spacecraft descended towards the planet, accelerating in the high-g field as it drew nearer. Sophisticated electronics measured the vehicle's position and environment with exquisite precision, waiting for just the right moment to deploy the parachute. Nothing happened. The craft crashed on the surface. Last month I described how NASA's Mars Polar Lander was lost due to a software error. But this failure played out on yet another planet, the one known as Earth, when on September 8 the Genesis mission impacted at 200MPH. As I write this the Mishap Investigation Board hasn't released a final report. But they did say the gravity-sensing switches were installed upside down so they couldn't detect the Earth's gravitational field. The origins of Murphy's Law are in some dispute. The best research I can find (www.improb.com/airchives/paperair/volume9/v9i5/murphy/murphy1.html) suggests that Captain Ed Murphy complained, "If there's any way they can do it wrong, they will" when he discovered that acceleration sensors on a rocket sled were installed backwards. Nearly 60 years later the same sort of mistake doomed Genesis. Perhaps a corollary to Murphy's Law is George Santayana's oft-quoted, "those who cannot remember the past are condemned to repeat it." NASA's mantra "test like you fly, fly like you test" serves as an inoculation of sorts against the Murphy virus. We don't as yet know why Genesis' sensors were installed upside down, but a reasonable test regime would have identified the flaw long before launch. Last month I focused on high-profile failures from the space business. Few other industries are exempt from their share of firmware disasters, some of which are quite instructive. This month we'll look at spectacular disasters and near misses in a few Earth-bound industries. Tumor zappers The Therac 25 was a radiotherapy instrument designed to treat tumors by administering carefully regulated doses of radiation. Operators found that occasionally when they pressed the "give the patient a dose" button the machine made a loud clunking sound and then illuminated the "no dose given" light. Being normal human-type operators, they did what any normal human-type person would do: press the button again. After a few iterations the patients were screaming in agony. Between 1985 and 1988 six cases of massive overdosing resulted in three deaths. The machines were all shut down during an investigation, which found that the software got confused when the backspace button was pressed within eight seconds of the "give the patient a dose" control being actuated. When this sequence occured, the device would give full-bore maximum X-rays, cooking the patient. Software killed. The code used a homebrew real-time operating system (RTOS) riddled with timing errors. Yet today, nearly two decades later, far too many of us continue to write our own operating systems despite the fact that at least a hundred are available, for prices ranging from free to infinity, from royalty-free licenses to ones probably written by pirates. Even those cool but brain-dead PIC processors that have a maximum address space of only a few hundred words have a $99 RTOS available. Developers give me lots of technical reasons why it's impossible to use a commercial operating system. Too big, too slow, wrong application programming interface—the reasons are legion. And mostly pretty dumb. Electrical engineers have long used glue logic to make incompatible parts compatible. They'd never consider building a custom UART just because of some technical obstacle. Can you imagine going to your boss and saying "this microprocessor is ideal for our application, except there are two instructions we could do so much better. So I plan to build our own out of 10 million transistors." The boss would have you committed. Yet we software people regularly do the same by building our own code from 10 million bits when perfectly sensible alternatives exist. Crafting a custom operating system is nearly always insane, and in the case of the Therac 25, criminal. It's tough to pass information between tasks safely in a multithreaded system, which is why a decent RTOS has sophisticated messaging schemes. The homebrew version used in the Therac 25 didn't have such features so global variables were used instead, another contributor to the disaster. Globals are responsible for all of the evil in the universe, from male pattern baldness to ozone depletion. Of course, sometimes they're unavoidable, but those instances are rare. Too many of us use them out of laziness. The OOP crowd chants "encapsulation, inheritance, polymorphism;" the faster they can utter that mantra the closer they are to OOP nirvana, it seems. Of the three, encapsulation is the most important. Both Java and C++ support encapsulation, as do assembly and C. Hide the data, bind it to just the routines that need it. Use drivers both for hardware and to access data items. The Therac's code was, as usual, a convoluted mess. Written mostly by a solo developer, it was utterly unaudited. No code inspections had been performed. We've known since 1976 that inspections are the best way to rid programs of bugs. Testing and debugging simply don't work; most test regimens only exercise about half the code. It's quite difficult to create truly comprehensive tests, and some features, such as exception handlers, are nearly impossible to invoke and exercise. Decent inspections will find about 70% of a system's bugs for a twentieth of the cost of debugging. The Therac's programmer couldn't be bothered, which was a shame for those three dead patients. But 1985 was a long time ago. These things just don't happen anymore. Or, do they? Dateline: Panama, 2001. Another radiotherapy device, built by a different company, zapped 28 patients. At least eight died right after the overexposures; another 15 are expected to die as a result or already have. To protect their patients the physicians put lead blocks around the tumor. The operator would draw the block configuration on the machine's screen using a mouse. Developers apparently expected the users to draw each one individually, though the manual didn't make that a requirement. Fifty years of software engineering has taught us that users will always do unexpected things. Since the blocks encircled the tumor a number of doctors drew the entire configuration in one smooth arcing line. The code printed out a reasonable treatment plan yet in fact delivered its maximum radiation dose. Software continues to kill. The FDA found the usual four horsemen of the software apocalypse at fault: inadequate testing, poor requirements, no code inspections, and no use of a defined software process. Pacemaking I bet you think heart pacemakers are immune from firmware defects. Better think again. In 1997 Guidant announced that one of its new pacemakers occasionally drives the patient's heartbeat to 190 beats per minute. Now, I don't know much about cardiovascular diseases, but suspect 190BPM to be a really bad thing for a person with a sick heart. The company reassured the pacemaker-buying public that there wasn't really a problem; they had fixed the code and were sending disks across the country to doctors. The pacemaker, however, is implanted subcutaneously. There's no Internet connection, no USB port, no PCMCIA slot. Turns out that it's possible to hold an inductive loop over the implanted pacemaker to communicate with it. A small coil in the device normally receives energy to charge the battery. It's possible to modulate the signal and upload new code into flash. The robopatients were reprogrammed and no one was hurt. The company was understandably reluctant to discuss the problem so it's impossible to get much insight into the nature of what went wrong. But clearly inadequate was testing. Guidant is far from alone. A study in the August 15, 2001 Journal of the American Medical Association ("Recalls and Safety Alerts Involving Pacemakers and Implantable Cardioverter-Defibrillator Generators") showed that more than 500,000 implanted pacemakers and cardioverters were recalled between 1990 and 2000. (This month's puzzler: how do you recall one of these things?) Forty-one percent of those recalls were due to firmware problems. The recall rate increased in the second half of that decade compared with the first. Firmware is getting worse. All five U.S. pacemaker vendors have an increasing recall rate. The study said, "engineered (hardware) incidents [are] predictable and therefore preventable, while system (firmware) incidents are inevitable due to complex processes combining in unforeseeable ways." Baloney. It's true that the software embedded into these marvels has steadily grown more complex over the years. But that's not an excuse for a greater recall rate. We must build better firmware when the code base grows. As the software content of the world increases a constant bug rate will lead to the collapse of civilization. We do know how to build better code. We choose not to. And that blows my mind. Plutonium perils Remember Los Alamos National Laboratory? Before they were so busily engaged in losing disks bulging with classified material this facility was charged with the final assembly of U.S. nuclear weapons. Most or all of that work has stopped, reportedly, but the lab still runs experiments with plutonium. In 1998 researchers were bringing two subcritical chunks of plutonium together in a "criticality" experiment that measured the rate of change of neutron flux between the two halves. It would be a Real Bad Thing if the two bits actually got quite close, so they were mounted on small controllable cars, rather like a model railway. An operator uses a joystick to cautiously nudge them toward each other. The experiment proceeded normally for a time, the cars moving at a snail's pace. Suddenly both picked up speed, careening towards each other at full speed. No doubt with thoughts of a mushroom cloud in his head, the operator hit the "shut down" button mounted on the joystick. Nothing happened. The cars kept accelerating. Finally after he actuated an emergency SCRAM control, the operator's racing heart (happily sans defective embedded pacemaker) slowed when the cars stopped and moved apart. The joystick had failed. A processor reading this device recognized the problem and sent an error message, a question mark, to the main controller. Unhappily, "?" is ASCII 63, the largest number that fits in a 6-bit field. The main CPU interpreted the message as a big number meaning go real fast. Two issues come to mind: the first is to test everything, even exception handlers. The second is that error handling is intrinsically difficult and must be designed carefully. Patterns The handful of disaster stories I've shared over the last two columns have many common elements. On Mars Polar Lander and Deep Space 2, the Mars Expedition Rover and Titan IVb, Sea Launch, pacemakers, Therac 25, and in Los Alamos, inadequate testing was a proximate cause. We know testing is hard. Yet it's usually deferred till near the end of the project, so gets shortchanged in favor of shipping now. Tired programmers make mistakes. Well, duh. Mars Polar Lander, Deep Space 2, and the Mars Expedition Rover were lost or compromised because of this well-known and preventable problem. Crummy exception handlers were one of the proximate causes of problems with the Mars Expedition Rover, Los Alamos, and plenty of other disasters. No one would have been killed by the Therac 25 had a defined software process, including decent inspections, been used. I estimate about 2% of embedded systems developers inspect all new code. Yet properly performed inspections are a silver bullet that accelerates the schedule and yields far better code. I have a large collection of embedded systems disasters. Some of the stories are tragic; others enlightening, and some merely funny. What's striking is that most of the failures stem from just a handful of causes. Remember the Tacoma Narrows bridge failure I described last month? Because bridge designer Leon Moisseiff was unable to learn from his profession's series of bridge failures caused by wind-induced torsional flutter and his own previous encounters with the same phenomenon, the bridge collapsed just four months after it opened. I fear too many of us in the embedded field are 21st-century Leon Moisseiffs, ignoring the screams of agony from our customers, the crashed code, and buggy products that are, well, everywhere. We do have a lore of disaster. It's up to us to draw the appropriate lessons. Jack G. Ganssle
No one wants a pacemaker, but if you had one, wouldn't you want it to be reliable? Jack shares more horror stories and lessons... The spacecraft descended towards the planet, accelerating in the high-g field as it drew nearer. Sophisticated electronics measured the vehicle's position and environment with exquisite precision, waiting for just the right moment to deploy the parachute. Nothing happened. The craft crashed on the surface. Last month I described how NASA's Mars Polar Lander was lost due to a software error. But this failure played out on yet another planet, the one known as Earth, when on September 8 the Genesis mission impacted at 200MPH. As I write this the Mishap Investigation Board hasn't released a final report. But they did say the gravity-sensing switches were installed upside down so they couldn't detect the Earth's gravitational field. The origins of Murphy's Law are in some dispute. The best research I can find (www.improb.com/airchives/paperair/volume9/v9i5/murphy/murphy1.html) suggests that Captain Ed Murphy complained, "If there's any way they can do it wrong, they will" when he discovered that acceleration sensors on a rocket sled were installed backwards. Nearly 60 years later the same sort of mistake doomed Genesis. Perhaps a corollary to Murphy's Law is George Santayana's oft-quoted, "those who cannot remember the past are condemned to repeat it." NASA's mantra "test like you fly, fly like you test" serves as an inoculation of sorts against the Murphy virus. We don't as yet know why Genesis' sensors were installed upside down, but a reasonable test regime would have identified the flaw long before launch. Last month I focused on high-profile failures from the space business. Few other industries are exempt from their share of firmware disasters, some of which are quite instructive. This month we'll look at spectacular disasters and near misses in a few Earth-bound industries. Tumor zappers The Therac 25 was a radiotherapy instrument designed to treat tumors by administering carefully regulated doses of radiation. Operators found that occasionally when they pressed the "give the patient a dose" button the machine made a loud clunking sound and then illuminated the "no dose given" light. Being normal human-type operators, they did what any normal human-type person would do: press the button again. After a few iterations the patients were screaming in agony. Between 1985 and 1988 six cases of massive overdosing resulted in three deaths. The machines were all shut down during an investigation, which found that the software got confused when the backspace button was pressed within eight seconds of the "give the patient a dose" control being actuated. When this sequence occured, the device would give full-bore maximum X-rays, cooking the patient. Software killed. The code used a homebrew real-time operating system (RTOS) riddled with timing errors. Yet today, nearly two decades later, far too many of us continue to write our own operating systems despite the fact that at least a hundred are available, for prices ranging from free to infinity, from royalty-free licenses to ones probably written by pirates. Even those cool but brain-dead PIC processors that have a maximum address space of only a few hundred words have a $99 RTOS available. Developers give me lots of technical reasons why it's impossible to use a commercial operating system. Too big, too slow, wrong application programming interface—the reasons are legion. And mostly pretty dumb. Electrical engineers have long used glue logic to make incompatible parts compatible. They'd never consider building a custom UART just because of some technical obstacle. Can you imagine going to your boss and saying "this microprocessor is ideal for our application, except there are two instructions we could do so much better. So I plan to build our own out of 10 million transistors." The boss would have you committed. Yet we software people regularly do the same by building our own code from 10 million bits when perfectly sensible alternatives exist. Crafting a custom operating system is nearly always insane, and in the case of the Therac 25, criminal. It's tough to pass information between tasks safely in a multithreaded system, which is why a decent RTOS has sophisticated messaging schemes. The homebrew version used in the Therac 25 didn't have such features so global variables were used instead, another contributor to the disaster. Globals are responsible for all of the evil in the universe, from male pattern baldness to ozone depletion. Of course, sometimes they're unavoidable, but those instances are rare. Too many of us use them out of laziness. The OOP crowd chants "encapsulation, inheritance, polymorphism;" the faster they can utter that mantra the closer they are to OOP nirvana, it seems. Of the three, encapsulation is the most important. Both Java and C++ support encapsulation, as do assembly and C. Hide the data, bind it to just the routines that need it. Use drivers both for hardware and to access data items. The Therac's code was, as usual, a convoluted mess. Written mostly by a solo developer, it was utterly unaudited. No code inspections had been performed. We've known since 1976 that inspections are the best way to rid programs of bugs. Testing and debugging simply don't work; most test regimens only exercise about half the code. It's quite difficult to create truly comprehensive tests, and some features, such as exception handlers, are nearly impossible to invoke and exercise. Decent inspections will find about 70% of a system's bugs for a twentieth of the cost of debugging. The Therac's programmer couldn't be bothered, which was a shame for those three dead patients. But 1985 was a long time ago. These things just don't happen anymore. Or, do they? Dateline: Panama, 2001. Another radiotherapy device, built by a different company, zapped 28 patients. At least eight died right after the overexposures; another 15 are expected to die as a result or already have. To protect their patients the physicians put lead blocks around the tumor. The operator would draw the block configuration on the machine's screen using a mouse. Developers apparently expected the users to draw each one individually, though the manual didn't make that a requirement. Fifty years of software engineering has taught us that users will always do unexpected things. Since the blocks encircled the tumor a number of doctors drew the entire configuration in one smooth arcing line. The code printed out a reasonable treatment plan yet in fact delivered its maximum radiation dose. Software continues to kill. The FDA found the usual four horsemen of the software apocalypse at fault: inadequate testing, poor requirements, no code inspections, and no use of a defined software process. Pacemaking I bet you think heart pacemakers are immune from firmware defects. Better think again. In 1997 Guidant announced that one of its new pacemakers occasionally drives the patient's heartbeat to 190 beats per minute. Now, I don't know much about cardiovascular diseases, but suspect 190BPM to be a really bad thing for a person with a sick heart. The company reassured the pacemaker-buying public that there wasn't really a problem; they had fixed the code and were sending disks across the country to doctors. The pacemaker, however, is implanted subcutaneously. There's no Internet connection, no USB port, no PCMCIA slot. Turns out that it's possible to hold an inductive loop over the implanted pacemaker to communicate with it. A small coil in the device normally receives energy to charge the battery. It's possible to modulate the signal and upload new code into flash. The robopatients were reprogrammed and no one was hurt. The company was understandably reluctant to discuss the problem so it's impossible to get much insight into the nature of what went wrong. But clearly inadequate was testing. Guidant is far from alone. A study in the August 15, 2001 Journal of the American Medical Association ("Recalls and Safety Alerts Involving Pacemakers and Implantable Cardioverter-Defibrillator Generators") showed that more than 500,000 implanted pacemakers and cardioverters were recalled between 1990 and 2000. (This month's puzzler: how do you recall one of these things?) Forty-one percent of those recalls were due to firmware problems. The recall rate increased in the second half of that decade compared with the first. Firmware is getting worse. All five U.S. pacemaker vendors have an increasing recall rate. The study said, "engineered (hardware) incidents [are] predictable and therefore preventable, while system (firmware) incidents are inevitable due to complex processes combining in unforeseeable ways." Baloney. It's true that the software embedded into these marvels has steadily grown more complex over the years. But that's not an excuse for a greater recall rate. We must build better firmware when the code base grows. As the software content of the world increases a constant bug rate will lead to the collapse of civilization. We do know how to build better code. We choose not to. And that blows my mind. Plutonium perils Remember Los Alamos National Laboratory? Before they were so busily engaged in losing disks bulging with classified material this facility was charged with the final assembly of U.S. nuclear weapons. Most or all of that work has stopped, reportedly, but the lab still runs experiments with plutonium. In 1998 researchers were bringing two subcritical chunks of plutonium together in a "criticality" experiment that measured the rate of change of neutron flux between the two halves. It would be a Real Bad Thing if the two bits actually got quite close, so they were mounted on small controllable cars, rather like a model railway. An operator uses a joystick to cautiously nudge them toward each other. The experiment proceeded normally for a time, the cars moving at a snail's pace. Suddenly both picked up speed, careening towards each other at full speed. No doubt with thoughts of a mushroom cloud in his head, the operator hit the "shut down" button mounted on the joystick. Nothing happened. The cars kept accelerating. Finally after he actuated an emergency SCRAM control, the operator's racing heart (happily sans defective embedded pacemaker) slowed when the cars stopped and moved apart. The joystick had failed. A processor reading this device recognized the problem and sent an error message, a question mark, to the main controller. Unhappily, "?" is ASCII 63, the largest number that fits in a 6-bit field. The main CPU interpreted the message as a big number meaning go real fast. Two issues come to mind: the first is to test everything, even exception handlers. The second is that error handling is intrinsically difficult and must be designed carefully. Patterns The handful of disaster stories I've shared over the last two columns have many common elements. On Mars Polar Lander and Deep Space 2, the Mars Expedition Rover and Titan IVb, Sea Launch, pacemakers, Therac 25, and in Los Alamos, inadequate testing was a proximate cause. We know testing is hard. Yet it's usually deferred till near the end of the project, so gets shortchanged in favor of shipping now. Tired programmers make mistakes. Well, duh. Mars Polar Lander, Deep Space 2, and the Mars Expedition Rover were lost or compromised because of this well-known and preventable problem. Crummy exception handlers were one of the proximate causes of problems with the Mars Expedition Rover, Los Alamos, and plenty of other disasters. No one would have been killed by the Therac 25 had a defined software process, including decent inspections, been used. I estimate about 2% of embedded systems developers inspect all new code. Yet properly performed inspections are a silver bullet that accelerates the schedule and yields far better code. I have a large collection of embedded systems disasters. Some of the stories are tragic; others enlightening, and some merely funny. What's striking is that most of the failures stem from just a handful of causes. Remember the Tacoma Narrows bridge failure I described last month? Because bridge designer Leon Moisseiff was unable to learn from his profession's series of bridge failures caused by wind-induced torsional flutter and his own previous encounters with the same phenomenon, the bridge collapsed just four months after it opened. I fear too many of us in the embedded field are 21st-century Leon Moisseiffs, ignoring the screams of agony from our customers, the crashed code, and buggy products that are, well, everywhere. We do have a lore of disaster. It's up to us to draw the appropriate lessons. Jack G. Ganssle