The full description of the issue, including any example(s).
Description of malfunctions and the appropriate safeguards, avoidance or workaround measures.
The Type of an issue. Possible issue types are:
The Status of an issue. Possible values are:
Component: The part of the product affected by this issue.
When a product contains multiple toolchains, this field shows the toolchain(s) that are affected by the problem.
The Resolution for this issue. Possible values are:
The product versions for which this issue is listed as an open issue.
The product version(s) in which the issue is fixed.
Note: A patch does not necessarily include fixes for all toolchains present within the product. Please consult the supplied Release Note to find out which updated components are present in the patch.
A short summary of the Issue.
The unique identifier of the Issue.
When an Inspector product is available that can detect the problem described in the issue, the version information of the Inspector is listed here.
Show the status of implementation of a detector in the inspector product:
Tells how the problem is discovered, for example in customer code or with a compiler testing tool.
This field will not be visible when empty.
The reproducibility of the problem: Always, Sometimes or Once.
This field will not be visible when empty.
The likelyhood that the problem affects real world application code.
This field will not be visible when empty.
The actions to be taken to trigger the problem.
This field will not be visible when empty.
The behavior that is observed when the problem is triggered.
This field will not be visible when empty.
The behavior that is expected in the situation where the problem is triggered.
This field will not be visible when empty.
In case of a command line tool, what tool options are essential to trigger the problem.
This field will not be visible when empty.
If the problem is triggered by source code, this field describes the code patterns required to trigger the problem.
This field will not be visible when empty.
This is the date that this issue is published on the TASKING Issues Portal
This is the date that this issue is updated on the TASKING Issues Portal. Update date recording in the TASKING Issues Portal has started 2020-01-01. Updates before that date are not reflected in the Updated date.
The update history of the issue. History recording in the TASKING Issues Portal has started 2020-01-01. Before that time the history table will not show details of the changed fields. The publication date of these issues is accurate.
The date of this update.
The issue field that has been updated.
The previous value of the field that has been updated.
The new value of the field that has been updated.
SIL (Software Integrity Level): A four-valued classification to indicate the criticality of (potential) malfunctions with regards to the integrity of toolset behavior based on IEEE-1012 Standard for Software Verification and Validation.
Four software integrity levels describe the criticality of the malfunction varying from high integrity to low integrity. The criticality specifies the verification and validation efforts, intensity and rigor applied to V&V tasks in order to reduce the risk of systematic faults in the software being developed due to malfunctions of the software tool. The V&V task shall be executed by the user of the software tool in compliance with the safety standard applicable to the software being developed.
TASKING assigns SILs in accordance with the rules specified in the table below.
| Criticality | Description | SIL |
|---|---|---|
| High | Issue affects critical toolset integrity.
Important notices:
|
4 |
| Major | Issue affects important toolset integrity.
Important notices:
|
3 |
| Moderate | Issue affects toolset integrity, but workaround strategies can be implemented to compensate.
Important notices:
|
2 |
| Low | Issue has no noticeable effect on toolset integrity but only creates inconvenience.
|
1 |
1) Partial mitigation: a mitigation that could fulfill the safety requirements. The verification and validation efforts could be high to ensure the mitigation is applied for all potential occurrences. The mitigation may cause performance degradation with respect to execution speed, timing, and memory footprint of the software being developed, also the usability of the tool may degrade.
2) Full mitigation: a mitigation that fulfills the safety requirements without causing significant verification and validation efforts. The mitigation may cause minimal performance degradation of the software being developed and does not affect the usability of the tool.