Skip to content

Perception-SLAM Artifact Compatibility Matrix

Last updated: 2026-05-09

Purpose

Perception-SLAM releases are not single artifacts. A safe runtime combination includes code, containers, models, TensorRT engines, maps, calibration, route/geofence overlays, parameters, diagnostics configuration, and cloud-side observability schemas. This matrix defines what must be compatible before an artifact can be activated on a vehicle or promoted through OTA rings.

The operating rule is simple: compatibility is proven by a signed manifest and validation evidence, not inferred from file names or "latest" labels.

Compatibility Axes

AxisRequired metadataWhy it matters
Vehicle platformVehicle type, wheelbase, sensor kit, brake/steer interface, safety controller versionGeometry and actuation assumptions affect free-space and MRC behavior
Sensor hardwareSensor model, serial, firmware, timestamp mode, mounting position, health limitsModels and calibration are sensor-specific
Compute/runtimeGPU/accelerator, driver, CUDA, TensorRT, ROS distro, kernel, DDS profileEngines and latency behavior can change across runtime versions
ModelModel ID, training data ID, input/output schema, class ontology, precision, calibration fileConsumers must understand tensors, classes, uncertainty, and thresholds
MapSite, bundle ID, tile IDs, datum, layers, overlays, route graph, expiryPose, route, and geofence depend on exact map bundle
CalibrationIntrinsics, extrinsics, time offsets, sensor-to-base transform, verification stateFusion and map alignment fail silently with stale calibration
ConfigurationODD limits, monitor thresholds, planner margins, feature flags, diagnostics graphConfig can change behavior as much as code
Telemetry schemaOTel schema URL, robotics custom schema, event IDs, unitsDashboards and release gates must not misread fields
EvidenceTest partition, benchmark manifest, shadow/canary results, safety-case claim IDsSUMS and safety case need reproducible approval evidence

Matrix

ArtifactCompatible withBlock conditionRequired evidence
Perception containerROS distro, message definitions, GPU driver, model runtime, diagnostics graphTopic/schema mismatch, unresolved dependency, untested DDS/QoS changeCI, SIL replay, interface contract check, SBOM/VEX
SLAM/localization containerMap format, TF tree, sensor drivers, calibration, timing stackFrame/datum change without migration test, timing policy mismatchReplay ATE/RPE, timing stress, map compatibility test
TensorRT engineGPU architecture, TensorRT/CUDA versions, model hash, precision calibrationEngine built on different accelerator/runtime or stale calibration cacheEngine build attestation, deserialization test, latency report
Neural modelInput preprocessing, ontology, uncertainty calibration, runtime thresholdsClass/order/schema change not reflected in consumersModel card, dataset lineage, calibration and slice metrics
Occupancy/free-space modelGrid resolution, unknown semantics, planner contract, protected-zone policyUnknown/free encoding change or false-free-space gate failureFalse-free-space report, OOD/unknown object evaluation
Map bundleSite/route, localization algorithm, calibration, vehicle geometry, overlaysWrong active map, expired overlay, tile frame mismatchMap QA report, source traversal provenance, canary metrics
Calibration packageSensor serials, mounts, firmware, TF tree, vehicle body frameApplied to wrong vehicle/sensor kit or drift state redCalibration benchmark report, drift monitor record
Runtime configCode/model/map version set, ODD, monitor thresholds, release ringThreshold differs from validation without approvalConfig schema validation, safety impact record
Diagnostics graphNode names, diagnostic producers, operation modes, latch policyMissing critical node or changed severity semanticsDiagnostic graph test and alert routing proof
Observability schemaOn-vehicle telemetry, cloud pipeline, dashboards, alert rulesBreaking schema without dashboard migrationSchema version, migration test, sample event replay

Manifest Fields

FieldRequirement
manifest_idImmutable ID signed by release authority
vehicle_eligibilityVehicle classes, sensor kits, excluded serials, site IDs
artifact_setCode, model, engine, map, calibration, config, schema, diagnostics graph digests
compatibility_hashHash over the full version set, not only individual artifacts
activation_preconditionsParked/mission-complete state, battery, network, operator acknowledgement if required
rollback_setPrevious compatible artifact set and cache state
evidence_idsCI, replay, calibration, map QA, safety-case, security, and canary evidence
expiryMaximum activation window and sunset date for temporary overlays/configs
signaturesUptane/TUF metadata signatures plus build provenance attestations

Release Gates

GatePass conditionBlocks
C0 inventoryFleet reports active and candidate artifact IDs with digestsUnknown active version on target vehicle
C1 cryptographic trustPackage signatures, metadata, and provenance verifyUnsigned package, expired metadata, failed SLSA provenance check
C2 compatibilityFull compatibility matrix passes for vehicle/site/cohortAny required axis unresolved
C3 validationRequired benchmark, replay, calibration, map, and runtime evidence attachedEvidence missing or produced under a different manifest
C4 activation safetyPreconditions and rollback cache verified on representative vehicleActivation during mission or no known-good rollback
C5 canary healthCanary metrics remain within baseline envelope for hold periodLocalization, free-space, OOD, latency, intervention, or support-ticket regression
C6 closurePost-deployment report links active manifests and residual issuesUnaccounted vehicles or unresolved safety alerts

Rollback and Quarantine

TriggerImmediate actionFollow-up
Engine deserialization failureKeep previous engine and mark candidate incompatibleRebuild engine for exact runtime and hardware
Map/calibration mismatchBlock dispatch for affected vehicle/siteReissue compatible map or recalibrate vehicle
Unknown schema in telemetryFreeze promotion and mark evidence invalidBackfill parser or republish telemetry schema
Canary false-free-space alertStop rollout and quarantine candidate manifestPreserve logs, replay event, update safety case
Security metadata failureAbort activation and revoke affected metadata if neededIncident review and key-rotation assessment

Governance Notes

UNECE R156 and ISO 24089 are road-vehicle software-update references, but the SUMS pattern applies directly to non-road airside fleets because behavior can change through software, maps, models, calibration, and configuration. Uptane protects OTA delivery against rollback, freeze, mix-and-match, and arbitrary software attacks, but it does not replace build provenance or safety validation. Use SLSA provenance for the build chain and the compatibility manifest for runtime activation.

  • 50-cloud-fleet/ota/software-update-management-system-ops.md
  • 50-cloud-fleet/ota/ota-fleet-management.md
  • 40-runtime-systems/software-operations/on-vehicle-supply-chain-runtime-security.md
  • 40-runtime-systems/ml-deployment/production-ml-deployment.md
  • 50-cloud-fleet/observability/slam-timing-health-dashboard.md
  • 60-safety-validation/safety-case/safety-case-evidence-traceability.md

Sources

Public research notes collected from public sources.