SAFECheckpoints Runtime Verification Monitoring (Optional)
There is an expectation within ISO 26262 that runtime verification monitors will be used to detect, indicate and handle systematic faults within software rated ASIL C and D.
SAFERTOS® includes a range of built-in error checking routines. Additionally, there is the optional SAFECheckpoints module which provides SAFERTOS with a sophisticated Task Monitoring capability, ensuring the scheduling of Tasks is occurring as intended. The Checkpoints mechanism allows the user to specify timing tolerances for critical sections of code; this can be used to ensure that:
- Periodic tasks run within tolerances.
- Sections of processing within tasks complete on time.
- Interrupt event to handler task processing completes within allowable tolerances.
- Complex functionality involving multiple tasks completes within allowable tolerances.
Individual checkpoints can specify their own call back function or the system error hook can be activated.
- Single shot and Periodic checkpoints can be created.
- Periodic checkpoints can operate in fixed or relative timing modes.
Security in Your Automotive Application
Whilst security has always been important, it has become even more of a priority over the last few years. We take cyber security very seriously, and can provide a variety of solutions.
One cyber security risk factor to consider is the length of the supply chain. The more companies you have in your software supply chain, the greater the risk. SAFERTOS® is developed completely in-house here at WHIS, with every line of code accounted for and verified, providing a very strong justification for using SAFERTOS within security applications.
For additional security, we offer SAFECRC Checker, a safety component from WHIS that can be used in conjunction with SAFERTOS. SAFECRC Checker guards against corruption and malicious attack by confirming the correctness of your program memory. More about SAFECRC Checker here.