Safety architecture decisions¶
Architecture decisions supporting the SEooC safety concept (see Safety).
Context. Taktora-hosted items at different integrity levels (safety-critical and QM-grade) must coexist in the same workspace without QM code being able to corrupt safety-critical state. The spatial Freedom From Interference argument has to hold without certifying the entire stack (host OS, libc, every transitive dependency) to ASIL B(D). Decision. Adopt OS process boundaries as the unit of spatial isolation between safety-critical and QM-grade hosted code. Cross- boundary communication is exclusively via iceoryx2 shared-memory channels with per-process read/write capability. Alternatives considered.
Consequences. Every SC↔QM call becomes an iceoryx2 channel
hop. Classification of which crates live inside the SC process
becomes load-bearing; per-crate integrity-level tags in
|
Context. Safety-critical hosted items at ASIL B(D) need deterministic memory-allocation behavior to meet their FTTI bound and must not be denied allocations by allocation pressure from QM-grade items. Standard system allocators don’t provide either guarantee. Decision. All allocation by safety-critical hosted code goes
through Alternatives considered.
Consequences. Caps must be sized at build time; growing past
the cap requires a rebuild. Partitioned pools (Per-integrity-level allocat... (TSR_0002))
require extending |