I understood that trusted function has unrestricted memory access, however I saw that a trusted function is mapped to QM application. Why do we need to put it in QM application if the function is trusted?
1
There are 1 answers
Related Questions in RTOS
- Binary Semaphore vs Mutux interview question
- Why RTOS is needed for FPGA based real-time embedded system?
- AUTOSAR Trusted function in QM application
- enabling cdc-acm uart and I2C at the same time on zephyr OS
- how does the blocking work in priority ceiling protocol
- Generating load for simulating different characteristics
- Are there advantages to using earliest deadline first?
- A hardware interrupt vs. an aperiodic task
- Priority inheritance vs priority ceiling
- Passing Small Amount of Data From an ISR Context to a Task/Thread Context
- Heap and Stack allocation in ThreadX RTOS
- if PendSV have lowest priority why it is set to 15 in RTOS
- how to port the threadX RTOS on the cortex R5?
- Why does nothing happen when i choose j-link in Segger SystemView?
- Context Switching RTOS
Related Questions in AUTOSAR
- How to decrypt data in arxml
- AUTOSAR Multiplicity * means 0 .. n or 1 .. n?
- How to define "Dem_EventStatusType" in case the state is neither in prepassed nor in prefailed condition?
- AUTOSAR Trusted function in QM application
- SenderReceiverInterface with multiple data elements difference from multiple ports and each with single data element
- File Structure of AUTOSAR BSW Modules
- AUTOSAR COM ISignal Receive Filter Default Value for Receiving ECU
- How to debug the software reset in the ECU?
- How to make CAN Frame Identifier as Dynamic Data Element in AUTOSAR ARXML File
- JAXB xjc: Resolving Illegal Class Inheritance Loop When Generating Classes from AUTOSAR XSD
- AUTOSAR BOOLEAN Size is how many bits
- AUTOSAR CanTpAddress and ISO 15765 CAN N_PDU relation
- Autosar based Secoc
- CANDBC and ARXML difference
- Does the leaf type of an array implementation data type follow type reference?
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?
Popular Tags
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
Interestingly, the (classic) Autosar OS Standard is quite hard to understand on this:
That means with other words, that only trusted OS Applications may provide trusted functions to external callers (like non-trusted OS Applications).
So, when you have a non-trusted OS Application, which has a trusted function configured (which is possible by the structure of the underlying XML), it is not Autosar conform. The generators of Autosar conformant OS implementations should state error messages on this wrong configuration.
You may ask your OS vendor (or the TechRef), whether he uses the configuration container for trusted functions in order to specify something like non-trusted functions in case the owner OS application is non-trusted.
At least MICROSAR OS (Vector) has extra parameters to configure non-trusted functions. Mind, that non-trusted functions are explicitly excluded from the classic Autosar OS Standard.