MT/content/introduction.tex

303 lines
16 KiB
TeX

\chapter{Introduction}
\label{chapter:Introduction}
Embedded applications are increasingly required to provide real-time
performance \cite{hopkins2006debug}. This means that the correct behavior of a
system is not only dependent on the logical results of a computation, but also
on the physical instant in which these are produced \cite{kopetz2011real}. For
hard real-time applications violation of a deadline will result in damage of
the system or its environment \cite{tokuda1990real}.
Due to the pervasive nature of embedded systems and their use for critical
applications, e.g., medical devices or advanced driver assistance systems,
measures to ensure the correctness of time dependent functionality must be
taken \cite{konrad2005real}. Therefore, debugging and validation are a
fundamental part of the development process of such applications
\cite{dixon2013advantages}.
Different techniques to debug embedded systems exist \cite{schneider2004ten}.
The simplest one is a classical \lstinline{printf} statement in C (or the
equivalent in another language). More sophisticated debug technologies require
on-chip debug logic in the embedded processor. On-chip debug generally
supports two different types of functionality: run-control debug and real-time
trace \cite{dixon2013advantages}.
The former allows it to stop and examine the state of a system at points of
interest, so called breakpoints. This approach is intrusive, or in other words
changes the runtime behavior of an application. This is not acceptable for
time critical applications, e.g., engine control units that require continuous
execution of the processor in order to control feedback loops and to maintain
mechanical stability \cite{dixon2013advantages}.
Real-time trace recording or tracing however, allows it to analyze and debug
a system without stopping the execution. It works by recording processor
events such as function calls and data accesses. The captured events can be
used to reconstruct and analyze the runtime behavior of an application.
Since timing is an integral part in the development of safe and secure
real-time applications, timing dependencies should be included in the software
interface specifications \cite{lutz1993analyzing}. One way to specify these
dependencies are timing requirements, e.g., the maximum response time for a
certain task \cite{deubzer2011robust}. Via tracing system engineers are
capable of validating those requirements on target.
\glsdesc{ta} (\gls{ta}) provides the \gls{ta} Tool Suite, a collection of tools
for the system design, simulation, automated optimization, and target
verification of embedded real-time multi-core and many-core systems
\cite{tatoolsuite}. These features work on the basis of system models.
Consequently, requirements are defined for system entities such as tasks,
runnables, signals, and semaphores.
On the contrary, trace recording produces events on software level. This means
a trace contains information about function entries and exits, and data read
and write accesses. As a consequence, the specified system requirements cannot
be evaluated.
However, by mapping software events to the corresponding system events it is
possible to transform a software to a system level trace. \glsdesc{btf}
(\gls{btf}) is a trace format on system level and is used in this thesis
because of its native support for multi-core environments. To the best of my
knowledge, the possibility of a software to system mapping has only been shown
for a small subset of all entities specified by \gls{btf}.
In this thesis the feasibility of mapping all event actions contained in the
\gls{btf} standard is discussed, evaluated and validated. Furthermore,
different real-time trace techniques are discussed with respect to their
versatility for the timing analysis of embedded multi-core real-time
applications.
\section{Motivation}
\label{section:motivation}
Transformation of software events to system events is required for the timing
analysis of embedded real-time systems as discussed in the previous section.
Moreover, system traces can also be used for different other use cases which
are covered in the following.
\subsubsection{Simulation Validation}
A simulation can be executed for a timing model by the TA Simulator. The
resulting simulated trace can be evaluated to validate the compliance of an
application with the specified requirements.
A simulated and a hardware based system trace will never be equal by
definition because a model is an abstraction of reality. Nevertheless,
simulation supports engineers in validating system behavior in early design
stages. It can abstract complex problems and analyze non-deterministic system
behavior \cite{sifakis2003building}.
However, a simulation is still a software which is vulnerable to bugs and can
potentially produce wrong results. A deviation to reality due to the
abstraction cannot be classified as a wrong result, on the other hand an
implementation error can be.
Via tracing it is possible to validate the correctness of simulated traces.
This is especially useful if a new simulation feature is implemented. In this
case a system trace recorded from hardware can provide valuable insights in the
actual behavior.
\subsubsection{OS Overhead Measurement}
Another aspect that is relevant for the development of embedded applications is
the overhead caused by the operating system (\gls{os})
\cite{zeng2011mechanisms}. Overheads are execution periods where the processor
is not used by the actual application but by the \gls{os} for example,
context switches and inter-core communication mechanisms.
Especially for applications with a high processor utilization the additional
overhead caused by the \gls{os} plays a critical role. Fulfillment of timing
requirements may be feasible or not depending on the overhead
\cite{maxmaster}. In order to take this into consideration a good
understanding of the execution times required by \gls{os} routines is
necessary. System traces recorded on hardware allow it to determine the exact
execution times for these overheads easily.
\subsubsection{Model Reconstruction}
The initial creation of a timing model for an existing application is a tedious
process if it must be done manually. Model reconstruction can simplify this
task by creating a timing model automatically. It works by analyzing a
system trace recorded from hardware. By detecting common timing patterns in
the trace a model of the application can be created
\cite{sailer2014reconstruction}.
\section{Related Work}
The two main topics discussed in this thesis are tracing and hardware to system
mapping. While the former has been an important topic in the literature over
the last three decades, the necessity for the latter has only become important
in recent years.
\subsubsection{Tracing}
Ferrari \cite{ferrari1978computer} gives an comprehensive overview of major
computer performance evaluation techniques and their application to various
types of performance problems. In his book \emph{Computer Systems Performance
Evaluation} he distinguishes between three trace measurement techniques:
software, hybrid, and hardware based trace measurement. It is important to
understand that these techniques do not directly relate to the trace
abstraction levels discussed in the previous sections. The concepts described
in his book which was released in 1978 are still relevant today, the
implementation is outdated.
Mink et al.\ \cite{mink1989performance} discuss hardware based performance
measurement in more detail. They argue that hardware tracing is the only
sufficient trace technique for recording resource utilization information
because of the high signal speeds involved and the fact that not all signals
are visible to software measurement techniques. Resource utilization is
concerned with detailed information about the operation of the hardware such as
cache hit ratios and access delays. Moreover, they mention that software based
tracing is intrusive and thus changes the runtime characteristics of an
application.
Kraft et al.\ \cite{kraft2010trace} discuss trace measurement in the context of
five industrial projects. They argue that hardware trace solutions require
large, expensive equipment mainly intended for lab use. Additionally, they
claim that software based trace solutions can also remain active in
applications post-release. Based on this arguments they use a software based
trace measurement approach in their paper. They introduce a software
instrumentation approach with a very low overhead according to their
measurement results.
\subsubsection{Hardware to System Mapping}
Lauterbach \cite{lauterbach2015third} provides a possibility to export task and
runnable system events for traces recorded via hardware tracing. However,
their approach is limited to a subset of the existing task and runnable events.
For example, runnable preempt and resume, and task wait events are not covered
by the Lauterbach export even though this information is relevant for the
real-time analysis. Lauterbach uses the information from the \glsdesc{orti}
(\gls{orti}) files and relies solely on function trace events for the export.
Kraft et al.\ \cite{kraft2010trace} also discuss how task events on system
level can be recorded. They argue that it is difficult to detect which entity
blocks a task because the scheduling status of the \gls{os} only provides
information about the entity type blocking the task not the entity itself.
They suggest code instrumentation as a pragmatic solution to work around this
problem, admitting that this approach is problematic because the
instrumentation points have to be maintained by the developer.
\section{Interrogation}
\label{section:interrogation}
Timing analysis of embedded system requires a trace, i.e., a sequence of
events, with sufficient duration and timestamp accuracy. The minimum trace
duration is dependent on the application and requirements that should be
validated. Fundamentally, the longer the trace duration the more information
for the real-time analysis of the application are acquired. However, more data
requires longer processing times. Therefore, a trace duration of at least one
second is demanded in this thesis to provide a tradeoff between processing time
and sufficient length for the real-life use-cases discussed in
\autoref{section:motivation}.
Timestamp accuracy is important for the real-time analysis because if the
resolution is too low no meaningful analysis may be feasible. For example, if
events can only be recorded in the range of milliseconds, the analysis of
requirements in the microseconds range is not feasible.
Kraft et al. \cite{kraft2010trace} also state that a timestamp accuracy in the
milliseconds range is too coarse-grained for embedded systems timing analysis.
Especially for validation of simulation tools and model reconstruction cycle
accurate timestamps would provide enormous benefits. From these requirements
the first hypothesis that should be evaluated in this thesis can be derived.
\begin{hyp}
\label{hyp:1}
There exists a trace technique that allows recording of cycle accurate traces
for embedded multi-core real-time system with a duration of at least one
second.
\end{hyp}
Trace techniques output a trace on software level, i.e., a sequence of software
events. These events provide information about the code segments executed by
an application and the memory regions accessed. This information allows deep
insights into the runtime behavior of an embedded system, but is not sufficient
for its real-time analysis.
Traces on system level or in other words, sequences of system events are
required for the real-time analysis of embedded multi-core applications. In
the context of this thesis system events are defined as all events that are
contained in the \gls{btf} specification and not explicitly excluded in
\autoref{subsection:btf_entity_types}. With an understanding of the underlying
\gls{os} mechanisms it may be possible to map software to system events.
\gls{osek} and \gls{autosar} are common standards for the development of
applications in the automotive industry. These standards are discussed in more
detail later. \gls{osek} compliant operating systems feature a so-called
\gls{orti} file.
The aim of \gls{orti} is to make \gls{os} internal data visible to external
tools \cite{osekortia}. This means it is possible via \gls{orti} to relate
software level entities to their respective interpretation on system level. It
must be examined if a mapping for all \gls{btf} entities is feasible.
\begin{hyp}
\label{hyp:2}
A complete mapping from software to system entities is feasible based on the
information included in the \gls{orti} file for an \gls{osek} compliant
\glsdesc{os}.
\end{hyp}
If Hypothesis~\ref{hyp:2} does not hold other ways to achieve a complete
software to system mapping must be found. An \gls{os} must keep track of the
states of all relevant system objects internally. Otherwise, it would not be
possible to execute appropriate actions if required. For example, if one task
activates another one the \gls{os} must determine whether the corresponding
task is allowed to be activated or if the maximum number of activations has
already been exceeded.
By analyzing the internal data structures of an \gls{os} it may be possible to
construct a mapping from software to system entities. Considering the previous
example, there might be an \gls{os} data structure that keeps track of the
remaining activations for each task entity. If the field for a task is
incremented, an entity of the corresponding task terminates. If it is
decremented a new task instance is activated.
\begin{hyp}
\label{hyp:3}
A complete mapping from software to system entities is feasible for an
\gls{osek} compliant \glsdesc{os}.
\end{hyp}
\section{Outline}
In oder to transform a trace recorded from hardware to a trace on system level
an understanding of the underlying operating system mechanisms is required. An
\gls{os} standard commonly used in the automotive industry is \gls{osekos}. It
is discussed in \autoref{section:osekvdxos}.
The real-time behavior of an embedded multi-core application can be represented
by a system trace. Based on a system trace an application can be examined and
specified timing requirements can be validated. \gls{btf} is a system level
trace format and used in this thesis. It is discussed in
\autoref{chapter:btf}.
There exist different techniques to record traces of embedded applications. In
\autoref{section:trace_measurement} an overview of these techniques is
provided. It is then argued why hardware tracing is the only technique
sufficient for the validation of embedded real-time applications. Accordingly,
hardware tracing is then discussed in more detail.
On the basis of the information in \autoref{chapter:fundamentals} the mapping
between software entities and system entities is described in
\autoref{chapter:mapping}. Mapping is done for all \gls{btf} entities that are
relevant for the analysis of embedded multi-core applications as discussed in
\autoref{subsection:btf_entity_types}.
In \autoref{chapter:validation} the mapping is validated. For that reason
criteria to compare \gls{btf} traces are established in
\autoref{subsection:validation_techniques}. Based on these criteria simulated
traces and traces recorded hardware are compared and evaluated. This is done
in two steps. Firstly, test applications are created manually to cover all
possible \gls{btf} actions in \autoref{subsection:systematic_tests}. Secondly,
applications are created randomly to avoid selection bias in the creation of
test cases in \autoref{subsection:randomized_tests}.
Finally, the results of this thesis are discussed in
\autoref{chapter:conclusion} and possible topics for future work are outlined
in \autoref{chapter:future_work}.