-
Vitamin-V: Expanding Open-Source RISC-V Cloud Environments
Authors:
Ramon Canal,
Stefano Di Carlo,
Dimitris Gizopoulos,
Alberto Scionti,
Francesco Lubrano,
Josep-Lluís Berral,
Aaron Call,
Diego Marron,
Konstantinos Nikas,
Dionisios Pnevmatikatos,
Daniel Raho,
Alvise Rigo,
Yannis Papaefstathiou,
José María Arnau,
Angelos Arelakis
Abstract:
Among the key contributions of Vitamin-V (2023-2025 Horizon Europe project), we develop a complete RISC-V open-source software stack for cloud services with comparable performance to the cloud-dominant x86 counterpart. In this paper, we detail the software suites and applications ported plus the three cloud setups under evaluation.
Among the key contributions of Vitamin-V (2023-2025 Horizon Europe project), we develop a complete RISC-V open-source software stack for cloud services with comparable performance to the cloud-dominant x86 counterpart. In this paper, we detail the software suites and applications ported plus the three cloud setups under evaluation.
△ Less
Submitted 12 June, 2024;
originally announced July 2024.
-
Hypervisor Extension for a RISC-V Processor
Authors:
Jaume Gauchola,
JuanJosé Costa,
Enric Morancho,
Ramon Canal,
Xavier Carril,
Max Doblas,
Beatriz Otero,
Alex Pajuelo,
Eva Rodríguez,
Javier Salamero,
Javier Verdú
Abstract:
This paper describes our experience implementing a Hypervisor extension for a 64-bit RISC-V processor. We describe the design process and the main required parts with a brief explanation of each one.
This paper describes our experience implementing a Hypervisor extension for a 64-bit RISC-V processor. We describe the design process and the main required parts with a brief explanation of each one.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
SafeLS: Toward Building a Lockstep NOEL-V Core
Authors:
Marcel Sarraseca,
Sergi Alcaide,
Francisco Fuentes,
Juan Carlos Rodriguez,
Feng Chang,
Ilham Lasfar,
Ramon Canal,
Francisco J. Cazorla,
Jaume Abella
Abstract:
Safety-critical systems such as those in automotive, avionics and space, require appropriate safety measures to avoid silent data corruption upon random hardware errors such as those caused by radiation and other types of electromagnetic interference. Those safety measures must be able to prevent faults from causing the so-called common cause failures (CCFs), which occur when a fault produces iden…
▽ More
Safety-critical systems such as those in automotive, avionics and space, require appropriate safety measures to avoid silent data corruption upon random hardware errors such as those caused by radiation and other types of electromagnetic interference. Those safety measures must be able to prevent faults from causing the so-called common cause failures (CCFs), which occur when a fault produces identical errors in redundant elements so that comparison fails to detect the errors and a failure arises. The usual solution to avoid CCFs in CPU cores is using lockstep cores, so that two cores execute the same flow of instructions, but with some time staggering so that their state is never identical and faults can only lead to different errors, which are then detectable by means of comparison. This paper extends Gaisler's RISC-V NOEL-V core with lockstep; and presents future prospects for its use and distribution.
△ Less
Submitted 28 July, 2023;
originally announced July 2023.
-
A comparison between traditional and Serverless technologies in a microservices setting
Authors:
Juan Mera Menéndez,
Jose Emilio Labra Gayo,
Enrique Riesgo Canal,
Aitor Echevarría Fernández
Abstract:
Serverless technologies, also known as FaaS (Function as a Service), are promoted as solutions that provide dynamic scalability, speed of development, cost-per-consumption model, and the ability to focus on the code while taking attention away from the infrastructure that is managed by the vendor. A microservices architecture is defined by the interaction and management of the application state by…
▽ More
Serverless technologies, also known as FaaS (Function as a Service), are promoted as solutions that provide dynamic scalability, speed of development, cost-per-consumption model, and the ability to focus on the code while taking attention away from the infrastructure that is managed by the vendor. A microservices architecture is defined by the interaction and management of the application state by several independent services, each with a well-defined domain. When implementing software architectures based on microservices, there are several decisions to take about the technologies and the possibility of adopting Serverless. In this study, we implement 9 prototypes of the same microservice application using different technologies. Some architectural decisions and their impact on the performance and cost of the result obtained are analysed. We use Amazon Web Services and start with an application that uses a more traditional deployment environment (Kubernetes) and migration to a serverless architecture is performed by combining and analysing the impact (both cost and performance) of the use of different technologies such as AWS ECS Fargate, AWS Lambda, DynamoDB or DocumentDB.
△ Less
Submitted 23 May, 2023;
originally announced May 2023.
-
Vitamin-V: Virtual Environment and Tool-boxing for Trustworthy Development of RISC-V based Cloud Services
Authors:
A. Arelakis,
J. M. Arnau,
J. L. Berral,
A. Call,
R. Canal,
S. Di Carlo,
J. Costa,
D. Gizopoulos,
V. Karakostas,
F. Lubrano,
K. Nikas,
Y. Nikolakopoulos,
B. Otero,
G. Papadimitriou,
I. Papaefstathiou,
D. Pnevmatikatos,
D. Raho,
A. Rigo,
E. Rodríguez,
A. Savino,
A. Scionti,
N. Tampouratzis,
A. Torregrosa
Abstract:
Vitamin-V is a 2023-2025 Horizon Europe project that aims to develop a complete RISC-V open-source software stack for cloud services with comparable performance to the cloud-dominant x86 counterpart and a powerful virtual execution environment for software development, validation, verification, and test that considers the relevant RISC-V ISA extensions for cloud deployment.
Vitamin-V is a 2023-2025 Horizon Europe project that aims to develop a complete RISC-V open-source software stack for cloud services with comparable performance to the cloud-dominant x86 counterpart and a powerful virtual execution environment for software development, validation, verification, and test that considers the relevant RISC-V ISA extensions for cloud deployment.
△ Less
Submitted 27 June, 2024; v1 submitted 18 May, 2023;
originally announced May 2023.
-
NEUROPULS: NEUROmorphic energy-efficient secure accelerators based on Phase change materials aUgmented siLicon photonicS
Authors:
Fabio Pavanello,
Cedric Marchand,
Ian O'Connor,
Regis Orobtchouk,
Fabien Mandorlo,
Xavier Letartre,
Sebastien Cueff,
Elena Ioana Vatajelu,
Giorgio Di Natale,
Benoit Cluzel,
Aurelien Coillet,
Benoit Charbonnier,
Pierre Noe,
Frantisek Kavan,
Martin Zoldak,
Michal Szaj,
Peter Bienstman,
Thomas Van Vaerenbergh,
Ulrich Ruhrmair,
Paulo Flores,
Luis Guerra e Silva,
Ricardo Chaves,
Luis-Miguel Silveira,
Mariano Ceccato,
Dimitris Gizopoulos
, et al. (12 additional authors not shown)
Abstract:
This special session paper introduces the Horizon Europe NEUROPULS project, which targets the development of secure and energy-efficient RISC-V interfaced neuromorphic accelerators using augmented silicon photonics technology. Our approach aims to develop an augmented silicon photonics platform, an FPGA-powered RISC-V-connected computing platform, and a complete simulation platform to demonstrate…
▽ More
This special session paper introduces the Horizon Europe NEUROPULS project, which targets the development of secure and energy-efficient RISC-V interfaced neuromorphic accelerators using augmented silicon photonics technology. Our approach aims to develop an augmented silicon photonics platform, an FPGA-powered RISC-V-connected computing platform, and a complete simulation platform to demonstrate the neuromorphic accelerator capabilities. In particular, their main advantages and limitations will be addressed concerning the underpinning technology for each platform. Then, we will discuss three targeted use cases for edge-computing applications: Global National Satellite System (GNSS) anti-jamming, autonomous driving, and anomaly detection in edge devices. Finally, we will address the reliability and security aspects of the stand-alone accelerator implementation and the project use cases.
△ Less
Submitted 4 May, 2023;
originally announced May 2023.
-
Validation, Verification, and Testing (VVT) of future RISC-V powered cloud infrastructures: the Vitamin-V Horizon Europe Project perspective
Authors:
Marti Alonso,
David Andreu,
Ramon Canal,
Stefano Di Carlo,
Cristiano Chenet,
Juanjo Costa,
Andreu Girones,
Dimitris Gizopoulos,
Vasileios Karakostas,
Beatriz Otero,
George Papadimitriou,
Eva Rodriguez,
Alessandro Savino
Abstract:
Vitamin-V is a project funded under the Horizon Europe program for the period 2023-2025. The project aims to create a complete open-source software stack for RISC-V that can be used for cloud services. This software stack is intended to have the same level of performance as the x86 architecture, which is currently dominant in the cloud computing industry. In addition, the project aims to create a…
▽ More
Vitamin-V is a project funded under the Horizon Europe program for the period 2023-2025. The project aims to create a complete open-source software stack for RISC-V that can be used for cloud services. This software stack is intended to have the same level of performance as the x86 architecture, which is currently dominant in the cloud computing industry. In addition, the project aims to create a powerful virtual execution environment that can be used for software development, validation, verification, and testing. The virtual environment will consider the relevant RISC-V ISA extensions required for cloud deployment. Commercial cloud systems use hardware features currently unavailable in RISC-V virtual environments, including virtualization, cryptography, and vectorization. To address this, Vitamin-V will support these features in three virtual environments: QEMU, gem5, and cloud-FPGA prototype platforms. The project will focus on providing support for EPI-based RISC-V designs for both the main CPUs and cloud-important accelerators, such as memory compression. The project will add the compiler (LLVM-based) and toolchain support for the ISA extensions. Moreover, Vitamin-V will develop novel approaches for validating, verifying, and testing software trustworthiness. This paper focuses on the plans and visions that the Vitamin-V project has to support validation, verification, and testing for cloud applications, particularly emphasizing the hardware support that will be provided.
△ Less
Submitted 3 May, 2023;
originally announced May 2023.
-
An Automotive Case Study on the Limits of Approximation for Object Detection
Authors:
Martí Caro,
Hamid Tabani,
Jaume Abella,
Francesc Moll,
Enric Morancho,
Ramon Canal,
Josep Altet,
Antonio Calomarde,
Francisco J. Cazorla,
Antonio Rubio,
Pau Fontova,
Jordi Fornt
Abstract:
The accuracy of camera-based object detection (CBOD) built upon deep learning is often evaluated against the real objects in frames only. However, such simplistic evaluation ignores the fact that many unimportant objects are small, distant, or background, and hence, their misdetections have less impact than those for closer, larger, and foreground objects in domains such as autonomous driving. Mor…
▽ More
The accuracy of camera-based object detection (CBOD) built upon deep learning is often evaluated against the real objects in frames only. However, such simplistic evaluation ignores the fact that many unimportant objects are small, distant, or background, and hence, their misdetections have less impact than those for closer, larger, and foreground objects in domains such as autonomous driving. Moreover, sporadic misdetections are irrelevant since confidence on detections is typically averaged across consecutive frames, and detection devices (e.g. cameras, LiDARs) are often redundant, thus providing fault tolerance.
This paper exploits such intrinsic fault tolerance of the CBOD process, and assesses in an automotive case study to what extent CBOD can tolerate approximation coming from multiple sources such as lower precision arithmetic, approximate arithmetic units, and even random faults due to, for instance, low voltage operation. We show that the accuracy impact of those sources of approximation is within 1% of the baseline even when considering the three approximate domains simultaneously, and hence, multiple sources of approximation can be exploited to build highly efficient accelerators for CBOD in cars.
△ Less
Submitted 13 April, 2023;
originally announced April 2023.
-
The RECIPE Approach to Challenges in Deeply Heterogeneous High Performance Systems
Authors:
Giovanni Agosta,
William Fornaciari,
David Atienza,
Ramon Canal,
Alessandro Cilardo,
José Flich Cardo,
Carles Hernandez Luz,
Michal Kulczewski,
Giuseppe Massari,
Rafael Tornero Gavilá,
Marina Zapater
Abstract:
RECIPE (REliable power and time-ConstraInts-aware Predictive management of heterogeneous Exascale systems) is a recently started project funded within the H2020 FETHPC programme, which is expressly targeted at exploring new High-Performance Computing (HPC) technologies. RECIPE aims at introducing a hierarchical runtime resource management infrastructure to optimize energy efficiency and minimize t…
▽ More
RECIPE (REliable power and time-ConstraInts-aware Predictive management of heterogeneous Exascale systems) is a recently started project funded within the H2020 FETHPC programme, which is expressly targeted at exploring new High-Performance Computing (HPC) technologies. RECIPE aims at introducing a hierarchical runtime resource management infrastructure to optimize energy efficiency and minimize the occurrence of thermal hotspots, while enforcing the time constraints imposed by the applications and ensuring reliability for both time-critical and throughput-oriented computation that run on deeply heterogeneous accelerator-based systems. This paper presents a detailed overview of RECIPE, identifying the fundamental challenges as well as the key innovations addressed by the project. In particular, the need for predictive reliability approaches to maximize hardware lifetime and guarantee application performance is identified as the key concern for RECIPE, and is addressed via hierarchical resource management of the heterogeneous architectural components of the system, driven by estimates of the application latency and hardware reliability obtained respectively through timing analysis and modelling thermal properties, mean-time-to-failure of subsystems. We show the impact of prediction accuracy on the overheads imposed by the checkpointing policy, as well as a possible application to a weather forecasting use case.
△ Less
Submitted 4 March, 2021;
originally announced March 2021.
-
Platform-Agnostic Steal-Time Measurement in a Guest Operating System
Authors:
Javier Verdu,
Juan Jose Costa,
Beatriz Otero,
Eva Rodriguez,
Alex Pajuelo,
Ramon Canal
Abstract:
Steal time is a key performance metric for applications executed in a virtualized environment. Steal time measures the amount of time the processor is preempted by code outside the virtualized environment. This, in turn, allows to compute accurately the execution time of an application inside a virtual machine (i.e. it eliminates the time the virtual machine is suspended). Unfortunately, this metr…
▽ More
Steal time is a key performance metric for applications executed in a virtualized environment. Steal time measures the amount of time the processor is preempted by code outside the virtualized environment. This, in turn, allows to compute accurately the execution time of an application inside a virtual machine (i.e. it eliminates the time the virtual machine is suspended). Unfortunately, this metric is only available in particular scenarios in which the host and the guest OS are tightly coupled. Typical examples are the Xen hypervisor and Linux-based guest OSes. In contrast, in scenarios where the steal time is not available inside the virtualized environment, performance measurements are, most often, incorrect.
In this paper, we introduce a novel and platform agnostic approach to calculate this steal time within the virtualized environment and without the cooperation of the host OS. The theoretical execution time of a deterministic microbenchmark is compared to its execution time in a virtualized environment. When factoring in the virtual machine load, this solution -as simple as it is- can compute the steal time. The preliminary results show that we are able to compute the load of the physical processor within the virtual machine with high accuracy.
△ Less
Submitted 2 October, 2018;
originally announced October 2018.