Hazard3
Hazard3 copied to clipboard
3-stage RV32IMACZb* processor with debug
Hazard3
Hazard3 is a 3-stage RISC-V processor, implementing the RV32I
instruction set and the following optional extensions:
-
M
: integer multiply/divide/modulo -
A
: atomic memory operations, with AHB5 global exclusives -
C
: compressed instructions -
Zicsr
: CSR access -
Zba
: address generation -
Zbb
: basic bit manipulation -
Zbc
: carry-less multiplication -
Zbs
: single-bit manipulation -
Zbkb
: basic bit manipulation for scalar cryptography -
Zcb
: basic additional compressed instructions -
Zcmp
: push/pop instructions - Debug, Machine and User privilege/execution modes
- Privileged instructions
ECALL
,EBREAK
,MRET
andWFI
- Physical memory protection (PMP) with up to 16 naturally aligned regions
You can read the documentation here. (PDF link)
This repository also contains a compliant RISC-V Debug Module for Hazard3, which can be accessed over an AMBA 3 APB port or using the optional JTAG Debug Transport Module.
There is an example SoC integration, showing how these components can be assembled to create a minimal system with a JTAG-enabled RISC-V processor, some RAM and a serial port.
Hazard3 is still under development.
Links to Specifications
These are links to the ratified versions of the extensions.
Extension | Specification |
---|---|
RV32I v2.1 |
Unprivileged ISA 20191213 |
M v2.0 |
Unprivileged ISA 20191213 |
A v2.1 |
Unprivileged ISA 20191213 |
C v2.0 |
Unprivileged ISA 20191213 |
Zicsr v2.0 |
Unprivileged ISA 20191213 |
Zifencei v2.0 |
Unprivileged ISA 20191213 |
Zba v1.0.0 |
Bit Manipulation ISA extensions 20210628 |
Zbb v1.0.0 |
Bit Manipulation ISA extensions 20210628 |
Zbc v1.0.0 |
Bit Manipulation ISA extensions 20210628 |
Zbs v1.0.0 |
Bit Manipulation ISA extensions 20210628 |
Zbkb v1.0.1 |
Scalar Cryptography ISA extensions 20220218 |
Zcb v1.0.3-1 |
Code Size Reduction extensions frozen v1.0.3-1 |
Zcmp v1.0.3-1 |
Code Size Reduction extensions frozen v1.0.3-1 |
Machine ISA v1.12 | Privileged Architecture 20211203 |
Debug v0.13.2 | RISC-V External Debug Support 20190322 |
These specifications are abstract descriptions of the architectural features that Hazard3 implements. The Hazard3 documentation is a concrete description of how it implements them, especially in regard to the privileged ISA and debug support.
Cloning This Repository
For the purpose of using Hazard3 in your design, this repository is self-contained. You will need to pull in the submodules for simulation scripts, compliance tests and for components for the example SoC:
git clone --recursive https://github.com/Wren6991/Hazard3.git hazard3
Running Hello World
These instructions are for Ubuntu 20.04. You will need:
- A recent Yosys build to process the Verilog. At least version
c2afcbe7
, which includes a workaround for a gtkwave string parsing issue. Latest master should be fine. - A
riscv32-unknown-elf-
toolchain to build software for the core - A native
clang
to build the simulator
Yosys
The Yosys GitHub repo has instructions for building Yosys from source. I don't recommend right now (July '21) to use the version from your package manager.
RISC-V Toolchain
The instructions below are for building a version of the 32-bit RISC-V GNU toolchain with multilib support for the various combinations of RV32I/M/A/C ISAs:
# Prerequisites for Ubuntu 20.04
sudo apt install -y autoconf automake autotools-dev curl python3 libmpc-dev libmpfr-dev libgmp-dev gawk build-essential bison flex texinfo gperf libtool patchutils bc zlib1g-dev libexpat-dev
cd /tmp
git clone --recursive https://github.com/riscv/riscv-gnu-toolchain
cd riscv-gnu-toolchain
./configure --prefix=/opt/riscv --with-arch=rv32ia --with-abi=ilp32 --with-multilib-generator="rv32i-ilp32--;rv32ia-ilp32--;rv32iac-ilp32--;rv32ic-ilp32--;rv32im-ilp32--;rv32ima-ilp32--;rv32imac-ilp32--;rv32imc-ilp32--"
sudo mkdir /opt/riscv
sudo chown $(whoami) /opt/riscv
make -j $(nproc)
This build will also install an appropriate gdb as riscv32-unknown-elf-gdb
.
The --with-multilib-generator=
flag builds multiple versions of the standard library, to match possible -march
flags provided at link time. If there is no exact match, the linker falls back to the architecture specified by the --with-arch
flag, which in this case is the fairly conservative RV32IA. This will become worse with GCC 12, where for example the CSR instructions have moved from I
to Zicsr
, and the entire arch string must still be matched to get the non-fallback library.
Make sure this toolchain can be found on your PATH
(as riscv32-unknown-elf-*
):
export PATH="$PATH:/opt/riscv/bin"
Actually Running Hello World
Make sure you have done a recursive clone of the Hazard3 repository. Build the CXXRTL-based simulator:
cd hazard3
cd test/sim/tb_cxxrtl
make
Build and run the hello world binary:
cd ../hellow
make
All going well you should see something like:
$ make
mkdir -p tmp/
riscv32-unknown-elf-gcc -march=rv32imc -Os ../common/init.S main.c -T ../common/memmap.ld -I../common -o tmp/hellow.elf
riscv32-unknown-elf-objcopy -O binary tmp/hellow.elf tmp/hellow.bin
riscv32-unknown-elf-objdump -h tmp/hellow.elf > tmp/hellow.dis
riscv32-unknown-elf-objdump -d tmp/hellow.elf >> tmp/hellow.dis
../tb_cxxrtl/tb --bin tmp/hellow.bin --vcd tmp/hellow_run.vcd --cycles 100000
Hello world from Hazard3 + CXXRTL!
CPU requested halt. Exit code 123
Ran for 601 cycles
This will have created a waveform dump called tmp/hellow_run.vcd
which you can view with GTKWave:
gtkwave tmp/hellow_run.vcd
Loading Hello World with the Debugger
Invoking the simulator built in the previous step, with no arguments, shows the following usage message:
$ ./tb
At least one of --bin or --port must be specified.
Usage: tb [--bin x.bin] [--vcd x.vcd] [--dump start end] [--cycles n] [--port n]
--bin x.bin : Flat binary file loaded to address 0x0 in RAM
--vcd x.vcd : Path to dump waveforms to
--dump start end : Print out memory contents from start to end (exclusive)
after execution finishes. Can be passed multiple times.
--cycles n : Maximum number of cycles to run before exiting.
Default is 0 (no maximum).
--port n : Port number to listen for openocd remote bitbang. Sim
runs in lockstep with JTAG bitbang, not free-running.
This simulator contains:
- Hardware:
- The processor
- A Debug Module (DM)
- A JTAG Debug Transport Module (DTM)
- Software:
- RAM model
- Routines for loading binary files, dumping VCDs
- Routines for bitbanging the JTAG DTM through a TCP socket
Running hello world in the previous section used the --bin
argument to load the linked hello world executable directly into the testbench's RAM. If we invoke the simulator with the --port
argument, it will instead wait for a connection on that port, and then accept JTAG bitbang commands in OpenOCD's remote-bitbang
format. The simulation runs in lockstep with the JTAG bitbanging, for more predictable results.
We need to build a copy of riscv-openocd
before going any further. OpenOCD's role is to translate the abstract debug commands issued by gdb, e.g. "set the program counter to address x
", to more concrete operations, e.g. "shift this JTAG DR".
Building riscv-openocd
We need a recent build of riscv-openocd with the remote-bitbang
protocol enabled.
cd /tmp
git clone https://github.com/riscv/riscv-openocd.git
cd riscv-openocd
./bootstrap
# Prefix is optional
./configure --enable-remote-bitbang --enable-ftdi --program-prefix=riscv-
make -j $(nproc)
sudo make install
Loading and Running
You're going to want three terminal tabs in the tb_cxxrtl
directory.
cd hazard3/test/sim/tb_cxxrtl
In the first of them type:
./tb --port 9824
You should see something like
Waiting for connection on port 9824
The simulation will start once OpenOCD connects. In your second terminal in the same directory, start riscv-openocd:
riscv-openocd -f openocd.cfg
If you see something like:
Info : Initializing remote_bitbang driver
Info : Connecting to localhost:9824
Info : remote_bitbang driver initialized
Info : This adapter doesn't support configurable speed
Info : JTAG tap: hazard3.cpu tap/device found: 0xdeadbeef (mfg: 0x777 (<unknown>), part: 0xeadb, ver: 0xd)
Info : datacount=1 progbufsize=2
Info : Disabling abstract command reads from CSRs.
Info : Examined RISC-V core; found 1 harts
Info : hart 0: XLEN=32, misa=0x40801105
Info : starting gdb server for hazard3.cpu on 3333
Info : Listening on port 3333 for gdb connections
Info : Listening on port 6666 for tcl connections
Info : Listening on port 4444 for telnet connections
Then openocd is successfully connected to the processor's debug hardware. We're going to use riscv-gdb to load and run the hello world executable, which is what the third terminal is for:
riscv32-unknown-elf-gdb
# Remaining commands are typed into the gdb prompt. This one tells gdb to shut up:
set confirm off
# Connect to openocd on its default port:
target extended-remote localhost:3333
# Load hello world, and check that it loaded correctly
file ../hellow/tmp/hellow.elf
load
compare-sections
# The processor will quit the simulation when after returning from main(), by
# writing to a magic MMIO register. openocd will be quite unhappy that the
# other end of its socket disappeared, so to avoid the resulting error
# messages, add a breakpoint before _exit.
break _exit
run
# Should break at _exit. Check the terminal with the simulator, you should see
# the hello world message. The exit code is in register a0, it should be 123:
info reg a0
Building an Example SoC
There is a tiny example SoC which builds on both iCEBreaker and ULX3S. The SoC contains:
- A Hazard3 processor, in a single-ported RV32IM configuration, with debug support
- A Debug Transport Module and Debug Module to access Hazard3's debug interface
- 128 kB of RAM (fits in UP5k SPRAMs)
- A UART
On iCEBreaker (a iCE40 UP5k development board), the processor can be debugged using the onboard FT2232H bridge, through a standard RISCV-V JTAG-DTM exposed on four IO pins. Connecting JTAG requires two solder jumpers to be bridged on the back to connect the JTAG -- see the comments in the pin constraints file. FT2232H is a dual-channel FTDI device, so the UART and JTAG can be accessed simultaneously for a very civilised debug experience, with JTAG running at the full 30 MHz supported by the FTDI.
ULX3S is based on a much larger ECP5 FPGA. Thanks to this ECP5 JTAG adapter, it is possible to attach the guts of a RISC-V JTAG-DTM to the custom DR hooks in ECP5's chip TAP. With the right config file you can then convince OpenOCD that the FPGA's own TAP is a JTAG-DTM. You can debug Hazard3 on ULX3S using the same micro USB cable you use to load the bitstream, no soldering required. The downside is that the FT231X device on the ULX3S is actually a UART bridge which supports JTAG by bitbanging the auxiliary UART signals, which is incredibly slow. The UART can not be used simultaneously with JTAG access.
For these reasons -- much faster JTAG, and simultaneous UART access -- iCEBreaker is currently a more pleasant platform to debug if you don't have any external JTAG probe.
Note there is no software tree for this SoC. For now you'll have to read the source and hack on the test software build. All very much WIP. At least you can attach to the processor, poke registers/memory, and convince yourself you really are debugging a RISC-V core.
Building for iCEBreaker
cd hazard3
cd example_soc/synth
make -f Icebreaker.mk prog
# Should be able to attach to the processor
riscv-openocd -f ../icebreaker-openocd.cfg
Building for ULX3S
cd hazard3
cd example_soc/synth
make -f ULX3S.mk flash
# Should be able to attach to the processor
riscv-openocd -f ../ulx3s-openocd.cfg