3.10.1. Jailhouse
3.10.1.1. Overview
Jailhouse is a static partitioning hypervisor that runs bare metal binaries. It cooperates closely with Linux. Jailhouse doesn’t emulate resources that don’t exist. It splits existing hardware resources into isolated compartments called “cells” that are wholly dedicated to guest software programs called “inmates”. One of these cells runs the Linux OS and is known as the “root cell”. Other cells borrow CPUs and devices from the root cell as they are created.
The picture below shows the Jailhouse on a system before the Jailhouse is enabled
After the Jailhouse is enabled
After a cell is created
Jailhouse consists of three parts:
A Kernel module
A Hypervisor firmware
Tools
The tools helps in enabling the hypervisor on the device at runtime, in creating a cell, to load inmate a binary, to run the inmate binary and to stop the hypervisor itself.
3.10.1.2. Enabling hypervisor on AM62x platform
Jailhouse is an example of Asynchronous Multiprocessing (AMP) architecture. When we boot Linux on AM62x, which has 4 ARM cores, Linux uses the all four cores. After we enable hypervisor it moves Linux to the root-cell. The root cell still uses the all ARM cores. When we create a new cell (ex. for linux-demo), hypervisor calls cpu_down() for the ARM1,ARM2 and ARM3 core, leaving ARM0 for Linux.The new cell will use the three ARM cores and hardware resources dedicated for this cell in the cell configuration file.
The open source Jailhouse project from https://github.com/siemens/jailhouse is integrated in Yocto build environment.
Yocto recipe (Scarthgap) for Jailhouse can be found here: meta-ti.
Jailhouse kernel patches are integrated with TI Linux Kernel (v6.6) and hosted here Linux git.ti. This repository includes Jailhouse module, uio_ivshmem module for shared-memory and device tree changes for Jailhouse.
U-Boot port for Jailhouse can be found here U-Boot git.ti. This repository contains the fix for error message during boot after memory for Jailhouse is reserved in device tree.
3.10.1.3. Building Jailhouse Image for AM62x platform
The list of components which should be built to get Jailhouse Image for AM62x are:
U-Boot (
tiboot3.bin
,tispl.bin
,u-boot.img
).Kernel ( with Jailhouse and shared memory module ).
Filesystem for root cell and RAM filesystem for inmate.
There are two options to build Jailhouse Image, one is using open source Yocto build environment with public repositories mentioned above or the other method is to use sources and makefile from TI Processors SDK installer.
3.10.1.3.1. Building Jailhouse Image using Yocto
Refer to prerequisites for Yocto build for an Ubuntu host: Host Setup - Ubuntu (Recommended).
The steps to download and build the AM62x wic Image containing Jailhouse (tisdk- jailhouse-image) using Yocto build environment are as listed below :
$ git clone https://git.ti.com/git/arago-project/oe-layersetup.git tisdk
$ cd tisdk
$ ./oe-layertool-setup.sh -f configs/processor-sdk/processor-sdk-<version>-config.txt
$ cd build
$ . conf/setenv
$ echo 'TI_EXTRAS="tie-jailhouse"' >> conf/local.conf
$ MACHINE=<machine> bitbake -k tisdk-jailhouse-image
The bitbake command mentioned in the last line above builds the tisdk-jailhouse-image, the image can be located at tisdk/build/deploy-ti/images/am62xx-evm.
This image includes a host cell filesystem Image based on arago ‘default’ filesystem, boot partition with bootloader binaries and kernel Image with Jailhouse components and uio_ivshmem kernel module for shared memory applications. The filesystem image also contains a RAM filesystem (cpio) which gets mounted by kernel booting on an inmate cell.
3.10.1.3.2. Building Jailhouse using TI SDK Installer
The latest Processor SDK Linux AM62x installer is available on AM62x-SDK-Download-page.
The installer should be downloaded on a Linux ubuntu host machine. The steps to install the sources using installer are:
chmod +x ./ti-processor-sdk-linux-<machine>-<version>-Linux-x86-Install.bin
./ti-processor-sdk-linux-<machine>-<version>-Linux-x86-Install.bin
Create an SD card with prepackaged filesystem image by following instructions from the link Create SD Card with custom images.
The Jailhouse kernel sources, Jailhouse firmware and u-boot bootloader sources can be customized or modified and then built using the steps given below.
Jailhouse sources are located at $TI_SDK_PATH/board-support/extra-drivers/jailhouse
directory. The top level SDK Makefile has the jailhouse_clean
, jailhouse
and
jailhouse_install
targets which can be used to clean, build and install Jailhouse
to the target file system using the default configs or after making any required changes.
Following are the additional dependencies needed to be installed in host PC for jailhouse build.
sudo apt-get install device-tree-compiler python3-dev
Python package:
pip3 install Mako
The exact commands are:
make jailhouse_clean
make jailhouse
make jailhouse_install DESTDIR=<root partition of target>
These commands can be used to install Jailhouse kernel module, firmware and management tools in the target filesystem.
The kernel and u-boot sources for Jailhouse image are located at
$TI_SDK_PATH/board-support/linux-extras-*
and
$TI_SDK_PATH/board-support/uboot-extras-*
. These targets can be build
and installed using top-level Makefile.
Below commands can be used to install kernel image and modules to root of the target filesystem.
make linux-extras
make linux-extras_install DESTDIR=<root partition of target>
Below commands can be used to install bootloader binaries to the boot partition of target.
make u-boot-extras
make u-boot-extras_install DESTDIR=<boot partition of target>
3.10.1.4. Generate SD Card Image for Jailhouse
You can download the tisdk-jailhouse-image-am62xx-evm.rootfs.wic.xz from here AM62x-SDK-Download-page.
After that you need to flash the tisdk-jailhouse-image-am62xx-evm.rootfs.wic.xz to a SD Card. Various ways to flash wic image on SD card are mentioned here Create SD Card.
3.10.1.5. Booting the SD Card Image
After the tisdk-jailhouse-image-am62xx-evm.rootfs.wic.xz is flashed to SD Card. Change the boot mode pins in AM62x board for SD Card boot.
SW1[1:8] = 11000010 and SW2[1:8] = 01000000
Insert the SD Card in SD Card slot in AM62x board. Use a USB Micro-B cable to connect the host PC to the USB Micro-B interface for UART on the EVM then power on the board, the following logs can be observed on the terminal window:
U-Boot SPL 2024.04-ti-g6301979bc99c (Jul 29 2024 - 09:10:51 +0000)
SYSFW ABI: 4.0 (firmware rev 0x000a '10.0.8--v10.00.08 (Fiery Fox)')
SPL initial stack usage: 13384 bytes
Trying to boot from MMC2
Authentication passed
Authentication passed
Authentication passed
Authentication passed
Authentication passed
Starting ATF on ARM64 core...
...
_____ _____ _ _
| _ |___ ___ ___ ___ | _ |___ ___ |_|___ ___| |_
| | _| .'| . | . | | __| _| . | | | -_| _| _|
|__|__|_| |__,|_ |___| |__| |_| |___|_| |___|___|_|
|___| |___|
Arago Project am62xx-evm -
Arago 2023.10 am62xx-evm -
am62xx-evm login:
Note
Jailhouse module is not autoloaded during boot-up. To load the jailhouse module after boot, run following commands:
am62xx-evm@ modprobe jailhouse
3.10.1.6. Pre-built components in Jailhouse Image
The target filesystem on AM62x platform will consists of the following Jailhouse components:
jailhouse.ko
: kernel module at/lib/modules/<linux_kernel_version>/extra/driver
directory;jailhouse.bin
: hypervisor at/lib/firmware
directory;Jailhouse management tools:
/usr/local/libexec/jailhouse
and/usr/sbin
directories;
In order to create the root-cell and an inmate cell we need to provide
cell configuration files. Those configuration files and example binaries
are located at /usr/share/jailhouse/cells
and /usr/share/jailhouse/inmates
.
3.10.1.7. Jailhouse Interface
Jailhouse provides several user-space interfaces. Some important ones are listed below:
Enable Jailhouse
root@am62xx-evm: jailhouse cell enable <root cell config>
To create a new cell
root@am62xx-evm: jailhouse cell create <inmate cell config>
To list the running cell(s)
root@am62xx-evm: jailhouse cell list
Stop inmate cell
root@am62xx-evm: jailhouse cell shutdown <id or name of inmate cell>
Destroy cell
root@am62xx-evm: jailhouse cell destroy <id or name of inmate cell>
Disable Jailhouse
root@am62xx-evm: jailhouse disable
3.10.1.8. Running Jailhouse Demos on AM62x
3.10.1.8.1. Host Setup
Flash tisdk-jailhouse-image-am62xx-evm.wic.xz to SD card using balena
and boot AM62x from the SD card. As we will be running
two instances ,two terminals are required. Connect one terminal to the primary
UART (e.g. /dev/ttyUSB0
) and the other to the secondary UART (e.g. /dev/ttyUSB1
).
3.10.1.8.2. Running Linux Demo
The goal of this demo is to partition the CPU cores and run a second instance of the Linux kernel with a RAM filesystem. The inmate kernel will use the secondary UART to provide a login shell to the user. The steps to run the demo are:
First enable Jailhouse
root@am62xx-evm: jailhouse enable /usr/share/jailhouse/cells/k3-am625-sk.cell
Create an inmate cell for linux
root@am62xx-evm: jailhouse cell create /usr/share/jailhouse/cells/k3-am625-sk-linux-demo.cell
Load the required inmate binaries
root@am62xx-evm: jailhouse cell load k3-am625-sk-linux-demo /usr/libexec/jailhouse/linux-loader.bin -a 0x0 -s "kernel=0xe0200000 dtb=0xe0000000" -a 0x1000 /boot/Image -a 0xe0200000 /boot/tisdk-jailhouse-inmate-am62xx-evm.rootfs.cpio -a 0xe28d4000 /usr/share/jailhouse/inmate-k3-am625-sk.dtb -a 0xe0000000
linux-loader.bin is a small application provided and built by Jailhouse source tree to run inmates. As you can see (-a 0x0) it is loaded to virtual address 0x0. “-s “kernel=0xe0200000 dtb=0xe0000000” -a 0x1000” - is the linux_loader argument loaded as string to virtual address 0x1000, which instructs the linux-loader to branch to the those addresses. Kernel Image is loaded to the virtual address 0xe0200000, jailhouse inmate ramfs to 0xe28d4000 and device tree for inmate to 0xe0000000.
Start inmate cell
root@am62xx-evm: jailhouse cell start k3-am625-sk-linux-demo
Now, on the secondary terminal, verify that the inmate kernel has booted with RAM filesystem. Also note that the
/dev/ttySX
number used for root cell and inmate may or may not match.
[ OK ] Finished Record Runlevel Change in UTMP.
_____ _____ _ _
| _ |___ ___ ___ ___ | _ |___ ___ |_|___ ___| |_
| | _| .'| . | . | | __| _| . | | | -_| _| _|
|__|__|_| |__,|_ |___| |__| |_| |___|_| |___|___|_|
|___| |___|
Arago Project am62xx-evm -
Arago 2023.10 am62xx-evm -
am62xx-evm login: root
The Linux demo (i.e Two Guest VMs) can be started using the linux-demo.sh
script
in that folder. There is no such script for the bare-metal demos but the commands
are very similar (all the needed pieces are in the filesystem already).
3.10.1.8.3. Run Crash Test To Detect Inmate Failure
The Jailhouse image also packages crash-test application, designed to detect crashes in the inmate Linux system by sending ICMP packets at regular intervals from the root side. If the application fails to receive ICMP echo reply packets within the expected timeframe, it prints “No response received for packet x” on the console which signifies a potential crash in the inmate Linux system.
It utilizes network interface created on both root and inmate side using the ivshmem net module to facilitate communication between the root side and the inmate Linux system. It ensures continuous monitoring for effective crash detection.
Crash test application can be run by using the linux-demo.sh
script present in
/usr/share/jailhouse
.
To start crash test after linux demo
./usr/share/jailhouse/linux-demo.sh -c
To start crash test in background mode
./usr/share/jailhouse/linux-demo.sh -c -b
To skip crash test and only start linux demo
./usr/share/jailhouse/linux-demo.sh
3.10.1.8.4. Adding custom demos or applications in Inmate Filesystem
Custom demos can also be run in inmate after copying the required files in RAM filesystem. This can be done using following steps:-
Extract the tisdk-jailhouse-inmate-am62xx-evm.rootfs.cpio file in a separate folder(ex. temp) in linux host PC. This file is present in
/media/$USER/root/boot/
or from output from yocto build.
$ cpio -iv < <path to cpio>/tisdk-jailhouse-inmate-image-<machine>.rootfs.cpio
Copy the your
demo/app
to folder where cpio is extracted
$ cp <TI-SDK-PATH>/board-support/extra-drivers/jailhouse/tools/demos/ivshmem-demo <path to extracted cpio>
Generate a new cpio file
$ find . | sort | cpio --reproducible -o -H newc -R root:root > <path you want to save your new cpio>/tisdk-jailhouse-inmate-<machine>.rootfs.cpio
3.10.1.8.6. Running Ethernet Demo
This application demonstrates how to use IVSHMEM Ethernet to communicate with another linux inmate cell in the Jailhouse hypervisor. Configure the eth1 in root cell and eth0 in inmate cell and ping.
In inmate cell
$ ifconfig enp0s1 192.168.0.2
In root cell
$ ifconfig enP1p0s1 192.168.0.3
Ping enp0s1 using enP1p0s1 #ping 192.168.0.2 in root cell or ping enP1p0s1 using enp0s1 ping 192.168.0.3 in inmate cell.
Ex. ping to inmate cell from root cell
$ ping 192.168.0.2
PING 192.168.0.2 (192.168.0.2): 56 data bytes
64 bytes from 192.168.0.2: seq=0 ttl=64 time=0.707 ms
64 bytes from 192.168.0.2: seq=1 ttl=64 time=0.373 ms
64 bytes from 192.168.0.2: seq=2 ttl=64 time=0.355 ms
64 bytes from 192.168.0.2: seq=3 ttl=64 time=0.308 ms
64 bytes from 192.168.0.2: seq=4 ttl=64 time=0.285 ms
64 bytes from 192.168.0.2: seq=5 ttl=64 time=0.352 ms
3.10.1.8.7. Running Baremetal Demos
Jailhouse comes with inmate demos located at the inmates/demos
directory. We will
see the working of two demo inmates: gic-demo and uart-demo. Those are very simple
bare-metal applications that demonstrate a uart and arm-timer interrupt. These
demos are common for all Jailhouse platforms.
3.10.1.8.7.1. Running UART Demo
Enable Jailhouse
root@am62xx-evm: jailhouse enable /usr/share/jailhouse/cells/k3-am625-sk.cell
Create a inmate cell
root@am62xx-evm: jailhouse cell create /usr/share/jailhouse/cells/k3-am625-sk-inmate-demo.cell
load uart-demo.bin in inmate cell
root@am62xx-evm: jailhouse cell load inmate-demo /usr/share/jailhouse/inmates/uart-demo.bin
Start inmate cell
root@am62xx-evm: jailhouse cell start inmate-demo
You will see UART demo running in secondary terminal for inmate
Hello 1 from cell!
Hello 2 from cell!
Hello 3 from cell!
Hello 4 from cell!
Hello 5 from cell!
Hello 6 from cell!
Hello 7 from cell!
Hello 8 from cell!
3.10.1.8.7.2. Running GIC Demo
Enable Jailhouse
root@am62xx-evm: jailhouse enable /usr/share/jailhouse/cells/k3-am625-sk.cell
Create a inmate cell
root@am62xx-evm: jailhouse cell create /usr/share/jailhouse/cells/k3-am625-sk-inmate-demo.cell
Load gic-demo.bin in inmate cell
root@am62xx-evm: jailhouse cell load inmate-demo /usr/share/jailhouse/inmates/gic-demo.bin
Start inmate cell
root@am62xx-evm: jailhouse cell start inmate-demo
You will see GIC demo running in secondary terminal inmate
Initializing the GIC...
Initializing the timer...
Timer fired, jitter: 9324 ns, min: 9324 ns, max: 9324 ns
Timer fired, jitter: 4794 ns, min: 4794 ns, max: 9324 ns
Timer fired, jitter: 4289 ns, min: 4289 ns, max: 9324 ns
Timer fired, jitter: 4249 ns, min: 4249 ns, max: 9324 ns
Timer fired, jitter: 739 ns, min: 739 ns, max: 9324 ns
Timer fired, jitter: 4489 ns, min: 739 ns, max: 9324 ns
Timer fired, jitter: 4184 ns, min: 739 ns, max: 9324 ns
Timer fired, jitter: 4184 ns, min: 739 ns, max: 9324 ns
Timer fired, jitter: 5034 ns, min: 739 ns, max: 9324 ns
3.10.1.9. Memory Reservation
Linux kernel has to reserve some memory for Jailhouse hypervisor and for inmate. This memory has to be reserved statically. Following example shows reservation of 518MB physical memory for hypervisor, inmates and also shared memory region for cross-cell communication.
hyp_mem: jailhouse@dfa00000 {
reg = <0x0 0xdfa00000 0x0 0x20600000>;
alignment = <0x1000>;
no-map;
};
3.10.1.10. Hardware Modules Reservation
Jailhouse is a partitioning hypervisor. This means a HW peripheral is in exclusive control of one of the cells. Jailhouse cell config file defines this ownership to ensure that all accesses to peripherals are isolated between different cells. Access to any peripheral outside of the owned will be treated as violation, and Jailhouse will park that cell. To ensure that Linux uses only the assigned peripheral, we can disable the peripherals which are owned by the other cell.
Following nodes describe an example of how devices are disabled in the root cell device tree.
/* Disable uart used by inmate cell */
&main_uart1 {
status = "disabled";
};
/* Disable emmc instance used by inmate cell */
&sdhci0 {
status = "disabled";
};
3.10.1.11. Root-cell configuration
When hypervisor is being enabled it creates a cell for Linux and moves it to that cell. The cell is called as “root-cell”. The cell configuration as a “.c” which gets compiled to “.cell” file. The hypervisor uses the “cell” file to create a cell. The cell configuration describes memory regions and their attributes which will be used by the cell,
.mem_regions = {
/* IVSHMEM shared memory regions for 00:00.0 (demo)
{
.phys_start = 0xdfa00000,
.virt_start = 0xdfa00000,
.size = 0x10000,
.flags = JAILHOUSE_MEM_READ,
},
{
.phys_start = 0xdfa10000,
.virt_start = 0xdfa10000,
.size = 0x10000,
.flags = JAILHOUSE_MEM_READ | JAILHOUSE_MEM_WRITE,
},
/* Peer 0 {
.phys_start = 0xdfa20000,
.virt_start = 0xdfa20000,
.size = 0x10000,
.flags = JAILHOUSE_MEM_READ | JAILHOUSE_MEM_WRITE,
},
/* Peer 1 {
.phys_start = 0xdfa30000,
.virt_start = 0xdfa30000,
.size = 0x10000,
.flags = JAILHOUSE_MEM_READ,
},
/* Peer 2 {
.phys_start = 0xdfa40000,
.virt_start = 0xdfa40000,
.size = 0x10000,
.flags = JAILHOUSE_MEM_READ,
},
/* IVSHMEM shared memory region for 00:01.0
JAILHOUSE_SHMEM_NET_REGIONS(0xdfb00000, 0),
{
.phys_start = 0x01810000,
.virt_start = 0x01810000,
.size = 0x00070000,
.flags = JAILHOUSE_MEM_READ | JAILHOUSE_MEM_WRITE |
JAILHOUSE_MEM_IO,
},
{
.phys_start = 0x018a0000,
.virt_start = 0x018a0000,
.size = 0x00060000,
.flags = JAILHOUSE_MEM_READ | JAILHOUSE_MEM_WRITE |
JAILHOUSE_MEM_IO,
},
/* RAM {
.phys_start = 0x80000000,
.virt_start = 0x80000000,
.size = 0x5fa00000,
.flags = JAILHOUSE_MEM_READ | JAILHOUSE_MEM_WRITE |
JAILHOUSE_MEM_EXECUTE,
},
/* RAM. Reserved for inmates {
.phys_start = 0xe0000000,
.virt_start = 0xe0000000,
.size = 0x20000000,
.flags = JAILHOUSE_MEM_READ | JAILHOUSE_MEM_WRITE |
JAILHOUSE_MEM_EXECUTE,
},
bitmap of CPU cores dedicated for the cell,
.cpus = {
0xf,
},
bitmap of interrupt controller SPI interrupts
.irqchips = {
{
.address = 0x01800000,
.pin_base = 32,
.pin_bitmap = {
0xffffffff, 0xffffffff, 0xffffffff, 0xffffffff,
},
},
{
.address = 0x01800000,
.pin_base = 160,
.pin_bitmap = {
0xffffffff, 0xffffffff, 0xffffffff, 0xffffffff,
},
},
{
.address = 0x01800000,
.pin_base = 288,
.pin_bitmap = {
0xffffffff, 0xffffffff, 0xffffffff, 0xffffffff,
},
},
{
.address = 0x01800000,
.pin_base = 416,
.pin_bitmap = {
0xffffffff, 0xffffffff, 0xffffffff, 0xffffffff,
},
},
{
.address = 0x01800000,
.pin_base = 544,
.pin_bitmap = {
0xffffffff, 0xffffffff, 0xffffffff, 0xffffffff,
},
},
},
and some other parameters. That is for all the cells.
In addition to that the root cell also allocates the physical memory for the hypervisor.
.hypervisor_memory = {
.phys_start = 0xdfc00000,
.size = 0x400000,
},
The “memory regions” section is used by hypervisor to create the second stage MMU translation table.
3.10.1.12. Performance
3.10.1.12.1. Cache Benchmark
In the Jailhouse hypervisor environment, cache benchmarking involves executing cache-intensive operations, like the dd command, on the root side, while simultaneously employing the perf tool on the inmate side to measure cache performance metrics. This setup ensures that the cache activity generated on the root side is monitored in real-time on the inmate side, allowing user to analyze cache hit rates, misses, and other relevant metrics. Both the root and inmate system share one instance of L2 cache sized at 512KiB. It’s important to emphasize that the performance observed during cache benchmarking in a Jailhouse hypervisor environment may vary due to several factors. These include workload characteristics, cache utilization patterns, system resource availability, and potential interference from other processes or system activities.
Root
root@am62xx-evm:/usr/share/jailhouse# dd if=/dev/zero of=large_file bs=1M count=2000
2000+0 records in
2000+0 records out
2097152000 bytes (2.1 GB, 2.0 GiB) copied, 55.4181 s, 37.8 MB/s
Inmate
root@am62xx-evm:~# perf stat -B -e cache-references,cache-misses,cycles,instructions,branches,faults,migrations sleep 5
Performance counter stats for 'sleep 5':
344746 cache-references
10291 cache-misses # 2.99% of all cache refs
3412780 cycles
918681 instructions # 0.27 insn per cycle
104012 branches
57 faults
0 migrations
5.004293725 seconds time elapsed
0.000000000 seconds user
0.004632000 seconds sys
root@am62xx-evm:~# perf stat -B -e cache-references,cache-misses,cycles,instructions,branches,faults,migrations sleep 5
Performance counter stats for 'sleep 5':
342780 cache-references
9929 cache-misses # 2.90% of all cache refs
3417097 cycles
911493 instructions # 0.27 insn per cycle
103554 branches
58 faults
0 migrations
5.004324530 seconds time elapsed
0.000000000 seconds user
0.004692000 seconds sys