6.1 KiB
Occlum FS Overview
Occlum supports various file systems: e.g., read-only integrity-protected SEFS, writable encrypted SEFS, UnionFS, untrusted HostFS, RamFS, and other pseudo filesystems.
Here is the default FS layout:
│"/"
┌──────┴──────┐
│ UnionFS │
│ ┌─────────┐ │
│ │ SEFS(RW)│ │
│ ├─────────┤ │
│ │ SEFS(RO)│ │
│ └─────────┘ │
│ │
└──────┬──────┘
│
┌────────┬────┴─────┬────────┐
│ │ │ │
│"/host" │"/dev/shm"│"/proc" │"/dev"
┌───┴──┐ ┌──┴──┐ ┌───┴──┐ ┌──┴──┐
│HostFS│ │RamFS│ │ProcFS│ │DevFS│
└──────┘ └─────┘ └──────┘ └─────┘
SEFS
The SEFS is a filesystem based on the Intel SGX Protected File (PFS), it protects the integrity and confidentiality of disk I/O data from the host.
Here is the hierarchy of SEFS:
┌──────────┐
│ SEFS │
│ Inode │
└────┬─────┘
│
┌─────┴──────┐
│Rust SGX SDK│
│ SGXFile │
└─────┬──────┘
│
┌──────┴────────┐
│ Intel SGX SDK │
│ Protected File│
└───────────────┘
There are two modes for SEFS:
- Integrity-only mode
- Encryption mode
Integrity-only mode
We modified the Intel SGX PFS to add this mode. It only protects the integrity of FS, which will generate the deterministic hash for the same FS image. So it is convenient to implement the remote attestation for the enclave with the same FS image.
The FS image (the image
dir of occlum instance ) provided by the user via the copy_bom
tool will be transformed into a SEFS image in this mode by default. For the use of copy_bom
, please refer to this.
Encryption mode
The integrity and confidentiality of the FS are both protected in this mode. There are two key-generation policies for this mode: the autokey generation policy and the user-provided key policy.
- The autokey generation policy
In this policy mode, the user is not required to provide the key. The key is automatically derived from the MRSIGNER of the enclave, the ProdID of the enclave, and the hardware info. So the same owner of two enclaves can share the FS data on the same machine. This policy is the default one for the encryption mode of SEFS.
- The user-provided policy
In this policy mode, the key should be provided by the user, which means the enclave owner should manage the key. This policy is more flexible for the user to control the data for sharing or isolation. The doc shows you how to use this policy mode.
UnionFS
As you can tell, we use the UnionFS consisting of SEFS as the rootfs of LibOS. To attest to the integrity of the user-provided FS image while having the ability to write data when running apps, we introduce a filesystem called UnionFS to satisfy this requirement.
UnionFS allows files and directories of separate file systems, known as branches, to be transparently overlaid, forming a single coherent file system.
We use two SEFSs to form the UnionFS. The lower layer is the read-only(RO) SEFS in integrity-only mode, and the upper is the writable(RW) SEFS in encryption mode. Generally speaking, the RO-SEFS is transformed by the image
dir provided by the user while building the enclave, and the RW-SEFS is generated while the enclave is running.
┌─────────────┐
│ UnionFS │
│ ┌─────────┐ │
│ │ SEFS(RW)│ │
│ ├─────────┤ │
│ │ SEFS(RO)│ │
│ └─────────┘ │
│ │
└─────────────┘
Here is the configuration of rootfs, the first item is the lower layer RO-SEFS and the second item is the upper layer RW-SEFS. As you can tell, the RO-SEFS is at ./build/mount/__ROOT
and the RW-SEFS is at ./run/mount/__ROOT
.
{
"target": "/",
"type": "unionfs",
"options": {
"layers": [
{
"target": "/",
"source": "./build/mount/__ROOT",
"type": "sefs",
"options": {
"MAC": ""
}
},
{
"target": "/",
"source": "./run/mount/__ROOT",
"type": "sefs"
}
]
}
}
HostFS
The HostFS is used for convenient data exchange between the LibOS and the host OS. It simply wraps the untrusted host OS file to implement the functionalities of FS. So the data is straightforwardly transferred between LibOS and host OS without any protection or validation.
The HostFS is mounted as the /host
dir inside LibOS. The default location in the host OS is the occlum_instance
dir itself("source": "."
in the Occlum.json). One can change the location of HostFS by configuring the Occlum.json file. For example, one can change it from "."
to the "/test"
dir in the host OS like this:
{
"target": "/host",
"source": "/test",
"type": "hostfs"
}
RamFS and other pseudo filesystems
The RamFS and other pseudo filesystems like ProcFS use the memory as the storage. So the data may lose if one terminates the enclave.
Please remember to enlarge the kernel_space_heap_size
of Occlum.json if your app depends on RamFS.
Q & A
How to decrypt and view the rootfs?
One can use the occlum mount
command to implements. Please refer to this doc for more information.
How to mount FS at runtime?
Please refer to this doc.