Skip to content

Latest commit

 

History

History
232 lines (158 loc) · 8.28 KB

File metadata and controls

232 lines (158 loc) · 8.28 KB

Sysbox User Guide: Design Notes

This document briefly describes some aspects of Sysbox's design.

Contents

Sysbox Components

Sysbox is made up of the following components:

  • sysbox-runc

  • sysbox-fs

  • sysbox-mgr

sysbox-runc is a container runtime, the program that does the low level kernel setup for execution of system containers. It's the "front-end" of Sysbox: higher layers (e.g., Docker & containerd) invoke sysbox-runc to launch system containers. It's mostly (but not 100%) compatible with the OCI runtime specification (more on this here).

sysbox-fs is a file-system-in-user-space (FUSE) daemon that emulates portions of the system container's filesystem, in particular portions of procfs and sysfs mounts inside the system container. It's purpose is to make the system container closely resemble a virtual host while ensuring proper isolation from the rest of the system.

sysbox-mgr is a daemon that provides services to sysbox-runc and sysbox-fs. For example, it manages assignment user-ID and group-ID mappings to system containers, manages some special mounts that Sysbox adds to system containers, etc.

Together, sysbox-fs and sysbox-mgr are the "back-ends" for sysbox. Communication between the sysbox components is done via gRPC.

Users don't normally interact with the Sysbox components directly. Instead, they use higher level apps (e.g., Docker) that interact with Sysbox to deploy system containers.

Ubuntu Shiftfs Module

Recent Ubuntu kernels carry a module called shiftfs. The purpose of this module is to perform filesystem user-ID and group-ID "shifting" between the container's Linux user namespace and the host's initial user namespace.

Without the shiftfs module, the system container would see its root filesystem files owned by nobody:nogroup, which in essence renders the container unusable. The reason is that the container's rootfs is typically owned by root:root on the host, but the container's root user is not mapped to the root on the host; rather it's mapped to an unprivileged host user-ID selected by Sysbox.

The shiftfs module solves this problem: by virtue of mounting shiftfs on the system container's root filesystem (as well as on host files or directories mounted into the container), system container processes see files with the correct ownership (i.e., directories in the container's / directory will have root:root ownership rather than nobody:nogroup).

Sysbox detects the presence of the shiftfs module and uses it when appropriate to ensure the container has access to its (chroot jail) filesystem and any host files or directories mounted into the container.

In scenarios where the shiftfs module is required but not present in the kernel, Sysbox will fail to launch containers and issue an error such as this one.

Checking for the Shiftfs Module

To verify the Ubuntu shiftfs module is loaded in your host, type:

$ sudo modprobe shiftfs
$ lsmod | grep shiftfs
shiftfs           24576  0

Shiftfs Security Precautions

When Sysbox uses shiftfs, note the following:

Any host files or directories mounted into the container are writable from within the container (unless the mount is "read-only"). Furthermore, when the container's root user writes to these mounted files or directories, it will do so as if it were the root user on the host.

In other words, be aware that host files or directories mounted into the container are not isolated from the container. Thus, make sure to only mount host files / directories into the container when it's safe to do so.

Refer to the user-guide's storage chapter for more info.

Shiftfs Functional Limitations

The Ubuntu shiftfs module is very recent and therefore has some functional limitations as this time.

One such limitation is that overlayfs can't be mounted on top of shiftfs.

This implies that when Sysbox uses shiftfs on a system container, applications running inside the system container that use overlayfs mounts may not work properly.

Note that one such application is Docker, which mounts overlayfs over portions of its /var/lib/docker directory. For this specific case however, Sysbox sets up the system container such that the limitation above is worked-around, allowing Docker to operate properly within the system container.

A similar work-around is applied by Sysbox to ensure other software such as Kubernetes and containerd work properly inside the system container.

Sysbox OCI compatibility

Sysbox is a fork of the OCI runc. It is mostly (but not 100%) compatible with the OCI runtime specification.

The incompatibilities arise from our desire to make deployment of system containers possible with Docker (to save users the trouble of having to learn yet another tool).

We believe these incompatibilities won't negatively affect users of Sysbox and should mostly be transparent to them.

Here is a list of OCI runtime incompatibilities:

Namespaces

Sysbox requires that the system container's config.json file have a namespace array field with at least the following namespaces:

  • pid
  • ipc
  • uts
  • mount
  • network

This is normally the case for Docker containers.

Sysbox adds the following namespaces to all system containers:

  • user
  • cgroup

Process Capabilities

Sysbox always enables all process capabilities for the system container's init process when owned by the root user.

Sysbox always disables all process capabilities for the system container's init process when owned by a non-root user.

See here for more info.

Procfs and Sysfs

Sysbox always mounts /proc and /sys read-write inside the system container.

Note that by virtue of enabling the Linux user namespace, only namespaced resources under /proc and /sys will be writable from within the system container. Non-namespaced resources (e.g., those under /proc/sys/kernel) won't be writable from within the system container, unless they are virtualized by Sysbox.

See Procfs Virtualization and Sysfs Virtualization for more info.

Cgroupfs Mount

Sysbox always mounts the cgroupfs as read-write inside the system container (under /sys/fs/cgroup).

This allows programs inside the system container (e.g., Docker) to assign cgroup resources to child containers. The assigned resources are always a subset of the cgroup resources assigned to the system container itself.

Sysbox ensures that programs inside the system container can't modify the cgroup resources assigned to the container itself, or cgroup resources associated with the rest of the system.

Seccomp

Sysbox modifies the system container's seccomp configuration to whitelist syscalls such as: mount, unmount, pivot_root, and a few others.

This allows execution of system level programs within the system container, such as Docker.

AppArmor

Sysbox currently ignores the Docker AppArmor profile, as it's too restrictive (e.g., prevents mounts inside the container, prevents write access to /proc/sys, etc.)

See here for more on this.

Read-only and Masked Paths

Sysbox honors read-only paths in the system container's config.json, with the exception of paths at or under /proc or under /sys.

The same applies to masked paths.

Mounts

Sysbox honors the mounts specified in the system container's config.json file, with a few exceptions such as:

  • Mounts over /sys and some of it's sub-directories.

  • Mounts over /proc and some of it's sub-directories.

In addition, Sysbox creates some mounts of its own (i.e., implicitly) within the system container. For example:

  • Read-only bind mount of the host's /lib/modules/<kernel-release> into a corresponding path within the system container.

  • Read-only bind mount of the host's kernel header files into the corresponding path within the system container.

  • Select mounts under the system container's /sys and /proc directories.

  • Mounts that enable Systemd, Docker and Kubernetes to operate correctly within the system container.