| .. SPDX-License-Identifier: GPL-2.0 |
| |
| =================================== |
| Cache on Already Mounted Filesystem |
| =================================== |
| |
| .. Contents: |
| |
| (*) Overview. |
| |
| (*) Requirements. |
| |
| (*) Configuration. |
| |
| (*) Starting the cache. |
| |
| (*) Things to avoid. |
| |
| (*) Cache culling. |
| |
| (*) Cache structure. |
| |
| (*) Security model and SELinux. |
| |
| (*) A note on security. |
| |
| (*) Statistical information. |
| |
| (*) Debugging. |
| |
| (*) On-demand Read. |
| |
| |
| Overview |
| ======== |
| |
| CacheFiles is a caching backend that's meant to use as a cache a directory on |
| an already mounted filesystem of a local type (such as Ext3). |
| |
| CacheFiles uses a userspace daemon to do some of the cache management - such as |
| reaping stale nodes and culling. This is called cachefilesd and lives in |
| /sbin. |
| |
| The filesystem and data integrity of the cache are only as good as those of the |
| filesystem providing the backing services. Note that CacheFiles does not |
| attempt to journal anything since the journalling interfaces of the various |
| filesystems are very specific in nature. |
| |
| CacheFiles creates a misc character device - "/dev/cachefiles" - that is used |
| to communication with the daemon. Only one thing may have this open at once, |
| and while it is open, a cache is at least partially in existence. The daemon |
| opens this and sends commands down it to control the cache. |
| |
| CacheFiles is currently limited to a single cache. |
| |
| CacheFiles attempts to maintain at least a certain percentage of free space on |
| the filesystem, shrinking the cache by culling the objects it contains to make |
| space if necessary - see the "Cache Culling" section. This means it can be |
| placed on the same medium as a live set of data, and will expand to make use of |
| spare space and automatically contract when the set of data requires more |
| space. |
| |
| |
| |
| Requirements |
| ============ |
| |
| The use of CacheFiles and its daemon requires the following features to be |
| available in the system and in the cache filesystem: |
| |
| - dnotify. |
| |
| - extended attributes (xattrs). |
| |
| - openat() and friends. |
| |
| - bmap() support on files in the filesystem (FIBMAP ioctl). |
| |
| - The use of bmap() to detect a partial page at the end of the file. |
| |
| It is strongly recommended that the "dir_index" option is enabled on Ext3 |
| filesystems being used as a cache. |
| |
| |
| Configuration |
| ============= |
| |
| The cache is configured by a script in /etc/cachefilesd.conf. These commands |
| set up cache ready for use. The following script commands are available: |
| |
| brun <N>%, bcull <N>%, bstop <N>%, frun <N>%, fcull <N>%, fstop <N>% |
| Configure the culling limits. Optional. See the section on culling |
| The defaults are 7% (run), 5% (cull) and 1% (stop) respectively. |
| |
| The commands beginning with a 'b' are file space (block) limits, those |
| beginning with an 'f' are file count limits. |
| |
| dir <path> |
| Specify the directory containing the root of the cache. Mandatory. |
| |
| tag <name> |
| Specify a tag to FS-Cache to use in distinguishing multiple caches. |
| Optional. The default is "CacheFiles". |
| |
| debug <mask> |
| Specify a numeric bitmask to control debugging in the kernel module. |
| Optional. The default is zero (all off). The following values can be |
| OR'd into the mask to collect various information: |
| |
| == ================================================= |
| 1 Turn on trace of function entry (_enter() macros) |
| 2 Turn on trace of function exit (_leave() macros) |
| 4 Turn on trace of internal debug points (_debug()) |
| == ================================================= |
| |
| This mask can also be set through sysfs, eg:: |
| |
| echo 5 >/sys/modules/cachefiles/parameters/debug |
| |
| |
| Starting the Cache |
| ================== |
| |
| The cache is started by running the daemon. The daemon opens the cache device, |
| configures the cache and tells it to begin caching. At that point the cache |
| binds to fscache and the cache becomes live. |
| |
| The daemon is run as follows:: |
| |
| /sbin/cachefilesd [-d]* [-s] [-n] [-f <configfile>] |
| |
| The flags are: |
| |
| ``-d`` |
| Increase the debugging level. This can be specified multiple times and |
| is cumulative with itself. |
| |
| ``-s`` |
| Send messages to stderr instead of syslog. |
| |
| ``-n`` |
| Don't daemonise and go into background. |
| |
| ``-f <configfile>`` |
| Use an alternative configuration file rather than the default one. |
| |
| |
| Things to Avoid |
| =============== |
| |
| Do not mount other things within the cache as this will cause problems. The |
| kernel module contains its own very cut-down path walking facility that ignores |
| mountpoints, but the daemon can't avoid them. |
| |
| Do not create, rename or unlink files and directories in the cache while the |
| cache is active, as this may cause the state to become uncertain. |
| |
| Renaming files in the cache might make objects appear to be other objects (the |
| filename is part of the lookup key). |
| |
| Do not change or remove the extended attributes attached to cache files by the |
| cache as this will cause the cache state management to get confused. |
| |
| Do not create files or directories in the cache, lest the cache get confused or |
| serve incorrect data. |
| |
| Do not chmod files in the cache. The module creates things with minimal |
| permissions to prevent random users being able to access them directly. |
| |
| |
| Cache Culling |
| ============= |
| |
| The cache may need culling occasionally to make space. This involves |
| discarding objects from the cache that have been used less recently than |
| anything else. Culling is based on the access time of data objects. Empty |
| directories are culled if not in use. |
| |
| Cache culling is done on the basis of the percentage of blocks and the |
| percentage of files available in the underlying filesystem. There are six |
| "limits": |
| |
| brun, frun |
| If the amount of free space and the number of available files in the cache |
| rises above both these limits, then culling is turned off. |
| |
| bcull, fcull |
| If the amount of available space or the number of available files in the |
| cache falls below either of these limits, then culling is started. |
| |
| bstop, fstop |
| If the amount of available space or the number of available files in the |
| cache falls below either of these limits, then no further allocation of |
| disk space or files is permitted until culling has raised things above |
| these limits again. |
| |
| These must be configured thusly:: |
| |
| 0 <= bstop < bcull < brun < 100 |
| 0 <= fstop < fcull < frun < 100 |
| |
| Note that these are percentages of available space and available files, and do |
| _not_ appear as 100 minus the percentage displayed by the "df" program. |
| |
| The userspace daemon scans the cache to build up a table of cullable objects. |
| These are then culled in least recently used order. A new scan of the cache is |
| started as soon as space is made in the table. Objects will be skipped if |
| their atimes have changed or if the kernel module says it is still using them. |
| |
| |
| Cache Structure |
| =============== |
| |
| The CacheFiles module will create two directories in the directory it was |
| given: |
| |
| * cache/ |
| * graveyard/ |
| |
| The active cache objects all reside in the first directory. The CacheFiles |
| kernel module moves any retired or culled objects that it can't simply unlink |
| to the graveyard from which the daemon will actually delete them. |
| |
| The daemon uses dnotify to monitor the graveyard directory, and will delete |
| anything that appears therein. |
| |
| |
| The module represents index objects as directories with the filename "I..." or |
| "J...". Note that the "cache/" directory is itself a special index. |
| |
| Data objects are represented as files if they have no children, or directories |
| if they do. Their filenames all begin "D..." or "E...". If represented as a |
| directory, data objects will have a file in the directory called "data" that |
| actually holds the data. |
| |
| Special objects are similar to data objects, except their filenames begin |
| "S..." or "T...". |
| |
| |
| If an object has children, then it will be represented as a directory. |
| Immediately in the representative directory are a collection of directories |
| named for hash values of the child object keys with an '@' prepended. Into |
| this directory, if possible, will be placed the representations of the child |
| objects:: |
| |
| /INDEX /INDEX /INDEX /DATA FILES |
| /=========/==========/=================================/================ |
| cache/@4a/I03nfs/@30/Ji000000000000000--fHg8hi8400 |
| cache/@4a/I03nfs/@30/Ji000000000000000--fHg8hi8400/@75/Es0g000w...DB1ry |
| cache/@4a/I03nfs/@30/Ji000000000000000--fHg8hi8400/@75/Es0g000w...N22ry |
| cache/@4a/I03nfs/@30/Ji000000000000000--fHg8hi8400/@75/Es0g000w...FP1ry |
| |
| |
| If the key is so long that it exceeds NAME_MAX with the decorations added on to |
| it, then it will be cut into pieces, the first few of which will be used to |
| make a nest of directories, and the last one of which will be the objects |
| inside the last directory. The names of the intermediate directories will have |
| '+' prepended:: |
| |
| J1223/@23/+xy...z/+kl...m/Epqr |
| |
| |
| Note that keys are raw data, and not only may they exceed NAME_MAX in size, |
| they may also contain things like '/' and NUL characters, and so they may not |
| be suitable for turning directly into a filename. |
| |
| To handle this, CacheFiles will use a suitably printable filename directly and |
| "base-64" encode ones that aren't directly suitable. The two versions of |
| object filenames indicate the encoding: |
| |
| =============== =============== =============== |
| OBJECT TYPE PRINTABLE ENCODED |
| =============== =============== =============== |
| Index "I..." "J..." |
| Data "D..." "E..." |
| Special "S..." "T..." |
| =============== =============== =============== |
| |
| Intermediate directories are always "@" or "+" as appropriate. |
| |
| |
| Each object in the cache has an extended attribute label that holds the object |
| type ID (required to distinguish special objects) and the auxiliary data from |
| the netfs. The latter is used to detect stale objects in the cache and update |
| or retire them. |
| |
| |
| Note that CacheFiles will erase from the cache any file it doesn't recognise or |
| any file of an incorrect type (such as a FIFO file or a device file). |
| |
| |
| Security Model and SELinux |
| ========================== |
| |
| CacheFiles is implemented to deal properly with the LSM security features of |
| the Linux kernel and the SELinux facility. |
| |
| One of the problems that CacheFiles faces is that it is generally acting on |
| behalf of a process, and running in that process's context, and that includes a |
| security context that is not appropriate for accessing the cache - either |
| because the files in the cache are inaccessible to that process, or because if |
| the process creates a file in the cache, that file may be inaccessible to other |
| processes. |
| |
| The way CacheFiles works is to temporarily change the security context (fsuid, |
| fsgid and actor security label) that the process acts as - without changing the |
| security context of the process when it the target of an operation performed by |
| some other process (so signalling and suchlike still work correctly). |
| |
| |
| When the CacheFiles module is asked to bind to its cache, it: |
| |
| (1) Finds the security label attached to the root cache directory and uses |
| that as the security label with which it will create files. By default, |
| this is:: |
| |
| cachefiles_var_t |
| |
| (2) Finds the security label of the process which issued the bind request |
| (presumed to be the cachefilesd daemon), which by default will be:: |
| |
| cachefilesd_t |
| |
| and asks LSM to supply a security ID as which it should act given the |
| daemon's label. By default, this will be:: |
| |
| cachefiles_kernel_t |
| |
| SELinux transitions the daemon's security ID to the module's security ID |
| based on a rule of this form in the policy:: |
| |
| type_transition <daemon's-ID> kernel_t : process <module's-ID>; |
| |
| For instance:: |
| |
| type_transition cachefilesd_t kernel_t : process cachefiles_kernel_t; |
| |
| |
| The module's security ID gives it permission to create, move and remove files |
| and directories in the cache, to find and access directories and files in the |
| cache, to set and access extended attributes on cache objects, and to read and |
| write files in the cache. |
| |
| The daemon's security ID gives it only a very restricted set of permissions: it |
| may scan directories, stat files and erase files and directories. It may |
| not read or write files in the cache, and so it is precluded from accessing the |
| data cached therein; nor is it permitted to create new files in the cache. |
| |
| |
| There are policy source files available in: |
| |
| https://people.redhat.com/~dhowells/fscache/cachefilesd-0.8.tar.bz2 |
| |
| and later versions. In that tarball, see the files:: |
| |
| cachefilesd.te |
| cachefilesd.fc |
| cachefilesd.if |
| |
| They are built and installed directly by the RPM. |
| |
| If a non-RPM based system is being used, then copy the above files to their own |
| directory and run:: |
| |
| make -f /usr/share/selinux/devel/Makefile |
| semodule -i cachefilesd.pp |
| |
| You will need checkpolicy and selinux-policy-devel installed prior to the |
| build. |
| |
| |
| By default, the cache is located in /var/fscache, but if it is desirable that |
| it should be elsewhere, than either the above policy files must be altered, or |
| an auxiliary policy must be installed to label the alternate location of the |
| cache. |
| |
| For instructions on how to add an auxiliary policy to enable the cache to be |
| located elsewhere when SELinux is in enforcing mode, please see:: |
| |
| /usr/share/doc/cachefilesd-*/move-cache.txt |
| |
| When the cachefilesd rpm is installed; alternatively, the document can be found |
| in the sources. |
| |
| |
| A Note on Security |
| ================== |
| |
| CacheFiles makes use of the split security in the task_struct. It allocates |
| its own task_security structure, and redirects current->cred to point to it |
| when it acts on behalf of another process, in that process's context. |
| |
| The reason it does this is that it calls vfs_mkdir() and suchlike rather than |
| bypassing security and calling inode ops directly. Therefore the VFS and LSM |
| may deny the CacheFiles access to the cache data because under some |
| circumstances the caching code is running in the security context of whatever |
| process issued the original syscall on the netfs. |
| |
| Furthermore, should CacheFiles create a file or directory, the security |
| parameters with that object is created (UID, GID, security label) would be |
| derived from that process that issued the system call, thus potentially |
| preventing other processes from accessing the cache - including CacheFiles's |
| cache management daemon (cachefilesd). |
| |
| What is required is to temporarily override the security of the process that |
| issued the system call. We can't, however, just do an in-place change of the |
| security data as that affects the process as an object, not just as a subject. |
| This means it may lose signals or ptrace events for example, and affects what |
| the process looks like in /proc. |
| |
| So CacheFiles makes use of a logical split in the security between the |
| objective security (task->real_cred) and the subjective security (task->cred). |
| The objective security holds the intrinsic security properties of a process and |
| is never overridden. This is what appears in /proc, and is what is used when a |
| process is the target of an operation by some other process (SIGKILL for |
| example). |
| |
| The subjective security holds the active security properties of a process, and |
| may be overridden. This is not seen externally, and is used when a process |
| acts upon another object, for example SIGKILLing another process or opening a |
| file. |
| |
| LSM hooks exist that allow SELinux (or Smack or whatever) to reject a request |
| for CacheFiles to run in a context of a specific security label, or to create |
| files and directories with another security label. |
| |
| |
| Statistical Information |
| ======================= |
| |
| If FS-Cache is compiled with the following option enabled:: |
| |
| CONFIG_CACHEFILES_HISTOGRAM=y |
| |
| then it will gather certain statistics and display them through a proc file. |
| |
| /proc/fs/cachefiles/histogram |
| |
| :: |
| |
| cat /proc/fs/cachefiles/histogram |
| JIFS SECS LOOKUPS MKDIRS CREATES |
| ===== ===== ========= ========= ========= |
| |
| This shows the breakdown of the number of times each amount of time |
| between 0 jiffies and HZ-1 jiffies a variety of tasks took to run. The |
| columns are as follows: |
| |
| ======= ======================================================= |
| COLUMN TIME MEASUREMENT |
| ======= ======================================================= |
| LOOKUPS Length of time to perform a lookup on the backing fs |
| MKDIRS Length of time to perform a mkdir on the backing fs |
| CREATES Length of time to perform a create on the backing fs |
| ======= ======================================================= |
| |
| Each row shows the number of events that took a particular range of times. |
| Each step is 1 jiffy in size. The JIFS column indicates the particular |
| jiffy range covered, and the SECS field the equivalent number of seconds. |
| |
| |
| Debugging |
| ========= |
| |
| If CONFIG_CACHEFILES_DEBUG is enabled, the CacheFiles facility can have runtime |
| debugging enabled by adjusting the value in:: |
| |
| /sys/module/cachefiles/parameters/debug |
| |
| This is a bitmask of debugging streams to enable: |
| |
| ======= ======= =============================== ======================= |
| BIT VALUE STREAM POINT |
| ======= ======= =============================== ======================= |
| 0 1 General Function entry trace |
| 1 2 Function exit trace |
| 2 4 General |
| ======= ======= =============================== ======================= |
| |
| The appropriate set of values should be OR'd together and the result written to |
| the control file. For example:: |
| |
| echo $((1|4|8)) >/sys/module/cachefiles/parameters/debug |
| |
| will turn on all function entry debugging. |
| |
| |
| On-demand Read |
| ============== |
| |
| When working in its original mode, CacheFiles serves as a local cache for a |
| remote networking fs - while in on-demand read mode, CacheFiles can boost the |
| scenario where on-demand read semantics are needed, e.g. container image |
| distribution. |
| |
| The essential difference between these two modes is seen when a cache miss |
| occurs: In the original mode, the netfs will fetch the data from the remote |
| server and then write it to the cache file; in on-demand read mode, fetching |
| the data and writing it into the cache is delegated to a user daemon. |
| |
| ``CONFIG_CACHEFILES_ONDEMAND`` should be enabled to support on-demand read mode. |
| |
| |
| Protocol Communication |
| ---------------------- |
| |
| The on-demand read mode uses a simple protocol for communication between kernel |
| and user daemon. The protocol can be modeled as:: |
| |
| kernel --[request]--> user daemon --[reply]--> kernel |
| |
| CacheFiles will send requests to the user daemon when needed. The user daemon |
| should poll the devnode ('/dev/cachefiles') to check if there's a pending |
| request to be processed. A POLLIN event will be returned when there's a pending |
| request. |
| |
| The user daemon then reads the devnode to fetch a request to process. It should |
| be noted that each read only gets one request. When it has finished processing |
| the request, the user daemon should write the reply to the devnode. |
| |
| Each request starts with a message header of the form:: |
| |
| struct cachefiles_msg { |
| __u32 msg_id; |
| __u32 opcode; |
| __u32 len; |
| __u32 object_id; |
| __u8 data[]; |
| }; |
| |
| where: |
| |
| * ``msg_id`` is a unique ID identifying this request among all pending |
| requests. |
| |
| * ``opcode`` indicates the type of this request. |
| |
| * ``object_id`` is a unique ID identifying the cache file operated on. |
| |
| * ``data`` indicates the payload of this request. |
| |
| * ``len`` indicates the whole length of this request, including the |
| header and following type-specific payload. |
| |
| |
| Turning on On-demand Mode |
| ------------------------- |
| |
| An optional parameter becomes available to the "bind" command:: |
| |
| bind [ondemand] |
| |
| When the "bind" command is given no argument, it defaults to the original mode. |
| When it is given the "ondemand" argument, i.e. "bind ondemand", on-demand read |
| mode will be enabled. |
| |
| |
| The OPEN Request |
| ---------------- |
| |
| When the netfs opens a cache file for the first time, a request with the |
| CACHEFILES_OP_OPEN opcode, a.k.a an OPEN request will be sent to the user |
| daemon. The payload format is of the form:: |
| |
| struct cachefiles_open { |
| __u32 volume_key_size; |
| __u32 cookie_key_size; |
| __u32 fd; |
| __u32 flags; |
| __u8 data[]; |
| }; |
| |
| where: |
| |
| * ``data`` contains the volume_key followed directly by the cookie_key. |
| The volume key is a NUL-terminated string; the cookie key is binary |
| data. |
| |
| * ``volume_key_size`` indicates the size of the volume key in bytes. |
| |
| * ``cookie_key_size`` indicates the size of the cookie key in bytes. |
| |
| * ``fd`` indicates an anonymous fd referring to the cache file, through |
| which the user daemon can perform write/llseek file operations on the |
| cache file. |
| |
| |
| The user daemon can use the given (volume_key, cookie_key) pair to distinguish |
| the requested cache file. With the given anonymous fd, the user daemon can |
| fetch the data and write it to the cache file in the background, even when |
| kernel has not triggered a cache miss yet. |
| |
| Be noted that each cache file has a unique object_id, while it may have multiple |
| anonymous fds. The user daemon may duplicate anonymous fds from the initial |
| anonymous fd indicated by the @fd field through dup(). Thus each object_id can |
| be mapped to multiple anonymous fds, while the usr daemon itself needs to |
| maintain the mapping. |
| |
| When implementing a user daemon, please be careful of RLIMIT_NOFILE, |
| ``/proc/sys/fs/nr_open`` and ``/proc/sys/fs/file-max``. Typically these needn't |
| be huge since they're related to the number of open device blobs rather than |
| open files of each individual filesystem. |
| |
| The user daemon should reply the OPEN request by issuing a "copen" (complete |
| open) command on the devnode:: |
| |
| copen <msg_id>,<cache_size> |
| |
| where: |
| |
| * ``msg_id`` must match the msg_id field of the OPEN request. |
| |
| * When >= 0, ``cache_size`` indicates the size of the cache file; |
| when < 0, ``cache_size`` indicates any error code encountered by the |
| user daemon. |
| |
| |
| The CLOSE Request |
| ----------------- |
| |
| When a cookie withdrawn, a CLOSE request (opcode CACHEFILES_OP_CLOSE) will be |
| sent to the user daemon. This tells the user daemon to close all anonymous fds |
| associated with the given object_id. The CLOSE request has no extra payload, |
| and shouldn't be replied. |
| |
| |
| The READ Request |
| ---------------- |
| |
| When a cache miss is encountered in on-demand read mode, CacheFiles will send a |
| READ request (opcode CACHEFILES_OP_READ) to the user daemon. This tells the user |
| daemon to fetch the contents of the requested file range. The payload is of the |
| form:: |
| |
| struct cachefiles_read { |
| __u64 off; |
| __u64 len; |
| }; |
| |
| where: |
| |
| * ``off`` indicates the starting offset of the requested file range. |
| |
| * ``len`` indicates the length of the requested file range. |
| |
| |
| When it receives a READ request, the user daemon should fetch the requested data |
| and write it to the cache file identified by object_id. |
| |
| When it has finished processing the READ request, the user daemon should reply |
| by using the CACHEFILES_IOC_READ_COMPLETE ioctl on one of the anonymous fds |
| associated with the object_id given in the READ request. The ioctl is of the |
| form:: |
| |
| ioctl(fd, CACHEFILES_IOC_READ_COMPLETE, msg_id); |
| |
| where: |
| |
| * ``fd`` is one of the anonymous fds associated with the object_id |
| given. |
| |
| * ``msg_id`` must match the msg_id field of the READ request. |