internals.rst 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555
  1. .. include:: global.rst.inc
  2. .. highlight:: none
  3. .. _internals:
  4. Internals
  5. =========
  6. This page documents the internal data structures and storage
  7. mechanisms of |project_name|. It is partly based on `mailing list
  8. discussion about internals`_ and also on static code analysis.
  9. Repository and Archives
  10. -----------------------
  11. |project_name| stores its data in a `Repository`. Each repository can
  12. hold multiple `Archives`, which represent individual backups that
  13. contain a full archive of the files specified when the backup was
  14. performed. Deduplication is performed across multiple backups, both on
  15. data and metadata, using `Chunks` created by the chunker using the Buzhash_
  16. algorithm.
  17. Each repository has the following file structure:
  18. README
  19. simple text file telling that this is a |project_name| repository
  20. config
  21. repository configuration
  22. data/
  23. directory where the actual data is stored
  24. hints.%d
  25. hints for repository compaction
  26. index.%d
  27. repository index
  28. lock.roster and lock.exclusive/*
  29. used by the locking system to manage shared and exclusive locks
  30. Lock files
  31. ----------
  32. |project_name| uses locks to get (exclusive or shared) access to the cache and
  33. the repository.
  34. The locking system is based on creating a directory `lock.exclusive` (for
  35. exclusive locks). Inside the lock directory, there is a file indicating
  36. hostname, process id and thread id of the lock holder.
  37. There is also a json file `lock.roster` that keeps a directory of all shared
  38. and exclusive lockers.
  39. If the process can create the `lock.exclusive` directory for a resource, it has
  40. the lock for it. If creation fails (because the directory has already been
  41. created by some other process), lock acquisition fails.
  42. The cache lock is usually in `~/.cache/borg/REPOID/lock.*`.
  43. The repository lock is in `repository/lock.*`.
  44. In case you run into troubles with the locks, you can use the ``borg break-lock``
  45. command after you first have made sure that no |project_name| process is
  46. running on any machine that accesses this resource. Be very careful, the cache
  47. or repository might get damaged if multiple processes use it at the same time.
  48. Config file
  49. -----------
  50. Each repository has a ``config`` file which which is a ``INI``-style file
  51. and looks like this::
  52. [repository]
  53. version = 1
  54. segments_per_dir = 10000
  55. max_segment_size = 5242880
  56. id = 57d6c1d52ce76a836b532b0e42e677dec6af9fca3673db511279358828a21ed6
  57. This is where the ``repository.id`` is stored. It is a unique
  58. identifier for repositories. It will not change if you move the
  59. repository around so you can make a local transfer then decide to move
  60. the repository to another (even remote) location at a later time.
  61. Keys
  62. ----
  63. The key to address the key/value store is usually computed like this:
  64. key = id = id_hash(unencrypted_data)
  65. The id_hash function is:
  66. * sha256 (no encryption keys available)
  67. * hmac-sha256 (encryption keys available)
  68. As the id / key is used for deduplication, id_hash must be a cryptographically
  69. strong hash or MAC.
  70. Segments and archives
  71. ---------------------
  72. A |project_name| repository is a filesystem based transactional key/value
  73. store. It makes extensive use of msgpack_ to store data and, unless
  74. otherwise noted, data is stored in msgpack_ encoded files.
  75. Objects referenced by a key are stored inline in files (`segments`) of approx.
  76. 5MB size in numbered subdirectories of ``repo/data``.
  77. They contain:
  78. * header size
  79. * crc
  80. * size
  81. * tag
  82. * key
  83. * data
  84. Segments are built locally, and then uploaded. Those files are
  85. strictly append-only and modified only once.
  86. Tag is either ``PUT``, ``DELETE``, or ``COMMIT``. A segment file is
  87. basically a transaction log where each repository operation is
  88. appended to the file. So if an object is written to the repository a
  89. ``PUT`` tag is written to the file followed by the object id and
  90. data. If an object is deleted a ``DELETE`` tag is appended
  91. followed by the object id. A ``COMMIT`` tag is written when a
  92. repository transaction is committed. When a repository is opened any
  93. ``PUT`` or ``DELETE`` operations not followed by a ``COMMIT`` tag are
  94. discarded since they are part of a partial/uncommitted transaction.
  95. The manifest
  96. ------------
  97. The manifest is an object with an all-zero key that references all the
  98. archives.
  99. It contains:
  100. * version
  101. * list of archive infos
  102. * timestamp
  103. * config
  104. Each archive info contains:
  105. * name
  106. * id
  107. * time
  108. It is the last object stored, in the last segment, and is replaced
  109. each time.
  110. The Archive
  111. -----------
  112. The archive metadata does not contain the file items directly. Only
  113. references to other objects that contain that data. An archive is an
  114. object that contains:
  115. * version
  116. * name
  117. * list of chunks containing item metadata (size: count * ~40B)
  118. * cmdline
  119. * hostname
  120. * username
  121. * time
  122. .. _archive_limitation:
  123. Note about archive limitations
  124. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  125. The archive is currently stored as a single object in the repository
  126. and thus limited in size to MAX_OBJECT_SIZE (20MiB).
  127. As one chunk list entry is ~40B, that means we can reference ~500.000 item
  128. metadata stream chunks per archive.
  129. Each item metadata stream chunk is ~128kiB (see hardcoded ITEMS_CHUNKER_PARAMS).
  130. So that means the whole item metadata stream is limited to ~64GiB chunks.
  131. If compression is used, the amount of storable metadata is bigger - by the
  132. compression factor.
  133. If the medium size of an item entry is 100B (small size file, no ACLs/xattrs),
  134. that means a limit of ~640 million files/directories per archive.
  135. If the medium size of an item entry is 2kB (~100MB size files or more
  136. ACLs/xattrs), the limit will be ~32 million files/directories per archive.
  137. If one tries to create an archive object bigger than MAX_OBJECT_SIZE, a fatal
  138. IntegrityError will be raised.
  139. A workaround is to create multiple archives with less items each, see
  140. also :issue:`1452`.
  141. The Item
  142. --------
  143. Each item represents a file, directory or other fs item and is stored as an
  144. ``item`` dictionary that contains:
  145. * path
  146. * list of data chunks (size: count * ~40B)
  147. * user
  148. * group
  149. * uid
  150. * gid
  151. * mode (item type + permissions)
  152. * source (for links)
  153. * rdev (for devices)
  154. * mtime, atime, ctime in nanoseconds
  155. * xattrs
  156. * acl
  157. * bsdfiles
  158. All items are serialized using msgpack and the resulting byte stream
  159. is fed into the same chunker algorithm as used for regular file data
  160. and turned into deduplicated chunks. The reference to these chunks is then added
  161. to the archive metadata. To achieve a finer granularity on this metadata
  162. stream, we use different chunker params for this chunker, which result in
  163. smaller chunks.
  164. A chunk is stored as an object as well, of course.
  165. .. _chunker_details:
  166. Chunks
  167. ------
  168. The |project_name| chunker uses a rolling hash computed by the Buzhash_ algorithm.
  169. It triggers (chunks) when the last HASH_MASK_BITS bits of the hash are zero,
  170. producing chunks of 2^HASH_MASK_BITS Bytes on average.
  171. Buzhash is **only** used for cutting the chunks at places defined by the
  172. content, the buzhash value is **not** used as the deduplication criteria (we
  173. use a cryptographically strong hash/MAC over the chunk contents for this, the
  174. id_hash).
  175. ``borg create --chunker-params CHUNK_MIN_EXP,CHUNK_MAX_EXP,HASH_MASK_BITS,HASH_WINDOW_SIZE``
  176. can be used to tune the chunker parameters, the default is:
  177. - CHUNK_MIN_EXP = 19 (minimum chunk size = 2^19 B = 512 kiB)
  178. - CHUNK_MAX_EXP = 23 (maximum chunk size = 2^23 B = 8 MiB)
  179. - HASH_MASK_BITS = 21 (statistical medium chunk size ~= 2^21 B = 2 MiB)
  180. - HASH_WINDOW_SIZE = 4095 [B] (`0xFFF`)
  181. The buzhash table is altered by XORing it with a seed randomly generated once
  182. for the repository, and stored encrypted in the keyfile. This is to prevent
  183. chunk size based fingerprinting attacks on your encrypted repo contents (to
  184. guess what files you have based on a specific set of chunk sizes).
  185. For some more general usage hints see also ``--chunker-params``.
  186. Indexes / Caches
  187. ----------------
  188. The **files cache** is stored in ``cache/files`` and is used at backup time to
  189. quickly determine whether a given file is unchanged and we have all its chunks.
  190. The files cache is a key -> value mapping and contains:
  191. * key:
  192. - full, absolute file path id_hash
  193. * value:
  194. - file inode number
  195. - file size
  196. - file mtime_ns
  197. - list of file content chunk id hashes
  198. - age (0 [newest], 1, 2, 3, ..., BORG_FILES_CACHE_TTL - 1)
  199. To determine whether a file has not changed, cached values are looked up via
  200. the key in the mapping and compared to the current file attribute values.
  201. If the file's size, mtime_ns and inode number is still the same, it is
  202. considered to not have changed. In that case, we check that all file content
  203. chunks are (still) present in the repository (we check that via the chunks
  204. cache).
  205. If everything is matching and all chunks are present, the file is not read /
  206. chunked / hashed again (but still a file metadata item is written to the
  207. archive, made from fresh file metadata read from the filesystem). This is
  208. what makes borg so fast when processing unchanged files.
  209. If there is a mismatch or a chunk is missing, the file is read / chunked /
  210. hashed. Chunks already present in repo won't be transferred to repo again.
  211. The inode number is stored and compared to make sure we distinguish between
  212. different files, as a single path may not be unique across different
  213. archives in different setups.
  214. Not all filesystems have stable inode numbers. If that is the case, borg can
  215. be told to ignore the inode number in the check via --ignore-inode.
  216. The age value is used for cache management. If a file is "seen" in a backup
  217. run, its age is reset to 0, otherwise its age is incremented by one.
  218. If a file was not seen in BORG_FILES_CACHE_TTL backups, its cache entry is
  219. removed. See also: :ref:`always_chunking` and :ref:`a_status_oddity`
  220. The files cache is a python dictionary, storing python objects, which
  221. generates a lot of overhead.
  222. Borg can also work without using the files cache (saves memory if you have a
  223. lot of files or not much RAM free), then all files are assumed to have changed.
  224. This is usually much slower than with files cache.
  225. The **chunks cache** is stored in ``cache/chunks`` and is used to determine
  226. whether we already have a specific chunk, to count references to it and also
  227. for statistics.
  228. The chunks cache is a key -> value mapping and contains:
  229. * key:
  230. - chunk id_hash
  231. * value:
  232. - reference count
  233. - size
  234. - encrypted/compressed size
  235. The chunks cache is a hashindex, a hash table implemented in C and tuned for
  236. memory efficiency.
  237. The **repository index** is stored in ``repo/index.%d`` and is used to
  238. determine a chunk's location in the repository.
  239. The repo index is a key -> value mapping and contains:
  240. * key:
  241. - chunk id_hash
  242. * value:
  243. - segment (that contains the chunk)
  244. - offset (where the chunk is located in the segment)
  245. The repo index is a hashindex, a hash table implemented in C and tuned for
  246. memory efficiency.
  247. Hints are stored in a file (``repo/hints.%d``).
  248. It contains:
  249. * version
  250. * list of segments
  251. * compact
  252. hints and index can be recreated if damaged or lost using ``check --repair``.
  253. The chunks cache and the repository index are stored as hash tables, with
  254. only one slot per bucket, but that spreads the collisions to the following
  255. buckets. As a consequence the hash is just a start position for a linear
  256. search, and if the element is not in the table the index is linearly crossed
  257. until an empty bucket is found.
  258. When the hash table is filled to 75%, its size is grown. When it's
  259. emptied to 25%, its size is shrinked. So operations on it have a variable
  260. complexity between constant and linear with low factor, and memory overhead
  261. varies between 33% and 300%.
  262. .. _cache-memory-usage:
  263. Indexes / Caches memory usage
  264. -----------------------------
  265. Here is the estimated memory usage of |project_name| - it's complicated:
  266. chunk_count ~= total_file_size / 2 ^ HASH_MASK_BITS
  267. repo_index_usage = chunk_count * 40
  268. chunks_cache_usage = chunk_count * 44
  269. files_cache_usage = total_file_count * 240 + chunk_count * 80
  270. mem_usage ~= repo_index_usage + chunks_cache_usage + files_cache_usage
  271. = chunk_count * 164 + total_file_count * 240
  272. Due to the hashtables, the best/usual/worst cases for memory allocation can
  273. be estimated like that:
  274. mem_allocation = mem_usage / load_factor # l_f = 0.25 .. 0.75
  275. mem_allocation_peak = mem_allocation * (1 + growth_factor) # g_f = 1.1 .. 2
  276. All units are Bytes.
  277. It is assuming every chunk is referenced exactly once (if you have a lot of
  278. duplicate chunks, you will have less chunks than estimated above).
  279. It is also assuming that typical chunk size is 2^HASH_MASK_BITS (if you have
  280. a lot of files smaller than this statistical medium chunk size, you will have
  281. more chunks than estimated above, because 1 file is at least 1 chunk).
  282. If a remote repository is used the repo index will be allocated on the remote side.
  283. The chunks cache, files cache and the repo index are all implemented as hash
  284. tables. A hash table must have a significant amount of unused entries to be
  285. fast - the so-called load factor gives the used/unused elements ratio.
  286. When a hash table gets full (load factor getting too high), it needs to be
  287. grown (allocate new, bigger hash table, copy all elements over to it, free old
  288. hash table) - this will lead to short-time peaks in memory usage each time this
  289. happens. Usually does not happen for all hashtables at the same time, though.
  290. For small hash tables, we start with a growth factor of 2, which comes down to
  291. ~1.1x for big hash tables.
  292. E.g. backing up a total count of 1 Mi (IEC binary prefix i.e. 2^20) files with a total size of 1TiB.
  293. a) with ``create --chunker-params 10,23,16,4095`` (custom, like borg < 1.0 or attic):
  294. mem_usage = 2.8GiB
  295. b) with ``create --chunker-params 19,23,21,4095`` (default):
  296. mem_usage = 0.31GiB
  297. .. note:: There is also the ``--no-files-cache`` option to switch off the files cache.
  298. You'll save some memory, but it will need to read / chunk all the files as
  299. it can not skip unmodified files then.
  300. Encryption
  301. ----------
  302. AES_-256 is used in CTR mode (so no need for padding). A 64bit initialization
  303. vector is used, a `HMAC-SHA256`_ is computed on the encrypted chunk with a
  304. random 64bit nonce and both are stored in the chunk.
  305. The header of each chunk is: ``TYPE(1)`` + ``HMAC(32)`` + ``NONCE(8)`` + ``CIPHERTEXT``.
  306. Encryption and HMAC use two different keys.
  307. In AES CTR mode you can think of the IV as the start value for the counter.
  308. The counter itself is incremented by one after each 16 byte block.
  309. The IV/counter is not required to be random but it must NEVER be reused.
  310. So to accomplish this |project_name| initializes the encryption counter to be
  311. higher than any previously used counter value before encrypting new data.
  312. To reduce payload size, only 8 bytes of the 16 bytes nonce is saved in the
  313. payload, the first 8 bytes are always zeros. This does not affect security but
  314. limits the maximum repository capacity to only 295 exabytes (2**64 * 16 bytes).
  315. Encryption keys (and other secrets) are kept either in a key file on the client
  316. ('keyfile' mode) or in the repository config on the server ('repokey' mode).
  317. In both cases, the secrets are generated from random and then encrypted by a
  318. key derived from your passphrase (this happens on the client before the key
  319. is stored into the keyfile or as repokey).
  320. The passphrase is passed through the ``BORG_PASSPHRASE`` environment variable
  321. or prompted for interactive usage.
  322. Key files
  323. ---------
  324. When initialized with the ``init -e keyfile`` command, |project_name|
  325. needs an associated file in ``$HOME/.config/borg/keys`` to read and write
  326. the repository. The format is based on msgpack_, base64 encoding and
  327. PBKDF2_ SHA256 hashing, which is then encoded again in a msgpack_.
  328. The internal data structure is as follows:
  329. version
  330. currently always an integer, 1
  331. repository_id
  332. the ``id`` field in the ``config`` ``INI`` file of the repository.
  333. enc_key
  334. the key used to encrypt data with AES (256 bits)
  335. enc_hmac_key
  336. the key used to HMAC the encrypted data (256 bits)
  337. id_key
  338. the key used to HMAC the plaintext chunk data to compute the chunk's id
  339. chunk_seed
  340. the seed for the buzhash chunking table (signed 32 bit integer)
  341. Those fields are processed using msgpack_. The utf-8 encoded passphrase
  342. is processed with PBKDF2_ (SHA256_, 100000 iterations, random 256 bit salt)
  343. to give us a derived key. The derived key is 256 bits long.
  344. A `HMAC-SHA256`_ checksum of the above fields is generated with the derived
  345. key, then the derived key is also used to encrypt the above pack of fields.
  346. Then the result is stored in a another msgpack_ formatted as follows:
  347. version
  348. currently always an integer, 1
  349. salt
  350. random 256 bits salt used to process the passphrase
  351. iterations
  352. number of iterations used to process the passphrase (currently 100000)
  353. algorithm
  354. the hashing algorithm used to process the passphrase and do the HMAC
  355. checksum (currently the string ``sha256``)
  356. hash
  357. the HMAC of the encrypted derived key
  358. data
  359. the derived key, encrypted with AES over a PBKDF2_ SHA256 key
  360. described above
  361. The resulting msgpack_ is then encoded using base64 and written to the
  362. key file, wrapped using the standard ``textwrap`` module with a header.
  363. The header is a single line with a MAGIC string, a space and a hexadecimal
  364. representation of the repository id.
  365. Compression
  366. -----------
  367. |project_name| supports the following compression methods:
  368. - none (no compression, pass through data 1:1)
  369. - lz4 (low compression, but super fast)
  370. - zlib (level 0-9, level 0 is no compression [but still adding zlib overhead],
  371. level 1 is low, level 9 is high compression)
  372. - lzma (level 0-9, level 0 is low, level 9 is high compression).
  373. Speed: none > lz4 > zlib > lzma
  374. Compression: lzma > zlib > lz4 > none
  375. Be careful, higher zlib and especially lzma compression levels might take a
  376. lot of resources (CPU and memory).
  377. The overall speed of course also depends on the speed of your target storage.
  378. If that is slow, using a higher compression level might yield better overall
  379. performance. You need to experiment a bit. Maybe just watch your CPU load, if
  380. that is relatively low, increase compression until 1 core is 70-100% loaded.
  381. Even if your target storage is rather fast, you might see interesting effects:
  382. while doing no compression at all (none) is a operation that takes no time, it
  383. likely will need to store more data to the storage compared to using lz4.
  384. The time needed to transfer and store the additional data might be much more
  385. than if you had used lz4 (which is super fast, but still might compress your
  386. data about 2:1). This is assuming your data is compressible (if you backup
  387. already compressed data, trying to compress them at backup time is usually
  388. pointless).
  389. Compression is applied after deduplication, thus using different compression
  390. methods in one repo does not influence deduplication.
  391. See ``borg create --help`` about how to specify the compression level and its default.