data-structures.rst 44 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072
  1. .. include:: ../global.rst.inc
  2. .. highlight:: none
  3. .. _data-structures:
  4. Data structures and file formats
  5. ================================
  6. .. todo:: Clarify terms, perhaps create a glossary.
  7. ID (client?) vs. key (repository?),
  8. chunks (blob of data in repo?) vs. object (blob of data in repo, referred to from another object?),
  9. .. _repository:
  10. Repository
  11. ----------
  12. .. Some parts of this description were taken from the Repository docstring
  13. |project_name| stores its data in a `Repository`, which is a filesystem-based
  14. transactional key-value store. Thus the repository does not know about
  15. the concept of archives or items.
  16. Each repository has the following file structure:
  17. README
  18. simple text file telling that this is a |project_name| repository
  19. config
  20. repository configuration
  21. data/
  22. directory where the actual data is stored
  23. hints.%d
  24. hints for repository compaction
  25. index.%d
  26. repository index
  27. lock.roster and lock.exclusive/*
  28. used by the locking system to manage shared and exclusive locks
  29. Transactionality is achieved by using a log (aka journal) to record changes. The log is a series of numbered files
  30. called segments_. Each segment is a series of log entries. The segment number together with the offset of each
  31. entry relative to its segment start establishes an ordering of the log entries. This is the "definition" of
  32. time for the purposes of the log.
  33. .. _config-file:
  34. Config file
  35. ~~~~~~~~~~~
  36. Each repository has a ``config`` file which which is a ``INI``-style file
  37. and looks like this::
  38. [repository]
  39. version = 1
  40. segments_per_dir = 10000
  41. max_segment_size = 5242880
  42. id = 57d6c1d52ce76a836b532b0e42e677dec6af9fca3673db511279358828a21ed6
  43. This is where the ``repository.id`` is stored. It is a unique
  44. identifier for repositories. It will not change if you move the
  45. repository around so you can make a local transfer then decide to move
  46. the repository to another (even remote) location at a later time.
  47. Keys
  48. ~~~~
  49. Repository keys are byte-strings of fixed length (32 bytes), they
  50. don't have a particular meaning (except for the Manifest_).
  51. Normally the keys are computed like this::
  52. key = id = id_hash(unencrypted_data)
  53. The id_hash function depends on the :ref:`encryption mode <borg_init>`.
  54. As the id / key is used for deduplication, id_hash must be a cryptographically
  55. strong hash or MAC.
  56. Segments
  57. ~~~~~~~~
  58. Objects referenced by a key are stored inline in files (`segments`) of approx.
  59. 500 MB size in numbered subdirectories of ``repo/data``.
  60. A segment starts with a magic number (``BORG_SEG`` as an eight byte ASCII string),
  61. followed by a number of log entries. Each log entry consists of:
  62. * size of the entry
  63. * CRC32 of the entire entry (for a PUT this includes the data)
  64. * entry tag: PUT, DELETE or COMMIT
  65. * PUT and DELETE follow this with the 32 byte key
  66. * PUT follow the key with the data
  67. Those files are strictly append-only and modified only once.
  68. Tag is either ``PUT``, ``DELETE``, or ``COMMIT``.
  69. When an object is written to the repository a ``PUT`` entry is written
  70. to the file containing the object id and data. If an object is deleted
  71. a ``DELETE`` entry is appended with the object id.
  72. A ``COMMIT`` tag is written when a repository transaction is
  73. committed. The segment number of the segment containing
  74. a commit is the **transaction ID**.
  75. When a repository is opened any ``PUT`` or ``DELETE`` operations not
  76. followed by a ``COMMIT`` tag are discarded since they are part of a
  77. partial/uncommitted transaction.
  78. Index, hints and integrity
  79. ~~~~~~~~~~~~~~~~~~~~~~~~~~
  80. The **repository index** is stored in ``index.<TRANSACTION_ID>`` and is used to
  81. determine an object's location in the repository. It is a HashIndex_,
  82. a hash table using open addressing. It maps object keys_ to two
  83. unsigned 32-bit integers; the first integer gives the segment number,
  84. the second indicates the offset of the object's entry within the segment.
  85. The **hints file** is a msgpacked file named ``hints.<TRANSACTION_ID>``.
  86. It contains:
  87. * version
  88. * list of segments
  89. * compact
  90. The **integrity file** is a msgpacked file named ``integrity.<TRANSACTION_ID>``.
  91. It contains checksums of the index and hints files and is described in the
  92. :ref:`Checksumming data structures <integrity_repo>` section below.
  93. If the index or hints are corrupted, they are re-generated automatically.
  94. If they are outdated, segments are replayed from the index state to the currently
  95. committed transaction.
  96. Compaction
  97. ~~~~~~~~~~
  98. For a given key only the last entry regarding the key, which is called current (all other entries are called
  99. superseded), is relevant: If there is no entry or the last entry is a DELETE then the key does not exist.
  100. Otherwise the last PUT defines the value of the key.
  101. By superseding a PUT (with either another PUT or a DELETE) the log entry becomes obsolete. A segment containing
  102. such obsolete entries is called sparse, while a segment containing no such entries is called compact.
  103. Since writing a ``DELETE`` tag does not actually delete any data and
  104. thus does not free disk space any log-based data store will need a
  105. compaction strategy (somewhat analogous to a garbage collector).
  106. Borg uses a simple forward compacting algorithm,
  107. which avoids modifying existing segments.
  108. Compaction runs when a commit is issued (unless the :ref:`append_only_mode` is active).
  109. One client transaction can manifest as multiple physical transactions,
  110. since compaction is transacted, too, and Borg does not distinguish between the two::
  111. Perspective| Time -->
  112. -----------+--------------
  113. Client | Begin transaction - Modify Data - Commit | <client waits for repository> (done)
  114. Repository | Begin transaction - Modify Data - Commit | Compact segments - Commit | (done)
  115. The compaction algorithm requires two inputs in addition to the segments themselves:
  116. (i) Which segments are sparse, to avoid scanning all segments (impractical).
  117. Further, Borg uses a conditional compaction strategy: Only those
  118. segments that exceed a threshold sparsity are compacted.
  119. To implement the threshold condition efficiently, the sparsity has
  120. to be stored as well. Therefore, Borg stores a mapping ``(segment
  121. id,) -> (number of sparse bytes,)``.
  122. The 1.0.x series used a simpler non-conditional algorithm,
  123. which only required the list of sparse segments. Thus,
  124. it only stored a list, not the mapping described above.
  125. (ii) Each segment's reference count, which indicates how many live objects are in a segment.
  126. This is not strictly required to perform the algorithm. Rather, it is used to validate
  127. that a segment is unused before deleting it. If the algorithm is incorrect, or the reference
  128. count was not accounted correctly, then an assertion failure occurs.
  129. These two pieces of information are stored in the hints file (`hints.N`)
  130. next to the index (`index.N`).
  131. When loading a hints file, Borg checks the version contained in the file.
  132. The 1.0.x series writes version 1 of the format (with the segments list instead
  133. of the mapping, mentioned above). Since Borg 1.0.4, version 2 is read as well.
  134. The 1.1.x series writes version 2 of the format and reads either version.
  135. When reading a version 1 hints file, Borg 1.1.x will
  136. read all sparse segments to determine their sparsity.
  137. This process may take some time if a repository is kept in the append-only mode,
  138. which causes the number of sparse segments to grow. Repositories not in append-only
  139. mode have no sparse segments in 1.0.x, since compaction is unconditional.
  140. Compaction processes sparse segments from oldest to newest; sparse segments
  141. which don't contain enough deleted data to justify compaction are skipped. This
  142. avoids doing e.g. 500 MB of writing current data to a new segment when only
  143. a couple kB were deleted in a segment.
  144. Segments that are compacted are read in entirety. Current entries are written to
  145. a new segment, while superseded entries are omitted. After each segment an intermediary
  146. commit is written to the new segment. Then, the old segment is deleted
  147. (asserting that the reference count diminished to zero), freeing disk space.
  148. A simplified example (excluding conditional compaction and with simpler
  149. commit logic) showing the principal operation of compaction:
  150. .. figure::
  151. compaction.png
  152. (The actual algorithm is more complex to avoid various consistency issues, refer to
  153. the ``borg.repository`` module for more comments and documentation on these issues.)
  154. .. _internals_storage_quota:
  155. Storage quotas
  156. ~~~~~~~~~~~~~~
  157. Quotas are implemented at the Repository level. The active quota of a repository
  158. is determined by the ``storage_quota`` `config` entry or a run-time override (via :ref:`borg_serve`).
  159. The currently used quota is stored in the hints file. Operations (PUT and DELETE) during
  160. a transaction modify the currently used quota:
  161. - A PUT adds the size of the *log entry* to the quota,
  162. i.e. the length of the data plus the 41 byte header.
  163. - A DELETE subtracts the size of the deleted log entry from the quota,
  164. which includes the header.
  165. Thus, PUT and DELETE are symmetric and cancel each other out precisely.
  166. The quota does not track on-disk size overheads (due to conditional compaction
  167. or append-only mode). In normal operation the inclusion of the log entry headers
  168. in the quota act as a faithful proxy for index and hints overheads.
  169. By tracking effective content size, the client can *always* recover from a full quota
  170. by deleting archives. This would not be possible if the quota tracked on-disk size,
  171. since journaling DELETEs requires extra disk space before space is freed.
  172. Tracking effective size on the other hand accounts DELETEs immediately as freeing quota.
  173. .. rubric:: Enforcing the quota
  174. The storage quota is meant as a robust mechanism for service providers, therefore
  175. :ref:`borg_serve` has to enforce it without loopholes (e.g. modified clients).
  176. The following sections refer to using quotas on remotely accessed repositories.
  177. For local access, consider *client* and *serve* the same.
  178. Accordingly, quotas cannot be enforced with local access,
  179. since the quota can be changed in the repository config.
  180. The quota is enforcible only if *all* :ref:`borg_serve` versions
  181. accessible to clients support quotas (see next section). Further, quota is
  182. per repository. Therefore, ensure clients can only access a defined set of repositories
  183. with their quotas set, using ``--restrict-to-repository``.
  184. If the client exceeds the storage quota the ``StorageQuotaExceeded`` exception is
  185. raised. Normally a client could ignore such an exception and just send a ``commit()``
  186. command anyway, circumventing the quota. However, when ``StorageQuotaExceeded`` is raised,
  187. it is stored in the ``transaction_doomed`` attribute of the repository.
  188. If the transaction is doomed, then commit will re-raise this exception, aborting the commit.
  189. The transaction_doomed indicator is reset on a rollback (which erases the quota-exceeding
  190. state).
  191. .. rubric:: Compatibility with older servers and enabling quota after-the-fact
  192. If no quota data is stored in the hints file, Borg assumes zero quota is used.
  193. Thus, if a repository with an enabled quota is written to with an older ``borg serve``
  194. version that does not understand quotas, then the quota usage will be erased.
  195. The client version is irrelevant to the storage quota and has no part in it.
  196. The form of error messages due to exceeding quota varies with client versions.
  197. A similar situation arises when upgrading from a Borg release that did not have quotas.
  198. Borg will start tracking quota use from the time of the upgrade, starting at zero.
  199. If the quota shall be enforced accurately in these cases, either
  200. - delete the ``index.N`` and ``hints.N`` files, forcing Borg to rebuild both,
  201. re-acquiring quota data in the process, or
  202. - edit the msgpacked ``hints.N`` file (not recommended and thus not
  203. documented further).
  204. The object graph
  205. ----------------
  206. On top of the simple key-value store offered by the Repository_,
  207. Borg builds a much more sophisticated data structure that is essentially
  208. a completely encrypted object graph. Objects, such as archives_, are referenced
  209. by their chunk ID, which is cryptographically derived from their contents.
  210. More on how this helps security in :ref:`security_structural_auth`.
  211. .. figure:: object-graph.png
  212. .. _manifest:
  213. The manifest
  214. ~~~~~~~~~~~~
  215. The manifest is the root of the object hierarchy. It references
  216. all archives in a repository, and thus all data in it.
  217. Since no object references it, it cannot be stored under its ID key.
  218. Instead, the manifest has a fixed all-zero key.
  219. The manifest is rewritten each time an archive is created, deleted,
  220. or modified. It looks like this:
  221. .. code-block:: python
  222. {
  223. b'version': 1,
  224. b'timestamp': b'2017-05-05T12:42:23.042864',
  225. b'item_keys': [b'acl_access', b'acl_default', ...],
  226. b'config': {},
  227. b'archives': {
  228. b'archive name': {
  229. b'id': b'<32 byte binary object ID>',
  230. b'time': b'2017-05-05T12:42:22.942864',
  231. },
  232. },
  233. b'tam': ...,
  234. }
  235. The *version* field can be either 1 or 2. The versions differ in the
  236. way feature flags are handled, described below.
  237. The *timestamp* field was used to avoid a certain class of replay attack.
  238. It is still used for that purpose, however, the newer replay protection
  239. introduced in Borg 1.1 includes all reply attacks. Thus it is not strictly
  240. necessary any more.
  241. *item_keys* is a list containing all Item_ keys that may be encountered in
  242. the repository. It is used by *borg check*, which verifies that all keys
  243. in all items are a subset of these keys. Thus, an older version of *borg check*
  244. supporting this mechanism can correctly detect keys introduced in later versions.
  245. The *tam* key is part of the :ref:`tertiary authentication mechanism <tam_description>`
  246. (formerly known as "tertiary authentication for metadata") and authenticates
  247. the manifest, since an ID check is not possible.
  248. *config* is a general-purpose location for additional metadata. All versions
  249. of Borg preserve its contents (it may have been a better place for *item_keys*,
  250. which is not preserved by unaware Borg versions).
  251. .. rubric:: Feature flags
  252. Feature flags are used to add features to data structures without causing
  253. corruption if older versions are used to access or modify them.
  254. The *config* key stores the feature flags enabled on a repository:
  255. .. code-block:: python
  256. config = {
  257. b'feature_flags': {
  258. b'read': {
  259. b'mandatory': [b'some_feature'],
  260. },
  261. b'check': {
  262. b'mandatory': [b'other_feature'],
  263. }
  264. b'write': ...,
  265. b'delete': ...
  266. },
  267. }
  268. The top-level distinction for feature flags is the operation the client intends
  269. to perform,
  270. | the *read* operation includes extraction and listing of archives,
  271. | the *write* operation includes creating new archives,
  272. | the *delete* (archives) operation,
  273. | the *check* operation requires full understanding of everything in the repository.
  274. |
  275. These are weakly set-ordered; *check* will include everything required for *delete*,
  276. *delete* will likely include *write* and *read*. However, *read* may require more
  277. features than *write* (due to ID-based deduplication, *write* does not necessarily
  278. require reading/understanding repository contents).
  279. Each operation can contain several sets of feature flags. Only one set,
  280. the *mandatory* set is currently defined.
  281. Upon reading the manifest, the Borg client has already determined which operation
  282. is to be performed. If feature flags are found in the manifest, the set
  283. of feature flags supported by the client is compared to the mandatory set
  284. found in the manifest. If any unsupported flags are found (i.e. the mandatory set is
  285. a superset of the features supported by the Borg client used), the operation
  286. is aborted with a *MandatoryFeatureUnsupported* error:
  287. Unsupported repository feature(s) {'some_feature'}. A newer version of borg is required to access this repository.
  288. Older Borg releases do not have this concept and do not perform feature flags checks.
  289. These can be locked out with manifest version 2. Thus, the only difference between
  290. manifest versions 1 and 2 is that the latter is only accepted by Borg releases
  291. implementing feature flags.
  292. .. rubric:: Defined feature flags
  293. Currently no feature flags are defined.
  294. From currently planned features, some examples follow,
  295. these may/may not be implemented and purely serve as examples.
  296. - A mandatory *read* feature could be using a different encryption scheme (e.g. session keys).
  297. This may not be mandatory for the *write* operation - reading data is not strictly required for
  298. creating an archive.
  299. - Any additions to the way chunks are referenced (e.g. to support larger archives) would
  300. become a mandatory *delete* and *check* feature; *delete* implies knowing correct
  301. reference counts, so all object references need to be understood. *check* must
  302. discover the entire object graph as well, otherwise the "orphan chunks check"
  303. could delete data still in use.
  304. .. _archive:
  305. Archives
  306. ~~~~~~~~
  307. Each archive is an object referenced by the manifest. The archive object
  308. itself does not store any of the data contained in the archive it describes.
  309. Instead, it contains a list of chunks which form a msgpacked stream of items_.
  310. The archive object itself further contains some metadata:
  311. * *version*
  312. * *name*, which might differ from the name set in the manifest.
  313. When :ref:`borg_check` rebuilds the manifest (e.g. if it was corrupted) and finds
  314. more than one archive object with the same name, it adds a counter to the name
  315. in the manifest, but leaves the *name* field of the archives as it was.
  316. * *items*, a list of chunk IDs containing item metadata (size: count * ~34B)
  317. * *cmdline*, the command line which was used to create the archive
  318. * *hostname*
  319. * *username*
  320. * *time* and *time_end* are the start and end timestamps, respectively
  321. * *comment*, a user-specified archive comment
  322. * *chunker_params* are the :ref:`chunker-params <chunker-params>` used for creating the archive.
  323. This is used by :ref:`borg_recreate` to determine whether a given archive needs rechunking.
  324. * Some other pieces of information related to recreate.
  325. .. _archive_limitation:
  326. .. rubric:: Note about archive limitations
  327. The archive is currently stored as a single object in the repository
  328. and thus limited in size to MAX_OBJECT_SIZE (20MiB).
  329. As one chunk list entry is ~40B, that means we can reference ~500.000 item
  330. metadata stream chunks per archive.
  331. Each item metadata stream chunk is ~128kiB (see hardcoded ITEMS_CHUNKER_PARAMS).
  332. So that means the whole item metadata stream is limited to ~64GiB chunks.
  333. If compression is used, the amount of storable metadata is bigger - by the
  334. compression factor.
  335. If the medium size of an item entry is 100B (small size file, no ACLs/xattrs),
  336. that means a limit of ~640 million files/directories per archive.
  337. If the medium size of an item entry is 2kB (~100MB size files or more
  338. ACLs/xattrs), the limit will be ~32 million files/directories per archive.
  339. If one tries to create an archive object bigger than MAX_OBJECT_SIZE, a fatal
  340. IntegrityError will be raised.
  341. A workaround is to create multiple archives with less items each, see
  342. also :issue:`1452`.
  343. .. _item:
  344. Items
  345. ~~~~~
  346. Each item represents a file, directory or other file system item and is stored as a
  347. dictionary created by the ``Item`` class that contains:
  348. * path
  349. * list of data chunks (size: count * ~40B)
  350. * user
  351. * group
  352. * uid
  353. * gid
  354. * mode (item type + permissions)
  355. * source (for symlinks, and for hardlinks within one archive)
  356. * rdev (for device files)
  357. * mtime, atime, ctime in nanoseconds
  358. * xattrs
  359. * acl (various OS-dependent fields)
  360. * bsdflags
  361. All items are serialized using msgpack and the resulting byte stream
  362. is fed into the same chunker algorithm as used for regular file data
  363. and turned into deduplicated chunks. The reference to these chunks is then added
  364. to the archive metadata. To achieve a finer granularity on this metadata
  365. stream, we use different chunker params for this chunker, which result in
  366. smaller chunks.
  367. A chunk is stored as an object as well, of course.
  368. .. _chunks:
  369. .. _chunker_details:
  370. Chunks
  371. ~~~~~~
  372. The |project_name| chunker uses a rolling hash computed by the Buzhash_ algorithm.
  373. It triggers (chunks) when the last HASH_MASK_BITS bits of the hash are zero,
  374. producing chunks of 2^HASH_MASK_BITS Bytes on average.
  375. Buzhash is **only** used for cutting the chunks at places defined by the
  376. content, the buzhash value is **not** used as the deduplication criteria (we
  377. use a cryptographically strong hash/MAC over the chunk contents for this, the
  378. id_hash).
  379. ``borg create --chunker-params CHUNK_MIN_EXP,CHUNK_MAX_EXP,HASH_MASK_BITS,HASH_WINDOW_SIZE``
  380. can be used to tune the chunker parameters, the default is:
  381. - CHUNK_MIN_EXP = 19 (minimum chunk size = 2^19 B = 512 kiB)
  382. - CHUNK_MAX_EXP = 23 (maximum chunk size = 2^23 B = 8 MiB)
  383. - HASH_MASK_BITS = 21 (statistical medium chunk size ~= 2^21 B = 2 MiB)
  384. - HASH_WINDOW_SIZE = 4095 [B] (`0xFFF`)
  385. The buzhash table is altered by XORing it with a seed randomly generated once
  386. for the archive, and stored encrypted in the keyfile. This is to prevent chunk
  387. size based fingerprinting attacks on your encrypted repo contents (to guess
  388. what files you have based on a specific set of chunk sizes).
  389. For some more general usage hints see also ``--chunker-params``.
  390. .. _cache:
  391. The cache
  392. ---------
  393. The **files cache** is stored in ``cache/files`` and is used at backup time to
  394. quickly determine whether a given file is unchanged and we have all its chunks.
  395. In memory, the files cache is a key -> value mapping (a Python *dict*) and contains:
  396. * key: id_hash of the encoded, absolute file path
  397. * value:
  398. - file inode number
  399. - file size
  400. - file mtime_ns
  401. - age (0 [newest], 1, 2, 3, ..., BORG_FILES_CACHE_TTL - 1)
  402. - list of chunk ids representing the file's contents
  403. To determine whether a file has not changed, cached values are looked up via
  404. the key in the mapping and compared to the current file attribute values.
  405. If the file's size, mtime_ns and inode number is still the same, it is
  406. considered to not have changed. In that case, we check that all file content
  407. chunks are (still) present in the repository (we check that via the chunks
  408. cache).
  409. If everything is matching and all chunks are present, the file is not read /
  410. chunked / hashed again (but still a file metadata item is written to the
  411. archive, made from fresh file metadata read from the filesystem). This is
  412. what makes borg so fast when processing unchanged files.
  413. If there is a mismatch or a chunk is missing, the file is read / chunked /
  414. hashed. Chunks already present in repo won't be transferred to repo again.
  415. The inode number is stored and compared to make sure we distinguish between
  416. different files, as a single path may not be unique across different
  417. archives in different setups.
  418. Not all filesystems have stable inode numbers. If that is the case, borg can
  419. be told to ignore the inode number in the check via --ignore-inode.
  420. The age value is used for cache management. If a file is "seen" in a backup
  421. run, its age is reset to 0, otherwise its age is incremented by one.
  422. If a file was not seen in BORG_FILES_CACHE_TTL backups, its cache entry is
  423. removed. See also: :ref:`always_chunking` and :ref:`a_status_oddity`
  424. The files cache is a python dictionary, storing python objects, which
  425. generates a lot of overhead.
  426. Borg can also work without using the files cache (saves memory if you have a
  427. lot of files or not much RAM free), then all files are assumed to have changed.
  428. This is usually much slower than with files cache.
  429. The on-disk format of the files cache is a stream of msgpacked tuples (key, value).
  430. Loading the files cache involves reading the file, one msgpack object at a time,
  431. unpacking it, and msgpacking the value (in an effort to save memory).
  432. The **chunks cache** is stored in ``cache/chunks`` and is used to determine
  433. whether we already have a specific chunk, to count references to it and also
  434. for statistics.
  435. The chunks cache is a key -> value mapping and contains:
  436. * key:
  437. - chunk id_hash
  438. * value:
  439. - reference count
  440. - size
  441. - encrypted/compressed size
  442. The chunks cache is a HashIndex_. Due to some restrictions of HashIndex,
  443. the reference count of each given chunk is limited to a constant, MAX_VALUE
  444. (introduced below in HashIndex_), approximately 2**32.
  445. If a reference count hits MAX_VALUE, decrementing it yields MAX_VALUE again,
  446. i.e. the reference count is pinned to MAX_VALUE.
  447. .. _cache-memory-usage:
  448. Indexes / Caches memory usage
  449. -----------------------------
  450. Here is the estimated memory usage of |project_name| - it's complicated::
  451. chunk_count ~= total_file_size / 2 ^ HASH_MASK_BITS
  452. repo_index_usage = chunk_count * 40
  453. chunks_cache_usage = chunk_count * 44
  454. files_cache_usage = total_file_count * 240 + chunk_count * 80
  455. mem_usage ~= repo_index_usage + chunks_cache_usage + files_cache_usage
  456. = chunk_count * 164 + total_file_count * 240
  457. Due to the hashtables, the best/usual/worst cases for memory allocation can
  458. be estimated like that::
  459. mem_allocation = mem_usage / load_factor # l_f = 0.25 .. 0.75
  460. mem_allocation_peak = mem_allocation * (1 + growth_factor) # g_f = 1.1 .. 2
  461. All units are Bytes.
  462. It is assuming every chunk is referenced exactly once (if you have a lot of
  463. duplicate chunks, you will have less chunks than estimated above).
  464. It is also assuming that typical chunk size is 2^HASH_MASK_BITS (if you have
  465. a lot of files smaller than this statistical medium chunk size, you will have
  466. more chunks than estimated above, because 1 file is at least 1 chunk).
  467. If a remote repository is used the repo index will be allocated on the remote side.
  468. The chunks cache, files cache and the repo index are all implemented as hash
  469. tables. A hash table must have a significant amount of unused entries to be
  470. fast - the so-called load factor gives the used/unused elements ratio.
  471. When a hash table gets full (load factor getting too high), it needs to be
  472. grown (allocate new, bigger hash table, copy all elements over to it, free old
  473. hash table) - this will lead to short-time peaks in memory usage each time this
  474. happens. Usually does not happen for all hashtables at the same time, though.
  475. For small hash tables, we start with a growth factor of 2, which comes down to
  476. ~1.1x for big hash tables.
  477. E.g. backing up a total count of 1 Mi (IEC binary prefix i.e. 2^20) files with a total size of 1TiB.
  478. a) with ``create --chunker-params 10,23,16,4095`` (custom, like borg < 1.0 or attic):
  479. mem_usage = 2.8GiB
  480. b) with ``create --chunker-params 19,23,21,4095`` (default):
  481. mem_usage = 0.31GiB
  482. .. note:: There is also the ``--no-files-cache`` option to switch off the files cache.
  483. You'll save some memory, but it will need to read / chunk all the files as
  484. it can not skip unmodified files then.
  485. HashIndex
  486. ---------
  487. The chunks cache and the repository index are stored as hash tables, with
  488. only one slot per bucket, spreading hash collisions to the following
  489. buckets. As a consequence the hash is just a start position for a linear
  490. search. If a key is looked up that is not in the table, then the hash table
  491. is searched from the start position (the hash) until the first empty
  492. bucket is reached.
  493. This particular mode of operation is open addressing with linear probing.
  494. When the hash table is filled to 75%, its size is grown. When it's
  495. emptied to 25%, its size is shrinked. Operations on it have a variable
  496. complexity between constant and linear with low factor, and memory overhead
  497. varies between 33% and 300%.
  498. If an element is deleted, and the slot behind the deleted element is not empty,
  499. then the element will leave a tombstone, a bucket marked as deleted. Tombstones
  500. are only removed by insertions using the tombstone's bucket, or by resizing
  501. the table. They present the same load to the hash table as a real entry,
  502. but do not count towards the regular load factor.
  503. Thus, if the number of empty slots becomes too low (recall that linear probing
  504. for an element not in the index stops at the first empty slot), the hash table
  505. is rebuilt. The maximum *effective* load factor, i.e. including tombstones, is 93%.
  506. Data in a HashIndex is always stored in little-endian format, which increases
  507. efficiency for almost everyone, since basically no one uses big-endian processors
  508. any more.
  509. HashIndex does not use a hashing function, because all keys (save manifest) are
  510. outputs of a cryptographic hash or MAC and thus already have excellent distribution.
  511. Thus, HashIndex simply uses the first 32 bits of the key as its "hash".
  512. The format is easy to read and write, because the buckets array has the same layout
  513. in memory and on disk. Only the header formats differ. The on-disk header is
  514. ``struct HashHeader``:
  515. - First, the HashIndex magic, the eight byte ASCII string "BORG_IDX".
  516. - Second, the signed 32-bit number of entries (i.e. buckets which are not deleted and not empty).
  517. - Third, the signed 32-bit number of buckets, i.e. the length of the buckets array
  518. contained in the file, and the modulus for index calculation.
  519. - Fourth, the signed 8-bit length of keys.
  520. - Fifth, the signed 8-bit length of values. This has to be at least four bytes.
  521. All fields are packed.
  522. The HashIndex is *not* a general purpose data structure.
  523. The value size must be at least 4 bytes, and these first bytes are used for in-band
  524. signalling in the data structure itself.
  525. The constant MAX_VALUE (defined as 2**32-1025 = 4294966271) defines the valid range for
  526. these 4 bytes when interpreted as an uint32_t from 0 to MAX_VALUE (inclusive).
  527. The following reserved values beyond MAX_VALUE are currently in use (byte order is LE):
  528. - 0xffffffff marks empty buckets in the hash table
  529. - 0xfffffffe marks deleted buckets in the hash table
  530. HashIndex is implemented in C and wrapped with Cython in a class-based interface.
  531. The Cython wrapper checks every passed value against these reserved values and
  532. raises an AssertionError if they are used.
  533. Encryption
  534. ----------
  535. .. seealso:: The :ref:`borgcrypto` section for an in-depth review.
  536. AES_-256 is used in CTR mode (so no need for padding). A 64 bit initialization
  537. vector is used, a MAC is computed on the encrypted chunk
  538. and both are stored in the chunk. Encryption and MAC use two different keys.
  539. Each chunk consists of ``TYPE(1)`` + ``MAC(32)`` + ``NONCE(8)`` + ``CIPHERTEXT``:
  540. .. figure:: encryption.png
  541. In AES-CTR mode you can think of the IV as the start value for the counter.
  542. The counter itself is incremented by one after each 16 byte block.
  543. The IV/counter is not required to be random but it must NEVER be reused.
  544. So to accomplish this |project_name| initializes the encryption counter to be
  545. higher than any previously used counter value before encrypting new data.
  546. To reduce payload size, only 8 bytes of the 16 bytes nonce is saved in the
  547. payload, the first 8 bytes are always zeros. This does not affect security but
  548. limits the maximum repository capacity to only 295 exabytes (2**64 * 16 bytes).
  549. Encryption keys (and other secrets) are kept either in a key file on the client
  550. ('keyfile' mode) or in the repository config on the server ('repokey' mode).
  551. In both cases, the secrets are generated from random and then encrypted by a
  552. key derived from your passphrase (this happens on the client before the key
  553. is stored into the keyfile or as repokey).
  554. The passphrase is passed through the ``BORG_PASSPHRASE`` environment variable
  555. or prompted for interactive usage.
  556. .. _key_files:
  557. Key files
  558. ---------
  559. .. seealso:: The :ref:`key_encryption` section for an in-depth review of the key encryption.
  560. When initialized with the ``init -e keyfile`` command, |project_name|
  561. needs an associated file in ``$HOME/.config/borg/keys`` to read and write
  562. the repository. The format is based on msgpack_, base64 encoding and
  563. PBKDF2_ SHA256 hashing, which is then encoded again in a msgpack_.
  564. The same data structure is also used in the "repokey" modes, which store
  565. it in the repository in the configuration file.
  566. The internal data structure is as follows:
  567. version
  568. currently always an integer, 1
  569. repository_id
  570. the ``id`` field in the ``config`` ``INI`` file of the repository.
  571. enc_key
  572. the key used to encrypt data with AES (256 bits)
  573. enc_hmac_key
  574. the key used to HMAC the encrypted data (256 bits)
  575. id_key
  576. the key used to HMAC the plaintext chunk data to compute the chunk's id
  577. chunk_seed
  578. the seed for the buzhash chunking table (signed 32 bit integer)
  579. These fields are packed using msgpack_. The utf-8 encoded passphrase
  580. is processed with PBKDF2_ (SHA256_, 100000 iterations, random 256 bit salt)
  581. to derive a 256 bit key encryption key (KEK).
  582. A `HMAC-SHA256`_ checksum of the packed fields is generated with the KEK,
  583. then the KEK is also used to encrypt the same packed fields using AES-CTR.
  584. The result is stored in a another msgpack_ formatted as follows:
  585. version
  586. currently always an integer, 1
  587. salt
  588. random 256 bits salt used to process the passphrase
  589. iterations
  590. number of iterations used to process the passphrase (currently 100000)
  591. algorithm
  592. the hashing algorithm used to process the passphrase and do the HMAC
  593. checksum (currently the string ``sha256``)
  594. hash
  595. HMAC-SHA256 of the *plaintext* of the packed fields.
  596. data
  597. The encrypted, packed fields.
  598. The resulting msgpack_ is then encoded using base64 and written to the
  599. key file, wrapped using the standard ``textwrap`` module with a header.
  600. The header is a single line with a MAGIC string, a space and a hexadecimal
  601. representation of the repository id.
  602. Compression
  603. -----------
  604. |project_name| supports the following compression methods:
  605. - none (no compression, pass through data 1:1)
  606. - lz4 (low compression, but super fast)
  607. - zlib (level 0-9, level 0 is no compression [but still adding zlib overhead],
  608. level 1 is low, level 9 is high compression)
  609. - lzma (level 0-9, level 0 is low, level 9 is high compression).
  610. Speed: none > lz4 > zlib > lzma
  611. Compression: lzma > zlib > lz4 > none
  612. Be careful, higher zlib and especially lzma compression levels might take a
  613. lot of resources (CPU and memory).
  614. The overall speed of course also depends on the speed of your target storage.
  615. If that is slow, using a higher compression level might yield better overall
  616. performance. You need to experiment a bit. Maybe just watch your CPU load, if
  617. that is relatively low, increase compression until 1 core is 70-100% loaded.
  618. Even if your target storage is rather fast, you might see interesting effects:
  619. while doing no compression at all (none) is a operation that takes no time, it
  620. likely will need to store more data to the storage compared to using lz4.
  621. The time needed to transfer and store the additional data might be much more
  622. than if you had used lz4 (which is super fast, but still might compress your
  623. data about 2:1). This is assuming your data is compressible (if you backup
  624. already compressed data, trying to compress them at backup time is usually
  625. pointless).
  626. Compression is applied after deduplication, thus using different compression
  627. methods in one repo does not influence deduplication.
  628. See ``borg create --help`` about how to specify the compression level and its default.
  629. Lock files
  630. ----------
  631. |project_name| uses locks to get (exclusive or shared) access to the cache and
  632. the repository.
  633. The locking system is based on creating a directory `lock.exclusive` (for
  634. exclusive locks). Inside the lock directory, there is a file indicating
  635. hostname, process id and thread id of the lock holder.
  636. There is also a json file `lock.roster` that keeps a directory of all shared
  637. and exclusive lockers.
  638. If the process can create the `lock.exclusive` directory for a resource, it has
  639. the lock for it. If creation fails (because the directory has already been
  640. created by some other process), lock acquisition fails.
  641. The cache lock is usually in `~/.cache/borg/REPOID/lock.*`.
  642. The repository lock is in `repository/lock.*`.
  643. In case you run into troubles with the locks, you can use the ``borg break-lock``
  644. command after you first have made sure that no |project_name| process is
  645. running on any machine that accesses this resource. Be very careful, the cache
  646. or repository might get damaged if multiple processes use it at the same time.
  647. Checksumming data structures
  648. ----------------------------
  649. As detailed in the previous sections, Borg generates and stores various files
  650. containing important meta data, such as the repository index, repository hints,
  651. chunks caches and files cache.
  652. Data corruption in these files can damage the archive data in a repository,
  653. e.g. due to wrong reference counts in the chunks cache. Only some parts of Borg
  654. were designed to handle corrupted data structures, so a corrupted files cache
  655. may cause crashes or write incorrect archives.
  656. Therefore, Borg calculates checksums when writing these files and tests checksums
  657. when reading them. Checksums are generally 64-bit XXH64 hashes.
  658. The canonical xxHash representation is used, i.e. big-endian.
  659. Checksums are stored as hexadecimal ASCII strings.
  660. For compatibility, checksums are not required and absent checksums do not trigger errors.
  661. The mechanisms have been designed to avoid false-positives when various Borg
  662. versions are used alternately on the same repositories.
  663. Checksums are a data safety mechanism. They are not a security mechanism.
  664. .. rubric:: Choice of algorithm
  665. XXH64 has been chosen for its high speed on all platforms, which avoids performance
  666. degradation in CPU-limited parts (e.g. cache synchronization).
  667. Unlike CRC32, it neither requires hardware support (crc32c or CLMUL)
  668. nor vectorized code nor large, cache-unfriendly lookup tables to achieve good performance.
  669. This simplifies deployment of it considerably (cf. src/borg/algorithms/crc32...).
  670. Further, XXH64 is a non-linear hash function and thus has a "more or less" good
  671. chance to detect larger burst errors, unlike linear CRCs where the probability
  672. of detection decreases with error size.
  673. The 64-bit checksum length is considered sufficient for the file sizes typically
  674. checksummed (individual files up to a few GB, usually less).
  675. xxHash was expressly designed for data blocks of these sizes.
  676. Lower layer — file_integrity
  677. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  678. To accommodate the different transaction models used for the cache and repository,
  679. there is a lower layer (borg.crypto.file_integrity.IntegrityCheckedFile)
  680. wrapping a file-like object, performing streaming calculation and comparison of checksums.
  681. Checksum errors are signalled by raising an exception (borg.crypto.file_integrity.FileIntegrityError)
  682. at the earliest possible moment.
  683. .. rubric:: Calculating checksums
  684. Before feeding the checksum algorithm any data, the file name (i.e. without any path)
  685. is mixed into the checksum, since the name encodes the context of the data for Borg.
  686. The various indices used by Borg have separate header and main data parts.
  687. IntegrityCheckedFile allows to checksum them independently, which avoids
  688. even reading the data when the header is corrupted. When a part is signalled,
  689. the length of the part name is mixed into the checksum state first (encoded
  690. as an ASCII string via `%10d` printf format), then the name of the part
  691. is mixed in as an UTF-8 string. Lastly, the current position (length)
  692. in the file is mixed in as well.
  693. The checksum state is not reset at part boundaries.
  694. A final checksum is always calculated in the same way as the parts described above,
  695. after seeking to the end of the file. The final checksum cannot prevent code
  696. from processing corrupted data during reading, however, it prevents use of the
  697. corrupted data.
  698. .. rubric:: Serializing checksums
  699. All checksums are compiled into a simple JSON structure called *integrity data*:
  700. .. code-block:: json
  701. {
  702. "algorithm": "XXH64",
  703. "digests": {
  704. "HashHeader": "eab6802590ba39e3",
  705. "final": "e2a7f132fc2e8b24"
  706. }
  707. }
  708. The *algorithm* key notes the used algorithm. When reading, integrity data containing
  709. an unknown algorithm is not inspected further.
  710. The *digests* key contains a mapping of part names to their digests.
  711. Integrity data is generally stored by the upper layers, introduced below. An exception
  712. is the DetachedIntegrityCheckedFile, which automatically writes and reads it from
  713. a ".integrity" file next to the data file.
  714. It is used for archive chunks indexes in chunks.archive.d.
  715. Upper layer
  716. ~~~~~~~~~~~
  717. Storage of integrity data depends on the component using it, since they have
  718. different transaction mechanisms, and integrity data needs to be
  719. transacted with the data it is supposed to protect.
  720. .. rubric:: Main cache files: chunks and files cache
  721. The integrity data of the ``chunks`` and ``files`` caches is stored in the
  722. cache ``config``, since all three are transacted together.
  723. The ``[integrity]`` section is used:
  724. .. code-block:: ini
  725. [cache]
  726. version = 1
  727. repository = 3c4...e59
  728. manifest = 10e...21c
  729. timestamp = 2017-06-01T21:31:39.699514
  730. key_type = 2
  731. previous_location = /path/to/repo
  732. [integrity]
  733. manifest = 10e...21c
  734. chunks = {"algorithm": "XXH64", "digests": {"HashHeader": "eab...39e3", "final": "e2a...b24"}}
  735. The manifest ID is duplicated in the integrity section due to the way all Borg
  736. versions handle the config file. Instead of creating a "new" config file from
  737. an internal representation containing only the data understood by Borg,
  738. the config file is read in entirety (using the Python ConfigParser) and modified.
  739. This preserves all sections and values not understood by the Borg version
  740. modifying it.
  741. Thus, if an older versions uses a cache with integrity data, it would preserve
  742. the integrity section and its contents. If a integrity-aware Borg version
  743. would read this cache, it would incorrectly report checksum errors, since
  744. the older version did not update the checksums.
  745. However, by duplicating the manifest ID in the integrity section, it is
  746. easy to tell whether the checksums concern the current state of the cache.
  747. Integrity errors are fatal in these files, terminating the program,
  748. and are not automatically corrected at this time.
  749. .. rubric:: chunks.archive.d
  750. Indices in chunks.archive.d are not transacted and use DetachedIntegrityCheckedFile,
  751. which writes the integrity data to a separate ".integrity" file.
  752. Integrity errors result in deleting the affected index and rebuilding it.
  753. This logs a warning and increases the exit code to WARNING (1).
  754. .. _integrity_repo:
  755. .. rubric:: Repository index and hints
  756. The repository associates index and hints files with a transaction by including the
  757. transaction ID in the file names. Integrity data is stored in a third file
  758. ("integrity.<TRANSACTION_ID>"). Like the hints file, it is msgpacked:
  759. .. code-block:: python
  760. {
  761. b'version': 2,
  762. b'hints': b'{"algorithm": "XXH64", "digests": {"final": "411208db2aa13f1a"}}',
  763. b'index': b'{"algorithm": "XXH64", "digests": {"HashHeader": "846b7315f91b8e48", "final": "cb3e26cadc173e40"}}'
  764. }
  765. The *version* key started at 2, the same version used for the hints. Since Borg has
  766. many versioned file formats, this keeps the number of different versions in use
  767. a bit lower.
  768. The other keys map an auxiliary file, like *index* or *hints* to their integrity data.
  769. Note that the JSON is stored as-is, and not as part of the msgpack structure.
  770. Integrity errors result in deleting the affected file(s) (index/hints) and rebuilding the index,
  771. which is the same action taken when corruption is noticed in other ways (e.g. HashIndex can
  772. detect most corrupted headers, but not data corruption). A warning is logged as well.
  773. The exit code is not influenced, since remote repositories cannot perform that action.
  774. Raising the exit code would be possible for local repositories, but is not implemented.
  775. Unlike the cache design this mechanism can have false positives whenever an older version
  776. *rewrites* the auxiliary files for a transaction created by a newer version,
  777. since that might result in a different index (due to hash-table resizing) or hints file
  778. (hash ordering, or the older version 1 format), while not invalidating the integrity file.
  779. For example, using 1.1 on a repository, noticing corruption or similar issues and then running
  780. ``borg-1.0 check --repair``, which rewrites the index and hints, results in this situation.
  781. Borg 1.1 would erroneously report checksum errors in the hints and/or index files and trigger
  782. an automatic rebuild of these files.