| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261 | .. include:: ../global.rst.inc.. highlight:: none.. _data-structures:Data structures and file formats================================This page documents the internal data structures and storagemechanisms of Borg. It is partly based on `mailing listdiscussion about internals`_ and also on static code analysis... todo:: Clarify terms, perhaps create a glossary.          ID (client?) vs. key (repository?),          chunks (blob of data in repo?) vs. object (blob of data in repo, referred to from another object?),.. _repository:Repository----------.. Some parts of this description were taken from the Repository docstringBorg stores its data in a `Repository`, which is a file system basedtransactional key-value store. Thus the repository does not know aboutthe concept of archives or items.Each repository has the following file structure:README  simple text file telling that this is a Borg repositoryconfig  repository configurationdata/  directory where the actual data is storedhints.%d  hints for repository compactionindex.%d  repository indexlock.roster and lock.exclusive/*  used by the locking system to manage shared and exclusive locksTransactionality is achieved by using a log (aka journal) to record changes. The log is a series of numbered filescalled segments_. Each segment is a series of log entries. The segment number together with the offset of eachentry relative to its segment start establishes an ordering of the log entries. This is the "definition" oftime for the purposes of the log... _config-file:Config file~~~~~~~~~~~Each repository has a ``config`` file which is a ``INI``-style fileand looks like this::    [repository]    version = 2    segments_per_dir = 1000    max_segment_size = 524288000    id = 57d6c1d52ce76a836b532b0e42e677dec6af9fca3673db511279358828a21ed6This is where the ``repository.id`` is stored. It is a uniqueidentifier for repositories. It will not change if you move therepository around so you can make a local transfer then decide to movethe repository to another (even remote) location at a later time.Keys~~~~Repository keys are byte-strings of fixed length (32 bytes), theydon't have a particular meaning (except for the Manifest_).Normally the keys are computed like this::  key = id = id_hash(plaintext_data)  # plain = not encrypted, not compressed, not obfuscatedThe id_hash function depends on the :ref:`encryption mode <borg_rcreate>`.As the id / key is used for deduplication, id_hash must be a cryptographicallystrong hash or MAC.Segments~~~~~~~~Objects referenced by a key are stored inline in files (`segments`) of approx.500 MB size in numbered subdirectories of ``repo/data``. The number of segmentsper directory is controlled by the value of ``segments_per_dir``. If you changethis value in a non-empty repository, you may also need to relocate the segmentfiles manually.A segment starts with a magic number (``BORG_SEG`` as an eight byte ASCII string),followed by a number of log entries. Each log entry consists of (in this order):* crc32 checksum (uint32):  - for PUT2: CRC32(size + tag + key + digest)  - for PUT: CRC32(size + tag + key + payload)  - for DELETE: CRC32(size + tag + key)  - for COMMIT: CRC32(size + tag)* size (uint32) of the entry (including the whole header)* tag (uint8): PUT(0), DELETE(1), COMMIT(2) or PUT2(3)* key (256 bit) - only for PUT/PUT2/DELETE* payload (size - 41 bytes) - only for PUT* xxh64 digest (64 bit) = XXH64(size + tag + key + payload) - only for PUT2* payload (size - 41 - 8 bytes) - only for PUT2PUT2 is new since repository version 2. For new log entries PUT2 is used.PUT is still supported to read version 1 repositories, but not generated any more.If we talk about ``PUT`` in general, it shall usually mean PUT2 for repositoryversion 2+.Those files are strictly append-only and modified only once.When an object is written to the repository a ``PUT`` entry is writtento the file containing the object id and payload. If an object is deleteda ``DELETE`` entry is appended with the object id.A ``COMMIT`` tag is written when a repository transaction iscommitted. The segment number of the segment containinga commit is the **transaction ID**.When a repository is opened any ``PUT`` or ``DELETE`` operations notfollowed by a ``COMMIT`` tag are discarded since they are part of apartial/uncommitted transaction.The size of individual segments is limited to 4 GiB, since the offset of entrieswithin segments is stored in a 32-bit unsigned integer in the repository index.Objects / Payload structure~~~~~~~~~~~~~~~~~~~~~~~~~~~All data (the manifest, archives, archive item stream chunks and file datachunks) is compressed, optionally obfuscated and encrypted. This produces someadditional metadata (size and compression information), which is separatelyserialized and also encrypted.See :ref:`data-encryption` for a graphic outlining the anatomy of the encryption in Borg.What you see at the bottom there is done twice: once for the data and once for the metadata.An object (the payload part of a segment file log entry) must be like:- length of encrypted metadata (16bit unsigned int)- encrypted metadata (incl. encryption header), when decrypted:  - msgpacked dict with:    - ctype (compression type 0..255)    - clevel (compression level 0..255)    - csize (overall compressed (and maybe obfuscated) data size)    - psize (only when obfuscated: payload size without the obfuscation trailer)    - size (uncompressed size of the data)- encrypted data (incl. encryption header), when decrypted:  - compressed data (with an optional all-zero-bytes obfuscation trailer)This new, more complex repo v2 object format was implemented to be able to query themetadata efficiently without having to read, transfer and decrypt the (usually much bigger)data part.The metadata is encrypted not to disclose potentially sensitive information that could beused for e.g. fingerprinting attacks.The compression `ctype` and `clevel` is explained in :ref:`data-compression`.Index, hints and integrity~~~~~~~~~~~~~~~~~~~~~~~~~~The **repository index** is stored in ``index.<TRANSACTION_ID>`` and is used todetermine an object's location in the repository. It is a HashIndex_,a hash table using open addressing.It maps object keys_ to:* segment number (unit32)* offset of the object's entry within the segment (uint32)* size of the payload, not including the entry header (uint32)* flags (uint32)The **hints file** is a msgpacked file named ``hints.<TRANSACTION_ID>``.It contains:* version* list of segments* compact* shadow_index* storage_quota_useThe **integrity file** is a msgpacked file named ``integrity.<TRANSACTION_ID>``.It contains checksums of the index and hints files and is described in the:ref:`Checksumming data structures <integrity_repo>` section below.If the index or hints are corrupted, they are re-generated automatically.If they are outdated, segments are replayed from the index state to the currentlycommitted transaction.Compaction~~~~~~~~~~For a given key only the last entry regarding the key, which is called current (all other entries are calledsuperseded), is relevant: If there is no entry or the last entry is a DELETE then the key does not exist.Otherwise the last PUT defines the value of the key.By superseding a PUT (with either another PUT or a DELETE) the log entry becomes obsolete. A segment containingsuch obsolete entries is called sparse, while a segment containing no such entries is called compact.Since writing a ``DELETE`` tag does not actually delete any data andthus does not free disk space any log-based data store will need acompaction strategy (somewhat analogous to a garbage collector).Borg uses a simple forward compacting algorithm, which avoids modifying existing segments.Compaction runs when a commit is issued with ``compact=True`` parameter, e.g.by the ``borg compact`` command (unless the :ref:`append_only_mode` is active).The compaction algorithm requires two inputs in addition to the segments themselves:(i) Which segments are sparse, to avoid scanning all segments (impractical).    Further, Borg uses a conditional compaction strategy: Only those    segments that exceed a threshold sparsity are compacted.    To implement the threshold condition efficiently, the sparsity has    to be stored as well. Therefore, Borg stores a mapping ``(segment    id,) -> (number of sparse bytes,)``.(ii) Each segment's reference count, which indicates how many live objects are in a segment.     This is not strictly required to perform the algorithm. Rather, it is used to validate     that a segment is unused before deleting it. If the algorithm is incorrect, or the reference     count was not accounted correctly, then an assertion failure occurs.These two pieces of information are stored in the hints file (`hints.N`)next to the index (`index.N`).Compaction may take some time if a repository has been kept in append-only modeor ``borg compact`` has not been used for a longer time, which both has causedthe number of sparse segments to grow.Compaction processes sparse segments from oldest to newest; sparse segmentswhich don't contain enough deleted data to justify compaction are skipped. Thisavoids doing e.g. 500 MB of writing current data to a new segment when onlya couple kB were deleted in a segment.Segments that are compacted are read in entirety. Current entries are written toa new segment, while superseded entries are omitted. After each segment an intermediarycommit is written to the new segment. Then, the old segment is deleted(asserting that the reference count diminished to zero), freeing disk space.A simplified example (excluding conditional compaction and with simplercommit logic) showing the principal operation of compaction:.. figure:: compaction.png    :figwidth: 100%    :width: 100%(The actual algorithm is more complex to avoid various consistency issues, refer tothe ``borg.repository`` module for more comments and documentation on these issues.).. _internals_storage_quota:Storage quotas~~~~~~~~~~~~~~Quotas are implemented at the Repository level. The active quota of a repositoryis determined by the ``storage_quota`` `config` entry or a run-time override (via :ref:`borg_serve`).The currently used quota is stored in the hints file. Operations (PUT and DELETE) duringa transaction modify the currently used quota:- A PUT adds the size of the *log entry* to the quota,  i.e. the length of the data plus the 41 byte header.- A DELETE subtracts the size of the deleted log entry from the quota,  which includes the header.Thus, PUT and DELETE are symmetric and cancel each other out precisely.The quota does not track on-disk size overheads (due to conditional compactionor append-only mode). In normal operation the inclusion of the log entry headersin the quota act as a faithful proxy for index and hints overheads.By tracking effective content size, the client can *always* recover from a full quotaby deleting archives. This would not be possible if the quota tracked on-disk size,since journaling DELETEs requires extra disk space before space is freed.Tracking effective size on the other hand accounts DELETEs immediately as freeing quota... rubric:: Enforcing the quotaThe storage quota is meant as a robust mechanism for service providers, therefore:ref:`borg_serve` has to enforce it without loopholes (e.g. modified clients).The following sections refer to using quotas on remotely accessed repositories.For local access, consider *client* and *serve* the same.Accordingly, quotas cannot be enforced with local access,since the quota can be changed in the repository config.The quota is enforcible only if *all* :ref:`borg_serve` versionsaccessible to clients support quotas (see next section). Further, quota isper repository. Therefore, ensure clients can only access a defined set of repositorieswith their quotas set, using ``--restrict-to-repository``.If the client exceeds the storage quota the ``StorageQuotaExceeded`` exception israised. Normally a client could ignore such an exception and just send a ``commit()``command anyway, circumventing the quota. However, when ``StorageQuotaExceeded`` is raised,it is stored in the ``transaction_doomed`` attribute of the repository.If the transaction is doomed, then commit will re-raise this exception, aborting the commit.The transaction_doomed indicator is reset on a rollback (which erases the quota-exceedingstate)... rubric:: Compatibility with older servers and enabling quota after-the-factIf no quota data is stored in the hints file, Borg assumes zero quota is used.Thus, if a repository with an enabled quota is written to with an older ``borg serve``version that does not understand quotas, then the quota usage will be erased.The client version is irrelevant to the storage quota and has no part in it.The form of error messages due to exceeding quota varies with client versions.A similar situation arises when upgrading from a Borg release that did not have quotas.Borg will start tracking quota use from the time of the upgrade, starting at zero.If the quota shall be enforced accurately in these cases, either- delete the ``index.N`` and ``hints.N`` files, forcing Borg to rebuild both,  re-acquiring quota data in the process, or- edit the msgpacked ``hints.N`` file (not recommended and thus not  documented further).The object graph----------------On top of the simple key-value store offered by the Repository_,Borg builds a much more sophisticated data structure that is essentiallya completely encrypted object graph. Objects, such as archives_, are referencedby their chunk ID, which is cryptographically derived from their contents.More on how this helps security in :ref:`security_structural_auth`... figure:: object-graph.png    :figwidth: 100%    :width: 100%.. _manifest:The manifest~~~~~~~~~~~~The manifest is the root of the object hierarchy. It referencesall archives in a repository, and thus all data in it.Since no object references it, it cannot be stored under its ID key.Instead, the manifest has a fixed all-zero key.The manifest is rewritten each time an archive is created, deleted,or modified. It looks like this:.. code-block:: python    {        'version': 1,        'timestamp': '2017-05-05T12:42:23.042864',        'item_keys': ['acl_access', 'acl_default', ...],        'config': {},        'archives': {            '2017-05-05-system-backup': {                'id': b'<32 byte binary object ID>',                'time': '2017-05-05T12:42:22.942864',            },        },        'tam': ...,    }The *version* field can be either 1 or 2. The versions differ in theway feature flags are handled, described below.The *timestamp* field is used to avoid logical replay attacks wherethe server just resets the repository to a previous state.*item_keys* is a list containing all Item_ keys that may be encountered inthe repository. It is used by *borg check*, which verifies that all keysin all items are a subset of these keys. Thus, an older version of *borg check*supporting this mechanism can correctly detect keys introduced in later versions.The *tam* key is part of the :ref:`tertiary authentication mechanism <tam_description>`(formerly known as "tertiary authentication for metadata") and authenticatesthe manifest, since an ID check is not possible.*config* is a general-purpose location for additional metadata. All versionsof Borg preserve its contents (it may have been a better place for *item_keys*,which is not preserved by unaware Borg versions, releases predating 1.0.4).Feature flags+++++++++++++Feature flags are used to add features to data structures without causingcorruption if older versions are used to access or modify them. The main issuesto consider for a feature flag oriented design are flag granularity,flag storage, and cache_ invalidation.Feature flags are divided in approximately three categories, detailed below.Due to the nature of ID-based deduplication, write (i.e. creating archives) andread access are not symmetric; it is possible to create archives referencingchunks that are not readable with the current feature set. The thirdcategory are operations that require accurate reference counts, for examplearchive deletion and check.As the manifest is always updated and always read, it is the ideal place to storefeature flags, comparable to the super-block of a file system. The only problemis to recover from a lost manifest, i.e. how is it possible to detect which featureflags are enabled, if there is no manifest to tell. This issue is left open at this time,but is not expected to be a major hurdle; it doesn't have to be handled efficiently, it justneeds to be handled.Lastly, cache_ invalidation is handled by noting which featureflags were and which were not understood while manipulating a cache.This allows borg to detect whether the cache needs to be invalidated,i.e. rebuilt from scratch. See `Cache feature flags`_ below.The *config* key stores the feature flags enabled on a repository:.. code-block:: python    config = {        'feature_flags': {            'read': {                'mandatory': ['some_feature'],            },            'check': {                'mandatory': ['other_feature'],            }            'write': ...,            'delete': ...        },    }The top-level distinction for feature flags is the operation the client intendsto perform,| the *read* operation includes extraction and listing of archives,| the *write* operation includes creating new archives,| the *delete* (archives) operation,| the *check* operation requires full understanding of everything in the repository.|These are weakly set-ordered; *check* will include everything required for *delete*,*delete* will likely include *write* and *read*. However, *read* may require morefeatures than *write* (due to ID-based deduplication, *write* does not necessarilyrequire reading/understanding repository contents).Each operation can contain several sets of feature flags. Only one set,the *mandatory* set is currently defined.Upon reading the manifest, the Borg client has already determined which operationshould be performed. If feature flags are found in the manifest, the setof feature flags supported by the client is compared to the mandatory setfound in the manifest. If any unsupported flags are found (i.e. the mandatory set isnot a subset of the features supported by the Borg client used), the operationis aborted with a *MandatoryFeatureUnsupported* error:    Unsupported repository feature(s) {'some_feature'}. A newer version of borg is required to access this repository.Older Borg releases do not have this concept and do not perform feature flags checks.These can be locked out with manifest version 2. Thus, the only difference betweenmanifest versions 1 and 2 is that the latter is only accepted by Borg releasesimplementing feature flags.Therefore, as soon as any mandatory feature flag is enabled in a repository,the manifest version must be switched to version 2 in order to lock out allBorg releases unaware of feature flags... _Cache feature flags:.. rubric:: Cache feature flags`The cache`_ does not have its separate set of feature flags. Instead, Borg storeswhich flags were used to create or modify a cache.All mandatory manifest features from all operations are gathered in one set.Then, two sets of features are computed;- those features that are supported by the client and mandated by the manifest  are added to the *mandatory_features* set,- the *ignored_features* set comprised of those features mandated by the manifest,  but not supported by the client.Because the client previously checked compliance with the mandatory set of featuresrequired for the particular operation it is executing, the *mandatory_features* setwill contain all necessary features required for using the cache safely.Conversely, the *ignored_features* set contains only those features which were notrelevant to operating the cache. Otherwise, the client would not pass the featureset test against the manifest.When opening a cache and the *mandatory_features* set is not a subset of the featuressupported by the client, the cache is wiped out and rebuilt,since a client not supporting a mandatory feature that the cache was built withwould be unable to update it correctly.The assumption behind this behaviour is that any of the unsupported features could havebeen reflected in the cache and there is no way for the client to discern whetherthat is the case.Meanwhile, it may not be practical for every feature to have clients using it trackwhether the feature had an impact on the cache.Therefore, the cache is wiped.When opening a cache and the intersection of *ignored_features* and the featuressupported by the client contains any elements, i.e. the client possesses featuresthat the previous client did not have and those new features are enabled in the repository,the cache is wiped out and rebuilt.While the former condition likely requires no tweaks, the latter condition is formulatedin an especially conservative way to play it safe. It seems likely that specific featuresmight be exempted from the latter condition... rubric:: Defined feature flagsCurrently no feature flags are defined.From currently planned features, some examples follow,these may/may not be implemented and purely serve as examples.- A mandatory *read* feature could be using a different encryption scheme (e.g. session keys).  This may not be mandatory for the *write* operation - reading data is not strictly required for  creating an archive.- Any additions to the way chunks are referenced (e.g. to support larger archives) would  become a mandatory *delete* and *check* feature; *delete* implies knowing correct  reference counts, so all object references need to be understood. *check* must  discover the entire object graph as well, otherwise the "orphan chunks check"  could delete data still in use... _archive:Archives~~~~~~~~Each archive is an object referenced by the manifest. The archive objectitself does not store any of the data contained in the archive it describes.Instead, it contains a list of chunks which form a msgpacked stream of items_.The archive object itself further contains some metadata:* *version** *name*, which might differ from the name set in the manifest.  When :ref:`borg_check` rebuilds the manifest (e.g. if it was corrupted) and finds  more than one archive object with the same name, it adds a counter to the name  in the manifest, but leaves the *name* field of the archives as it was.* *item_ptrs*, a list of "pointer chunk" IDs.  Each "pointer chunk" contains a list of chunk IDs of item metadata.* *command_line*, the command line which was used to create the archive* *hostname** *username** *time* and *time_end* are the start and end timestamps, respectively* *comment*, a user-specified archive comment* *chunker_params* are the :ref:`chunker-params <chunker-params>` used for creating the archive.  This is used by :ref:`borg_recreate` to determine whether a given archive needs rechunking.* Some other pieces of information related to recreate... _item:Items~~~~~Each item represents a file, directory or other file system item and is stored as adictionary created by the ``Item`` class that contains:* path* list of data chunks (size: count * ~40B)* user* group* uid* gid* mode (item type + permissions)* source (for symlinks)* hlid (for hardlinks)* rdev (for device files)* mtime, atime, ctime, birthtime in nanoseconds* xattrs* acl (various OS-dependent fields)* flagsAll items are serialized using msgpack and the resulting byte streamis fed into the same chunker algorithm as used for regular file dataand turned into deduplicated chunks. The reference to these chunks is then addedto the archive metadata. To achieve a finer granularity on this metadatastream, we use different chunker params for this chunker, which result insmaller chunks.A chunk is stored as an object as well, of course... _chunks:.. _chunker_details:Chunks~~~~~~Borg has these chunkers:- "fixed": a simple, low cpu overhead, fixed blocksize chunker, optionally  supporting a header block of different size.- "buzhash": variable, content-defined blocksize, uses a rolling hash  computed by the Buzhash_ algorithm.For some more general usage hints see also ``--chunker-params``."fixed" chunker+++++++++++++++The fixed chunker triggers (chunks) at even-spaced offsets, e.g. every 4MiB,producing chunks of same block size (the last chunk is not required to befull-size).Optionally, it supports processing a differently sized "header" first, beforeit starts to cut chunks of the desired block size.The default is not to have a differently sized header.``borg create --chunker-params fixed,BLOCK_SIZE[,HEADER_SIZE]``- BLOCK_SIZE: no default value, multiple of the system page size (usually 4096  bytes) recommended. E.g.: 4194304 would cut 4MiB sized chunks.- HEADER_SIZE: optional, defaults to 0 (no header).The fixed chunker also supports processing sparse files (reading only the rangeswith data and seeking over the empty hole ranges).``borg create --sparse --chunker-params fixed,BLOCK_SIZE[,HEADER_SIZE]``"buzhash" chunker+++++++++++++++++The buzhash chunker triggers (chunks) when the last HASH_MASK_BITS bits of thehash are zero, producing chunks with a target size of 2^HASH_MASK_BITS bytes.Buzhash is **only** used for cutting the chunks at places defined by thecontent, the buzhash value is **not** used as the deduplication criteria (weuse a cryptographically strong hash/MAC over the chunk contents for this, theid_hash).The idea of content-defined chunking is assigning every byte where acut *could* be placed a hash. The hash is based on some number of bytes(the window size) before the byte in question. Chunks are cutwhere the hash satisfies some condition(usually "n numbers of trailing/leading zeroes"). This causes chunks to be cutin the same location relative to the file's contents, even if bytes are insertedor removed before/after a cut, as long as the bytes within the window stay the same.This results in a high chance that a single cluster of changes to a file will onlyresult in 1-2 new chunks, aiding deduplication.Using normal hash functions this would be extremely slow,requiring hashing approximately ``window size * file size`` bytes.A rolling hash is used instead, which allows to add a new input byte andcompute a new hash as well as *remove* a previously added input bytefrom the computed hash. This makes the cost of computing a hash for eachinput byte largely independent of the window size.Borg defines minimum and maximum chunk sizes (CHUNK_MIN_EXP and CHUNK_MAX_EXP, respectively)which narrows down where cuts may be made, greatly reducing the amount of datathat is actually hashed for content-defined chunking.``borg create --chunker-params buzhash,CHUNK_MIN_EXP,CHUNK_MAX_EXP,HASH_MASK_BITS,HASH_WINDOW_SIZE``can be used to tune the chunker parameters, the default is:- CHUNK_MIN_EXP = 19 (minimum chunk size = 2^19 B = 512 kiB)- CHUNK_MAX_EXP = 23 (maximum chunk size = 2^23 B = 8 MiB)- HASH_MASK_BITS = 21 (target chunk size ~= 2^21 B = 2 MiB)- HASH_WINDOW_SIZE = 4095 [B] (`0xFFF`)The buzhash table is altered by XORing it with a seed randomly generated oncefor the repository, and stored encrypted in the keyfile. This is to preventchunk size based fingerprinting attacks on your encrypted repo contents (toguess what files you have based on a specific set of chunk sizes)... _cache:The cache---------The **files cache** is stored in ``cache/files`` and is used at backup time toquickly determine whether a given file is unchanged and we have all its chunks.In memory, the files cache is a key -> value mapping (a Python *dict*) and contains:* key: id_hash of the encoded, absolute file path* value:  - file inode number  - file size  - file ctime_ns (or mtime_ns)  - age (0 [newest], 1, 2, 3, ..., BORG_FILES_CACHE_TTL - 1)  - list of chunk ids representing the file's contentsTo determine whether a file has not changed, cached values are looked up viathe key in the mapping and compared to the current file attribute values.If the file's size, timestamp and inode number is still the same, it isconsidered not to have changed. In that case, we check that all file contentchunks are (still) present in the repository (we check that via the chunkscache).If everything is matching and all chunks are present, the file is not read /chunked / hashed again (but still a file metadata item is written to thearchive, made from fresh file metadata read from the filesystem). This iswhat makes borg so fast when processing unchanged files.If there is a mismatch or a chunk is missing, the file is read / chunked /hashed. Chunks already present in repo won't be transferred to repo again.The inode number is stored and compared to make sure we distinguish betweendifferent files, as a single path may not be unique across differentarchives in different setups.Not all filesystems have stable inode numbers. If that is the case, borg canbe told to ignore the inode number in the check via --files-cache.The age value is used for cache management. If a file is "seen" in a backuprun, its age is reset to 0, otherwise its age is incremented by one.If a file was not seen in BORG_FILES_CACHE_TTL backups, its cache entry isremoved. See also: :ref:`always_chunking` and :ref:`a_status_oddity`The files cache is a python dictionary, storing python objects, whichgenerates a lot of overhead.Borg can also work without using the files cache (saves memory if you have alot of files or not much RAM free), then all files are assumed to have changed.This is usually much slower than with files cache.The on-disk format of the files cache is a stream of msgpacked tuples (key, value).Loading the files cache involves reading the file, one msgpack object at a time,unpacking it, and msgpacking the value (in an effort to save memory).The **chunks cache** is stored in ``cache/chunks`` and is used to determinewhether we already have a specific chunk, to count references to it and alsofor statistics.The chunks cache is a key -> value mapping and contains:* key:  - chunk id_hash* value:  - reference count  - sizeThe chunks cache is a HashIndex_. Due to some restrictions of HashIndex,the reference count of each given chunk is limited to a constant, MAX_VALUE(introduced below in HashIndex_), approximately 2**32.If a reference count hits MAX_VALUE, decrementing it yields MAX_VALUE again,i.e. the reference count is pinned to MAX_VALUE... _cache-memory-usage:Indexes / Caches memory usage-----------------------------Here is the estimated memory usage of Borg - it's complicated::  chunk_size ~= 2 ^ HASH_MASK_BITS  (for buzhash chunker, BLOCK_SIZE for fixed chunker)  chunk_count ~= total_file_size / chunk_size  repo_index_usage = chunk_count * 48  chunks_cache_usage = chunk_count * 40  files_cache_usage = total_file_count * 240 + chunk_count * 80  mem_usage ~= repo_index_usage + chunks_cache_usage + files_cache_usage             = chunk_count * 164 + total_file_count * 240Due to the hashtables, the best/usual/worst cases for memory allocation canbe estimated like that::  mem_allocation = mem_usage / load_factor  # l_f = 0.25 .. 0.75  mem_allocation_peak = mem_allocation * (1 + growth_factor)  # g_f = 1.1 .. 2All units are Bytes.It is assuming every chunk is referenced exactly once (if you have a lot ofduplicate chunks, you will have fewer chunks than estimated above).It is also assuming that typical chunk size is 2^HASH_MASK_BITS (if you havea lot of files smaller than this statistical medium chunk size, you will havemore chunks than estimated above, because 1 file is at least 1 chunk).If a remote repository is used the repo index will be allocated on the remote side.The chunks cache, files cache and the repo index are all implemented as hashtables. A hash table must have a significant amount of unused entries to befast - the so-called load factor gives the used/unused elements ratio.When a hash table gets full (load factor getting too high), it needs to begrown (allocate new, bigger hash table, copy all elements over to it, free oldhash table) - this will lead to short-time peaks in memory usage each time thishappens. Usually does not happen for all hashtables at the same time, though.For small hash tables, we start with a growth factor of 2, which comes down to~1.1x for big hash tables.E.g. backing up a total count of 1 Mi (IEC binary prefix i.e. 2^20) files with a total size of 1TiB.a) with ``create --chunker-params buzhash,10,23,16,4095`` (custom, like borg < 1.0):  mem_usage  =  2.8GiBb) with ``create --chunker-params buzhash,19,23,21,4095`` (default):  mem_usage  =  0.31GiB.. note:: There is also the ``--files-cache=disabled`` option to disable the files cache.   You'll save some memory, but it will need to read / chunk all the files as   it can not skip unmodified files then.HashIndex---------The chunks cache and the repository index are stored as hash tables, withonly one slot per bucket, spreading hash collisions to the followingbuckets. As a consequence the hash is just a start position for a linearsearch. If a key is looked up that is not in the table, then the hash tableis searched from the start position (the hash) until the first emptybucket is reached.This particular mode of operation is open addressing with linear probing.When the hash table is filled to 75%, its size is grown. When it'semptied to 25%, its size is shrunken. Operations on it have a variablecomplexity between constant and linear with low factor, and memory overheadvaries between 33% and 300%.If an element is deleted, and the slot behind the deleted element is not empty,then the element will leave a tombstone, a bucket marked as deleted. Tombstonesare only removed by insertions using the tombstone's bucket, or by resizingthe table. They present the same load to the hash table as a real entry,but do not count towards the regular load factor.Thus, if the number of empty slots becomes too low (recall that linear probingfor an element not in the index stops at the first empty slot), the hash tableis rebuilt. The maximum *effective* load factor, i.e. including tombstones, is 93%.Data in a HashIndex is always stored in little-endian format, which increasesefficiency for almost everyone, since basically no one uses big-endian processorsany more.HashIndex does not use a hashing function, because all keys (save manifest) areoutputs of a cryptographic hash or MAC and thus already have excellent distribution.Thus, HashIndex simply uses the first 32 bits of the key as its "hash".The format is easy to read and write, because the buckets array has the same layoutin memory and on disk. Only the header formats differ. The on-disk header is``struct HashHeader``:- First, the HashIndex magic, the eight byte ASCII string "BORG_IDX".- Second, the signed 32-bit number of entries (i.e. buckets which are not deleted and not empty).- Third, the signed 32-bit number of buckets, i.e. the length of the buckets array  contained in the file, and the modulus for index calculation.- Fourth, the signed 8-bit length of keys.- Fifth, the signed 8-bit length of values. This has to be at least four bytes.All fields are packed.The HashIndex is *not* a general purpose data structure.The value size must be at least 4 bytes, and these first bytes are used for in-bandsignalling in the data structure itself.The constant MAX_VALUE (defined as 2**32-1025 = 4294966271) defines the valid range forthese 4 bytes when interpreted as an uint32_t from 0 to MAX_VALUE (inclusive).The following reserved values beyond MAX_VALUE are currently in use (byte order is LE):- 0xffffffff marks empty buckets in the hash table- 0xfffffffe marks deleted buckets in the hash tableHashIndex is implemented in C and wrapped with Cython in a class-based interface.The Cython wrapper checks every passed value against these reserved values andraises an AssertionError if they are used... _data-encryption:Encryption----------.. seealso:: The :ref:`borgcrypto` section for an in-depth review.AEAD modes~~~~~~~~~~For new repositories, borg only uses modern AEAD ciphers: AES-OCB or CHACHA20-POLY1305.For each borg invocation, a new sessionkey is derived from the borg key materialand the 48bit IV starts from 0 again (both ciphers internally add a 32bit counterto our IV, so we'll just count up by 1 per chunk).The encryption layout is best seen at the bottom of this diagram:.. figure:: encryption-aead.png    :figwidth: 100%    :width: 100%No special IV/counter management is needed here due to the use of session keys.A 48 bit IV is way more than needed: If you only backed up 4kiB chunks (2^12B),the IV would "limit" the data encrypted in one session to 2^(12+48)B == 2.3 exabytes,meaning you would run against other limitations (RAM, storage, time) way before that.In practice, chunks are usually bigger, for big files even much bigger, giving aneven higher limit.Legacy modes~~~~~~~~~~~~Old repositories (which used AES-CTR mode) are supported read-only to be able to``borg transfer`` their archives to new repositories (which use AEAD modes).AES-CTR mode is not supported for new repositories and the related code will beremoved in a future release.Both modes~~~~~~~~~~Encryption keys (and other secrets) are kept either in a key file on the client('keyfile' mode) or in the repository config on the server ('repokey' mode).In both cases, the secrets are generated from random and then encrypted by akey derived from your passphrase (this happens on the client before the keyis stored into the keyfile or as repokey).The passphrase is passed through the ``BORG_PASSPHRASE`` environment variableor prompted for interactive usage... _key_files:Key files---------.. seealso:: The :ref:`key_encryption` section for an in-depth review of the key encryption.When initializing a repository with one of the "keyfile" encryption modes,Borg creates an associated key file in ``$HOME/.config/borg/keys``.The same key is also used in the "repokey" modes, which store it in the repositoryin the configuration file.The internal data structure is as follows:version  currently always an integer, 2repository_id  the ``id`` field in the ``config`` ``INI`` file of the repository.crypt_key  the initial key material used for the AEAD crypto (512 bits)id_key  the key used to MAC the plaintext chunk data to compute the chunk's idchunk_seed  the seed for the buzhash chunking table (signed 32 bit integer)These fields are packed using msgpack_. The utf-8 encoded passphraseis processed with argon2_ to derive a 256 bit key encryption key (KEK).Then the KEK is used to encrypt and authenticate the packed data usingthe chacha20-poly1305 AEAD cipher.The result is stored in a another msgpack_ formatted as follows:version  currently always an integer, 1salt  random 256 bits salt used to process the passphraseargon2_*  some parameters for the argon2 kdfalgorithm  the algorithms used to process the passphrase  (currently the string ``argon2 chacha20-poly1305``)data  The encrypted, packed fields.The resulting msgpack_ is then encoded using base64 and written to thekey file, wrapped using the standard ``textwrap`` module with a header.The header is a single line with a MAGIC string, a space and a hexadecimalrepresentation of the repository id... _data-compression:Compression-----------Borg supports the following compression methods, each identified by a ctype valuein the range between 0 and 255 (and augmented by a clevel 0..255 value for thecompression level):- none (no compression, pass through data 1:1), identified by 0x00- lz4 (low compression, but super fast), identified by 0x01- zstd (level 1-22 offering a wide range: level 1 is lower compression and high  speed, level 22 is higher compression and lower speed) - identified by 0x03- zlib (level 0-9, level 0 is no compression [but still adding zlib overhead],  level 1 is low, level 9 is high compression), identified by 0x05- lzma (level 0-9, level 0 is low, level 9 is high compression), identified  by 0x02.The type byte is followed by a byte indicating the compression level.Speed:  none > lz4 > zlib > lzma, lz4 > zstdCompression: lzma > zlib > lz4 > none, zstd > lz4Be careful, higher compression levels might use a lot of resources (CPU/memory).The overall speed of course also depends on the speed of your target storage.If that is slow, using a higher compression level might yield better overallperformance. You need to experiment a bit. Maybe just watch your CPU load, ifthat is relatively low, increase compression until 1 core is 70-100% loaded.Even if your target storage is rather fast, you might see interesting effects:while doing no compression at all (none) is a operation that takes no time, itlikely will need to store more data to the storage compared to using lz4.The time needed to transfer and store the additional data might be much morethan if you had used lz4 (which is super fast, but still might compress yourdata about 2:1). This is assuming your data is compressible (if you back upalready compressed data, trying to compress them at backup time is usuallypointless).Compression is applied after deduplication, thus using different compressionmethods in one repo does not influence deduplication.See ``borg create --help`` about how to specify the compression level and its default.Lock files----------Borg uses locks to get (exclusive or shared) access to the cache andthe repository.The locking system is based on renaming a temporary directoryto `lock.exclusive` (forexclusive locks). Inside this directory, there is a file indicatinghostname, process id and thread id of the lock holder.There is also a json file `lock.roster` that keeps a directory of all sharedand exclusive lockers.If the process is able to rename a temporary directory (with thehost/process/thread identifier prepared inside it) in the resource directoryto `lock.exclusive`, it has the lock for it. If renaming fails(because this directory already exists and its host/process/thread identifierdenotes a thread on the host which is still alive), lock acquisition fails.The cache lock is usually in `~/.cache/borg/REPOID/lock.*`.The repository lock is in `repository/lock.*`.In case you run into troubles with the locks, you can use the ``borg break-lock``command after you first have made sure that no Borg process isrunning on any machine that accesses this resource. Be very careful, the cacheor repository might get damaged if multiple processes use it at the same time.Checksumming data structures----------------------------As detailed in the previous sections, Borg generates and stores various filescontaining important meta data, such as the repository index, repository hints,chunks caches and files cache.Data corruption in these files can damage the archive data in a repository,e.g. due to wrong reference counts in the chunks cache. Only some parts of Borgwere designed to handle corrupted data structures, so a corrupted files cachemay cause crashes or write incorrect archives.Therefore, Borg calculates checksums when writing these files and tests checksumswhen reading them. Checksums are generally 64-bit XXH64 hashes.The canonical xxHash representation is used, i.e. big-endian.Checksums are stored as hexadecimal ASCII strings.For compatibility, checksums are not required and absent checksums do not trigger errors.The mechanisms have been designed to avoid false-positives when various Borgversions are used alternately on the same repositories.Checksums are a data safety mechanism. They are not a security mechanism... rubric:: Choice of algorithmXXH64 has been chosen for its high speed on all platforms, which avoids performancedegradation in CPU-limited parts (e.g. cache synchronization).Unlike CRC32, it neither requires hardware support (crc32c or CLMUL)nor vectorized code nor large, cache-unfriendly lookup tables to achieve good performance.This simplifies deployment of it considerably (cf. src/borg/algorithms/crc32...).Further, XXH64 is a non-linear hash function and thus has a "more or less" goodchance to detect larger burst errors, unlike linear CRCs where the probabilityof detection decreases with error size.The 64-bit checksum length is considered sufficient for the file sizes typicallychecksummed (individual files up to a few GB, usually less).xxHash was expressly designed for data blocks of these sizes.Lower layer — file_integrity~~~~~~~~~~~~~~~~~~~~~~~~~~~~To accommodate the different transaction models used for the cache and repository,there is a lower layer (borg.crypto.file_integrity.IntegrityCheckedFile)wrapping a file-like object, performing streaming calculation and comparison of checksums.Checksum errors are signalled by raising an exception (borg.crypto.file_integrity.FileIntegrityError)at the earliest possible moment... rubric:: Calculating checksumsBefore feeding the checksum algorithm any data, the file name (i.e. without any path)is mixed into the checksum, since the name encodes the context of the data for Borg.The various indices used by Borg have separate header and main data parts.IntegrityCheckedFile allows borg to checksum them independently, which avoidseven reading the data when the header is corrupted. When a part is signalled,the length of the part name is mixed into the checksum state first (encodedas an ASCII string via `%10d` printf format), then the name of the partis mixed in as an UTF-8 string. Lastly, the current position (length)in the file is mixed in as well.The checksum state is not reset at part boundaries.A final checksum is always calculated in the same way as the parts described above,after seeking to the end of the file. The final checksum cannot prevent codefrom processing corrupted data during reading, however, it prevents use of thecorrupted data... rubric:: Serializing checksumsAll checksums are compiled into a simple JSON structure called *integrity data*:.. code-block:: json    {        "algorithm": "XXH64",        "digests": {            "HashHeader": "eab6802590ba39e3",            "final": "e2a7f132fc2e8b24"        }    }The *algorithm* key notes the used algorithm. When reading, integrity data containingan unknown algorithm is not inspected further.The *digests* key contains a mapping of part names to their digests.Integrity data is generally stored by the upper layers, introduced below. An exceptionis the DetachedIntegrityCheckedFile, which automatically writes and reads it froma ".integrity" file next to the data file.It is used for archive chunks indexes in chunks.archive.d.Upper layer~~~~~~~~~~~Storage of integrity data depends on the component using it, since they havedifferent transaction mechanisms, and integrity data needs to betransacted with the data it is supposed to protect... rubric:: Main cache files: chunks and files cacheThe integrity data of the ``chunks`` and ``files`` caches is stored in thecache ``config``, since all three are transacted together.The ``[integrity]`` section is used:.. code-block:: ini    [cache]    version = 1    repository = 3c4...e59    manifest = 10e...21c    timestamp = 2017-06-01T21:31:39.699514    key_type = 2    previous_location = /path/to/repo    [integrity]    manifest = 10e...21c    chunks = {"algorithm": "XXH64", "digests": {"HashHeader": "eab...39e3", "final": "e2a...b24"}}The manifest ID is duplicated in the integrity section due to the way all Borgversions handle the config file. Instead of creating a "new" config file froman internal representation containing only the data understood by Borg,the config file is read in entirety (using the Python ConfigParser) and modified.This preserves all sections and values not understood by the Borg versionmodifying it.Thus, if an older versions uses a cache with integrity data, it would preservethe integrity section and its contents. If a integrity-aware Borg versionwould read this cache, it would incorrectly report checksum errors, sincethe older version did not update the checksums.However, by duplicating the manifest ID in the integrity section, it iseasy to tell whether the checksums concern the current state of the cache.Integrity errors are fatal in these files, terminating the program,and are not automatically corrected at this time... rubric:: chunks.archive.dIndices in chunks.archive.d are not transacted and use DetachedIntegrityCheckedFile,which writes the integrity data to a separate ".integrity" file.Integrity errors result in deleting the affected index and rebuilding it.This logs a warning and increases the exit code to WARNING (1)... _integrity_repo:.. rubric:: Repository index and hintsThe repository associates index and hints files with a transaction by including thetransaction ID in the file names. Integrity data is stored in a third file("integrity.<TRANSACTION_ID>"). Like the hints file, it is msgpacked:.. code-block:: python    {        'version': 2,        'hints': '{"algorithm": "XXH64", "digests": {"final": "411208db2aa13f1a"}}',        'index': '{"algorithm": "XXH64", "digests": {"HashHeader": "846b7315f91b8e48", "final": "cb3e26cadc173e40"}}'    }The *version* key started at 2, the same version used for the hints. Since Borg hasmany versioned file formats, this keeps the number of different versions in usea bit lower.The other keys map an auxiliary file, like *index* or *hints* to their integrity data.Note that the JSON is stored as-is, and not as part of the msgpack structure.Integrity errors result in deleting the affected file(s) (index/hints) and rebuilding the index,which is the same action taken when corruption is noticed in other ways (e.g. HashIndex candetect most corrupted headers, but not data corruption). A warning is logged as well.The exit code is not influenced, since remote repositories cannot perform that action.Raising the exit code would be possible for local repositories, but is not implemented.Unlike the cache design this mechanism can have false positives whenever an older version*rewrites* the auxiliary files for a transaction created by a newer version,since that might result in a different index (due to hash-table resizing) or hints file(hash ordering, or the older version 1 format), while not invalidating the integrity file.For example, using 1.1 on a repository, noticing corruption or similar issues and then running``borg-1.0 check --repair``, which rewrites the index and hints, results in this situation.Borg 1.1 would erroneously report checksum errors in the hints and/or index files and triggeran automatic rebuild of these files.HardLinkManager and the hlid concept------------------------------------Dealing with hard links needs some extra care, implemented in borg within the HardLinkManagerclass:- At archive creation time, fs items with st_nlink > 1 indicate that they are a member of  a group of hardlinks all pointing to the same inode. For such fs items, the archived item  includes a hlid attribute (hardlink id), which is computed like H(st_dev, st_ino). Thus,  if archived items have the same hlid value, they pointed to the same inode and form a  group of hardlinks. Besides that, nothing special is done for any member of the group  of hardlinks, meaning that e.g. for regular files, each archived item will have a  chunks list.- At extraction time, the presence of a hlid attribute indicates that there might be more  hardlinks coming, pointing to the same content (inode), thus borg will remember the "hlid  to extracted path" mapping, so it will know the correct path for extracting (hardlinking)  the next hardlink of that group / with the same hlid.- This symmetric approach (each item has all the information, e.g. the chunks list)  simplifies dealing with such items a lot, especially for partial extraction, for the  FUSE filesystem, etc.- This is different from the asymmetric approach of old borg versions (< 2.0) and also from  tar which have the concept of a main item (first hardlink, has the content) and content-less  secondary items with by-name back references for each subsequent hardlink, causing lots  of complications when dealing with them.
 |