xref: /linux/Documentation/filesystems/caching/netfs-api.rst (revision daa2be74b1b2302004945b2a5e32424e177cc7da)
1.. SPDX-License-Identifier: GPL-2.0
2
3==============================
4Network Filesystem Caching API
5==============================
6
7Fscache provides an API by which a network filesystem can make use of local
8caching facilities.  The API is arranged around a number of principles:
9
10 (1) A cache is logically organised into volumes and data storage objects
11     within those volumes.
12
13 (2) Volumes and data storage objects are represented by various types of
14     cookie.
15
16 (3) Cookies have keys that distinguish them from their peers.
17
18 (4) Cookies have coherency data that allows a cache to determine if the
19     cached data is still valid.
20
21 (5) I/O is done asynchronously where possible.
22
23This API is used by::
24
25	#include <linux/fscache.h>.
26
27.. This document contains the following sections:
28
29	 (1) Overview
30	 (2) Volume registration
31	 (3) Data file registration
32	 (4) Declaring a cookie to be in use
33	 (5) Resizing a data file (truncation)
34	 (6) Data I/O API
35	 (7) Data file coherency
36	 (8) Data file invalidation
37	 (9) Write back resource management
38	(10) Caching of local modifications
39	(11) Page release and invalidation
40
41
42Overview
43========
44
45The fscache hierarchy is organised on two levels from a network filesystem's
46point of view.  The upper level represents "volumes" and the lower level
47represents "data storage objects".  These are represented by two types of
48cookie, hereafter referred to as "volume cookies" and "cookies".
49
50A network filesystem acquires a volume cookie for a volume using a volume key,
51which represents all the information that defines that volume (e.g. cell name
52or server address, volume ID or share name).  This must be rendered as a
53printable string that can be used as a directory name (ie. no '/' characters
54and shouldn't begin with a '.').  The maximum name length is one less than the
55maximum size of a filename component (allowing the cache backend one char for
56its own purposes).
57
58A filesystem would typically have a volume cookie for each superblock.
59
60The filesystem then acquires a cookie for each file within that volume using an
61object key.  Object keys are binary blobs and only need to be unique within
62their parent volume.  The cache backend is responsible for rendering the binary
63blob into something it can use and may employ hash tables, trees or whatever to
64improve its ability to find an object.  This is transparent to the network
65filesystem.
66
67A filesystem would typically have a cookie for each inode, and would acquire it
68in iget and relinquish it when evicting the cookie.
69
70Once it has a cookie, the filesystem needs to mark the cookie as being in use.
71This causes fscache to send the cache backend off to look up/create resources
72for the cookie in the background, to check its coherency and, if necessary, to
73mark the object as being under modification.
74
75A filesystem would typically "use" the cookie in its file open routine and
76unuse it in file release and it needs to use the cookie around calls to
77truncate the cookie locally.  It *also* needs to use the cookie when the
78pagecache becomes dirty and unuse it when writeback is complete.  This is
79slightly tricky, and provision is made for it.
80
81When performing a read, write or resize on a cookie, the filesystem must first
82begin an operation.  This copies the resources into a holding struct and puts
83extra pins into the cache to stop cache withdrawal from tearing down the
84structures being used.  The actual operation can then be issued and conflicting
85invalidations can be detected upon completion.
86
87The filesystem is expected to use netfslib to access the cache, but that's not
88actually required and it can use the fscache I/O API directly.
89
90
91Volume Registration
92===================
93
94The first step for a network filesystem is to acquire a volume cookie for the
95volume it wants to access::
96
97	struct fscache_volume *
98	fscache_acquire_volume(const char *volume_key,
99			       const char *cache_name,
100			       const void *coherency_data,
101			       size_t coherency_len);
102
103This function creates a volume cookie with the specified volume key as its name
104and notes the coherency data.
105
106The volume key must be a printable string with no '/' characters in it.  It
107should begin with the name of the filesystem and should be no longer than 254
108characters.  It should uniquely represent the volume and will be matched with
109what's stored in the cache.
110
111The caller may also specify the name of the cache to use.  If specified,
112fscache will look up or create a cache cookie of that name and will use a cache
113of that name if it is online or comes online.  If no cache name is specified,
114it will use the first cache that comes to hand and set the name to that.
115
116The specified coherency data is stored in the cookie and will be matched
117against coherency data stored on disk.  The data pointer may be NULL if no data
118is provided.  If the coherency data doesn't match, the entire cache volume will
119be invalidated.
120
121This function can return errors such as EBUSY if the volume key is already in
122use by an acquired volume or ENOMEM if an allocation failure occurred.  It may
123also return a NULL volume cookie if fscache is not enabled.  It is safe to
124pass a NULL cookie to any function that takes a volume cookie.  This will
125cause that function to do nothing.
126
127
128When the network filesystem has finished with a volume, it should relinquish it
129by calling::
130
131	void fscache_relinquish_volume(struct fscache_volume *volume,
132				       const void *coherency_data,
133				       bool invalidate);
134
135This will cause the volume to be committed or removed, and if sealed the
136coherency data will be set to the value supplied.  The amount of coherency data
137must match the length specified when the volume was acquired.  Note that all
138data cookies obtained in this volume must be relinquished before the volume is
139relinquished.
140
141
142Data File Registration
143======================
144
145Once it has a volume cookie, a network filesystem can use it to acquire a
146cookie for data storage::
147
148	struct fscache_cookie *
149	fscache_acquire_cookie(struct fscache_volume *volume,
150			       u8 advice,
151			       const void *index_key,
152			       size_t index_key_len,
153			       const void *aux_data,
154			       size_t aux_data_len,
155			       loff_t object_size)
156
157This creates the cookie in the volume using the specified index key.  The index
158key is a binary blob of the given length and must be unique for the volume.
159This is saved into the cookie.  There are no restrictions on the content, but
160its length shouldn't exceed about three quarters of the maximum filename length
161to allow for encoding.
162
163The caller should also pass in a piece of coherency data in aux_data.  A buffer
164of size aux_data_len will be allocated and the coherency data copied in.  It is
165assumed that the size is invariant over time.  The coherency data is used to
166check the validity of data in the cache.  Functions are provided by which the
167coherency data can be updated.
168
169The file size of the object being cached should also be provided.  This may be
170used to trim the data and will be stored with the coherency data.
171
172This function never returns an error, though it may return a NULL cookie on
173allocation failure or if fscache is not enabled.  It is safe to pass in a NULL
174volume cookie and pass the NULL cookie returned to any function that takes it.
175This will cause that function to do nothing.
176
177
178When the network filesystem has finished with a cookie, it should relinquish it
179by calling::
180
181	void fscache_relinquish_cookie(struct fscache_cookie *cookie,
182				       bool retire);
183
184This will cause fscache to either commit the storage backing the cookie or
185delete it.
186
187
188Marking A Cookie In-Use
189=======================
190
191Once a cookie has been acquired by a network filesystem, the filesystem should
192tell fscache when it intends to use the cookie (typically done on file open)
193and should say when it has finished with it (typically on file close)::
194
195	void fscache_use_cookie(struct fscache_cookie *cookie,
196				bool will_modify);
197	void fscache_unuse_cookie(struct fscache_cookie *cookie,
198				  const void *aux_data,
199				  const loff_t *object_size);
200
201The *use* function tells fscache that it will use the cookie and, additionally,
202indicate if the user is intending to modify the contents locally.  If not yet
203done, this will trigger the cache backend to go and gather the resources it
204needs to access/store data in the cache.  This is done in the background, and
205so may not be complete by the time the function returns.
206
207The *unuse* function indicates that a filesystem has finished using a cookie.
208It optionally updates the stored coherency data and object size and then
209decreases the in-use counter.  When the last user unuses the cookie, it is
210scheduled for garbage collection.  If not reused within a short time, the
211resources will be released to reduce system resource consumption.
212
213A cookie must be marked in-use before it can be accessed for read, write or
214resize - and an in-use mark must be kept whilst there is dirty data in the
215pagecache in order to avoid an oops due to trying to open a file during process
216exit.
217
218Note that in-use marks are cumulative.  For each time a cookie is marked
219in-use, it must be unused.
220
221
222Resizing A Data File (Truncation)
223=================================
224
225If a network filesystem file is resized locally by truncation, the following
226should be called to notify the cache::
227
228	void fscache_resize_cookie(struct fscache_cookie *cookie,
229				   loff_t new_size);
230
231The caller must have first marked the cookie in-use.  The cookie and the new
232size are passed in and the cache is synchronously resized.  This is expected to
233be called from ``->setattr()`` inode operation under the inode lock.
234
235
236Data I/O API
237============
238
239To do data I/O operations directly through a cookie, the following functions
240are available::
241
242	int fscache_begin_read_operation(struct netfs_cache_resources *cres,
243					 struct fscache_cookie *cookie);
244	int fscache_read(struct netfs_cache_resources *cres,
245			 loff_t start_pos,
246			 struct iov_iter *iter,
247			 enum netfs_read_from_hole read_hole,
248			 netfs_io_terminated_t term_func,
249			 void *term_func_priv);
250	int fscache_write(struct netfs_cache_resources *cres,
251			  loff_t start_pos,
252			  struct iov_iter *iter,
253			  netfs_io_terminated_t term_func,
254			  void *term_func_priv);
255
256The *begin* function sets up an operation, attaching the resources required to
257the cache resources block from the cookie.  Assuming it doesn't return an error
258(for instance, it will return -ENOBUFS if given a NULL cookie, but otherwise do
259nothing), then one of the other two functions can be issued.
260
261The *read* and *write* functions initiate a direct-IO operation.  Both take the
262previously set up cache resources block, an indication of the start file
263position, and an I/O iterator that describes buffer and indicates the amount of
264data.
265
266The read function also takes a parameter to indicate how it should handle a
267partially populated region (a hole) in the disk content.  This may be to ignore
268it, skip over an initial hole and place zeros in the buffer or give an error.
269
270The read and write functions can be given an optional termination function that
271will be run on completion::
272
273	typedef
274	void (*netfs_io_terminated_t)(void *priv, ssize_t transferred_or_error,
275				      bool was_async);
276
277If a termination function is given, the operation will be run asynchronously
278and the termination function will be called upon completion.  If not given, the
279operation will be run synchronously.  Note that in the asynchronous case, it is
280possible for the operation to complete before the function returns.
281
282Both the read and write functions end the operation when they complete,
283detaching any pinned resources.
284
285The read operation will fail with ESTALE if invalidation occurred whilst the
286operation was ongoing.
287
288
289Data File Coherency
290===================
291
292To request an update of the coherency data and file size on a cookie, the
293following should be called::
294
295	void fscache_update_cookie(struct fscache_cookie *cookie,
296				   const void *aux_data,
297				   const loff_t *object_size);
298
299This will update the cookie's coherency data and/or file size.
300
301
302Data File Invalidation
303======================
304
305Sometimes it will be necessary to invalidate an object that contains data.
306Typically this will be necessary when the server informs the network filesystem
307of a remote third-party change - at which point the filesystem has to throw
308away the state and cached data that it had for an file and reload from the
309server.
310
311To indicate that a cache object should be invalidated, the following should be
312called::
313
314	void fscache_invalidate(struct fscache_cookie *cookie,
315				const void *aux_data,
316				loff_t size,
317				unsigned int flags);
318
319This increases the invalidation counter in the cookie to cause outstanding
320reads to fail with -ESTALE, sets the coherency data and file size from the
321information supplied, blocks new I/O on the cookie and dispatches the cache to
322go and get rid of the old data.
323
324Invalidation runs asynchronously in a worker thread so that it doesn't block
325too much.
326
327
328Write-Back Resource Management
329==============================
330
331To write data to the cache from network filesystem writeback, the cache
332resources required need to be pinned at the point the modification is made (for
333instance when the page is marked dirty) as it's not possible to open a file in
334a thread that's exiting.
335
336The following facilities are provided to manage this:
337
338 * An inode flag, ``I_PINNING_FSCACHE_WB``, is provided to indicate that an
339   in-use is held on the cookie for this inode.  It can only be changed if the
340   the inode lock is held.
341
342 * A flag, ``unpinned_fscache_wb`` is placed in the ``writeback_control``
343   struct that gets set if ``__writeback_single_inode()`` clears
344   ``I_PINNING_FSCACHE_WB`` because all the dirty pages were cleared.
345
346To support this, the following functions are provided::
347
348	bool fscache_dirty_folio(struct address_space *mapping,
349				 struct folio *folio,
350				 struct fscache_cookie *cookie);
351	void fscache_unpin_writeback(struct writeback_control *wbc,
352				     struct fscache_cookie *cookie);
353	void fscache_clear_inode_writeback(struct fscache_cookie *cookie,
354					   struct inode *inode,
355					   const void *aux);
356
357The *set* function is intended to be called from the filesystem's
358``dirty_folio`` address space operation.  If ``I_PINNING_FSCACHE_WB`` is not
359set, it sets that flag and increments the use count on the cookie (the caller
360must already have called ``fscache_use_cookie()``).
361
362The *unpin* function is intended to be called from the filesystem's
363``write_inode`` superblock operation.  It cleans up after writing by unusing
364the cookie if unpinned_fscache_wb is set in the writeback_control struct.
365
366The *clear* function is intended to be called from the netfs's ``evict_inode``
367superblock operation.  It must be called *after*
368``truncate_inode_pages_final()``, but *before* ``clear_inode()``.  This cleans
369up any hanging ``I_PINNING_FSCACHE_WB``.  It also allows the coherency data to
370be updated.
371
372
373Caching of Local Modifications
374==============================
375
376If a network filesystem has locally modified data that it wants to write to the
377cache, it needs to mark the pages to indicate that a write is in progress, and
378if the mark is already present, it needs to wait for it to be removed first
379(presumably due to an already in-progress operation).  This prevents multiple
380competing DIO writes to the same storage in the cache.
381
382Firstly, the netfs should determine if caching is available by doing something
383like::
384
385	bool caching = fscache_cookie_enabled(cookie);
386
387If caching is to be attempted, pages should be waited for and then marked using
388the following functions provided by the netfs helper library::
389
390	void set_page_fscache(struct page *page);
391	void wait_on_page_fscache(struct page *page);
392	int wait_on_page_fscache_killable(struct page *page);
393
394Once all the pages in the span are marked, the netfs can ask fscache to
395schedule a write of that region::
396
397	void fscache_write_to_cache(struct fscache_cookie *cookie,
398				    struct address_space *mapping,
399				    loff_t start, size_t len, loff_t i_size,
400				    netfs_io_terminated_t term_func,
401				    void *term_func_priv,
402				    bool caching)
403
404And if an error occurs before that point is reached, the marks can be removed
405by calling::
406
407	void fscache_clear_page_bits(struct address_space *mapping,
408				     loff_t start, size_t len,
409				     bool caching)
410
411In these functions, a pointer to the mapping to which the source pages are
412attached is passed in and start and len indicate the size of the region that's
413going to be written (it doesn't have to align to page boundaries necessarily,
414but it does have to align to DIO boundaries on the backing filesystem).  The
415caching parameter indicates if caching should be skipped, and if false, the
416functions do nothing.
417
418The write function takes some additional parameters: the cookie representing
419the cache object to be written to, i_size indicates the size of the netfs file
420and term_func indicates an optional completion function, to which
421term_func_priv will be passed, along with the error or amount written.
422
423Note that the write function will always run asynchronously and will unmark all
424the pages upon completion before calling term_func.
425
426
427Page Release and Invalidation
428=============================
429
430Fscache keeps track of whether we have any data in the cache yet for a cache
431object we've just created.  It knows it doesn't have to do any reading until it
432has done a write and then the page it wrote from has been released by the VM,
433after which it *has* to look in the cache.
434
435To inform fscache that a page might now be in the cache, the following function
436should be called from the ``release_folio`` address space op::
437
438	void fscache_note_page_release(struct fscache_cookie *cookie);
439
440if the page has been released (ie. release_folio returned true).
441
442Page release and page invalidation should also wait for any mark left on the
443page to say that a DIO write is underway from that page::
444
445	void wait_on_page_fscache(struct page *page);
446	int wait_on_page_fscache_killable(struct page *page);
447
448
449API Function Reference
450======================
451
452.. kernel-doc:: include/linux/fscache.h
453