Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp986826pxb; Fri, 15 Apr 2022 17:29:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwx4ZYCorZ+IojCUYLMWpLr+9sxI9It4PjFYKFY0XIE3dnofSEvJ/ObHliac1blDntOqkku X-Received: by 2002:a17:90b:3cf:b0:1d0:cdd4:9d0a with SMTP id go15-20020a17090b03cf00b001d0cdd49d0amr1412083pjb.187.1650068978272; Fri, 15 Apr 2022 17:29:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650068978; cv=none; d=google.com; s=arc-20160816; b=PwbUTpWp2yOpU3RuDed0PPyb9niqyN4RFMUiNR4M9sFd5mUQrCfBw1A5aBe+sV4q56 uerUZ0rvQnLDeKS4vwlr/evwFIk90HACh2WVF6TqJuYP0MCTAVWliURxYY8KPcur5j6P 6ddsbiowtFbzxkzzOroP2QN8DDtM6whpNmEd8/+FU08B4uPmH+dIQgQ5DLs8PdEiJ4v4 2pyV/FoT4l+0AJrLpcjfdZFH3KH3ij3ijLjMwbVHMuIoFzyFEmogW2+2nVsq7IUudrnc Cb8JG8wBuVmMyG77qX96nrfJ6mj2k3Vpor8hOY8DbY4HEu2tgJY+O6VWOjnRMywienES 39EA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=L5nnNdzEvTht06IQP5wXIZ/juP5UiT+NGYZWivkH7pc=; b=hIurM+/IbYIlMIDSZS2prSBQMSX97kmVr9s90poTLzSXv56hHMsWtCu3EE6eeHYGu4 TK5iUp/5N3NKH+hxHHU8zhEBjpKcWRPMwbaGclq+vCxzF5ujZxnKvT7uynK86PhRZ3S9 roKe0wbWw8wHxPAMPs4dfH59/nmqn+uFI7R3Tbedx3/kqD/mA/l8qlQkaBBj4CTSJOny J7nf/7FrD5ybAt7OF14+bmqnubK97LyTx5foMA6+Xpu0gG/7mTsiKc/TcID83P+X7Xst SrMkThMhp4r0qBK66AhtiGzzWzoVG/hqQ3kG8URcer/PEgarFgn2GA6EbQqy05iIHSmS tSwA== ARC-Authentication-Results: i=1; mx.google.com; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id q2-20020a656a82000000b003816043eea4si2838255pgu.153.2022.04.15.17.29.37 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 15 Apr 2022 17:29:38 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 6356818B29; Fri, 15 Apr 2022 17:27:08 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245518AbiDOMki (ORCPT + 99 others); Fri, 15 Apr 2022 08:40:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39650 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1353591AbiDOMjB (ORCPT ); Fri, 15 Apr 2022 08:39:01 -0400 Received: from out30-42.freemail.mail.aliyun.com (out30-42.freemail.mail.aliyun.com [115.124.30.42]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A0C5D6832D; Fri, 15 Apr 2022 05:36:32 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R181e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04400;MF=jefflexu@linux.alibaba.com;NM=1;PH=DS;RN=19;SR=0;TI=SMTPD_---0VA7Y1b1_1650026187; Received: from localhost(mailfrom:jefflexu@linux.alibaba.com fp:SMTPD_---0VA7Y1b1_1650026187) by smtp.aliyun-inc.com(127.0.0.1); Fri, 15 Apr 2022 20:36:28 +0800 From: Jeffle Xu To: dhowells@redhat.com, linux-cachefs@redhat.com, xiang@kernel.org, chao@kernel.org, linux-erofs@lists.ozlabs.org Cc: torvalds@linux-foundation.org, gregkh@linuxfoundation.org, willy@infradead.org, linux-fsdevel@vger.kernel.org, joseph.qi@linux.alibaba.com, bo.liu@linux.alibaba.com, tao.peng@linux.alibaba.com, gerry@linux.alibaba.com, eguan@linux.alibaba.com, linux-kernel@vger.kernel.org, luodaowen.backend@bytedance.com, tianzichen@kuaishou.com, fannaihao@baidu.com, zhangjiachen.jaycee@bytedance.com Subject: [PATCH v9 08/21] cachefiles: document on-demand read mode Date: Fri, 15 Apr 2022 20:36:01 +0800 Message-Id: <20220415123614.54024-9-jefflexu@linux.alibaba.com> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20220415123614.54024-1-jefflexu@linux.alibaba.com> References: <20220415123614.54024-1-jefflexu@linux.alibaba.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE,UNPARSEABLE_RELAY autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Document new user interface introduced by on-demand read mode. Signed-off-by: Jeffle Xu --- .../filesystems/caching/cachefiles.rst | 170 ++++++++++++++++++ 1 file changed, 170 insertions(+) diff --git a/Documentation/filesystems/caching/cachefiles.rst b/Documentation/filesystems/caching/cachefiles.rst index 8bf396b76359..c10a16957141 100644 --- a/Documentation/filesystems/caching/cachefiles.rst +++ b/Documentation/filesystems/caching/cachefiles.rst @@ -28,6 +28,7 @@ Cache on Already Mounted Filesystem (*) Debugging. + (*) On-demand Read. Overview @@ -482,3 +483,172 @@ the control file. For example:: echo $((1|4|8)) >/sys/module/cachefiles/parameters/debug will turn on all function entry debugging. + + +On-demand Read +============== + +When working in its original mode, cachefiles mainly serves as a local cache +for a remote networking fs - while in on-demand read mode, cachefiles can boost +the scenario where on-demand read semantics is needed, e.g. container image +distribution. + +The essential difference between these two modes is that, in original mode, +when a cache miss occurs, the netfs will fetch the data from the remote server +and then write it to the cache file. With on-demand read mode, however, +fetching the data and writing it into the cache is delegated to a user daemon. + +``CONFIG_CACHEFILES_ONDEMAND`` should be enabled to support on-demand read mode. + + +Protocol Communication +---------------------- + +The on-demand read mode relies on a simple protocol used for communication +between kernel and user daemon. The protocol can be modeled as:: + + kernel --[request]--> user daemon --[reply]--> kernel + +The cachefiles kernel module will send requests to the user daemon when needed. +The user daemon needs to poll on the devnode ('/dev/cachefiles') to check if +there's a pending request to be processed. A POLLIN event will be returned +when there's a pending request. + +The user daemon then reads the devnode to fetch a request and process it +accordingly. It is worth noting that each read only gets one request. When +finished processing the request, the user daemon needs to write the reply to +the devnode. + +Each request starts with a message header of the form:: + + struct cachefiles_msg { + __u32 msg_id; + __u32 opcode; + __u32 len; + __u32 object_id; + __u8 data[]; + }; + + where: + + * ``msg_id`` is a unique ID identifying this request among all pending + requests. + + * ``opcode`` indicates the type of this request. + + * ``object_id`` is a unique ID identifying the cache file operated on. + + * ``data`` indicates the payload of this request. + + * ``len`` indicates the whole length of this request, including the + header and following type-specific payload. + + +Turn on On-demand Mode +---------------------- + +An optional parameter is added to the "bind" command:: + + bind [ondemand] + +When the "bind" command takes without argument, it defaults to the original +mode. When the "bind" command is given the "ondemand" argument, i.e. +"bind ondemand", on-demand read mode will be enabled. + + +The OPEN Request +---------------- + +When the netfs opens a cache file for the first time, a request with the +CACHEFILES_OP_OPEN opcode, a.k.a an OPEN request will be sent to the user +daemon. The payload format is of the form:: + + struct cachefiles_open { + __u32 volume_key_size; + __u32 cookie_key_size; + __u32 fd; + __u32 flags; + __u8 data[]; + }; + + where: + + * ``data`` contains the volume_key followed directly by the cookie_key. + The volume key is a NUL-terminated string; the cookie key is binary + data. + + * ``volume_key_size`` indicates the size of the volume key in bytes. + + * ``cookie_key_size`` indicates the size of the cookie key in bytes. + + * ``fd`` indicates an anonymous fd referring to the cache file, through + which the user daemon can perform write/llseek file operations on the + cache file. + + +The user daemon is able to distinguish the requested cache file with the given +(volume_key, cookie_key) pair. Each cache file has a unique object_id, while it +may have multiple anonymous fds. The user daemon may duplicate anonymous fds +from the initial anonymous fd indicated by the @fd field through dup(). Thus +each object_id can be mapped to multiple anonymous fds, while the usr daemon +itself needs to maintain the mapping. + +With the given anonymous fd, the user daemon can fetch data and write it to the +cache file in the background, even when kernel has not triggered a cache miss +yet. + +The user daemon should complete the READ request by issuing a "copen" (complete +open) command on the devnode:: + + copen , + + * ``msg_id`` must match the msg_id field of the previous OPEN request. + + * When >= 0, ``cache_size`` indicates the size of the cache file; + when < 0, ``cache_size`` indicates the error code ecountered by the + user daemon. + + +The CLOSE Request +----------------- + +When a cookie withdrawn, a CLOSE request (opcode CACHEFILES_OP_CLOSE) will be +sent to the user daemon. It will notify the user daemon to close all anonymous +fds associated with the given object_id. The CLOSE request has no extea +payload. + + +The READ Request +---------------- + +When on-demand read mode is turned on, and a cache miss encountered, the kernel +will send a READ request (opcode CACHEFILES_OP_READ) to the user daemon. This +will tell the user daemon to fetch data of the requested file range. The payload +is of the form:: + + struct cachefiles_read { + __u64 off; + __u64 len; + }; + + where: + + * ``off`` indicates the starting offset of the requested file range. + + * ``len`` indicates the length of the requested file range. + + +When receiving a READ request, the user daemon needs to fetch the data of the +requested file range, and then write it to the cache file identified by +object_id. + +To finish processing the READ request, the user daemon should reply with the +CACHEFILES_IOC_CREAD ioctl on one of the anonymous fds associated with the given +object_id in the READ request. The ioctl is of the form:: + + ioctl(fd, CACHEFILES_IOC_CREAD, msg_id); + + * ``fd`` is one of the anonymous fds associated with the given object_id + in the READ request. + + * ``msg_id`` must match the msg_id field of the previous READ request. -- 2.27.0