1 .\" Copyright (c) 2005 Michael Bushkov <bushman@rsu.ru>
2 .\" All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
13 .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
14 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
15 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
16 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
17 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
18 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
19 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
20 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
21 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
22 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 .Nd "caching server daemon"
40 is the system caching daemon.
41 It can cache almost all types of data and is basically intended to be used
45 The cache is actually per-user.
46 This means that each user can work only with the
47 cached data that was cached locally and cannot poison the cache of other users.
50 utility supports two types of caching:
55 Each cached element is the the key+value pair.
56 This type of caching supports policies which are applied when maximum
57 number of cached elements is exceeded.
58 Three policies are available:
60 (first in - first out),
62 (least recently used) and
64 (least frequently used).
65 This type of caching is used with the
69 Each cached element is the part of the elements sequence.
70 This type of caching is intended to be used with the
77 utility is able not only to cache elements, but to perform the actual nsswitch
79 To enable this feature use the
80 .Pa perform-actual-lookups
86 utility recognizes the following runtime options:
87 .Bl -tag -width indent
91 will not fork or disconnect itself from the terminal.
94 Forces using only one thread for all processing purposes (it overrides
102 All trace messages will be written to stdout.
103 This mode is usually used with
107 flags are used for debugging purposes.
108 .It Fl i Ar cachename
109 Invalidates personal cache.
112 acts as the administration tool.
113 It asks the already running
115 to invalidate the specified part of the cache of the
117 For example, sometimes you may want to invalidate your
124 to invalidate your personal cache as a whole.
125 You cannot use this option for the cachename, for which
127 .Pa perform-actual-lookups
129 .It Fl I Ar cachename
130 Invalidates the cache for every user.
133 acts as the administration tool.
137 to invalidate the specified part of the cache for
143 to invalidate the whole cache.
144 Only the root can use this option.
153 .An Michael Bushkov Aq bushman@rsu.ru
155 To report bugs or suggestions please mail me: