Network storage system with shared software stack for LDMA and RDMA

ABSTRACT

A network storage system includes a non-volatile memory to store data including a log of received data access requests, and a cluster interconnect adapter through which to send data to a cluster partner. The nonvolatile memory and the cluster interconnect adapter are implemented in a single device connected to an expansion bus in the network storage system. Communication with the nonvolatile memory is carried out using LDMA, and communication with the cluster partner is carried out using RDMA via the cluster interconnect adapter. LDMA and RDMA functionality are merged in a common software stack.

FIELD OF THE INVENTION

At least one embodiment of the present invention pertains to network storage systems for clustered failover (CFO) applications, and more particularly, to a network storage system with local and remote storage operations controlled by the same stack.

BACKGROUND

In modern computer networks, a storage server can be used for many different purposes, such as to provide multiple users with access to shared data or to back up mission critical data. A file server is an example of a storage server which operates on behalf of one or more clients to store and manage shared files in a set of mass storage devices, such as magnetic or optical storage based disks or tapes. The mass storage devices are typically organized into one or more volumes of Redundant Array of Independent (or Inexpensive) Disks (RAID).

One mode in which a file server can be used is a network attached storage (NAS) mode. In a NAS mode, a file server can be implemented in the form of an appliance, called a filer, that attaches to a network, such as a local area network (LAN) or a corporate intranet. An example of such an appliance is any of the Filer products made by Network Appliance, Inc. in Sunnyvale, Calif. A storage server can also be employed in a storage area network (SAN), which is a highly efficient network of interconnected, shared storage devices. In a SAN, the storage server (which may be an appliance) provides a remote host with block-level access to stored data, whereas in a NAS configuration, the storage server provides clients with file-level access to stored data.

Some storage servers, such as certain Filers from Network Appliance, Inc. are capable of operating in either a NAS mode or a SAN mode, or even both modes at the same time. Such dual-use devices are sometimes referred to as “unified storage” devices. A storage server such as this may use any of various protocols to store and provide data, such as Hypertext Transport Protocol (HTTP), Network File System (NFS), Common Internet File system (CIFS), Internet SCSI (ISCSI), and/or Fibre Channel Protocol (FCP).

A storage server such as a filer can be used to backup critical data, among other purposes. A data backup technique known as “mirroring” involves backing up data stored at a primary site by storing an exact duplicate (a mirror image) of the data at a remote secondary site. If data is ever lost at the primary site, it can be recovered from the secondary site.

A simple example of a network configuration for mirroring is illustrated in FIG. 1. A source filer 2A located at the primary site is coupled locally to a set of mass storage devices 4; to a set of clients 1 through a network 3, such as a local area network (LAN); and to a destination filer 2B located at a remote mirror site. Each of the clients 1 may be, for example, a conventional personal computer (PC), workstation, or the like. The destination filer 2B located at the mirror site is coupled locally to a separate set of mass storage devices 4 at the mirror site. The mass storage devices 4 may be, for example, conventional magnetic disks, optical disks such as CD-ROM or DVD based storage, magneto-optical (MO) storage, or any other type of non-volatile storage devices suitable for storing large quantities of data.

The source filer 2A receives and responds to various read and write requests from the clients 1. In a system which handles large volumes of client requests, it may be impractical to save data modifications to the mass storage devices 4 every time a write request is received from a client 1. The reason is that disk accesses tend to take a relatively long time compared to other operations. Therefore, the source filer 2A may instead hold write requests in memory temporarily and only periodically save the modified data to the mass storage devices 4, such as every few seconds. The event of saving the modified data to the mass storage devices is called a “consistency point”. At a consistency point, the source filer 2A saves any data that was modified by the write requests to its local mass storage devices 4 and triggers a process of updating the data stored at the mirror site to reflect the updated primary volume.

In this approach, there is a small risk of a system failure occurring between consistency points, causing the loss of data modified after the last consistency point. Consequently, in at least one prior art solution, the source filer 2A includes a non-volatile random access memory (NVRAM) in which it maintains a log of write requests received from clients since the last consistency point. This log is referred to as the “NVLog”. The NVLog includes a separate entry for each write request received from a client 1 since the last consistency point. Each NVLog entry includes the data to be written according to the corresponding request. The NVLog is only used in the event of a failure, to recover data that would otherwise be lost. In the event of a failure, it may be possible to replay the NVLog to reconstruct the current state of stored data just prior to the failure. After each consistency point is completed, the NVLog is cleared and started anew.

To protect against a failure of the source filer 2A (including its NVLog), an approach called clustered failover (CFO) has been used in the prior art, in which the source filer 2A and the destination filer 2B operate as “cluster partners”. The example of FIG. 1 shows two filers 2A and 2B connected to each other and to each others mass storage devices 4, for CFO. As shown, the source filer 2A and destination filer 2B are connected by a high-speed cluster interconnect 5. The cluster interconnect can be implemented as, for example, one or more direct copper links, or as a Fibre Channel arbitration loop (FCAL).

In addition to the NVLog in the source filer 2A, a separate copy of the NVLog is maintained in a corresponding NVRAM in its cluster partner, destination filer 2B. In some implementations the NVLog in the destination filer 2B is created by sending each NVLog entry from the source filer 2A to the destination filer 2B at the time the entry is created (i.e., in response to a request). Upon receiving each NVLog entry from the source filer 2A, the destination filer 2B creates a corresponding NVLog entry in its own NVRAM. If one filer 2 fails, the other filer takes over the ownership of the failed filer's disks and replays the NVLog contents mirrored from the failed filer.

Each filer 2 has a remote direct memory access (RDMA) capability by which it can communicate over the cluster interconnect 5. This configuration enables replication of the source filer's NVLog on the destination filer 2B. The cluster interconnect 5 can also be used for non-DMA based communications, such as send/receive operations.

FIG. 2 is a block diagram showing the architecture of a filer 2 known in the prior art, representing either the source filer 2A or the destination filer 2B. The filer 2 includes one or more processors 21 and a system memory 22 coupled to each other by a north bridge. The north bridge 28 is also coupled to a Peripheral Component Interconnect (PCI) bus 23. The north bridge 28 provides an interface between peripheral components on the PCI bus and the processors 21 and system memory 22.

Each processor 21 is a central processing unit of (CPU) of the filer 2 and, thus, controls the overall operation of the filer 2. In certain embodiments, a processor 21 accomplishes this by executing software stored in system memory 22. Such software may include the operating system 24 of the filer 2. Each processor 21 may be, or may include, one or more programmable general-purpose or special-purpose microprocessors, digital signal processors (DSPs), programmable controllers, application specific integrated circuits (ASICs), programmable logic devices (PLDs), or the like, or a combination of such devices. The system memory 22 is a random access memory (RAM) which stores, among other things, the operating system 24 of the filer 2, in which the techniques introduced herein can be implemented.

Connected to the PCI bus 23 are an NVRAM 29, which stores the NVLog of the filer 2; one or more internal mass storage devices 25; a storage adapter 26; a network adapter 27; and a cluster interconnect adapter 30. Internal mass storage devices 25 may be or include any conventional medium for storing large volumes of data in a non-volatile manner, such as one or more disks. The storage adapter 26 allows the filer 2 to access the external mass storage devices 4 and may be, for example, a Fibre Channel adapter or a SCSI adapter. The network adapter 27 provides the filer 2 with the ability to communicate with remote devices such as the clients 1 over a network and may be, for example, an Ethernet adapter. The cluster interconnect adapter 30 provides the filer 2 with the ability to communicate with its cluster partner. In certain known implementations, the cluster interconnect adapter 30 complies with the INFINIBAND Architecture Specification, Release 1.1, Nov. 6, 2002, to communicate with the cluster partner, and more specifically, to communicate with the cluster partner using RDMA or Send/Receive operations of an input/output (I/O) standard, such as INFINIBAND.

In accordance with one implementation known in the prior art, the filer 2 uses two independent drivers (driver software) to operate the NVRAM 29 and cluster interconnect hardware 30, with two separate software stacks for dealing with these two separate types of data transfers. Specifically, the NVRAM 29 and its corresponding driver software handle local DMA (LDMA) of data from system memory 22 into NVRAM 29, and the cluster interconnect adapter 30 and its separate driver software handle RDMA of data to the cluster partner's NVRAM.

One problem with clusters such as this is that sending data to NVRAM and to the cluster partner requires at least two PCI bus transactions. When a filer 2 receives a write request from a client 1, that request is first stored in system memory 22. A first PCI transaction is required to log the request in NVRAM 29. A second PCI transaction is required to send the request from NVRAM 29 (or to send it again from system memory 22) to the cluster interconnect adapter 30, for purposes of transmission to the cluster partner. The PCI bus 23, therefore, becomes the performance bottleneck in these clusters. PCI bus contention particularly tends to create a problem for sequential writes, which is one of the most challenging workloads for filer clusters.

A common way of measuring how well a filer cluster performs is to compare the cluster's performance with the performance of a single (non-clustered) filer. A cluster's performance may be expressed in the form of “n×”, where n is called the cluster scaling factor. A two-filer cluster where the filers suffer no performance degradation due to clustering has a cluster scaling of 2×. A two-filer cluster where each node suffers a 25% performance degradation due to clustering has a scaling of 1.5×. Traditional clusters tend to be limited in performance due to PCI bus contention, which often results in a cluster scaling well below 2× for FCP sequential write workload in two-filer clusters.

Prior approaches to this problem involved introducing batching algorithms to reduce the number of interconnect operations and implementing faster interconnects. While these approaches improve performance to some extent, they do not address the underlying fundamental performance problem in many clusters, which is PCI bus contention.

SUMMARY OF THE INVENTION

The present invention includes a network storage system in which a driver software module is used to store data in a non-volatile memory in the network storage system, and the driver software module is further used to store data in a second memory in a cluster partner of the network storage system, by controlling a cluster interconnect adapter in the network storage system.

Other aspects of the invention will be apparent from the accompanying figures and from the detailed description which follows.

BRIEF DESCRIPTION OF THE DRAWINGS

One or more embodiments of the present invention are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements and in which:

FIG. 1 illustrates a network configuration that includes two filers connected as a cluster-failover pair in the prior art;

FIG. 2 is a block diagram of a filer in the prior art;

FIG. 3 is a block diagram of a filer that includes NVRAM and a cluster interconnect adapter in a single device in accordance with the invention;

FIG. 4 is a high-level block diagram of the NVRAM/cluster interconnect device according to embodiments of the invention;

FIG. 5 is a detailed block diagram of the NVRAM/cluster interconnect device according to embodiments of the invention;

FIG. 6 is a block diagram of the operating system of the filer shown in FIG. 3 according to embodiments of the invention;

FIG. 7A illustrates the use of loopback queue pairs for file system data traffic and RAID data traffic according to a first embodiment of the invention;

FIG. 7B illustrates the use of loopback queue pairs for file system data traffic and RAID data traffic according to a second embodiment of the invention;

FIG. 8 illustrates the multicasting of data from system memory to NVRAM and a cluster interconnect adapter according to embodiments of the invention; and

FIGS. 9A and 9B show a process performed at boot up by the filer shown in FIG. 3, according to embodiments of the invention.

DETAILED DESCRIPTION

A network storage system with local and remote storage operations controlled by a common software stack is described. Note that in this description, references to “one embodiment” or “an embodiment” mean that the feature being referred to is included in at least one embodiment of the present invention. Further, separate references to “one embodiment” or “an embodiment” in this description do not necessarily refer to the same embodiment; however, such embodiments are also not mutually exclusive unless so stated, and except as will be readily apparent to those skilled in the art from the description. For example, a feature, structure, act, etc. described in one embodiment may also be included in other embodiments. Thus, the present invention can include a variety of combinations and/or integrations of the embodiments described herein.

Overview

Introduced herein is a network storage system, such as a filer, in which an NVRAM and cluster interconnect adapter are combined into a single device that connects to a PCI bus (or other expansion bus) within the network storage system. Software for LDMA (for local NVRAM) and remote communication (such as RDMA) are merged into one software stack, such that a single driver is used to control both functions. This approach is advantageous, in that it requires only a single PCI transaction to transfer data from system memory to both local NVRAM and the remote cluster partner's NVRAM, thus alleviating a PCI bottleneck and improving cluster performance.

Note that to facilitate description, the techniques introduced herein are described as being implemented in a filer. It is to be understood, however, that these techniques can alternatively be implemented in other types of storage devices, such as storage servers which use purely block-based storage (e.g., for SAN), unified storage devices, etc.

Overall Architecture

FIG. 3 illustrates an example of the architecture of a filer 36 in accordance with the invention. The filer 36 can be substantially similar to the filer 2 described in FIG. 2, except that the NVRAM 32 and cluster interconnect adapter 33 of filer 36 are provided in a single PCI device, i.e., the NVRAM/cluster device 31. The NVRAM/cluster device 31 is a circuit module, such as a removable circuit board/card (such as an add-in printed circuit board, PCMCIA card, or the like, hereinafter all referred to as a “card”), with electronic components mounted thereon and or embedded therein. The NVRAM/cluster device 31 includes an NVRAM 32, which is used to store (among other things) the NVLog 34, and a cluster interconnect adapter 33 which enables communication with a remote cluster partner. Because these elements are provided in a single device on the PCI bus 23, only a single PCI transaction is needed to transfer data from system memory 22 to both local NVRAM 32 and the remote cluster partner's NVRAM.

Note that in alternative embodiments, the PCI bus in filer 36 may be replaced by some other type of expansion bus or interconnect, such as a PCI EXPRESS bus, HyperTransport or industry standard architecture (ISA) bus, a small computer system interface (SCSI) bus, a universal serial bus (USB), or an Institute of Electrical and Electronics Engineers (IEEE) standard 1394 bus (sometimes referred to as “FIREWIRE”), or the like.

As described in greater detail below, the NVRAM/cluster device 31 implements certain techniques and protocols described in the INFINIBAND Architecture Specification, Release 1.1, Nov. 6, 2002 (hereinafter “INFINIBAND specification”), which is incorporated herein by reference. In particular, techniques of an I/O standard, such as INFINIBAND, are used to implement LDMA to access local NVRAM 32 and to implement RDMA to access the cluster partner's NVRAM. Information is communicated to local NVRAM 32 and to the cluster partner in data packets of an I/O standard, such as INFINIBAND. Certain types of information, as described below, are communicated in subnet management packets (SMPs) of an I/O standard, such as INFINIBAND.

NVRAM/Cluster Device Architecture

Refer now to FIG. 4, which shows at a high level the architecture of the NVRAM/cluster device 31, according to certain embodiments of the invention. As shown, the NVRAM/cluster device 31 includes NVRAM 32 and cluster interconnect adapter 33. The cluster interconnect adapter 33 includes control circuitry 41, a PCI connector 44, and two or more copper connectors 43 of an I/O standard, such as INFINIBAND. The PCI connector 44 couples the NVRAM/cluster device 31 to the PCI bus 23. The NVRAM 32 is used to store the NVLog 34 and other critical information which is important to preserve between consistency points. The control circuitry 41 is coupled to the NVRAM 32, the PCI connector 44 and the connectors of an I/O standard, such as INFINIBAND 43. The control circuitry 41 controls the overall operation of the NVRAM/cluster device 31, including: access to NVRAM 32 using internal (“loopback”) RDMA operations (hereinafter referred to as “LDMA”) of an I/O standard, such as INFINIBAND, and/or programmed input/output (PIO) operations; communication with the cluster partner's NVRAM using RDMA operations of an I/O standard, such as INFINIBAND; and/or communication with other components in the cluster partner using Send/Receive operations of an I/O standard, such as INFINIBAND. The control circuitry 41 includes an host channel adapter (HCA) 42 of an I/O standard, such as INFINIBAND, which has a built-in memory controller (not shown).

FIG. 5 illustrates the NVRAM/cluster device 31 in greater detail, according to certain embodiments of the invention. In particular, FIG. 5 shows further detail of the NVRAM 32, the control circuitry 41, and other components of the NVRAM/cluster device 31. The NVRAM 32 in the illustrated embodiment is implemented by a double data rate synchronous dynamic RAM (DDR SDRAM) 51, which is made nonvolatile by providing it with regulated backup power from an onboard Lithium battery 52. Battery power is provided through a regulator 53 to switching circuitry 54, which provides the SDRAM 51 with either the regulated power from the battery or regulated power received from the PCI connector (system power) 44. A second voltage regulator 55 receives system power from the PCI bus 23 and outputs regulated system power to the switching circuitry 54 and the HCA 42.

Normally, the SDRAM 51 receives regulated system power, however, if the system power drops below a predetermined voltage threshold, the switching circuitry 54 switches the SDRAM 51 onto regulated battery power. A battery charger 56 receives system power from the PCI bus to charge the battery 52 under control of the HCA 42.

The NVRAM/cluster device 31 also includes a monitor 57 to monitor the battery voltage and the status of the SDRAM 51. In addition, the NVRAM/cluster device 31 includes a front panel display 58 to output to a user indications of the aforementioned status information and other status information received from the HCA 42.

The control circuitry includes an HCA 42 of an I/O standard, such as INFINIBAND, with a built-in DDR memory controller 59 to control access to the SDRAM 51 (i.e., the HCA and the memory controller are on the same chip). Note that in alternative embodiments, the HCA and memory controller could be on separate chips, however. The HCA 42 has communication interfaces with the PCI bus and the SDRAM for control, clocks, data, and addresses.

The control circuitry 41 also includes a programmable logic device (PLD) 60, a zero-delay clock buffer 61, a clock loss reset logic circuit 62, and a flash memory 63. The zero-delay clock buffer 61 eliminates dependency on PCI clock implementation differences on different platforms, receiving as input the PCI clock from the PCI bus and outputting to the HCA 42 a clock signal CLOCK OUT that is in-phase with the PCI clock. The clock loss reset logic circuit 62 is used to detect loss of the PCI clock from the PCI bus and outputs a CLOCK LOSS RST# to the PLD 60 as an indication thereof.

The NVRAM/cluster device 31 also includes a power monitor 64, which detects loss of system power from the PCI bus and outputs a PWR LOSS RST# signal to the PLD 60 as an indication thereof. The PLD 60 includes logic circuitry that implements a RESET tree, i.e., logic used to reset the HCA 42 and/or the SDRAM 51 if any of various predetermined conditions occurs (e.g., loss of power, loss of clock, etc.). The PLD 60 provides its output to the HCA 42 and the SDRAM 51. The PLD 60 optionally includes any other miscellaneous logic that may be desired. The flash memory 63 contains any firmware required by the HCA 42.

Software Architecture

Refer now to FIG. 6, which shows the operating system 35 of filer 36, according to certain embodiments of the invention. The operating system 35 includes several modules, or layers. These layers include a file system 65. The file system 65 is a programmatic entity that imposes structure on an address space of the filer's storage devices in order to conveniently deal with data containers, including files and blocks. The file system 65 executes read and write operations on the mass storage devices 4 in response to client requests, maintains directories of stored data, etc. Logically “under” the file system 65, the operating system 35 also includes a network layer 66 and an associated media access layer 67, to allow the storage server to communicate over a network (e.g., with clients 1). The network access 66 layer may implement any of various protocols, such as NFS, CIFS and/or HTTP. The media access layer 67 includes one or more drivers which implement one or more protocols to communicate over the network, such as Ethernet. Also logically under the file system 65, the operating system 35 includes a storage access layer 68 and an associated storage driver layer 69, to allow the filer 2 to communicate with external mass storage devices 4. The storage access layer 68 implements a disk storage protocol such as RAID, while the storage driver layer 69 implements a lower-level storage device access protocol, such as Fibre Channel or SCSI. The details of the above-mentioned layers of the operating system 35 are not necessary for an understanding of the invention and, hence, need not be described herein.

As indicated above, the software for LDMA (for local NVRAM) and RDMA (for clustering) are merged into one software stack, such that a single driver is used to control both functions; the single driver is NVRAM/cluster driver 70, illustrated in FIG. 6. The NVRAM/cluster driver 70 is the driver software which controls the hardware of the NVRAM/cluster device 35. Logically under the file system 65, the operating system 35 further includes a DMA module (henceforth “NVDMA”) 73 for LDMA to NVRAM, a cluster module 74 for RDMA to the cluster partner, a Virtual Interface Architecture (VIA) module 75, and (at the lowest logical level) the NVRAM/cluster driver 70. The NVRAM/cluster driver includes code to control LDMA access to local NVRAM and code to control access to the cluster partner's NVRAM.

The NVDMA module 73 and the cluster module 74 provide the high-level control of the LDMA and RDMA operations, respectively, in response to either the file system or the storage access (e.g., RAID) layer. The LDMA and RDMA functionality are merged into a common software stack at the VIA module, which operatively couples the NVDMA module 73 and cluster module 74 to the NVRAM/cluster driver 70. Thus, communication to the NVRAM/cluster driver 70 from higher levels of the operating system is done using the VIA protocol, as implemented by the VIA module 75. Storage to local NVRAM 32 (LDMA) or the cluster partner's NVRAM (RDMA) may be initiated by either the file system 65 or the storage access layer 68. DMA operations initiated by the file system 65 include logging of write requests in NVLog 34. DMA operations initiated by the storage access layer may include, for example, storage of RAID-specific data or metadata used to maintain integrity of data stored on disks.

NVRAM/Cluster Operational Features

A storage system such as filer 36 can provide a variety of advantageous features in conjunction with the NVRAM/cluster device 31, as will now be described.

LID Assignment

As described above, the NVRAM/cluster device 31 in certain embodiments uses technology of an I/O standard, such as INFINIBAND, to DMA data to local or remote NVRAM. Under the INFINIBAND specification, such DMA can only be performed after a Local Identifier (LID) has been assigned to each node of an I/O standard, such as INFINIBAND. Under the INFINIBAND specification, an LID is normally assigned to each node by a separate device, known as a subnet manager, in a fairly cumbersome process. Filer 36, however, is capable of assigning a unique LID to the NVRAM/cluster device 31 without the use of a subnet manager, and of doing so very early in the boot cycle. Early LID assignment allows the operating system to start DMA of data to the NVRAM/cluster device 31, and other types of communications, without even having to wait until communication is established with the cluster partner or any other external entity, such as a subnet manager, which is not needed. This feature is advantageous, since it allows the filer 36 to begin servicing client requests earlier than would otherwise be possible.

The NVRAM/cluster driver 70 is started very early in the boot cycle of the operating system 35, i.e., as soon as the presence of the NVRAM/cluster device 31 is detected on the PCI bus 23. When the NVRAM/cluster driver 70 is started, it reads a unique serial number stored on-board the NVRAM/cluster device 31, which may be a serial number assigned by the manufacturer and programmed into a nonvolatile memory, such as flash memory 63. The NVRAM/cluster driver 70 uses a predetermined portion of the serial number (e.g., the last 16 bits) to create a unicast LID in the range of 1 to 0xbfff. For example, the last 16 bits can be simply converted to hexadecimal (if not already in hexadecimal) and used as the LID. The LID is then assigned to each of the ports of an I/O standard, such as INFINIBAND 43 on the NVRAM/cluster device 31. This LID assignment allows the operating system 35 to start LDMA (DMA between system memory 22 and local NVRAM 32 of the filer 36) and other types of communications.

When communication with the cluster partner is initiated, this LID is sent to the cluster partner in the data payload of a subnet management packet (SMP) of an I/O standard, such as INFINIBAND. As is well known, a SMP of an I/O standard, such as INFINIBAND is a type of management datagram (MAD). The filer 36 also receives the LID of the NVRAM/cluster device 31 in the cluster partner in a similar SMP. Once the two nodes have exchanged their LIDs, they can start sending data back and forth using standard packets of an I/O standard, such as INFINIBAND. Assuming the operating systems of the filer 36 and its cluster partner are essentially the same, one can rely on the fact that they will perform the same steps, and obtain each other's LID correctly.

Use of SMPs

The filer 36 uses SMPs of an I/O standard, such as INFINIBAND to exchange LIDs (as just noted) as well as other information, with a remote cluster partner. SMPs according to the INFINIBAND specification have a standard format and only allow certain information to be exchanged between end nodes. However, because the cluster partners described above are in a closed network of an I/O standard, such as INFINIBAND, it is possible to send whatever type of data is desired in an SMP. As long as the correct header is present, the SMP will reach the other node (cluster partner) and will be processed on the cluster partner.

In certain embodiments of the invention, a particular type of SMP called a Set Portinfo Management Datagram is used to communicate the following information between cluster partners:

-   -   Local node's LID (used by the remote node to send data packets         to this node)     -   Queue Pair (QP) number to be used to set up the initial         connection     -   Memory handle to be used to set up the initial connection     -   Memory address to be used to set up the initial connection

Note that while only four fields inside the SMP are described as being used here, this approach allows the use of as many fields as needed, provided the overall packet size is below the limit set by the INFINIBAND specification. Furthermore, other types of SMPs could also (or alternatively) be used, as long as the header is set correctly and the packet size meets the restrictions placed by the INFINIBAND specification.

Management data (e.g., LIDs, QP numbers, memory handles and memory addresses) are transmitted in SMPs to a “promiscuous” address, such as 0xFFFF. Other types of data, which are transmitted after the LIDs have been assigned and connections have been established, are transmitted in standard data packets of an I/O standard, such as INFINIBAND addressed using the LID of the destination filer.

This approach has advantages. For instance, SMPs are used to exchange LIDs between the cluster partner in a simple manner, without involving any subnet manager or a switch. This approach also allows different versions of the NVRAM/cluster driver 70 running on different storage systems (e.g., different filers) to communicate with each other. Specific information in the SMP can tell each driver how to establish a connection with the remote node.

Loopback QPs

Under the INFINIBAND specification, a communication connection is defined by two endpoints known as queue pairs (QPs). Typically, the QPs that form a connection are on different hosts connected over a link of an I/O standard, such as INFINIBAND. Each QP includes a send queue and a receive queue. The send queue is a first-in and first-out (FIFO) buffer for data to be transmitted to another node of an I/O standard, such as INFINIBAND, while receive queue is a FIFO buffer for data that has been received from another node of an I/O standard, such as INFINIBAND.

For LDMA, however, all of the communication happens inside a single host (e.g., within filer 36) without traversing a link of an I/O standard, such as INFINIBAND. The QPs that participate in this kind of internal communication are known as “loopback” QPs. In accordance with certain embodiments of the invention, “loopback” QPs can be used to implement LDMA (i.e., storage in local NVRAM 32) in the filer 36.

In order to use a QP, it must be first connected to another QP to form a connection. The former QP is called a source QP and the latter one is called a destination QP. The INFINIBAND specification does not allow a single QP to be used as both source and destination loopback QP.

As noted above, local NVRAM 32 may be used by either the file system 65 or the storage access (e.g., RAID) layer 68. Consequently, in order to implement LDMA in the filer 36, two separate channels are needed: one for file system data traffic and another for RAID data traffic. A simple solution can be described as follows:

Channel 1 (File system traffic): QP1 (source)→QP1′ (destination)

Channel 2 (RAID traffic): QP2 (source)→QP2′ (destination)

This solution uses four QPs and requires two separate connections. A better solution, which uses LDMA (i.e., internal RDMA) Write operations of an I/O standard, such as INFINIBAND and requires only two QPs and only one connection, can be described as follows, as illustrated in FIG. 7A:

QP1 (source for File system traffic)→NVRAM 32

QP2 (source for RAID traffic)→NVRAM 32

The send queue of QP1 is the source of data traffic for writes to local NVRAM 32 initiated by the file system layer 65. The send queue of QP2 is the source of data traffic for writes to local NVRAM 32 initiated by the storage control (e.g., RAID) layer 68. The receive queues of QP1 and QP2 are not used at all; the transferred data directly appears in the memory mapped buffers.

There are two main advantages to this approach. First, a QP is a major resource in a solution of an I/O standard, such as INFINIBAND. A QP uses host memory and memory on the adapter. In applications that require numerous loopback connections, this approach provides a 50% reduction in the consumption of this resource, as well as a 50% reduction in connection requests and responses. Second, this reduction in QP requirements and connection messages also has a performance benefit. The software and hardware have to iterate over fewer QPs, and the system can be set up much faster.

An alternative solution, in which Send/Receive operations of an I/O standard, such as INFINIBAND are used for data transfer rather than LDMA, can be described as follows and is illustrated in FIG. 7B:

QP1 (source for File system traffic, destination for RAID traffic)←→QP2 (source for RAID traffic, destination for File system traffic)

The send queue of QP1 is the source of file system traffic, while the receive queue of QP1 is the destination of RAID traffic. Similarly, the send queue of QP2 is the source of RAID traffic, while the receive queue of QP2 is the destination of file system traffic.

Multicasting

The data flow in a conventional filer cluster is from system memory 22 to local NVRAM 29, then from local NVRAM 29 to the cluster interconnect adapter 36, and finally from the cluster interconnect adapter 36 to the cluster partner's NVRAM (see FIG. 2). This is essentially a store-and-forward model, where the data is first sent to local NVRAM 29 and then forwarded to the cluster partner's NVRAM. The problem with this model is that data cannot be sent to the cluster partner's NVRAM until it is available in local NVRAM 29. This delay introduces latency for client operations, thereby increasing response time. Response time is a key performance measure in a storage system such as a filer.

The INFINIBAND specification defines a technique, known as multicast, which allows messages of an I/O standard, such as INFINIBAND to be sent to multiple destinations using a single operation. In accordance with certain embodiments of the invention, as illustrated in FIG. 8, the multicast technique defined in the INFINIBAND specification (hereinafter “multicast of an I/O standard, such as INFINIBAND”) is used to send data from system memory concurrently to both local NVRAM 32 and remote NVRAM (of a cluster partner) with a single hardware operation. This approach reduces latency and improves performance. A single message of an I/O standard, such as INFINIBAND with two destinations is created and launched with a single multicast operation of an I/O standard, such as INFINIBAND. This multicast operation completes only upon receiving confirmation that the data has successfully reached both destinations. In this model, the two data transfer operations are overlapped in time, thereby reducing total latency.

There are at least two advantages to this approach. The first is performance: The latency overhead inherent in clustering can be dramatically reduced, thereby improving response time in filer clusters. The second advantage is simplicity: Traditional cluster nodes have separate code paths to launch LDMA and RDMA operations and separate processes that wait for these operations to complete. With the multicast approach, all of the clustering functionality can be merged with the local NVRAM functionality, which substantially reduces the synchronization overhead involved in launching and monitoring separate data transfer operations.

Virtual Lanes

The NVRAM/cluster device provides the capability to perform both LDMA and RDMA using the same circuit card (or other single device). In that regard it is desirable to protect LDMA traffic from potential link of an I/O standard, such as INFINIBAND errors. Specifically, any problems on the cluster interconnect that cause packets to be backed up at the port could also stall LDMA on that node. LDMA failure can be extremely harmful for a storage system such as a filer. Accordingly, introduced now is a method which eliminates some causes for LDMA failure.

The INFINIBAND specification provides for the use of “virtual lanes” (VLs), which allows multiple independent data streams to share the same physical link. The INFINIBAND specification provides that up to 15 VLs can be used on a link between two end points. Each VL can have its own set of quality of service (QoS) guarantees. In accordance with certain embodiments of the invention, for LDMA (local data transfer), a QP is connected to another QP on the same node. For remote data transfer, a QP is connected to a QP on a remote node (e.g., the cluster partner). Whenever a QP is connected to another QP (either on the same node or a remote node), a VL needs to be specified for the connection.

In accordance with certain embodiments of the invention, therefore, one VL is used for a connection between two QPs on the same storage system (e.g., filer), and another VL is used for a connection between two QPs on different nodes. Thus, local (loop back) connections are assigned to different VLs from remote connections. Consequently, if for any reason data backs up on the cluster interconnect, only traffic assigned to the corresponding VL will be affected. Since LDMA is on a different VL, it will not be affected by the backup. This approach, therefore, insulates LDMA traffic from link of an I/O standard, such as INFINIBAND errors and reduces the likelihood of LDMA failures.

Active/Passive Ports

In certain embodiments of the invention, the filer 36 uses multipathing in its connection with its cluster partner to provide seamless failover of data traffic from one link to another. One possible approach to handling a failure on the cluster interconnect is that, when the driver software detects transport errors on a link, it tears down the existing connections on that link and reestablishes the connection on the backup link (port). However, this approach causes disruption in data transfer for the higher levels of software. As a result, the clustering capability is disabled when the connections are reestablished, leaving clients 1 vulnerable to filer failures.

The filer 36, therefore, provides a better solution to this problem in certain embodiments of the invention. When the filer 36 boots up, the NVRAM/cluster driver 70 attempts to bring up (initialize) both of its links (i.e., both of its ports of an I/O standard, such as INFINIBAND). The filer 36 then exchanges SMPs with its cluster partner using these links. Once both links are up, one of the links (ports) is designated as the active port, and the other link (port) is designated as the passive (or inactive) port. Next, QPs are created and connected with the corresponding QPs on the remote node. While setting up the connection, the NVRAM/cluster driver 70 causes the NVRAM/cluster device 31 to send packets over the active port. The NVRAM/cluster driver 70 also sets fields in the hardware context telling the hardware to failover the packets to the passive link if there are any problems on the active link.

When attempting to send a packet over the current active link, the NVRAM/cluster device 31 will attempt up to a predetermined number of retries if it encounters any errors. If all of the retries fail, the passive link is redesignated as the active link, and the failed active link is redesignated as a failed link. The NVRAM/cluster device 31 then monitors the state of the failed link. When the failed link comes up again, it is marked as the passive link for that QP.

In certain embodiments, detection of link failures and redesignation of the links as active or passive is performed by the HCA 42, in which case the HCA 42 also notifies the software of the failover. No operating system intervention is needed to perform the failover.

Boot Process

Refer now to FIGS. 9A and 9B, which collectively show a portion of the boot process of the filer 36 that is relevant to the features and techniques described above, according to certain embodiments of the invention. Initially, in response to a power on or reset condition, at 901 the operating system 35 identifies any devices which are connected to the PCI bus 23. Upon identifying the NVRAM/cluster device 31 as a connected device at 902, the operating system 35 initiates the NVRAM/cluster driver 70 at 903. The remaining operations shown in FIGS. 9A and 9B are performed by the NVRAM/cluster driver 70.

At 903, the NVRAM/cluster device 31 is initialized. Next, the above-mentioned serial number is read from a predetermined location on the NVRAM/cluster device 31 (e.g., from on-board flash memory) at 904. The last 16 bits of the serial number (in at least one embodiment) are then used to generate an LID of an I/O standard, such as INFINIBAND at 905, which is then assigned at 906 to each port of an I/O standard, such as INFINIBAND 43 of the NVRAM/cluster device 31. The process then splits into two parallel subprocesses, as follows.

In the first subprocess, at 907 the NVRAM/cluster driver 70 creates loopback QPs for LDMA and assigns LDMA functions to an appropriate VL. The NVRAM/cluster driver 70 then enables LDMA at 908, and the first subprocess then ends.

In the second subprocess, at 909 the NVRAM/cluster device 31 monitors port status to determine the available communication links and at 910 designates one of the links as an active link and the other(s) as passive link(s). At 911 the NVRAM/cluster driver 70 creates a peer QP at 911 and registers memory (i.e., fixes a virtual-to-physical memory translation to allow the cluster partner to write into the filer's memory) at 912. At 913 the NVRAM/cluster driver 70 transmits the assigned LID, peer QP, memory address, and memory handle for the initial connection, in one or more SMPs to a promiscuous address (see above). The process also waits for the corresponding information to be received in SMPs from the cluster partner. When such information has been received from the cluster partner (914), the NVRAM/cluster driver 70 initiates the connection process with the cluster partner at 915 using the received information. Remote access (including RDMA by the cluster partner) is then enabled at 916. Enabling remote access includes creating QPs and assigning VLs for file system data traffic and RAID data traffic initiated by the cluster partner. After enabling remote access, the second subprocess ends. Of course, numerous variations upon the foregoing process are possible.

Thus, a network storage system with local and remote storage operations controlled by a common software stack has been described. Although the present invention has been described with reference to specific exemplary embodiments, it will be recognized that the invention is not limited to the embodiments described, but can be practiced with modification and alteration within the spirit and scope of the appended claims. Accordingly, the specification and drawings are to be regarded in an illustrative sense rather than a restrictive sense. 

1. A method comprising: using a driver software module and a software stack in a network storage system to store data in a non-volatile memory in the network storage system, wherein the network storage system contains a cluster interconnect adapter, the driver software module contains code for accessing the non-volatile memory and the cluster interconnect adapter, and the software stack provides a shared interface for invoking the code; and using the driver software module and the software stack to store data in a second memory in a cluster partner of the network storage system, by controlling the cluster interconnect adapter in the network storage system, wherein the software stack invokes the code in the driver software module to control the cluster interconnect adapter and to store data in the second memory of the cluster partner.
 2. A method as recited in claim 1, wherein using the driver software module in the network storage system to store data in the non-volatile memory comprises using a local direct memory access (DMA) operation to store the data in the non-volatile memory.
 3. A method as recited in claim 2, wherein using the driver software module to store data in the second memory comprises using a remote DMA operation to store the data in the second memory.
 4. A method as recited in claim 3, wherein the local DMA operation and the remote DMA operation each comprises sending data in an INFINIBAND message.
 5. A method as recited in claim 3, wherein the local DMA operation and the remote DMA operation are executed in response to receiving, at a network storage system, a data access request from a remote client of the network storage system.
 6. A method as recited in claim 5, wherein the data stored in the non-volatile memory and the second memory represents the request.
 7. A method as recited in claim 6, wherein the request is a write request relating to data stored by the network storage system.
 8. A method as recited in claim 7, wherein the non-volatile memory is a non-volatile random access memory (NVRAM) of the network storage system.
 9. A method as recited in claim 8, wherein the data is stored in the non-volatile memory and the second memory as part of a log of data access requests received by the network storage system.
 10. A method of operating a network storage system, the method comprising: managing access to data stored in a plurality of mass storage devices on behalf of a plurality of clients; receiving a data access request at the network storage system from one of the plurality of clients, the data access request being directed to a portion of the stored data; using a driver software module and a software stack in the network storage system to store data representing the data access request in a non-volatile memory in the network storage system, by performing a local direct memory access (DMA) operation, wherein the network storage system contains a cluster interconnect adapter, the driver software module contains code for accessing the non-volatile memory and the cluster interconnect adapter, and the software stack provides a shared interface for invoking the code; and using the driver software module and the software stack to store data representing the data access request in a second memory in a cluster partner of the network storage system, by controlling the cluster interconnect adapter in the network storage system, wherein the software stack invokes the code in the driver software module to control the cluster interconnect adapter and to store data in the second memory of the cluster partner.
 11. A method as recited in claim 10, wherein the local DMA operation and the remote DMA operation each comprises sending data in an INFINIBAND message.
 12. A method as recited in claim 10, wherein the data representing the data access request is stored in the non-volatile memory and the second memory as part of a log of data access requests received by the network storage system from the plurality of clients.
 13. A method as recited in claim 10, wherein using the driver software module to store data representing the data access request in the second memory in the cluster partner comprises performing a remote DMA operation to store the data representing the data access request.
 14. An apparatus for use in a network storage system, the apparatus comprising: a non-volatile memory to store log data representing data access requests received by the network storage system; a cluster interconnect adapter through which the network storage system can communicate with a cluster partner; and a driver software module and a software stack to control operation of both the non-volatile memory and the cluster interconnect adapter, wherein the software module contains code for accessing the non-volatile memory and the cluster interconnect adapter, and the software stack provides a shared interface for invoking the code.
 15. An apparatus as recited in claim 14, wherein the driver software module is to store data in the non-volatile memory during a local direct memory access (DMA) operation executed in the network storage system, and to store the data in a memory of the cluster partner via the cluster interconnect adapter during a remote DMA executed from the network storage system.
 16. An apparatus as recited in claim 15, wherein the local DMA operation and the remote DMA operation are executed concurrently.
 17. An apparatus as recited in claim 15, wherein the local DMA operation and the remote DMA operation are both in response to a data access request received from a client of the data storage system.
 18. An apparatus as recited in claim 14, further comprising an expansion bus coupled to the processor, wherein the non-volatile memory, the cluster interconnect adapter, and the driver software are all implemented in a single circuit module coupled to the expansion bus.
 19. An apparatus as recited in claim 18, wherein the driver software is to store the data in the non-volatile memory and to store the data in a memory of the cluster partner, using a single transaction on the expansion bus.
 20. An apparatus as recited in claim 14, wherein the non-volatile memory is a non-volatile random access memory.
 21. A network storage system comprising: a processor; a storage adapter coupled to the processor; a network adapter coupled to the processor; a non-volatile memory coupled to the processor; a cluster interconnect adapter coupled to the processor, through which the storage system can communicate with a cluster partner; and an operating system, executable by the processor, the operating system including a driver and a software stack to control operation of both the non-volatile memory and the cluster interconnect adapter, wherein the software module contains code for accessing the non-volatile memory and the cluster interconnect adapter, and the software stack provides a shared interface for invoking the code.
 22. A network storage system as recited in claim 21, wherein the driver is configured to execute a local direct memory access (DMA) operation to store data in the non-volatile memory and to initiate an operation to store the data in a memory of the cluster partner via the cluster interconnect adapter.
 23. A network storage system as recited in claim 22, wherein the operation to store the data in the memory of the cluster partner is a remote DMA operation.
 24. A network storage system as recited in claim 22, wherein the local DMA operation and the remote DMA operation are both in response to a data access request received from a client of the data storage system.
 25. A network storage system as recited in claim 22, wherein the local DMA operation and the remote DMA operation each comprises sending data in an INFINIBAND message.
 26. A network storage system as recited in claim 21, wherein the operating system further comprises a file system layer to manage a file system of the network storage system, the file system representing data stored in a set of mass storage devices, wherein the driver is responsive to the file system layer.
 27. A network storage system as recited in claim 26, wherein the operating system further comprises a storage layer to manage storage operations performed upon the set of mass storage devices, wherein the driver is further responsive to the storage layer.
 28. A network storage system as recited in claim 21, wherein the non-volatile memory is a non-volatile random access memory.
 29. A network storage system as recited in claim 21, wherein the network storage system comprises a filer.
 30. A network storage system comprising: a processor; a storage adapter coupled to the processor; a network adapter coupled to the processor; a non-volatile random access memory (NVRAM) coupled to the processor; a cluster interconnect adapter coupled to the processor, through which the storage system can communicate with a cluster partner; and a second memory containing a driver and a software stack, wherein the driver contains code for accessing the non-volatile memory and the cluster interconnect adapter, the software stack provides a shared interface for invoking the code, the driver and the software stack are to execute local direct memory access (DMA) operations to store data representing one or more write requests in the NVRAM and to initiate remote DMA operations to store the data representing the one or more write requests in a memory of the cluster partner via the cluster interconnect adapter.
 31. A network storage system as recited in claim 30, wherein the local DMA operations and the remote DMA operations comprise sending the data in INFINIBAND messages.
 32. A network storage system as recited in claim 30, wherein the second memory further contains: a file system layer to manage a file system of the network storage system, the file system representing data stored in a set of mass storage devices; and a storage layer to manage storage operations performed upon the set of mass storage devices; wherein the driver is responsive to both the file system layer and the storage layer.
 33. A network storage system as recited in claim 30, wherein the network storage system comprises a filer.
 34. A network storage system comprising: a non-volatile memory; a cluster interconnect adapter; means for using a driver software module and a software stack in the network storage system to store data in the non-volatile memory; and means for using the driver software module and the software stack to store data in a second memory in a cluster partner of the network storage system, by controlling the cluster interconnect adapter, wherein the software module contains code for accessing the non-volatile memory and the cluster interconnect adapter, and the software stack provide a shared interface for invoking the code.
 35. A method comprising: using a driver software module and a software stack to access a device in a network storage system, wherein the device contains a non-volatile memory and a cluster interconnect adapter, the driver software module contains code for accessing the non-volatile memory and the cluster interconnect adapter, and the software stack provides a shared interface for invoking the code; storing data in the non-volatile memory of the device by interfacing with the software stack, wherein the software stack invokes the code in the driver software module to access the non-volatile memory; and storing data in a second memory in a cluster partner of the network storage system by interfacing with the software stack, wherein the software stack invokes the code in the driver software module to access the cluster interconnect adaptor and communicate with the cluster partner.
 36. The method as recited in claim 35, wherein the non-volatile memory is embedded in the cluster interconnect adapter.
 37. The method as recited in claim 35, wherein the software module further contains code for accessing the second memory of the cluster partner via the cluster interconnect adaptor.
 38. The method as recited in claim 35, wherein the data stored in the non-volatile memory of the device contains a log for data access requests not yet saved to the network storage system.
 39. The method as recited in claim 35, wherein said storing data in the non-volatile memory and said storing data in the second memory in the cluster partner are in response to a data storage request received from a client of the network storage system. 