We describe improvements for random access memory systems and memory controllers.
In random access memories, a memory access sequence (for example, a read or write operation) typically proceeds as follows. An activate command opens a row (selected by row address decoding). A read or write command reads/writes data in a column of the open row (or in a corresponding row buffer), and finally a precharge command closes the row and prepares the bank for a next access. Each activate/precharge cycle of a memory component is a stress event, generating electric fields and current flow across junctions, dielectric layers and conductors. Over time, these stress events may lead to a hard failure, particularly in the rows that are accessed most frequently.
In this example, the memory module 140 comprises a plurality of memory devices, for example DRAM devices 142, 144, 146. The memory 134 will be discussed herein in some detail by way of illustration and not limitation. The present disclosure can be applied to many different memory configurations. In the present example, the memory 134 comprises four modules, including module 140. Memory module 140 may comprise 18 devices (D), of which three are shown (142, 144, 146) to simplify the illustration. Each memory device (D), for example device 144, may comprise a series of memory banks, of which three banks are shown (152, 154, 156), again to simplify the illustration.
Within each device D, a device interface is provided. To illustrate, in device 144, each of the memory banks 152, 154, 156 is coupled to the device interface 160 which, in turn, is coupled to the CA bus 130 and the DQ bus 132, which are common to the entire memory 134 as is known. Similarly, the banks in devices 142 and 146 are coupled to the corresponding device interfaces 162, 166, respectively; and those device interfaces are coupled to the common CA 130 and DQ 140 buses as well.
In general, in operation, the request queue and memory controller block 110 in the controller component 100 would generate logical address fields for accessing the memory 134 responsive to a request in the request queue. For example, a memory request or access request may be generated by a processor or other host user. Typically, the logical address fields generated by the controller block 110 may comprise logical module, bank, and row values. For illustration, these values are shown in the drawing as MLI, BLJ, and RLK respectively. In operation, the logical address is input to the logical-to-physical (LTP) remapping block 120, which remaps the logical address to a new (remapped) physical address, labeled MPI, BPJ, RPK respectively for reference. The remapped physical address may be applied, directly or indirectly, to the CA bus 130 to access the memory 134.
A full row, or a subset of a row may be remapped in connection with one or more access operations. In the present example of
The “target” remapping locations may be selected with a view to leveling out the number of activation/precharge cycles seen by each row of a memory component so a particular row is not excessively stressed (relative to the other rows). Preferably, the memory component itself need not be changed to take advantage of our remapping strategy. That is, the methods and apparatus disclosed herein may be used with standard (“off the shelf”) memory components, now existing or developed in the future. In other embodiments, described below, limited modifications to standard memory component designs may be used to advantage with regard to activate leveling. Illustrative strategies to achieve these and other goals are discussed in more detail later. Next we will describe, by way of example, operation of the remapping logic 122 [or the LTP remapping block 120?] of the controller component 100 of
Referring now to
A variable RPL (see register 123 in
In general, the remapping logic can remap any physical row to any other (available) physical row. Destination rows may be selected at random, or pseudo-randomly, or using some other algorithm. These or other, more complex remapping algorithms can be used to improve security against malicious attack.
In an embodiment, another variable RF (maintained, for example, in a register or counter value, see 125 in
Referring again to
To begin remapping, the data F in row LK=5 (PK=0) is saved into a holding data register Ro (illustrated at 129 in
Next, at snapshot (iv), the data G is moved from the coherency data register RX into the available physical row PK=0. The previous data F from row 0 remains stored in the holding data register Ro. In this way, data G and the corresponding logical row LK=6 have been remapped to a new physical location.
Next, data H corresponding to LK=7 (PK=2) is copied into the coherency register RX, snapshot (v). Then, the data is copied from register RX into a new physical location PK=1. This process continues in similar fashion, as illustrated in snapshots (vi), (vii), (viii) moving each row of data into a new location, while maintaining association to the correct logical row. Remapping data G, H, and A is shown. Remapping the remaining data B, C, D and E is conducted in the same fashion, indicated by the three horizontal dots to the right of snapshot (viii) in the drawing. Finally, the LK=5 data F is restored from the holding data register Ro to PK=7, snapshot (xvi).
The cost impact of the illustrated example may be on the order of about 1 Mb SRAM storage on the controller for registers Rx, Ro, and mapping control logic estimated to be on the order of 3 k gates. We assume in this example 18×4 devices per memory component (134 in
In some embodiments (not shown), error correction or “scrubbing” logic may be coupled to the register Rx in the remapping component. Accordingly, corrected (or confirmed correct) data can be written to the new PK location. This strategy may be used to relieve the controller of conducting separate background scrubbing operations.
The timeline of
We next describe operation, in one embodiment, for the case of reading or writing a partially transferred row of memory cells. Continuing with the same illustrative example of
In the case of a read access in the scenario of
At block 706, row and column counters may be reset to begin the remapping operation. Next, at block 708, the logic begins by copying the contents (data) of the current column to a coherency data buffer RX. The coherency data buffer may be implemented, for example, as a register such as 127 in the remapping block 120 of
Block 716 begins a process of copying the data from the coherency buffer RX to the new physical location RPK′. After block 716 is executed, decision 717 determines whether the column counter currently points to the last column. (Various implementations of counters, registers, and logic, realized in hardware and or software/firmware, may be used. The specifics are not critical. For example, the column counter used for transfers into RX may or may not be the same as the column counter used for transfers out of RX.) If the column count is not at the last column, the column count is incremented at block 720, and this process repeats via loop 724 back to block 716 to copy the next column. This loop continues until all of the columns of the current word have been copied from the coherency data buffer RX into the new physical location. After that copy process is completed, decision 717, the remapping process loops back via path 730 and again enters the decision 702 to determine their loading on the request queue. As before, if the loading does not exceed a predetermined threshold, the next remapping operation can proceed.
If the applicable scheduling criteria for remapping operations are not met, decision 700, or the queue loading is unacceptable, the logic proceeds via path 732 to service the access request queue, beginning at block 752. An access request is fetched from the request queue, and the memory control block generates a logical address LK corresponding to the requested memory access, block 754. Next, at block 756, the remap logic re-maps the logical address LK to a new physical address PK, as discussed earlier. Next, decision 760 determines whether the physical row RPK has been partially transferred to a new location. If that is not the case, in other words, if moving of the relevant data has been completed or has not started, then the access request is processed normally, at block 762, and the process loops back via path 736 to fetch the next access request at block 752.
If it is determined at decision 760 that the relevant row RPK has been partially transferred, then the next steps depend upon of the state of that transfer. On the one hand, the row may be “in flight” from RPK to RX. That is, a row may be in the process of being copied from its current physical location to the coherency data buffer RX. This process was illustrated in
In the first case, indicated at block 764, the process proceeds to block 766 in the case of a write command Here, data is written to the physical row are PK and also to the partial row in RX. Alternatively, if the access request is a read command, then data is read from the physical row RPK, block 768. Referring now to block 780, we describe the case where the row of interest is in the process of transfer from RX to RPK′. Here, in the case of a write command, block 782, the write operation is executed to the remapped physical row RPK′ and additionally to the partial row in RX. Alternatively, in the case of a read command, the read is executed from the row stored in RX, see block 784. In this way, correct data are written, or read, as appropriate.
It will be obvious to those having skill in the art that many changes may be made to the details of the above-described embodiments without departing from the underlying principles of the invention. The scope of the present invention should, therefore, be determined only by the following claims.
This application is a continuation of U.S. application Ser. No. 14/566,411, filed Dec. 10, 2014, now U.S. Pat. No. 10,152,408, issued Dec. 11, 2018, which claims the benefit to U.S. Provisional Patent Application Ser. No. 61/941,865, filed Feb. 19, 2014, which are hereby incorporated in its entirety herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
4748627 | Ohsawa | May 1988 | A |
5293631 | Rau et al. | Mar 1994 | A |
6192457 | Porterfield | Feb 2001 | B1 |
6441641 | Pang et al. | Aug 2002 | B1 |
6490225 | Millar | Dec 2002 | B1 |
6681283 | Thekkath et al. | Jan 2004 | B1 |
7355909 | Cohen | Apr 2008 | B2 |
7984329 | Lastras-Montano et al. | Jul 2011 | B2 |
8069377 | Singh | Nov 2011 | B2 |
8301826 | Gonzalez et al. | Oct 2012 | B2 |
8347176 | Resnick et al. | Jan 2013 | B2 |
20030065899 | Gorobets | Apr 2003 | A1 |
20030149700 | Bolt | Aug 2003 | A1 |
20040215897 | Arimilli et al. | Oct 2004 | A1 |
20060106972 | Gorobets et al. | May 2006 | A1 |
20060106982 | Ashmore et al. | May 2006 | A1 |
20080077767 | Khosravi et al. | Mar 2008 | A1 |
20080229025 | Plamondon | Sep 2008 | A1 |
20090089485 | Yeh | Apr 2009 | A1 |
20090125678 | Tokuda | May 2009 | A1 |
20100161923 | GadelRab | Jun 2010 | A1 |
20100174845 | Gorobets et al. | Jul 2010 | A1 |
20100191923 | Archer | Jul 2010 | A1 |
20120233397 | Keren | Sep 2012 | A1 |
20120324141 | Seong et al. | Dec 2012 | A1 |
20140173180 | D'Abreu | Jun 2014 | A1 |
20140173234 | Jung et al. | Jun 2014 | A1 |
20150149728 | Moon | May 2015 | A1 |
Number | Date | Country | |
---|---|---|---|
20190179740 A1 | Jun 2019 | US |
Number | Date | Country | |
---|---|---|---|
61941865 | Feb 2014 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14566411 | Dec 2014 | US |
Child | 16214558 | US |