System and method for data error recovery in a solid state subsystem

Information

  • Patent Grant
  • 8700950
  • Patent Number
    8,700,950
  • Date Filed
    Friday, February 11, 2011
    13 years ago
  • Date Issued
    Tuesday, April 15, 2014
    10 years ago
Abstract
Systems and methods are disclosed for recovering from a data access error encountered in data stripes implemented in a data redundancy scheme (e.g., RAID) in a solid state storage device. In one embodiment, the storage device holds parity data in a temporary, volatile memory such as a RAM and writes the parity data to the non-volatile memory when a full stripe's worth of new write data has been written to the non-volatile memory. In one embodiment, upon detecting that a data access error has occurred in a partially written stripe, the storage device initiates a write of the parity data for the partially written stripe to the non-volatile memory and executes a RAID recovery procedure using the newly written parity data to attempt to recover from the detected error. This approach allows for a recovery from the data access error without waiting for the full stripe to be written.
Description
BACKGROUND

Many data storage components such as hard disks and solid state drives have certain advertised reliability guarantees that the manufacturers provide to customers. For example, certain solid state drive manufacturers guarantee a drive failure rate of 10−16 or 10−17. To increase data reliability, a data redundancy scheme such as RAID (Redundant Arrays of Independent Disks) is used to increase storage reliability. The redundancy may be provided by combining multiple storage elements within the storage device into groups providing mirroring and/or error checking mechanisms. For example, various memory pages/blocks of a solid state storage device may be combined into data stripes in which user data is stored.





BRIEF DESCRIPTION OF THE DRAWINGS

Systems and methods which embody the various features of the invention will now be described with reference to the following drawings, in which:



FIG. 1 is a block diagram illustrating a storage subsystem implementing a data redundancy scheme with a mechanism for utilizing redundancy data to recover from a data access error according to one embodiment.



FIG. 2 is flow diagram showing a process of ensuring data reliability in the event of a data read error according to one embodiment.



FIGS. 3A-3B illustrate an example of a partial data stripe that is written as a result of a data read error according to one embodiment.





DETAILED DESCRIPTION OF SPECIFIC EMBODIMENTS

Overview


A common approach to overcome storage element failure is to use redundant RAID (mirroring, parity, etc.) to allow data recovery should one or more failures (e.g., a read failure) occur. Typically, a target number of storage elements (e.g., pages, blocks, etc.) per stripe is chosen to achieve a desired reliability at a given cost in storage overhead. In a flash-based/solid-state storage system, parity data is usually held in a temporary volatile memory such as RAM (Random Access Memory) and such parity data for a stripe is typically written to the non-volatile flash media when the full stripe's worth of data has been written to the non-volatile flash media. However, there are situations when the yet-to-be written parity may be needed for data recovery.


Various embodiments of the invention determine when it is appropriate to force a write of the yet-to-be written parity data associated with a partial stripe. In one embodiment, upon the detection of a data access error (e.g., a read or program error) on data in the partial stripe, the system triggers a write of the parity data to the flash media and initiates a data recovery procedure using the newly written parity. This approach allows the system to recover from a data access error without having to wait for a full stripe of data to be written to the flash media.


System Overview



FIG. 1 is a block diagram illustrating a storage subsystem implementing a data redundancy scheme with a mechanism for utilizing redundancy data to recover from a data access error according to one embodiment. As shown, a storage subsystem 140 includes a controller 150 and one or more non-volatile solid-state memory arrays 160. The arrays 160 may comprise a plurality of solid-state storage devices coupled to the controller 114. The arrays may comprise, for example, flash integrated circuits, Chalcogenide RAM (C-RAM), Phase Change Memory (PC-RAM or PRAM), Programmable Metallization Cell RAM (PMC-RAM or PMCm), Ovonic Unified Memory (OUM), Resistance RAM (RRAM), NAND memory, NOR memory, EEPROM, Ferroelectric Memory (FeRAM), or other discrete NVM chips. The solid-state storage devices may be physically divided into blocks, pages and sectors, as is known in the art. Other forms of storage (e.g., battery backed-up volatile DRAM or SRAM devices, magnetic disk drives, etc.) may additionally or alternatively be used.


The controller 150 in one embodiment in turn includes a RAID module 158 and a volatile memory 164, which may be implemented in, for example, RAM such as a DRAM or SRAM. The controller may alternatively be implemented in-whole or in-part as an ASIC, FPGA, or other device, which may but need not execute firmware. In another embodiment the volatile memory 164 is outside of the controller 150 in the storage subsystem 140. In one embodiment, the RAID module 158 is configured to execute data access commands to maintain a data redundancy scheme in the storage subsystem. For example, the RAID module 158 may maintain data on which storage elements are assigned to which RAID stripes and determine how data are arranged in the data redundancy scheme (e.g., grouped into stripes with parity).


In one embodiment, the controller 150 of the storage subsystem 140 is configured to receive and execute commands from a storage interface 132 in a host system 130. The memory commands from the storage interface 132 may include write and read commands issued by the host system 130. As further shown in FIG. 1, in one embodiment, the controller 150 executes the received commands in one or more non-volatile solid-state memory arrays 160. As will be explained below, in one embodiment, the volatile memory 164 is configured to temporarily hold parity data for data stripes (e.g., RAID stripes) that are yet to be completed/closed. When a stripe is complete (e.g., all pages of a stripe are programmed in the non-volatile memory arrays 160), the parity data is then transferred to the non-volatile memory arrays 160. The volatile memory 164 may also be configured to temporarily hold “user” data to be written to the memory arrays 160, and such user data may include data received from the host system 130 and/or other data related to internal storage subsystem operations such as garbage collection and wear leveling. In one embodiment, the user data may be held in a separate volatile memory than that which is used to hold the parity data, or in a different portion of the volatile memory 164 than that which is used for the parity data. The controller 150 may also execute internal memory commands such as those needed for garbage collection and wear leveling, etc. and write data related to those internal memory commands to the non-volatile solid-state memory arrays 160 (via the volatile memory or directly to the memory arrays).


Although this disclosure uses RAID as an example, the systems and methods described herein are not limited to the RAID redundancy schemes and can be used in any data redundancy configuration that utilizes striping and/or grouping of storage elements for mirroring or error checking purposes. In addition, although RAID is an acronym for Redundant Array of Independent Disks, those skilled in art will appreciate that RAID is not limited to storage devices with physical disks and is applicable to a wide variety of storage devices including the non-volatile solid state devices described herein.


Partial Parity Writing Process



FIG. 2 is flow diagram showing a process of ensuring data reliability in the event of a data read error according to one embodiment. Although an ECC read error example is described here, the same process is applicable to a program error as well. In block 202, the controller 150 reads a data page in the non-volatile memory array. In block 204, it is determined whether an uncorrectable error (e.g., uncorrectable by ECC) has occurred as a result of the read operation. In one embodiment, the controller employs an ECC (error-correcting code) mechanism to attempt to correct any reading error, but if the ECC mechanism cannot recover the error, then the error is deemed uncorrectable. If the error is not uncorrectable, e.g., the error was corrected by ECC, then the process exits since the error condition no longer exists. However, if the error is uncorrectable, in block 206, the controller determines whether the read operation that triggered the error belongs to an open RAID stripe (i.e., a data stripe that has not been completely written to the non-volatile memory array and for which parity data has not been written to the non-volatile memory array). Since the writing of the parity data “closes” a stripe, a stripe prior to the writing of its parity data is said to be an “open” stripe. FIGS. 3A and 3B below will further illustrate the concept of an open RAID stripe. If it is determined that the read operation was for a page within an open RAID stripe, then in block 208 the controller will force a write of the parity data for the open RAID stripe. In one embodiment, this means that the parity data (for the open stripe) that is currently held in the volatile memory is written to the non-volatile memory array. With the parity data written, in block 210, the controller then attempts to recover the previously uncorrectable error using the RAID data recovery procedure (i.e., using the parity data that has just been written). Although FIG. 2 describes data as stored in units of pages, those skilled in the art will recognize that the process is applicable to systems with other memory measurement units such as blocks, sectors, etc.


Partial Stripe with Forced Parity Write Example


FIGS. 3A-3B illustrate an example of a partial data stripe that is written as a result of a data read error according to one embodiment. FIG. 3A shows four example stripes (Stripes 1-4). Stripes 1-3 are all full stripes in the sense that each has 15 data pages covered by one parity page. Stripes 1-3 have all been written to the non-volatile memory array. These three stripes represent stripes created under normal operation in which no uncorrectable (e.g., uncorrectable by ECC) data errors were detected in the process of stripe creation. In one embodiment, for these completed stripes with parity already written, any error not corrected by ECC can be corrected by using the normal RAID recovery procedure using the parity data. The fourth stripe, Stripe 4, is an open stripe, since it has only 6 pages written to the non-volatile memory array, and the parity data held in the volatile memory is not yet written to the non-volatile memory since parity is typically written after the 15th page is written to the non-volatile memory.



FIG. 3B shows the state of the non-volatile memory after the forced write of the parity data. The process shown in FIG. 3B may be performed in whole or in part by the controller shown in FIG. 1, or by a component of the controller such as the RAID module. As previously shown in FIG. 2, the forced write of parity data occurs when an uncorrectable data access error (e.g., uncorrectable by ECC) is encountered in one of the pages in an open stripe for which parity data has not been written to the non-volatile memory. In this example, the data error occurred while a read was being performed on one of the six pages in Stripe 4, prompting the writing of the parity data to the non-volatile memory ahead of its scheduled write time. The result, as shown in FIG. 3B, is that Stripe 4 is now a partial stripe within the non-volatile memory, and recovery from that uncorrectable data error proceeds with the partial parity data that was written. In one embodiment, after the storage subsystem recovers from that data access error through the use of parity data, the subsystem may move on to create other data stripes, leaving Stripe 4 as a partial stripe. In another embodiment, a partial stripe is re-opened and combined with additional new data to create a full stripe. The data in the partial stripe may be combined with newly received write data (whether from the host system or from other internal operations such as garbage collection or wear leveling), related data already in a volatile memory location in the storage subsystem, or filler data such as system data or pre-designated filler values such as zeros. Those skilled in the art will appreciate that in various embodiments, the actual steps taken in the process shown in FIG. 3B may differ from those shown in the figure. Depending on the embodiment, certain of the steps described in the example above may be removed, others may be added, and the sequence of steps may be altered and/or performed in parallel.


Conclusion

While certain embodiments of the inventions have been described, these embodiments have been presented by way of example only, and are not intended to limit the scope of the inventions. Indeed, the novel methods and systems described herein may be embodied in a variety of other forms. Furthermore, various omissions, substitutions and changes in the form of the methods and systems described herein may be made without departing from the spirit of the inventions. The accompanying claims and their equivalents are intended to cover such forms or modifications as would fall within the scope and spirit of the inventions. The features and attributes of the specific embodiments disclosed above may be combined in different ways to form additional embodiments, all of which fall within the scope of the present disclosure. Although the present disclosure provides certain preferred embodiments and applications, other embodiments that are apparent to those of ordinary skill in the art, including embodiments which do not provide all of the features and advantages set forth herein, are also within the scope of this disclosure. Accordingly, the scope of the present disclosure is intended to be defined only by reference to the appended claims.

Claims
  • 1. A solid-state storage subsystem comprising: a non-volatile memory array;a controller configured to implement a data redundancy configuration with a plurality of data stripes in the non-volatile memory array; anda volatile memory for temporarily storing data to be written to the non-volatile memory array and parity data for one or more of the data stripes in the non-volatile memory array, wherein each of the plurality of data stripes is of a pre-defined stripe size and wherein the controller is configured to write parity data for a data stripe to the non-volatile memory array when data already written to the non-volatile memory for the data stripe reaches the pre-defined stripe size;wherein the controller is further configured to: detect an occurrence of a data access error in one of the plurality of data stripes for which parity data has not been written to the non-volatile memory array; andin response to detecting an occurrence of a data access error, move the parity data for the data stripe causing the error from the volatile memory to the non-volatile memory array ahead of a scheduled writing of the parity data, andattempt to correct the data access error with the newly written parity data.
  • 2. The solid-state storage subsystem of claim 1, wherein the writing of the parity data creates a partial data stripe that is smaller than the pre-defined stripe size.
  • 3. The solid-state storage subsystem of claim 2, wherein the controller is further configured to combine the partial data stripe with additional data to create an expanded stripe of the pre-defined stripe size and write new parity data for the expanded stripe.
  • 4. The solid-state storage subsystem of claim 1, wherein the data access error is an ECC read error.
  • 5. The solid-state storage subsystem of claim 1, wherein the data access error is a program error.
  • 6. The solid-state storage subsystem of claim 1, wherein the data redundancy configuration is a redundant array of independent disks (RAID) configuration.
  • 7. A method of recovering from a data access error in a solid-state storage subsystem, the method comprising: implementing a data redundancy configuration with a plurality of data stripes in a non-volatile memory array of the solid-state storage subsystem;temporarily storing, in a volatile memory of the solid-state storage subsystem, data to be written to the non-volatile memory array and parity data associated with said data to be written;detecting an occurrence of a data access error in one of the plurality of data stripes for which parity data has not been written to the non-volatile memory array; andin response to detecting the occurrence of a data access error, moving the parity data for said data stripe in which the data access error occurred from the volatile memory to the non-volatile memory array to make said parity data available for attempting to correct the data access error in advance of a scheduled write for the parity data, the scheduled write corresponding to a time when the data already written to the non-volatile memory for said data stripe reaches a pre-defined stripe size.
  • 8. The method of claim 7, wherein each of the plurality of data stripes is of the pre-defined stripe size and wherein the writing of the parity data creates a partial data stripe that is smaller than the pre-defined stripe size.
  • 9. The method of claim 7, further comprising: combining the partial data stripe with additional data to create an expanded stripe of the pre-defined stripe size; andwriting new parity data for the expanded stripe.
  • 10. The method of claim 7, wherein the data access error is an ECC read error.
  • 11. The method of claim 7, wherein the data redundancy configuration is a redundant array of independent disks (RAID) configuration.
  • 12. A solid-state storage subsystem comprising: a non-volatile memory array;a controller configured to implement a data redundancy configuration with a plurality of data stripes in the non-volatile memory array; andvolatile memory for temporarily storing data to be written to the non-volatile memory array and parity data for one or more of the data stripes in the non-volatile memory array;wherein the controller is further configured to: detect an occurrence of a data access error in one of the plurality of data stripes for which parity data has not been written to the non-volatile memory array; andin response to detecting an occurrence of a data access error, move the parity data for the data stripe in which the data access error occurred from the volatile memory to the non-volatile memory array, in advance of a time when the data written to the non-volatile memory for the data stripe reaches a pre-defined stripe size, whereby the data access error can be corrected with the parity data.
  • 13. The solid-state storage subsystem of claim 12, wherein the data access error is an ECC read error.
  • 14. The solid-state storage subsystem of claim 12, wherein the data access error is a program error.
  • 15. The solid-state storage subsystem of claim 12, wherein the data redundancy configuration is a redundant array of independent disks (RAID) configuration.
US Referenced Citations (61)
Number Name Date Kind
5408644 Schneider et al. Apr 1995 A
5499337 Gordon Mar 1996 A
6467022 Buckland et al. Oct 2002 B1
6523087 Busser Feb 2003 B2
6959413 Humlicek et al. Oct 2005 B2
7069382 Horn et al. Jun 2006 B2
7200715 Kleiman et al. Apr 2007 B2
7409492 Tanaka et al. Aug 2008 B2
7640390 Iwamura et al. Dec 2009 B2
7653778 Merry, Jr. et al. Jan 2010 B2
7779294 Corrado et al. Aug 2010 B2
7856528 Frost et al. Dec 2010 B1
8321597 Yu et al. Nov 2012 B2
8402217 Burd Mar 2013 B2
20040015657 Humlicek et al. Jan 2004 A1
20040123032 Talagala et al. Jun 2004 A1
20050066124 Horn et al. Mar 2005 A1
20050086429 Chatterjee et al. Apr 2005 A1
20050177672 Rao Aug 2005 A1
20060004957 Hand, III et al. Jan 2006 A1
20060236029 Corrado et al. Oct 2006 A1
20070268905 Baker et al. Nov 2007 A1
20070283079 Iwamura et al. Dec 2007 A1
20070294565 Johnston et al. Dec 2007 A1
20070297265 Kim et al. Dec 2007 A1
20080133969 Manoj Jun 2008 A1
20080141054 Danilak Jun 2008 A1
20080155160 McDaniel Jun 2008 A1
20080229148 Forhan et al. Sep 2008 A1
20080276124 Hetzler et al. Nov 2008 A1
20090073762 Lee et al. Mar 2009 A1
20090083504 Belluomini et al. Mar 2009 A1
20090150599 Bennett Jun 2009 A1
20090172335 Kulkarni et al. Jul 2009 A1
20090204852 Diggs et al. Aug 2009 A1
20090210744 Kamalavannan Aug 2009 A1
20090248998 Sato et al. Oct 2009 A1
20090327604 Sato et al. Dec 2009 A1
20090327803 Fukutomi et al. Dec 2009 A1
20100049914 Goodwin Feb 2010 A1
20100064111 Kunimatsu et al. Mar 2010 A1
20100088557 Weingarten et al. Apr 2010 A1
20100088579 Hafner et al. Apr 2010 A1
20100115175 Zhuang et al. May 2010 A9
20100122115 Olster May 2010 A1
20100169543 Edgington et al. Jul 2010 A1
20100262773 Borchers et al. Oct 2010 A1
20100281202 Abali et al. Nov 2010 A1
20110035548 Kimmel et al. Feb 2011 A1
20110126045 Bennett May 2011 A1
20110173484 Schuette et al. Jul 2011 A1
20110191649 Lim et al. Aug 2011 A1
20110219259 Frost et al. Sep 2011 A1
20110264843 Haines et al. Oct 2011 A1
20110314218 Bert Dec 2011 A1
20120079318 Colgrove et al. Mar 2012 A1
20120110376 Dreifus et al. May 2012 A1
20120151253 Horn Jun 2012 A1
20120173790 Hetzler et al. Jul 2012 A1
20120233406 Igashira et al. Sep 2012 A1
20120246403 Mchale et al. Sep 2012 A1
Foreign Referenced Citations (1)
Number Date Country
WO 2010049928 May 2010 WO