Host-resident translation layer triggered host refresh

ABSTRACT

Devices and techniques are disclosed herein for verifying host generated physical addresses at a memory device during a host performance boost mode of operation to ameliorate erroneous or potentially malicious access to the memory device, and efficiently providing refreshed mapping information to the host during the host performance boost mode of operation.

BACKGROUND

Memory devices are typically provided as internal, semiconductor,integrated circuits in computers or other electronic devices. There aremany different types of memory including volatile and non-volatilememory. Volatile memory can require power to maintain data and includesrandom-access memory (RAM), dynamic random-access memory (DRAM), andsynchronous dynamic random-access memory (SDRAM), among others.Non-volatile memory can provide persistent data by retaining stored datawhen not powered and can include NAND flash memory, NOR flash memory,read only memory (ROM), Electrically Erasable Programmable ROM (EEPROM),Erasable Programmable ROM (EPROM), and resistance variable memory suchas phase change random access memory (PCRAM), resistive random-accessmemory (RRAM), and magnetoresistive random access memory (MRAM), 3DXPoint™ memory, among others.

Memory cells are typically arranged in a matrix or an array. Multiplematrices or arrays can be combined into a memory device, and multipledevices can be combined to form a storage volume of a memory system,such as a solid-state drive (SSD), a Universal Flash Storage (UFS™)device, a MultiMediaCard (MMC) solid-state storage device, an embeddedMMC device (eMMC™), etc.

A memory system can include one or more processors or other memorycontrollers performing logic functions to operate the memory devices orinterface with external systems. The memory matrices or arrays caninclude a number of blocks of memory cells organized into a number ofphysical pages. The memory system can receive commands from a host inassociation with memory operations, such as read or write operations totransfer data (e.g., user data and associated integrity data, such aserror data and address data, etc.) between the memory devices and thehost, erase operations to erase data from the memory devices, or performone or more other memory operations.

Memory is utilized as volatile and non-volatile data storage for a widerange of electronic applications, including, for example, personalcomputers, portable memory sticks, digital cameras, cellular telephones,portable music players such as MP3 players, movie players, and otherelectronic devices. Memory cells can be arranged into arrays, with thearrays being used in memory devices.

Many electronic devices include several main components: a hostprocessor (e.g., a central processing unit (CPU) or other mainprocessor); main memory (e.g., one or more volatile or non-volatilememory device, such as dynamic RAM (DRAM), mobile or low-powerdouble-data-rate synchronous DRAM (DDR SDRAM), etc.); and a storagedevice (e.g., non-volatile memory (NVM) device, such as flash memory,read-only memory (ROM), an SSD, an MMC, or other memory card structureor assembly, or combination of volatile and non-volatile memory, etc.).In certain examples, electronic devices can include a user interface(e.g., a display, touch-screen, keyboard, one or more buttons, etc.), agraphics processing unit (GPU), a power management circuit, a basebandprocessor or one or more transceiver circuits, etc.

BRIEF DESCRIPTION OF THE DRAWINGS

In the drawings, which are not necessarily drawn to scale, like numeralsmay describe similar components in different views. Like numerals havingdifferent letter suffixes may represent different instances of similarcomponents. The drawings illustrate generally, by way of example, butnot by way of limitation, various embodiments discussed in the presentdocument.

FIG. 1 illustrates an example system an environment including a memorydevice upon which one or more examples of the present subject matter maybe implemented.

FIG. 2 illustrates generally a flowchart of an example method forimplementing memory operations at a flash memory system using aspects ofhost-resident FTL.

FIG. 3 illustrates generally a flowchart of an example method forefficiently monitoring and updating host mapping table data forhost-resident FTL operation.

FIG. 4 illustrates a block diagram of an example machine upon which anyone or more of the techniques (e.g., methodologies) discussed herein mayperform.

DETAILED DESCRIPTION

Flash memory based storage devices such as NAND memory can use a FlashTranslation Layer (FTL) to translate logical addresses of I/O requests,often referred to as logical block addresses (LBAs), to correspondingflash memory addresses which are stored in one or more FTL mappingtables. LBAs can be the logical addresses used by a host for managingdata. Mobile storage devices typically have a cache with constrainedsize, and thus often lack memory to store an entire mapping table.Therefore, portions of the mapping table(s) can be retrieved from theflash memory on demand, which can cause random read performancedegradation.

In order to improve random read performance, techniques described hereinenable use of host-resident memory, in addition to memory cells of amemory device coupled to the host, as a cache for a FTL mapping table.Under a host-resident FTL, FTL data can be read from host memory fasterthan from flash memory, and the host can initiate a memory operation byretrieving a physical address (PA) of the flash memory and including thePA in a memory request to the flash memory. The PA can be retrieved bythe host using the FTL memory cache of the host and the LBA of the host.Upon receiving the memory request, the flash memory system canimmediately retrieve the data associated with the physical addresswithout the delay associated with accessing the flash memory-basedmapping table and using the LBA to obtain the physical address.

In certain implementations of a host-resident FTL, improvements inrandom read workload performance can be significant. However, thepresent inventors have identified techniques for host-resident FTL thatcan assist in validating the integrity of host memory requests, canassist in maintaining coherency between the host FTL table and theactual flash mapping table, and can assist in providing timely updatesto the host FTL table while host-triggered memory operations are at ornear idle. Straightforward implementations of host-resident FTL canassume that the mapping table remains accurate between host initiatedoperations. However, the memory system or memory device connected to thehost often performs housekeeping operations such a garbage collectionand wear leveling in between host initiated operations or during timeswhen the host is idle. Housekeeping operations move data around andoften revise and update, the mapping table resident at the memorydevice. Without some validity checks, straight forward implementation ofhost-resident FTL, such as a memory system blindly using thehost-provided PA to access flash data, can often result in the memorysystem accessing flash memory at the wrong PA.

FIG. 1 illustrates an example of an environment 100 including a host 105and a memory device 110 configured to communicate over a communicationinterface. The host 105 or the memory device 110 may be included in avariety of products 150, such as IoT devices (e.g., a refrigerator orother appliance, sensor, motor or actuator, mobile communication device,automobile, mobile phone, drone, etc.) to support processing,communications, or control of the product 150.

The memory device 110 includes a memory controller 115 and a memoryarray 120 including, for example, one or more individual memory die(e.g., a stack of three-dimensional (3D) NAND die). In 3D architecturesemiconductor memory technology, vertical structures are stacked inmultiple tiers, and coupled to form physical pages, to increase thestorage density of a memory device (e.g., a storage device) in a givenfootprint (i.e. form factor). In an example, the memory device 110 canbe a discrete memory device.

One or more communication interfaces 111 can be used to transfer databetween the memory device 110 and one or more other components of thehost 105, such as a Serial Advanced Technology Attachment (SATA)interface, a Peripheral Component Interconnect Express (PCIe) interface,a Universal Serial Bus (USB) interface, a UFS interface, an eMMC™interface, or one or more other connectors or interfaces. The host 105can include a host system, an electronic device, a processor, a memorycard reader, or one or more other electronic devices external to thememory device 110. In some examples, the host 105 may be a machinehaving some portion, or all, of the components discussed in reference tothe machine 400 of FIG. 4. Data may be transferred between the memorydevice 110 and other components over an input/output (I/O) bus that mayinclude one or more latches for temporarily storing the data as it isbeing transferred (e.g., before being read or written from/to a memoryarray).

The memory controller 115 can receive instructions from the host 105,and can communicate with the memory array, such as to transfer data to(e.g., write or erase) or from (e.g., read) one or more of the memorycells, planes, sub-blocks, blocks, or pages of the memory array. Thememory controller 115 can include, among other things, circuitry orfirmware, including one or more components or integrated circuits. Forexample, the memory controller 115 can include one or more memorycontrol units, circuits, control circuitries, or components configuredto control access across the memory array 120 and to provide atranslation layer between the host 105 and the memory device 110. Thememory controller 115 can include one or more I/O circuits (andcorresponding latches), caches, lines, or interfaces to transfer data toor from the memory array 120. The memory controller 115 can include amemory manager 125 and an array controller 135.

The array controller 135 can include, among other things, circuitry orcomponents configured to control memory operations associated withwriting data to, reading data from, or erasing one or more memory cellsof the memory device 110 coupled to the memory controller 115. Thememory operations can be based on, for example, host commands receivedfrom the host 105, or internally generated by the memory manager 125(e.g., in association with wear leveling, error detection or correction,etc.).

The array controller 135 can include an error correction code (ECC)component 140, which can include, among other things, an ECC engine orother circuitry configured to detect or correct errors associated withwriting data to or reading data from one or more memory cells of thememory device 110 coupled to the memory controller 115. ECC component140, for example, may detect or compute a bit-error-rate (BER)associated with performing a number of memory operations. The BER maycorrespond to bit errors occurring in latches of an I/O bus, internalerrors of memory controller 115, errors occurring in one or more of theNAND arrays, or any one or more of the multi-level cell(s) (MLC) of thememory device 110. The memory controller 115 can be configured toactively detect and recover from error occurrences (e.g., bit errors,operation errors, crash conditions, stalls, hang ups, etc.) associatedwith various operations or storage of data, while maintaining integrityof the data transferred between the host 105 and the memory device 110,or maintaining integrity of stored data (e.g., using redundant RAIDstorage, etc.), and can remove (e.g., retire) failing memory resources(e.g., memory cells, memory arrays, pages, blocks, etc.) to preventfuture errors. Array controller 135 may transmit detected BERinformation to memory manager 125 for storage and tracking. The memorycontroller 115 may include a command queue (not shown) that tracksmemory commands received from a host. Commands in the queue may beexecuted by memory controller 115 in a first-in first-out (FIFO) manner,stack manner, out of sequence, according to priority, or in any othersuitable order.

The described memory device 110 includes an host-resident FTL module 160in association with the memory array 120. In some implementations,memory controller 115 of memory device 110 may include control circuitryconfigured to implement the functions of the host-resident FTL module160. In other implementations, the host-resident FTL module 160 mayinclude an independent control circuitry for implementing the describedfunctionality. In yet other implementations, control circuitry may bedivided between the host-resident FTL module 160 and memory controller115 to implement the described functions of the host-resident FTL module160. In the depicted example, the array controller 135 forms a portionof the memory controller 115, and the host-resident FTL module 160 formsa portion of the array controller. In other implementations,host-resident FTL module 160 may be external, and/or outside of arraycontroller 135. For example, the host-resident FTL module 160 (or anyindividual components thereof), may be an independent component coupledto one or more components in environment 100. However physicallylocated, the structures providing the additional functionality of thehost-resident FTL module 160, function to verify physical addressesprovided by the host 105 to prevent erroneous or malicious access to thememory device and to provide opportunities for the host to refresh thehost-resident mapping table information to align the mapping informationwith the mapping information of the memory device during host-residentFTL operation of the environment 100.

The memory manager 125 can include, among other things, circuitry orfirmware, such as a number of components or integrated circuitsassociated with various memory management functions. For purposes of thepresent description, example memory operation and management functionswill be described in the context of NAND memory. Persons skilled in theart will recognize that other forms of non-volatile memory may haveanalogous memory operations or management functions. Such NANDmanagement functions include wear leveling (e.g., garbage collection orreclamation), error detection (e.g., BER monitoring) or correction,block retirement, or one or more other memory management functions. Thememory manager 125 can parse or format host commands (e.g., commandsreceived from a host) into device commands (e.g., commands associatedwith operation of a memory array, etc.), or generate device commands(e.g., to accomplish various memory management functions) for the arraycontroller 135 or one or more other components of the memory device 110.

The memory manager 125 can include a set of management tables 130configured to maintain various information associated with one or morecomponents of the memory device 110 (e.g., various informationassociated with a memory array or one or more memory cells coupled tothe memory controller 115 and can include an FTL table). For example,the management tables 130 can include information regarding FTL mappinginformation, block age, block erase count, error history, errorparameter information, host reset timeout value, memory operationcommand latencies, or one or more error counts (e.g., a write operationerror count, a read bit error count, a read operation error count, anerase error count, etc.) for one or more blocks of memory cells coupledto the memory controller 115. In certain examples, if the number ofdetected errors for one or more of the error counts (e.g., an errorparameter) is above a threshold (e.g., an allowable error threshold),the bit error can be referred to as an uncorrectable bit error. Themanagement tables 130 can maintain a count of correctable oruncorrectable bit errors, among other things.

The memory array 120 can include multiple memory cells arranged in, forexample, a number of devices, planes, sub-blocks, blocks, or pages. Asone example, a 48 GB TLC NAND memory device can include 18,592 bytes ofdata per page (16,384+2208 bytes), 1536 pages per block, 548 blocks perplane, and 4 or more planes per device. As another example, a 32 GB MLCmemory device (storing two bits of data per cell (i.e., 4 programmablestates)) can include 18,592 bytes (B) of data per page (16,384+2208bytes), 1024 pages per block, 548 blocks per plane, and 4 planes perdevice, but with half the required write time and twice theprogram/erase (P/E) cycles as a corresponding TLC memory device. Otherexamples can include other numbers or arrangements. In some examples, amemory device, or a portion thereof, may be selectively operated in SLCmode, or in a desired MLC mode (such as TLC, QLC, etc.).

In operation, data is typically written to or read from the memorydevice 110 in pages and erased in blocks. However, one or more memoryoperations (e.g., read, write, erase, etc.) can be performed on largeror smaller groups of memory cells, as desired. The data transfer size ofa memory device 110 is typically referred to as a page, whereas the datatransfer size of a host is typically referred to as a sector.

Different types of memory cells or memory arrays 120 can provide fordifferent page sizes or may require different amounts of metadataassociated therewith. For example, different memory device types mayhave different bit error rates, which can lead to different amounts ofmetadata necessary to ensure integrity of the page of data (e.g., amemory device with a higher bit error rate may require more bytes oferror correction code data than a memory device with a lower bit errorrate). As an example, a MLC NAND flash device may have a higher biterror rate than a corresponding single-level cell (SLC) NAND flashdevice. As such, the MLC device may require more metadata bytes forerror data than the corresponding SLC device.

FIG. 2 illustrates generally a flowchart of an example method 200 forimplementing memory operations at a flash memory system using aspects ofhost-resident FTL. In certain examples, the method can assist invalidating that the physical address received from the host correspondsto the LBA provided by the host. Without some form of verification, amalicious host can provide an LBA and an unrelated physical address thatmay result in accessing flash memory data not intended to be accessibleby the host, or not intended to be accessed by the host using theparticular host memory request received at the memory system. At 201,the memory system can receive a host memory request including an LBA anda physical address. At 203, the memory controller can determine thecorrect physical address corresponding to the LBA. In certain examples,the memory controller can first search the mapping table or portionthereof contained in the memory device cache using the LBA. If thememory device cache includes the LBA, the correct physical address canquickly be retrieved from the memory device cache. At 205, memoryoperation can proceed, such as retrieving data of the LBA at thephysical address of the flash memory to fulfill a read request from thehost, for example. At 207, the data can be returned to the host alongwith the LBA and the correct physical address. In certain examples,returning the correct physical address with LBA can assist the host inupdating the mapping table resident in memory of the host.

In certain examples, if a portion, or piece, of the mapping table withinthe cache of the memory device does not include the LBA of the hostrequest, the memory controller can assume the mapping table isup-to-date and, for example, retrieve the data at the physical addressand return the data to the host. In some examples, if the portion of themapping table within the cache of the memory device does not include theLBA of the host request, the memory controller can retrieve the portionof the mapping table from flash memory, retrieve the correct PAcorresponding to the LBA, retrieve or access the data of the flashmemory associated with PA, and return the data, or acknowledgement offlash memory access, along with the LBA and correct PA to the host.

In certain examples, validating the physical address passed by the hostcan ameliorate issues arising from the host mapping table not beingcoherent with the mapping table of the memory system as well as reducingthe success of a malicious host accessing data not meant to be accessed.It is acknowledged that if the correct physical address is not availablein the portion of the mapping table in the cache of the memory device,accessing the correct portion of the memory table from flash memory maycontribute to operation latency. In addition, in certain examples, uponrecognizing that the host supplied physical address asserted tocorrespond with the LBA is not coherent with the correct physicaladdress of the memory system, the reply or acknowledgement to the hostcan include a chunk of updated mapping data. Retrieving and sending theupdated chunk of mapping data can also contribute to operation latencyespecially if the updated mapping data is not cached at the memorysystem and is retrieved from flash memory.

Because updating the mapping table data of the host during memoryoperations can significantly affect overall system performance in someexamples, providing updated mapping data to the host at each instancethe memory system becomes aware of incoherency between the actualmapping table and the host mapping table is generally avoided. Continuedfailure to update the host mapping table would eventually renderhost-resident FTL meaningless, therefore, in certain examples, thememory system controller can keep an indication of each time hostmapping data appears to be incorrect, and periodically update the hostmapping table during idle modes of operation. In certain examples, theindication can be implemented using a counter, threshold count, acomparator, and logic to provide updated mapping table data to the hostwhen the counter value satisfies the threshold count.

In certain examples, the indication can be implemented using multiplecounters where each counter is associated to certain chunks of a flashmemory mapping table. For example, a host system can target an area ofmemory for a period of time such that during that time the host mappingtable can span at least a portion of the overall storage device LBAspace. As an example, if a memory system includes 256 gigabyte (GB) ofLBA storage space, during a host-resident FTL mode of operation, thehost may target a 1 GB portion of the device LBA space. A typicalmapping table entry can be 4 bytes of physical address for 4 KB of userdata, so the mapping table for a 1 GB range can be 1 MB in size. Ifhost-resident FTL update chunks are 16 KB in size, 64 such chunks canexist in a 1 MB mapping table range. In such an example system, thememory device can include 64 counters. Each counter can be associatedwith an LBA that defines a 16 Kb mapping chunk of data. If a hostcommand includes the LBA but does not include a valid physical address,the counter can be triggered. It is understood that the actual numbersassociated with a memory system, physical address storage, host-residentFTL update chunk size, etc. can differ from the numbers discussed in theabove example without departing from the scope of the present subjectmatter.

If the counter value satisfies a threshold value, such as a maximumcount threshold for an up counter or zero count threshold for a downcounter, the memory device can schedule and execute transmission ofupdated mapping data to the host when a counter satisfies the threshold.In certain examples, all the counters can be reset periodically. In suchexamples, the memory device can delay a short amount of time (up to athreshold of invalid read command addresses) before triggering therelatively expensive host-resident FTL table update. The periodic resetof the counters can assure that updates only happen in high trafficscenarios (e.g., benchmarks), and that small amounts of host trafficwill not trigger an update. A triggered host-resident FTL update, asdiscussed above, can provide superior performance over updateimplementations that update on each incorrect address.

In certain examples, the full memory capacity can span more than thetargeted memory area and the memory system can include a finite numberof counters. In such examples, the memory system can include a countermapping table. The counter mapping table can identify a range of LBAsassigned to each of the finite number of counters as the counters areassigned. At some point, a physical address mismatch of a host requestincluding a LBA can be detected and the memory system can identify acounter to count the physical address mismatch. If the identifiedcounter is already assigned, the memory system can use the countermapping table to identify if the LBA of the present host request is inthe LBA range associated with the identified counter. If the LBA iswithin the LBA range, the identified counter is incremented. If the LBAis not within the LBA range associated with the identified counter, thecounter is reset and a new LBA range can be assigned to the identifiedcounter via the counter mapping table.

FIG. 3 illustrates generally a flowchart of an example method 300 forefficiently monitoring and updating host mapping table data forhost-resident FTL operation. At 301, a memory request can be received atthe memory device. Such a request can come from a host and can include aread memory request or a write memory request among other things. Inhost-resident FTL operation, the request can include a LBA associatedwith the host and a physical address assumed to be the location in thememory system corresponding to the data defined by the LBA. At 303, thememory system can use an internal mapping table to determine the correctPA associated with the LBA provided by the host. Once the correct PA isdetermined, the memory system can execute the request. In some examples,the request can be executed in parallel with the following operations.In some examples, the request can be executed serial with one or more ofthe following operations.

At 305, the correct PA can be compared with the PA received with thememory request. At 307, the result of the comparison can be evaluated.At 309, if the correct PA is different from the PA received with thememory request, a counter can be incremented. As used herein,incrementing a counter can include changing the counter by a valueeither up or down unless otherwise specified in more detail. At 311, thevalue of the counter can be compared to a threshold. At 313, if thevalue of the counter satisfies the threshold, refreshed host mappingdata can be prepared or sent to the host. At 315, the memory systemresponds to the memory request with appropriate data or acknowledgment.The memory system can respond to the memory request after determiningthe correct PA is not different from the PA received with the memoryrequest, after determining the counter does not satisfy the threshold,or before, simultaneous with, or after providing the refreshed hostmapping data.

In certain examples, a counter can be assigned to a range of LBAs when afirst discrepancy between a received LBA and received physical addressis determined. If the number of counters is limited at the memorydevice, a counter mapping table can be established. In certain examples,the counter mapping table can associate an LBA range with a particularcounter. Upon determining a new discrepancy between a received LBA and areceived PA, a controller of the memory system can select a counter,determine the LBA range associated with the counter if the counter hasalready been assigned, and compare the LBA range with the new LBAassociated with the new discrepancy. If the new LBA is within the LBArange the counter can be incremented. If the LBA is not within the LBArange of the counter, the memory controller can attempt to find anothercounter, or can reassign the present counter, reset the present counter,and save a new LBA range associated with the new LBA in the countermapping table. In certain examples, the memory controller can align thecounters with ranges of LBAs such that selecting a counter for aparticular LBA can be the result of a simple division of the LBA.

In certain examples, the memory controller includes a timer used toreset all the counters. In some examples, the timer can be initiated onpower up or on the memory device detecting initiation of thehost-resident FTL feature. On timeout of the timer, the counters can bereset. This periodic reset prevents providing refreshed host mappingtable data for LBAs that accumulate physical address discrepancies at aslow rate. It is assumed that mechanisms outside of the host-residentFTL feature can provide host mapping data updates in an efficient mannerthat will also take care to update ranges of LBAs that have not quicklyaccumulated PA discrepancies between the mapping information of thememory system and mapping data of the host.

FIG. 4 illustrates a block diagram of an example machine 400 upon whichany one or more of the techniques (e.g., methodologies) discussed hereinmay perform. In alternative embodiments, the machine 400 may operate asa standalone device or may be connected (e.g., networked) to othermachines. In a networked deployment, the machine 400 may operate in thecapacity of a server machine, a client machine, or both in server-clientnetwork environments. In an example, the machine 400 may act as a peermachine in peer-to-peer (P2P) (or other distributed) networkenvironment. The machine 400 may be a personal computer (PC), a tabletPC, a set-top box (STB), a personal digital assistant (PDA), a mobiletelephone, a web appliance, an IoT device, automotive system, or anymachine capable of executing instructions (sequential or otherwise) thatspecify actions to be taken by that machine. Further, while only asingle machine is illustrated, the term “machine” shall also be taken toinclude any collection of machines that individually or jointly executea set (or multiple sets) of instructions to perform any one or more ofthe methodologies discussed herein, such as cloud computing, software asa service (SaaS), other computer cluster configurations.

Examples, as described herein, may include, or may operate by, logic,components, devices, packages, or mechanisms. Circuitry is a collection(e.g., set) of circuits implemented in tangible entities that includehardware (e.g., simple circuits, gates, logic, etc.). Circuitrymembership may be flexible over time and underlying hardwarevariability. Circuitries include members that may, alone or incombination, perform specific tasks when operating. In an example,hardware of the circuitry may be immutably designed to carry out aspecific operation (e.g., hardwired). In an example, the hardware of thecircuitry may include variably connected physical components (e.g.,execution units, transistors, simple circuits, etc.) including acomputer-readable medium physically modified (e.g., magnetically,electrically, moveable placement of invariant massed particles, etc.) toencode instructions of the specific operation. In connecting thephysical components, the underlying electrical properties of a hardwareconstituent are changed, for example, from an insulator to a conductoror vice versa. The instructions enable participating hardware (e.g., theexecution units or a loading mechanism) to create members of thecircuitry in hardware via the variable connections to carry out portionsof the specific tasks when in operation. Accordingly, thecomputer-readable medium is communicatively coupled to the othercomponents of the circuitry when the device is operating. In an example,any of the physical components may be used in more than one member ofmore than one circuitry. For example, under operation, execution unitsmay be used in a first circuit of a first circuitry at one point in timeand reused by a second circuit in the first circuitry, or by a thirdcircuit in a second circuitry at a different time.

The machine (e.g., computer system) 400 (e.g., the host 105, the memorydevice 110, etc.) may include a processing device 402 (e.g., a hardwareprocessor, a central processing unit (CPU), a graphics processing unit(GPU), a hardware processor core, or any combination thereof, such as amemory controller of the memory device 110, etc.), a main memory 404(e.g., read-only memory (ROM), flash memory, dynamic random-accessmemory (DRAM) such as synchronous DRAM (SDRAM) or Rambus DRAM (RDRAM),etc.), a static memory 406 (e.g., static random-access memory (SRAM),cache, etc.), and a data storage system 418, some or all of which maycommunicate with each other via an interlink (e.g., bus) 430.

The processing device 402 can represent one or more general-purposeprocessing devices such as a microprocessor, a central processing unit,or the like. More particularly, the processing device can be a complexinstruction set computing (CISC) microprocessor, reduced instruction setcomputing (RISC) microprocessor, very long instruction word (VLIW)microprocessor, or a processor implementing other instruction sets, orprocessors implementing a combination of instruction sets. Theprocessing device 402 can also be one or more special-purpose processingdevices such as an application specific integrated circuit (ASIC), afield programmable gate array (FPGA), a digital signal processor (DSP),network processor, or the like. The processing device 402 can beconfigured to execute instructions 426 for performing the operations andsteps discussed herein. The computer system 400 can further include anetwork interface device 408 to communicate over a network 420.

The data storage system 418 can include a machine-readable storagemedium 424 (also known as a computer-readable medium) on which is storedone or more sets of instructions 426 or software embodying any one ormore of the methodologies or functions described herein. Theinstructions 426 can also reside, completely or at least partially,within the main memory 404 or within the processing device 402 duringexecution thereof by the computer system 400, the main memory 404 andthe processing device 402 also constituting machine-readable storagemedia. The machine-readable storage medium 424, the data storage system418, or the main memory 404 can correspond to the memory device 110 ofFIG. 1.

In one implementation, the instructions 426 include instructions toimplement functionality corresponding to one or more host-resident FTLoperations discussed above with respect to FIG. 2 or FIG. 3. While themachine-readable storage medium 424 is shown in an exampleimplementation to be a single medium, the term “machine-readable storagemedium” should be taken to include a single medium or multiple mediathat store the one or more sets of instructions. The term“machine-readable storage medium” shall also be taken to include anymedium that is capable of storing or encoding a set of instructions forexecution by the machine and that cause the machine to perform any oneor more of the methodologies of the present disclosure. The term“machine-readable storage medium” shall accordingly be taken to include,but not be limited to, solid-state memories, optical media, and magneticmedia. In an example, a massed machine-readable medium comprises amachine-readable medium with a plurality of particles having invariant(e.g., rest) mass. Accordingly, massed machine-readable media are nottransitory propagating signals. Specific examples of massedmachine-readable media may include: non-volatile memory, such assemiconductor memory devices (e.g., Electrically Programmable Read-OnlyMemory (EPROM), Electrically Erasable Programmable Read-Only Memory(EEPROM)) and flash memory devices; magnetic disks, such as internalhard disks and removable disks; magneto-optical disks; and CD-ROM andDVD-ROM disks.

The machine 400 may further include a display unit, an alphanumericinput device (e.g., a keyboard), and a user interface (UI) navigationdevice (e.g., a mouse). In an example, one or more of the display unit,the input device, or the UI navigation device may be a touch screendisplay. The machine a signal generation device (e.g., a speaker), orone or more sensors, such as a global positioning system (GPS) sensor,compass, accelerometer, or one or more other sensor. The machine 400 mayinclude an output controller, such as a serial (e.g., universal serialbus (USB), parallel, or other wired or wireless (e.g., infrared (IR),near field communication (NFC), etc.) connection to communicate orcontrol one or more peripheral devices (e.g., a printer, card reader,etc.).

The instructions 426 (e.g., software, programs, an operating system(OS), etc.) or other data are stored on the data storage device 418 canbe accessed by the main memory 404 for use by the processing device 402.The main memory 404 (e.g., DRAM) is typically fast, but volatile, andthus a different type of storage than the data storage device 418 (e.g.,an SSD), which is suitable for long-term storage, including while in an“off” condition. The instructions 426 or data in use by a user or themachine 400 are typically loaded in the main memory 404 for use by theprocessing device 402. When the main memory 404 is full, virtual spacefrom the data storage device 418 can be allocated to supplement the mainmemory 404; however, because the data storage device 418 device istypically slower than the main memory 404, and write speeds aretypically at least twice as slow as read speeds, use of virtual memorycan greatly reduce user experience due to storage device latency (incontrast to the main memory 404, e.g., DRAM). Further, use of the datastorage device 418 for virtual memory can greatly reduce the usablelifespan of the data storage device 418.

In contrast to virtual memory, virtual memory compression (e.g., theLinux™ kernel feature “ZRAM”) uses part of the memory as compressedblock storage to avoid paging to the data storage device 418. Pagingtakes place in the compressed block until it is necessary to write suchdata to the data storage device 418. Virtual memory compressionincreases the usable size of the main memory 404, while reducing wear onthe data storage device 418.

Storage devices optimized for mobile electronic devices, or mobilestorage, traditionally include MMC solid-state storage devices (e.g.,micro Secure Digital (microSD™) cards, etc.). MMC devices include anumber of parallel interfaces (e.g., an 8-bit parallel interface) with ahost (e.g., a host device), and are often removable and separatecomponents from the host. In contrast, eMMC™ devices are attached to acircuit board and considered a component of the host, with read speedsthat rival serial ATA™ (Serial AT (Advanced Technology) Attachment, orSATA) based SSD devices. However, demand for mobile device performancecontinues to increase, such as to fully enable virtual oraugmented-reality devices, utilize increasing networks speeds, etc. Inresponse to this demand, storage devices have shifted from parallel toserial communication interfaces. Universal Flash Storage (UFS) devices,including controllers and firmware, communicate with a host using alow-voltage differential signaling (LVDS) serial interface withdedicated read/write paths, further advancing greater read/write speeds.

The instructions 424 may further be transmitted or received over anetwork 420 using a transmission medium via the network interface device408 utilizing any one of a number of transfer protocols (e.g., framerelay, internet protocol (IP), transmission control protocol (TCP), userdatagram protocol (UDP), hypertext transfer protocol (HTTP), etc.).Example communication networks may include a local area network (LAN), awide area network (WAN), a packet data network (e.g., the Internet),mobile telephone networks (e.g., cellular networks), Plain Old Telephone(POTS) networks, and wireless data networks (e.g., Institute ofElectrical and Electronics Engineers (IEEE) 802.11 family of standardsknown as Wi-Fi®, IEEE 802.16 family of standards known as WiMax®), IEEE802.15.4 family of standards, peer-to-peer (P2P) networks, among others.In an example, the network interface device 408 may include one or morephysical jacks (e.g., Ethernet, coaxial, or phone jacks) or one or moreantennas to connect to the network 420. In an example, the networkinterface device 408 may include a plurality of antennas to wirelesslycommunicate using at least one of single-input multiple-output (SIMO),multiple-input multiple-output (MIMO), or multiple-input single-output(MISO) techniques. The term “transmission medium” shall be taken toinclude any intangible medium that is capable of storing, encoding, orcarrying instructions for execution by the machine 400, and includesdigital or analog communications signals or other intangible medium tofacilitate communication of such software.

ADDITIONAL NOTES AND EXAMPLES

Example 1 is a method comprising: receiving a memory operation requestfrom a host at a non-volatile memory, the memory operation requestincluding a logical block address (LBA) associated with the host and aphysical address associated with the non-volatile memory; determining acorrect physical address associated with the LBA using an addressmapping stored on the non-volatile memory; comparing the correctphysical address with the physical address received from the host; whenthe correct physical address is different than the physical addressreceived from the host, incrementing a first counter at the non-volatilememory; comparing the first counter to a threshold value; and when thefirst counter is at or over the threshold value, providing a refreshedaddress mapping table to the host.

In Example 2, the subject matter of Example 1, wherein the providing arefreshed address mapping table to the host includes sending a mappingtable chunk including the LBA from the non-volatile memory to the host.

In Example 3, the subject matter of any of Examples 1-2, wherein thememory operation request is a memory read request.

In Example 4, the subject matter of any of Examples 1-3, wherein thememory operation request is a memory write request.

In Example 5, the subject matter of any of Examples 1-4, includingresetting the first counter after a predetermined amount of time toavoid refreshing the host for seldom encountered discrepancies.

In Example 6, the subject matter of any of Examples 1-5, including usinga mathematical operation on the LBA to determine the first counter isassociated with the LBA, wherein a quotient of a result of themathematical operation is an index to the first counter.

In Example 7, the subject matter of any of Examples 1-6, whereinincrementing the first counter includes assigning the first counter witha range of LBAs and storing the range of LBAs assigned to the firstcounter in a counter assignment table on the non-volatile memory.

In Example 8, the subject matter of Example 7, including: receiving asecond memory operation request from the host at the non-volatilememory, the second memory operation request including a second logicalblock address (LBA) associated with the host and a second physicaladdress associated with the non-volatile memory; determining a secondcorrect physical address associated with the second LBA using theaddress mapping table stored on the non-volatile memory; comparing thesecond correct physical address with the second physical addressreceived from the host; when the second correct physical address isdifferent than the second physical address received from the host: usinga modular mathematical operation on the second LBA to determine thefirst counter is associated with the second LBA.

In Example 9, the subject matter of Example 8, if the second LBA iswithin the range of LBAs assigned to the first counter, incrementing thefirst counter.

In Example 10, the subject matter of any of Examples 7-9, including:receiving a second memory operation request from the host at thenon-volatile memory, the second memory operation request including asecond logical block address (LBA) associated with the host and a secondphysical address associated with the non-volatile memory; determining asecond correct physical address associated with the second LBA using theaddress mapping table stored on the non-volatile memory; comparing thesecond correct physical address with the second physical addressreceived from the host; when the second correct physical address isdifferent than the second physical address received from the host: usinga modular mathematical operation on the second LBA to determine thefirst counter is associated with the second LBA.

In Example 11, the subject matter of Example 10, including: determiningthe second LBA is within the range of LBAs assigned to the firstcounter; and incrementing the first counter.

Example 12 is a memory device comprising: a cache configured to hold aportion of a mapping table of the memory device; flash memory configuredto store and retrieve user data of a host, and to store the mappingtable of the memory device; and a controller configured to: receive amemory operation request from a host, the memory operation requestincluding a logical block address (LBA) associated with the host and aphysical address associated with the flash memory; determine a correctphysical address associated with the LBA using the mapping table;compare the correct physical address with the physical address receivedfrom the host; when the correct physical address is different than thephysical address received from the host, incrementing a counter of thememory device; comparing the counter to a threshold value; and when thecounter satisfies the threshold value, providing a refreshed portion ofthe mapping table to the host.

In Example 13, the subject matter of Example 12, wherein the refreshedportion of the mapping table includes a chunk of the mapping tableincluding the LBA and the correct physical address.

In Example 14, the subject matter of any of Examples 12-13, whereincontroller is further configured to assign the counter with a range ofLBAs and store the range of LBAs assigned to the counter in a counterassignment table on the memory device.

In Example 15, the subject matter of Example 14, wherein the controlleris further configured to: receive a second memory operation request fromthe host, the second memory operation request including a second LBAassociated with the host and a second physical address associated withthe flash memory; determine a second correct physical address associatedwith the second LBA using the mapping table of the flash memory; comparethe second correct physical address with the second physical addressreceived from the host; when the second correct physical address isdifferent than the second physical address received from the host:execute a mathematical operation on the second LBA to determine a secondcounter associated with the second LBA; retrieve the range of LBAsassigned to the second counter from the counter assignment table;compare the second LBA with the range of LBAs assigned to the counter;if the second LBA is not within the range of LBAs assigned to the secondcounter: assign the second counter with a second range of LBAs and storethe second range of LBAs assigned to the second counter in the counterassignment table; and reset the second counter.

In Example 16, the subject matter of Example 15, if the second LBA iswithin the range of LBAs assigned to the second counter, the controlleris configured to increment the second counter.

In Example 17, the subject matter of any of Examples 15-16, wherein aquotient of the mathematical operation is an index to the secondcounter.

In Example 18, the subject matter of any of Examples 12-17, wherein thememory operation request is a memory read request.

In Example 19, the subject matter of any of Examples 12-18, wherein thememory operation request is a memory write request.

In Example 20, the subject matter of any of Examples 12-19, wherein thecounter is reset after a predetermined amount of time independent of avalue of the counter to avoid refreshing the host for seldom encountereddiscrepancies.

Example 21 is at least one machine-readable medium includinginstructions that, when executed by processing circuitry, cause theprocessing circuitry to perform operations to implement of any ofExamples 1-20.

Example 22 is an apparatus comprising means to implement of any ofExamples 1-20.

Example 23 is a system to implement of any of Examples 1-20.

Example 24 is a method to implement of any of Examples 1-20.

The above detailed description includes references to the accompanyingdrawings, which form a part of the detailed description. The drawingsshow, by way of illustration, specific embodiments in which theinvention can be practiced. These embodiments are also referred toherein as “examples”. Such examples can include elements in addition tothose shown or described. However, the present inventors alsocontemplate examples in which only those elements shown or described areprovided. Moreover, the present inventors also contemplate examplesusing any combination or permutation of those elements shown ordescribed (or one or more aspects thereof), either with respect to aparticular example (or one or more aspects thereof), or with respect toother examples (or one or more aspects thereof) shown or describedherein.

In this document, the terms “a” or “an” are used, as is common in patentdocuments, to include one or more than one, independent of any otherinstances or usages of “at least one” or “one or more.” In thisdocument, the term “or” is used to refer to a nonexclusive or, such that“A or B” may include “A but not B,” “B but not A,” and “A and B,” unlessotherwise indicated. In the appended claims, the terms “including” and“in which” are used as the plain-English equivalents of the respectiveterms “comprising” and “wherein”. Also, in the following claims, theterms “including” and “comprising” are open-ended. A system, device,article, or process that includes elements in addition to those listedafter such a term in a claim are still deemed to fall within the scopeof that claim. Moreover, in the following claims, the terms “first,”“second,” and “third,” etc. are used merely as labels, and are notintended to impose numerical requirements on their objects.

In various examples, the components, controllers, processors, units,engines, or tables described herein can include, among other things,physical circuitry or firmware stored on a physical device. As usedherein, “processor” means any type of computational circuit such as, butnot limited to, a microprocessor, a microcontroller, a graphicsprocessor, a digital signal processor (DSP), or any other type ofprocessor or processing circuit, including a group of processors ormulti-core devices.

Operating a memory cell, as used herein, includes reading from, writingto, or erasing the memory cell. The operation of placing a memory cellin an intended state is referred to herein as “programming,” and caninclude both writing to or erasing from the memory cell (e.g., thememory cell may be programmed to an erased state).

According to one or more embodiments of the present disclosure, a memorycontroller (e.g., a processor, controller, firmware, etc.) locatedinternal or external to a memory device, is capable of determining(e.g., selecting, setting, adjusting, computing, changing, clearing,communicating, adapting, deriving, defining, utilizing, modifying,applying, etc.) a quantity of wear cycles, or a wear state (e.g.,recording wear cycles, counting operations of the memory device as theyoccur, tracking the operations of the memory device it initiates,evaluating the memory device characteristics corresponding to a wearstate, etc.)

According to one or more embodiments of the present disclosure, a memoryaccess device may be configured to provide wear cycle information to thememory device with each memory operation. The memory device controlcircuitry (e.g., control logic) may be programmed to compensate formemory device performance changes corresponding to the wear cycleinformation. The memory device may receive the wear cycle informationand determine one or more operating parameters (e.g., a value,characteristic) in response to the wear cycle information.

Method examples described herein can be machine, device, orcomputer-implemented at least in part. Some examples can include acomputer-readable medium, a device-readable medium, or amachine-readable medium encoded with instructions operable to configurean electronic device to perform methods as described in the aboveexamples. An implementation of such methods can include code, such asmicrocode, assembly language code, a higher-level language code, or thelike. Such code can include computer readable instructions forperforming various methods. The code may form portions of computerprogram products. Further, the code can be tangibly stored on one ormore volatile or non-volatile tangible computer-readable media, such asduring execution or at other times. Examples of these tangiblecomputer-readable media can include, but are not limited to, hard disks,removable magnetic disks, removable optical disks (e.g., compact discsand digital video disks), magnetic cassettes, memory cards or sticks,random access memories (RAMs), read only memories (ROMs), solid statedrives (SSDs), Universal Flash Storage (UFS) device, embedded MMC (eMMC)device, and the like.

The above description is intended to be illustrative, and notrestrictive. For example, the above-described examples (or one or moreaspects thereof) may be used in combination with each other. Otherembodiments can be used, such as by one of ordinary skill in the artupon reviewing the above description. It is submitted with theunderstanding that it will not be used to interpret or limit the scopeor meaning of the claims. Also, in the above Detailed Description,various features may be grouped together to streamline the disclosure.This should not be interpreted as intending that an unclaimed disclosedfeature is essential to any claim. Rather, inventive subject matter maylie in less than all features of a particular disclosed embodiment.Thus, the following claims are hereby incorporated into the DetailedDescription, with each claim standing on its own as a separateembodiment, and it is contemplated that such embodiments can be combinedwith each other in various combinations or permutations. The scope ofthe invention should be determined with reference to the appendedclaims, along with the full scope of equivalents to which such claimsare entitled.

1. A method comprising: receiving a memory operation request from a hostat a non-volatile memory, the memory operation request including alogical block address (LBA) associated with the host and a physicaladdress associated with the non-volatile memory; determining a correctphysical address associated with the LBA using an address mapping storedon the non-volatile memory; comparing the correct physical address withthe physical address received from the host; when the correct physicaladdress is different than the physical address received from the host,incrementing a first counter at the non-volatile memory; comparing thefirst counter to a threshold value; and when the first counter is at orover the threshold value, providing a refreshed address mapping table tothe host.
 2. The method of claim 1, wherein the providing a refreshedaddress mapping table to the host includes sending a mapping table chunkincluding the LBA from the non-volatile memory to the host.
 3. Themethod of claim 1, wherein the memory operation request is a memory readrequest.
 4. The method of claim 1, wherein the memory operation requestis a memory write request.
 5. The method of claim 1, including resettingthe first counter after a predetermined amount of time to avoidrefreshing the host for seldom encountered discrepancies.
 6. The methodof claim 1, including using a mathematical operation on the LBA todetermine the first counter is associated with the LBA, wherein aquotient of a result of the mathematical operation is an index to thefirst counter.
 7. The method of claim 1, wherein incrementing the firstcounter includes assigning the first counter with a range of LBAs andstoring the range of LBAs assigned to the first counter in a counterassignment table on the non-volatile memory.
 8. The method of claim 7,including: receiving a second memory operation request from the host atthe non-volatile memory, the second memory operation request including asecond logical block address (LBA) associated with the host and a secondphysical address associated with the non-volatile memory; determining asecond correct physical address associated with the second LBA using theaddress mapping table stored on the non-volatile memory; comparing thesecond correct physical address with the second physical addressreceived from the host; when the second correct physical address isdifferent than the second physical address received from the host: usinga modular mathematical operation on the second LBA to determine thefirst counter is associated with the second LBA; retrieving the range ofLBAs assigned to the first counter from the counter assignment table;comparing the second LBA with the range of LBAs assigned to the firstcounter; and if the second LBA is not within range of LBAs assigned tothe first counter: assigning the first counter with a second range ofLBAs and storing the second range of LBAs assigned to the first counterin the counter assignment table; and resetting the first counter.
 9. Themethod of claim 8, if the second LBA is within the range of LBAsassigned to the first counter, incrementing the first counter.
 10. Themethod of claim 7, including: receiving a second memory operationrequest from the host at the non-volatile memory, the second memoryoperation request including a second logical block address (LBA)associated with the host and a second physical address associated withthe non-volatile memory; determining a second correct physical addressassociated with the second LBA using the address mapping table stored onthe non-volatile memory; comparing the second correct physical addresswith the second physical address received from the host; when the secondcorrect physical address is different than the second physical addressreceived from the host: using a modular mathematical operation on thesecond LBA to determine the first counter is associated with the secondLBA; retrieving the range of LBAs assigned to the first counter from thecounter assignment table; comparing the second LBA with the range ofLBAs assigned to the first counter; and if the second LBA is not withinthe range of LBAs assigned to the first counter: assigning a secondcounter with a second range of LBAs and storing the second range of LBAsassigned to the second counter in the counter assignment table, whereinthe second range of LBAs includes the second LBA; and resetting thesecond counter.
 11. The method of claim 10, including: determining thesecond LBA is within the range of LBAs assigned to the first counter;and incrementing the first counter.
 12. A memory device comprising: acache configured to hold a portion of a mapping table of the memorydevice; flash memory configured to store and retrieve user data of ahost, and to store the mapping table of the memory device; and acontroller configured to: receive a memory operation request from ahost, the memory operation request including a logical block address(LBA) associated with the host and a physical address associated withthe flash memory; determine a correct physical address associated withthe LBA using the mapping table; compare the correct physical addresswith the physical address received from the host; when the correctphysical address is different than the physical address received fromthe host, incrementing a counter of the memory device; comparing thecounter to a threshold value; and when the counter satisfies thethreshold value, providing a refreshed portion of the mapping table tothe host.
 13. The memory device of claim 12, wherein the refreshedportion of the mapping table includes a chunk of the mapping tableincluding the LBA and the correct physical address.
 14. The memorydevice of claim 12, wherein the controller is further configured toassign the counter with a range of LBAs and store the range of LBAsassigned to the counter in a counter assignment table on the memorydevice.
 15. The memory device of claim 14, wherein the controller isfurther configured to: receive a second memory operation request fromthe host, the second memory operation request including a second LBAassociated with the host and a second physical address associated withthe flash memory; determine a second correct physical address associatedwith the second LBA using the mapping table of the flash memory; comparethe second correct physical address with the second physical addressreceived from the host; when the second correct physical address isdifferent than the second physical address received from the host:execute a mathematical operation on the second LBA to determine a secondcounter associated with the second LBA; retrieve the range of LBAsassigned to the second counter from the counter assignment table;compare the second LBA with the range of LBA assigned to the counter; ifthe second LBA is not within the range of LBAs assigned to the secondcounter: assign the second counter with a second range of LBAs and storethe second range of LBAs assigned to the second counter in the counterassignment table; and reset the second counter.
 16. The memory device ofclaim 15, if the second LBA is within the range of LBAs assigned to thesecond counter, the controller is configured to increment the secondcounter.
 17. The memory device of claim 15, wherein a quotient of themathematical operation is an index to the second counter.
 18. The memorydevice of claim 12, wherein the memory operation request is a memoryread request.
 19. The memory device of claim 12, wherein the memoryoperation request is a memory write request.
 20. The memory device ofclaim 12, wherein the counter is reset after a predetermined amount oftime independent of a value of the counter to avoid refreshing the hostfor seldom encountered discrepancies.