WO2007076518A9 - Generation and use of system level defect tables for main memory - Google Patents
Generation and use of system level defect tables for main memoryInfo
- Publication number
- WO2007076518A9 WO2007076518A9 PCT/US2006/062644 US2006062644W WO2007076518A9 WO 2007076518 A9 WO2007076518 A9 WO 2007076518A9 US 2006062644 W US2006062644 W US 2006062644W WO 2007076518 A9 WO2007076518 A9 WO 2007076518A9
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- memory
- locations
- defective
- defect tables
- memory locations
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02P—CONTROL OR REGULATION OF ELECTRIC MOTORS, ELECTRIC GENERATORS OR DYNAMO-ELECTRIC CONVERTERS; CONTROLLING TRANSFORMERS, REACTORS OR CHOKE COILS
- H02P7/00—Arrangements for regulating or controlling the speed or torque of electric DC motors
- H02P7/06—Arrangements for regulating or controlling the speed or torque of electric DC motors for regulating or controlling an individual dc dynamo-electric motor by varying field or armature current
- H02P7/18—Arrangements for regulating or controlling the speed or torque of electric DC motors for regulating or controlling an individual dc dynamo-electric motor by varying field or armature current by master control with auxiliary power
- H02P7/24—Arrangements for regulating or controlling the speed or torque of electric DC motors for regulating or controlling an individual dc dynamo-electric motor by varying field or armature current by master control with auxiliary power using discharge tubes or semiconductor devices
- H02P7/28—Arrangements for regulating or controlling the speed or torque of electric DC motors for regulating or controlling an individual dc dynamo-electric motor by varying field or armature current by master control with auxiliary power using discharge tubes or semiconductor devices using semiconductor devices
- H02P7/281—Arrangements for regulating or controlling the speed or torque of electric DC motors for regulating or controlling an individual dc dynamo-electric motor by varying field or armature current by master control with auxiliary power using discharge tubes or semiconductor devices using semiconductor devices the DC motor being operated in four quadrants
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C29/44—Indication or identification of errors, e.g. for repair
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/70—Masking faults in memories by using spares or by reconfiguring
- G11C29/88—Masking faults in memories by using spares or by reconfiguring with partially good memories
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C2029/1208—Error catch memory
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C5/00—Details of stores covered by group G11C11/00
- G11C5/02—Disposition of storage elements, e.g. in the form of a matrix array
- G11C5/04—Supports for storage elements, e.g. memory modules; Mounting or fixing of storage elements on such supports
Definitions
- Embodiments of the present invention generally relate to techniques for increasing the overall reliability of memory systems that utilize modular memory modules.
- Computer system performance can be increased by increasing computing power, for example, by utilizing more powerful processors or a larger number of processors to form a multi-processor system. It is well established, however, that increasing memory in computing systems can often have a greater effect on overall system performance than increasing computing power. This result holds true from personal computers (PCs) to massively parallel supercomputers.
- PCs personal computers
- High performance computing platforms such as the Altix systems available from Silicon Graphics, Inc. may include several tera-bytes (TBs) of memory.
- TBs tera-bytes
- such configurations may include many thousands of modular memory modules, such as dual inline memory modules (DIMMs).
- DIMMs dual inline memory modules
- factory testing at the device (IC) level can catch many defects and, in some cases, replace defective cells with redundant cells (e.g., via fusing), some defects may develop over time after factory testing.
- a costly solution to increase fault tolerance is through redundancy.
- some systems may utilize some type of system memory mirroring whereby the same data is stored in multiple "mirrored" memory devices.
- this solution can be cost prohibitive, particularly as the overall memory space increases.
- Another alternative is to simply avoid allocating an entire defective device or DIMM from allocation.
- this approach may significantly impact performance by reducing the available memory by an entire device or DIMM, regardless of the amount of memory locations found to be defective.
- Embodiments of the present invention provide techniques for increasing the overall reliability of memory systems that utilize modular memory modules.
- One embodiment provides a method for maintaining and utilizing memory defect tables in a computing system.
- the memory defect tables may store entries indicating defective memory locations of memory modules (such as DIMMs) which may then, at the system level, be mapped to non-defective memory locations.
- the memory defect tables may be maintained across reset (e.g., power-up) cycles of the computing system.
- Another embodiment provides a computing system configured to maintain and utilize memory defect tables.
- the memory defect tables may store entries indicating defective memory locations of memory modules (such as DIMMs) which may then, at the system level, be mapped to non-defective memory locations.
- the memory defect tables may be maintained across reset cycles of the computing system.
- Another embodiment provides a computer readable medium containing a program which, when executed by a processor of a computing system, performs operations to maintain and utilizes memory defect tables.
- the operations may include detecting defective memory locations of memory modules and storing entries in the defect tables indicating the defective memory locations.
- the operations may also include mapping the defective memory locations to non- defective memory locations.
- the operations may also include accessing the memory defect tables upon power up, or other reset, and allocating memory to avoid defective locations identified in the tables.
- Another embodiment provides a memory module comprising a plurality of volatile memory devices and at least one non-volatile memory device.
- a defect table identifying defective locations within the volatile memory devices is contained in the non-volatile memory device.
- the non-volatile memory device may also include information for mapping the defective memory locations to non-defective memory locations.
- FIG. 1 illustrates an exemplary system in which embodiments of the present invention may be utilized.
- FIG. 2 illustrates an exemplary logical arrangement in accordance with embodiments of the present invention.
- FIGs. 3A-3B illustrate exemplary operations for maintaining and utilizing a system memory defect table, in accordance with one embodiment of the present invention.
- FIG. 4 illustrates exemplary operations for identifying defective memory locations, in accordance with one embodiment of the present invention.
- FIG. 5 illustrates an exemplary memory module, in accordance with another embodiment of the present invention.
- Embodiments of the present invention generally provide methods and apparatus for maintaining and utilizing system memory defect tables that store information identifying defective memory locations in memory modules.
- the defect tables may be utilized to identify and re-map defective memory locations to non-defective replacement (spare) memory locations as an alternative to replacing an entire memory module.
- some portion of the overall capacity of the memory module may be allocated for such replacement.
- memory modules may be made more fault-tolerant and systems more reliable. Further, this increased fault-tolerance may significantly reduce service requirements (e.g., repair/replacement) and overall operating cost to the owner and/or vendor.
- DIMMs dual inline memory modules
- embodiments of the invention may also be used to advantage to identify defective memory locations in any other type of memory module or arrangement of memory devices, including cache memory structures.
- reference to DIMMs should be understood as a particular, but not limiting, example of a type of memory module.
- FIG. 1 illustrates an exemplary computing system 100 including one or more processors 110 coupled to a memory system 120 via an interface 122. While not shown, the system 100 may also include any other suitable components, such as graphics processor units (GPUs), network interface modules, or any other type of input/output (I/O) interface.
- the interface 122 may include any suitable type of bus (e.g., a front side bus) and corresponding components to allow the processors 110 to communicate with the memory system 120 and with each other.
- the memory system 120 may include a plurality of memory modules, illustratively shown as DIMMs 130.
- DIMMs 130 may grow quite large, for example, into the thousands for large scale memory systems of several terabytes (TBs).
- Each DIMM 130 may include a plurality of volatile memory devices, illustratively shown as dynamic random access memory (DRAM) devices 132.
- DRAM dynamic random access memory
- one or more memory defect tables 150 may be maintained to store defective memory locations. For some embodiments, identification of a defective block or page within a particular DIMM and/or DRAM device 132 may be stored (e.g., regardless of the number of bits that failed). Contents of the defect tables 150 may be maintained across reset cycles, for example, by storing the defect tables 150 in non-volatile memory. As will be described in greater detail below, for some embodiments, defect tables 150 may be stored on the DIMMs, for example in non-volatile memory, such as EEPROMs 134, allowing defect information to travel with the DIMMs.
- non-volatile memory such as EEPROMs 134
- Defects may be detected via any suitable means, including conventional error checking algorithms utilizing checksums, error correction codes (ECC) bits, and the like. Regardless, upon detection of a defective memory location, an entry may be made in the defect table 150 and the defective memory location may be remapped to a different (non-defective) location.
- system level software such as a process 142 running as part of an operating system (O/S) 140 may detect defective memory locations, maintain, and/or utilize the defect table 150, by performing operations described herein.
- a predetermined amount of memory locations in the DIMM may be allocated and used to replace defective memory locations when detected. In some cases, replacement may be allowed in specified minimal sizes. For example, for some embodiments, entire pages of memory may need to be replaced, regardless of the number of bits found to be defective in that page.
- some number of spare pages may be allocated and used for replacement by remapping defective memory locations.
- the total usable capacity may be 1GB - n * page_size.
- the reduction in usable capacity may be acceptable given the offsetting benefit in increased fault tolerance and reduced service/repair.
- some portion of memory is dedicated to overhead, such as maintaining cache coherency, such that a relatively small (e.g., 1 -2%) reduction in overall usable capacity would be transparent to the user.
- a single defect table 150 may be used to store defective locations for multiple DIMMs 130.
- a different defect table 150 may be maintained for each DIMM 130.
- processors and memory may be logically partitioned into a plurality of nodes 210 (as shown 210 0 -210 M ).
- Each node 210 may include one or more processors 110 that access DIMMs 130 via an interface hub (SHUB 220).
- the collective memory of each node 210 may be considered shared memory and accessible by processors 110 on each node.
- each node 210 may maintain one or more defect tables 150 to store information regarding defective memory locations for their respective DIMMs 130.
- FIG. 3A illustrates exemplary operations for maintaining system memory defect table, in accordance with one embodiment of the present invention.
- the operations may be performed, for example, as operating system code, or application code.
- the operations begin, at step 302, by detecting defective memory locations.
- the defective memory locations are stored in the memory defect table 150, which may be maintained across reset cycles. These defective memory locations may be subsequently avoided, for example, by mapping the defective locations to spare (non-defective) locations, at step 306.
- the defect table 150 may include entries that include a defective location and a corresponding replacement location.
- the defective location may be identified by page, DIMM, and/or device.
- the replacement location to which the defective location is mapped
- page, DIMM, and/or device may be identified by page, DIMM, and/or device.
- the defect table 150 may be utilized upon a subsequent reset to avoid allocating defective memory locations. For example, upon a subsequent reset, at step 308, defective memory locations may be read from the defect memory table 150, at step 310. These memory locations may be avoided during allocation, at step 312, for example, by mapping the defective locations to replacement locations, which may also identified in the defect table 150.
- Defective memory locations may be mapped to replacement memory locations, for example, by manipulating virtual-to-physical address translation.
- page table entries may be generated that translate internal virtual addresses to the physical addresses of the replacement memory locations rather than the defective memory locations.
- defective memory locations on one DIMM may be replaced by replacement memory locations on another DIMM.
- an entire DIMM may be effectively removed (e.g., by de-allocation) if the total number of defective locations exceeds some threshold number or percentage. In other words, the occurrence of a certain number of defective locations may be a good predictor of pending device failure.
- defective locations of DRAM devices 432 may be stored on a DIMM 430.
- one or more defect tables 450 may be stored in non-volatile memory, such as a EEPROM 434.
- DIMMs typically contain a EEPROM to comply with the JEDEC Serial Present Detect (SPD) standard. According to this standard, DIMM manufactures may store necessary operating parameters (e.g., describing the DRAM devices, operating parameters, etc.), for use by the OS during system reset in configuring memory controllers. If the size of these EEPROMs were sufficient, defect tables 450 could be stored with this SPD data. In fact, it may be beneficial that the storage and use of such defect tables may be incorporated into such a standard.
- SPD Serial Present Detect
- FIG. 4 illustrates a technique whereby extended refresh cycles may be utilized for identifying weak DRAM memory cells. Such operations may be performed periodically, or upon reset, as part of an initialization procedure by the operating system. For some embodiments, to prevent uncorrectable errors occurring during testing with extended refresh cycles, user data may be offloaded from a DIMM under test (e.g., to another DIMM or a disk drive). [0035] In any case, the operations may begin, for example, by setting an initial refresh rate, which may be the same as that typically utilized during normal operation.
- rows of memory cells may be refreshed automatically by issuing a refresh command.
- DRAM devices may internally increment a row address such that a new row (or set of rows in different banks) is refreshed with each issued command.
- the rate at which these commands are issued during normal operation is controlled to ensure each row is refreshed within a defined retention time specified by the device manufacturer.
- this rate may be incrementally decreased at step 504 (e.g., by increasing the interval between refresh commands) until each row is not refreshed within the specified retention time.
- memory locations exhibiting defects at the lower refresh rate are detected. This detection may be performed in any suitable manner, such as preloading the memory devices with known data, reading the data back, and comparing the data read to the known data. A mismatch indicated a memory cell that fails to maintain data at the lowered refresh rate. Such defective (marginal) memory locations may be stored in a defect table, at step 508.
- the operations may repeat, with successively reduced refresh rates, until the refresh rate reaches a predetermined minimum amount (which may be well below the device specified operating range), as determined at step 510.
- a predetermined minimum amount which may be well below the device specified operating range
- memory defect tables may be populated with both marginal locations detected during testing with extended refresh periods and defective locations detected during normal operation.
Abstract
Methods and apparatus for maintaining and utilizing system memory defect tables that store information identifying defective memory locations in memory modules. For some embodiments, the defect tables may be utilized to identify and re-map defective memory locations to non-defective replacement (spare) memory locations as an alternative to replacing an entire memory module. For some embodiments, some portion of the overall capacity of the memory module may be allocated for such replacement.
Description
GENERATION AND USE OF SYSTEM LEVEL DEFECT TABLES FOR MAIN MEMORY
BACKGROUND OF THE INVENTION Field of the Invention
[0001] Embodiments of the present invention generally relate to techniques for increasing the overall reliability of memory systems that utilize modular memory modules.
Description of the Related Art
[0002] Computer system performance can be increased by increasing computing power, for example, by utilizing more powerful processors or a larger number of processors to form a multi-processor system. It is well established, however, that increasing memory in computing systems can often have a greater effect on overall system performance than increasing computing power. This result holds true from personal computers (PCs) to massively parallel supercomputers.
[0003] High performance computing platforms, such as the Altix systems available from Silicon Graphics, Inc. may include several tera-bytes (TBs) of memory. To provide such a large amount of memory, such configurations may include many thousands of modular memory modules, such as dual inline memory modules (DIMMs). Unfortunately, with such a large number of modules in use (each having a number of memory chips), at least some amount of memory failures can be expected. While factory testing at the device (IC) level can catch many defects and, in some cases, replace defective cells with redundant cells (e.g., via fusing), some defects may develop over time after factory testing.
[0004] In conventional systems, a zero defect tolerance is typically employed. If a memory failure is detected, the entire module will be replaced, even if the failure is limited to a relatively small portion of the module. Replacing modules in this manner is inefficient in a number of ways, in addition to the possible interruption of computing and loss of data. On the one hand, the replacement may be performed by repair personnel of the system vendor at substantial cost to the vendor. On the
other hand, the replacement may be performed by dedicated personnel of the customer, at substantial cost to the customer.
[0005] A costly solution to increase fault tolerance is through redundancy. For example, some systems may utilize some type of system memory mirroring whereby the same data is stored in multiple "mirrored" memory devices. However, this solution can be cost prohibitive, particularly as the overall memory space increases. Another alternative is to simply avoid allocating an entire defective device or DIMM from allocation. However, this approach may significantly impact performance by reducing the available memory by an entire device or DIMM, regardless of the amount of memory locations found to be defective.
[0006] Accordingly, what is needed is a technique to increase the overall reliability of memory systems that utilize modular memory modules.
SUMMARY OF THE INVENTION
[0007] Embodiments of the present invention provide techniques for increasing the overall reliability of memory systems that utilize modular memory modules.
[0008] One embodiment provides a method for maintaining and utilizing memory defect tables in a computing system. The memory defect tables may store entries indicating defective memory locations of memory modules (such as DIMMs) which may then, at the system level, be mapped to non-defective memory locations. The memory defect tables may be maintained across reset (e.g., power-up) cycles of the computing system.
[0009] Another embodiment provides a computing system configured to maintain and utilize memory defect tables. The memory defect tables may store entries indicating defective memory locations of memory modules (such as DIMMs) which may then, at the system level, be mapped to non-defective memory locations. The memory defect tables may be maintained across reset cycles of the computing system.
[0010] Another embodiment provides a computer readable medium containing a program which, when executed by a processor of a computing system, performs operations to maintain and utilizes memory defect tables. The operations may include detecting defective memory locations of memory modules and storing entries in the defect tables indicating the defective memory locations. The operations may also include mapping the defective memory locations to non- defective memory locations. The operations may also include accessing the memory defect tables upon power up, or other reset, and allocating memory to avoid defective locations identified in the tables.
[0011] Another embodiment provides a memory module comprising a plurality of volatile memory devices and at least one non-volatile memory device. A defect table identifying defective locations within the volatile memory devices is contained in the non-volatile memory device. For some embodiments, the non-volatile memory device may also include information for mapping the defective memory locations to non-defective memory locations.
BRIEF DESCRIPTION OF THE DRAWINGS
[0012] So that the manner in which the above recited features of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, for the invention may admit to other equally effective embodiments.
[0013] FIG. 1 illustrates an exemplary system in which embodiments of the present invention may be utilized.
[0014] FIG. 2 illustrates an exemplary logical arrangement in accordance with embodiments of the present invention.
[0015] FIGs. 3A-3B illustrate exemplary operations for maintaining and utilizing a system memory defect table, in accordance with one embodiment of the present invention.
[0016] FIG. 4 illustrates exemplary operations for identifying defective memory locations, in accordance with one embodiment of the present invention.
[0017] FIG. 5 illustrates an exemplary memory module, in accordance with another embodiment of the present invention.
DETAILED DESCRIPTION
[0018] Embodiments of the present invention generally provide methods and apparatus for maintaining and utilizing system memory defect tables that store information identifying defective memory locations in memory modules. For some embodiments, the defect tables may be utilized to identify and re-map defective memory locations to non-defective replacement (spare) memory locations as an alternative to replacing an entire memory module. For some embodiments, some portion of the overall capacity of the memory module may be allocated for such replacement. As a result, memory modules may be made more fault-tolerant and systems more reliable. Further, this increased fault-tolerance may significantly reduce service requirements (e.g., repair/replacement) and overall operating cost to the owner and/or vendor.
[0019] Embodiments of the present invention will be described below with reference to defect table to identify defective memory locations in dual inline memory modules (DIMMs). However, those skilled in the art will recognize that embodiments of the invention may also be used to advantage to identify defective memory locations in any other type of memory module or arrangement of memory devices, including cache memory structures. Thus, reference to DIMMs should be understood as a particular, but not limiting, example of a type of memory module.
[0020] Further, while embodiments will be described with reference to operations performed by executing code (e.g., by a processor or CPU), it may also be possible to perform similar operations with dedicated or modified hardware. Further, those
skilled in the art will recognize that the techniques described herein may be used to advantage in any type of system in which multiple memory devices are utilized.
AN EXEMPLARY SYSTEM
[0021] FIG. 1 illustrates an exemplary computing system 100 including one or more processors 110 coupled to a memory system 120 via an interface 122. While not shown, the system 100 may also include any other suitable components, such as graphics processor units (GPUs), network interface modules, or any other type of input/output (I/O) interface. The interface 122 may include any suitable type of bus (e.g., a front side bus) and corresponding components to allow the processors 110 to communicate with the memory system 120 and with each other.
[0022] As illustrated, the memory system 120 may include a plurality of memory modules, illustratively shown as DIMMs 130. As previously described, the number of DIMMs 130 may grow quite large, for example, into the thousands for large scale memory systems of several terabytes (TBs). Each DIMM 130 may include a plurality of volatile memory devices, illustratively shown as dynamic random access memory (DRAM) devices 132. As previously described, as the number of DIMMs 130 increases, thereby increasing the number of DRAM devices 132, the likelihood of a defect developing in a memory location over time increases.
[0023] In an effort to monitor the defective memory locations, one or more memory defect tables 150 may be maintained to store defective memory locations. For some embodiments, identification of a defective block or page within a particular DIMM and/or DRAM device 132 may be stored (e.g., regardless of the number of bits that failed). Contents of the defect tables 150 may be maintained across reset cycles, for example, by storing the defect tables 150 in non-volatile memory. As will be described in greater detail below, for some embodiments, defect tables 150 may be stored on the DIMMs, for example in non-volatile memory, such as EEPROMs 134, allowing defect information to travel with the DIMMs.
[0024] Defects may be detected via any suitable means, including conventional error checking algorithms utilizing checksums, error correction codes (ECC) bits,
and the like. Regardless, upon detection of a defective memory location, an entry may be made in the defect table 150 and the defective memory location may be remapped to a different (non-defective) location. In some cases, system level software, such as a process 142 running as part of an operating system (O/S) 140 may detect defective memory locations, maintain, and/or utilize the defect table 150, by performing operations described herein.
[0025] For some embodiments, a predetermined amount of memory locations in the DIMM may be allocated and used to replace defective memory locations when detected. In some cases, replacement may be allowed in specified minimal sizes. For example, for some embodiments, entire pages of memory may need to be replaced, regardless of the number of bits found to be defective in that page.
[0026] For some embodiments, some number of spare pages may be allocated and used for replacement by remapping defective memory locations. As an example, for a DIMM with 1 GB total capacity, if n pages were allocated for replacement, the total usable capacity may be 1GB - n*page_size. The reduction in usable capacity may be acceptable given the offsetting benefit in increased fault tolerance and reduced service/repair. Further, in certain systems, such as cache- coherent non-uniform memory access (ccNUMA) systems, some portion of memory is dedicated to overhead, such as maintaining cache coherency, such that a relatively small (e.g., 1 -2%) reduction in overall usable capacity would be transparent to the user.
[0027] For some embodiments, a single defect table 150 may be used to store defective locations for multiple DIMMs 130. For other embodiments, a different defect table 150 may be maintained for each DIMM 130. As illustrated in FIG. 2, for some embodiments, processors and memory may be logically partitioned into a plurality of nodes 210 (as shown 2100-210M). Each node 210 may include one or more processors 110 that access DIMMs 130 via an interface hub (SHUB 220). As illustrated, the collective memory of each node 210 may be considered shared memory and accessible by processors 110 on each node. As illustrated, in such configurations, each node 210 may maintain one or more defect tables 150 to store information regarding defective memory locations for their respective DIMMs 130.
EXEMPLARY OPERATIONS
[0028] FIG. 3A illustrates exemplary operations for maintaining system memory defect table, in accordance with one embodiment of the present invention. The operations may be performed, for example, as operating system code, or application code. The operations begin, at step 302, by detecting defective memory locations. At step 304, the defective memory locations are stored in the memory defect table 150, which may be maintained across reset cycles. These defective memory locations may be subsequently avoided, for example, by mapping the defective locations to spare (non-defective) locations, at step 306.
[0029] As illustrated, for some embodiments, the defect table 150 may include entries that include a defective location and a corresponding replacement location. For example, the defective location may be identified by page, DIMM, and/or device. Similarly, the replacement location (to which the defective location is mapped) may be identified by page, DIMM, and/or device.
[0030] Referring to FIG. 3B, by maintaining the defect table 150 across reset cycles, the defect table 150 may be utilized upon a subsequent reset to avoid allocating defective memory locations. For example, upon a subsequent reset, at step 308, defective memory locations may be read from the defect memory table 150, at step 310. These memory locations may be avoided during allocation, at step 312, for example, by mapping the defective locations to replacement locations, which may also identified in the defect table 150.
[0031] Defective memory locations may be mapped to replacement memory locations, for example, by manipulating virtual-to-physical address translation. For some embodiments, page table entries may be generated that translate internal virtual addresses to the physical addresses of the replacement memory locations rather than the defective memory locations. For some embodiments, defective memory locations on one DIMM may be replaced by replacement memory locations on another DIMM.
[0032] In any case, by avoiding the allocation of defective memory locations, it may be possible to avoid replacing entire DIMMs 130 and replace defective memory locations in a manner that is transparent to a user. As a result, a much greater utilization of memory resources may be achieved, particularly if only a small percentage of memory locations exhibit defects (e.g., some limited number of pages encounter defective cells). For some embodiments, however, an entire DIMM may be effectively removed (e.g., by de-allocation) if the total number of defective locations exceeds some threshold number or percentage. In other words, the occurrence of a certain number of defective locations may be a good predictor of pending device failure.
[0033] As illustrated in FIG. 4, for some embodiments, defective locations of DRAM devices 432 may be stored on a DIMM 430. For example, one or more defect tables 450 may be stored in non-volatile memory, such as a EEPROM 434. DIMMs typically contain a EEPROM to comply with the JEDEC Serial Present Detect (SPD) standard. According to this standard, DIMM manufactures may store necessary operating parameters (e.g., describing the DRAM devices, operating parameters, etc.), for use by the OS during system reset in configuring memory controllers. If the size of these EEPROMs were sufficient, defect tables 450 could be stored with this SPD data. In fact, it may be beneficial that the storage and use of such defect tables may be incorporated into such a standard.
MARGIN TESTING USING EXTENDED REFRESH CYCLES
[0034] Further, in some cases, some memory cells may be more prone to failure, for example, due to marginal storage capacitance in DRAM cells. For some embodiments, such marginal locations may be proactively detected to avoid errors and increase reliability. As an example, FIG. 4 illustrates a technique whereby extended refresh cycles may be utilized for identifying weak DRAM memory cells. Such operations may be performed periodically, or upon reset, as part of an initialization procedure by the operating system. For some embodiments, to prevent uncorrectable errors occurring during testing with extended refresh cycles, user data may be offloaded from a DIMM under test (e.g., to another DIMM or a disk drive).
[0035] In any case, the operations may begin, for example, by setting an initial refresh rate, which may be the same as that typically utilized during normal operation. As is well known, rows of memory cells may be refreshed automatically by issuing a refresh command. DRAM devices may internally increment a row address such that a new row (or set of rows in different banks) is refreshed with each issued command. The rate at which these commands are issued during normal operation is controlled to ensure each row is refreshed within a defined retention time specified by the device manufacturer.
[0036] However, to test for marginal cells, this rate may be incrementally decreased at step 504 (e.g., by increasing the interval between refresh commands) until each row is not refreshed within the specified retention time. At step 506, memory locations exhibiting defects at the lower refresh rate are detected. This detection may be performed in any suitable manner, such as preloading the memory devices with known data, reading the data back, and comparing the data read to the known data. A mismatch indicated a memory cell that fails to maintain data at the lowered refresh rate. Such defective (marginal) memory locations may be stored in a defect table, at step 508.
[0037] As illustrated, the operations may repeat, with successively reduced refresh rates, until the refresh rate reaches a predetermined minimum amount (which may be well below the device specified operating range), as determined at step 510. By storing these defective locations in the defect table, these locations may be avoided during allocation, as described above. For some embodiments, memory defect tables may be populated with both marginal locations detected during testing with extended refresh periods and defective locations detected during normal operation.
CONCLUSION
[0038] By generating and maintaining system memory defect tables memory module reliability may be significantly increased. As a result, the number of service/repair operations and overall operating costs of systems utilizing memory modules may be reduced accordingly.
[0039] While the foregoing is directed to embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims that follow.
Claims
1. A method for accessing system memory having one or more memory modules, comprising: detecting defective memory locations of the memory modules; and storing information identifying the defective memory locations in one or more system memory defect tables.
2. The method of claim 1 , further comprising mapping the defective memory locations identified in the system memory defect tables to replacement memory locations.
3. The method of claim 1 , further comprising maintaining the information in the system memory defect tables across reset cycles.
4. The method of claim 3, wherein maintaining the information in the system memory defect tables across reset cycles comprises storing the system memory defect tables in non-volatile memory.
5. The method of claim 4, wherein storing the storing the system memory defect tables in non-volatile memory comprises storing the system memory defect tables in non-volatile memory located on the memory modules.
6. The method of claim 1 , wherein the storing and mapping are performed by operating system code.
7. The method of claim 1 , further comprising, avoiding use of a memory module if the total number of defective locations detected thereon exceeds a predetermined threshold amount.
8. A method for identifying marginal dynamic memory cells in one or more memory modules of system memory, comprising: a) reducing a refresh rate for refreshing rows of memory cells in the memory cells; b) detecting memory locations of the memory modules having memory cells that fail to maintain data at a reduced refresh rate; and c) storing information identifying the marginal memory locations in one or more system memory defect tables.
9. The method of claim 8, comprising: repeating the operations of a) and b) to incrementally reduce the refresh rate and detecting marginal memory locations at incrementally reduced refresh rates.
10. The method of claim 8, wherein reducing the refresh rate comprises reducing the refresh rate to a level below an operational refresh rate specified by a manufacturer of the memory modules.
11. The method of claim 8, further comprising: d) mapping marginal memory locations to replacement memory locations.
12. The method of claim 11 , wherein the operations a)-d) are performed by an operating system after a system reset.
13. The method of claim 8, further comprising maintaining information in the system memory defect tables across reset cycles.
14. A system, comprising: one or more processing devices; system memory addressable by the processing devices, the system memory including one or more memory modules; one or more system memory defect tables; and a component executable by one or more of the processing devices to detect defective memory locations of the memory modules, store information identifying the defective memory locations in one or more system memory defect tables, and map the defective memory locations identified in the system memory defect tables to replacement memory locations.
15. The system of claim 14, wherein information in the system memory defect tables is maintained across reset cycles of the system.
16. The system of claim 14, wherein the system memory defect tables are stored in non-volatile memory.
17. The system of claim 16, wherein the system memory defect tables are stored in non-volatile memory located on the memory modules.
18. The system of claim 17, wherein the system memory defect tables are stored in non-volatile memory located on the memory modules that are also used for serial presence detect (SPD) purposes.
19. The system of claim 14, wherein the component is configured to map the defective memory locations identified in the system memory defect tables to replacement memory locations by generating page table entries that map virtual addresses to physical addresses of the replacement memory locations.
20. The system of claim 14, wherein the component is configured to map defective memory locations of one memory module to replacement memory locations of another memory module.
21. The system of claim 14, wherein the component is configured to identify memory locations as defective by reducing a refresh rate of the memory modules and storing information identifying defective memory locations having cells unable to maintain data at reduced refresh rates in the system memory defect tables.
22. A memory module, comprising: a plurality of volatile random access memory (RAM) devices; and at least one non-volatile memory device for storing a defect table identifying defective storage locations of the RAM devices.
23. The memory module of claim 22, wherein a portion of the memory locations of the RAM devices is allocated as replacement memory locations.
24. The memory module of claim 23, wherein the defect table identifies replacement memory locations to be used to replace defective memory locations.
25. The memory module of claim 22, wherein the non-volatile memory device is also for storing serial presence detect (SPD) data.
26. The memory module of claim 22, wherein the memory module is a dual inline memory module (DIMM).
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/323,029 | 2005-12-30 | ||
US11/323,029 US7478285B2 (en) | 2005-12-30 | 2005-12-30 | Generation and use of system level defect tables for main memory |
Publications (3)
Publication Number | Publication Date |
---|---|
WO2007076518A2 WO2007076518A2 (en) | 2007-07-05 |
WO2007076518A9 true WO2007076518A9 (en) | 2008-03-13 |
WO2007076518A3 WO2007076518A3 (en) | 2008-09-04 |
Family
ID=38287038
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2006/062644 WO2007076518A2 (en) | 2005-12-30 | 2006-12-28 | Generation and use of system level defect tables for main memory |
Country Status (2)
Country | Link |
---|---|
US (1) | US7478285B2 (en) |
WO (1) | WO2007076518A2 (en) |
Families Citing this family (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7099221B2 (en) * | 2004-05-06 | 2006-08-29 | Micron Technology, Inc. | Memory controller method and system compensating for memory cell data losses |
US7116602B2 (en) * | 2004-07-15 | 2006-10-03 | Micron Technology, Inc. | Method and system for controlling refresh to avoid memory cell data losses |
US7380161B2 (en) * | 2005-02-11 | 2008-05-27 | International Business Machines Corporation | Switching a defective signal line with a spare signal line without shutting down the computer system |
KR100703969B1 (en) * | 2005-04-07 | 2007-04-06 | 삼성전자주식회사 | Apparatus for testing memory module |
JP4328736B2 (en) * | 2005-04-22 | 2009-09-09 | エルピーダメモリ株式会社 | Computer system and memory defect relief method |
US20080229143A1 (en) * | 2006-09-21 | 2008-09-18 | Sony Computer Entertainment Inc. | Management of available circuits to repair defective circuits |
US7894289B2 (en) * | 2006-10-11 | 2011-02-22 | Micron Technology, Inc. | Memory system and method using partial ECC to achieve low power refresh and fast access to data |
US7900120B2 (en) * | 2006-10-18 | 2011-03-01 | Micron Technology, Inc. | Memory system and method using ECC with flag bit to identify modified data |
US7793175B1 (en) | 2007-01-10 | 2010-09-07 | Marvell International Ltd. | Automated scan testing of DDR SDRAM |
US7966518B2 (en) * | 2007-05-15 | 2011-06-21 | Sandisk Corporation | Method for repairing a neighborhood of rows in a memory array using a patch table |
US7958390B2 (en) * | 2007-05-15 | 2011-06-07 | Sandisk Corporation | Memory device for repairing a neighborhood of rows in a memory array using a patch table |
US7949913B2 (en) * | 2007-08-14 | 2011-05-24 | Dell Products L.P. | Method for creating a memory defect map and optimizing performance using the memory defect map |
US7694195B2 (en) * | 2007-08-14 | 2010-04-06 | Dell Products L.P. | System and method for using a memory mapping function to map memory defects |
US9373362B2 (en) * | 2007-08-14 | 2016-06-21 | Dell Products L.P. | System and method for implementing a memory defect map |
US7945815B2 (en) * | 2007-08-14 | 2011-05-17 | Dell Products L.P. | System and method for managing memory errors in an information handling system |
US7642105B2 (en) * | 2007-11-23 | 2010-01-05 | Kingston Technology Corp. | Manufacturing method for partially-good memory modules with defect table in EEPROM |
US20090150721A1 (en) * | 2007-12-10 | 2009-06-11 | International Business Machines Corporation | Utilizing A Potentially Unreliable Memory Module For Memory Mirroring In A Computing System |
US20090287957A1 (en) * | 2008-05-16 | 2009-11-19 | Christoph Bilger | Method for controlling a memory module and memory control unit |
US7773441B2 (en) * | 2008-06-18 | 2010-08-10 | Micron Technology, Inc. | Memory malfunction prediction system and method |
US8151138B2 (en) * | 2008-10-31 | 2012-04-03 | Dell Products L.P. | Redundant memory architecture management methods and systems |
CN102004701B (en) * | 2009-08-28 | 2013-01-09 | 炬才微电子(深圳)有限公司 | Method and device for distributing secondary memory |
IT1396864B1 (en) * | 2009-11-17 | 2012-12-20 | Magneti Marelli Spa | METHOD FOR OPERATING AN ELECTRONIC CONTROL UNIT DURING A CALIBRATION PHASE. |
CN102714061A (en) | 2009-11-20 | 2012-10-03 | 拉姆伯斯公司 | Bit-replacement technique for DRAM error correction |
US8140890B2 (en) * | 2009-12-29 | 2012-03-20 | International Business Machines Corporation | Relocating bad block relocation (BBR) directory upon encountering physical media defect on a disk |
US8724408B2 (en) * | 2011-11-29 | 2014-05-13 | Kingtiger Technology (Canada) Inc. | Systems and methods for testing and assembling memory modules |
KR101893895B1 (en) | 2011-12-16 | 2018-09-03 | 삼성전자주식회사 | Memory system, and method for controlling operation thereof |
KR20140007990A (en) | 2012-07-09 | 2014-01-21 | 삼성전자주식회사 | User device having non-volatile random access memory and data management method thererof |
US9411678B1 (en) | 2012-08-01 | 2016-08-09 | Rambus Inc. | DRAM retention monitoring method for dynamic error correction |
US9117552B2 (en) | 2012-08-28 | 2015-08-25 | Kingtiger Technology(Canada), Inc. | Systems and methods for testing memory |
WO2014074390A1 (en) | 2012-11-06 | 2014-05-15 | Rambus Inc. | Memory repair using external tags |
US9183081B2 (en) | 2013-03-12 | 2015-11-10 | Sandisk Technologies Inc. | Systems and methods for performing defect detection and data recovery in a memory system |
US10198358B2 (en) * | 2014-04-02 | 2019-02-05 | Advanced Micro Devices, Inc. | System and method of testing processor units using cache resident testing |
KR20160065468A (en) * | 2014-12-01 | 2016-06-09 | 삼성전자주식회사 | Method of operating solid state drive |
US10078567B2 (en) * | 2016-03-18 | 2018-09-18 | Alibaba Group Holding Limited | Implementing fault tolerance in computer system memory |
US10606513B2 (en) | 2017-12-06 | 2020-03-31 | Western Digital Technologies, Inc. | Volatility management for non-volatile memory device |
US11579770B2 (en) * | 2018-03-15 | 2023-02-14 | Western Digital Technologies, Inc. | Volatility management for memory device |
US11157319B2 (en) | 2018-06-06 | 2021-10-26 | Western Digital Technologies, Inc. | Processor with processor memory pairs for improved process switching and methods thereof |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6173382B1 (en) * | 1998-04-28 | 2001-01-09 | International Business Machines Corporation | Dynamic configuration of memory module using modified presence detect data |
US6496945B2 (en) * | 1998-06-04 | 2002-12-17 | Compaq Information Technologies Group, L.P. | Computer system implementing fault detection and isolation using unique identification codes stored in non-volatile memory |
DE10136544B4 (en) * | 2001-07-26 | 2004-02-12 | Infineon Technologies Ag | Integrated dynamic memory and operating procedures |
US6754117B2 (en) * | 2002-08-16 | 2004-06-22 | Micron Technology, Inc. | System and method for self-testing and repair of memory modules |
US7099221B2 (en) * | 2004-05-06 | 2006-08-29 | Micron Technology, Inc. | Memory controller method and system compensating for memory cell data losses |
US7444577B2 (en) * | 2005-08-04 | 2008-10-28 | Rambus Inc. | Memory device testing to support address-differentiated refresh rates |
-
2005
- 2005-12-30 US US11/323,029 patent/US7478285B2/en active Active
-
2006
- 2006-12-28 WO PCT/US2006/062644 patent/WO2007076518A2/en unknown
Also Published As
Publication number | Publication date |
---|---|
WO2007076518A3 (en) | 2008-09-04 |
US20070174718A1 (en) | 2007-07-26 |
WO2007076518A2 (en) | 2007-07-05 |
US7478285B2 (en) | 2009-01-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7478285B2 (en) | Generation and use of system level defect tables for main memory | |
US11276450B2 (en) | Refresh circuitry | |
US8099570B2 (en) | Methods, systems, and computer program products for dynamic selective memory mirroring | |
US7996710B2 (en) | Defect management for a semiconductor memory system | |
US7656727B2 (en) | Semiconductor memory device and system providing spare memory locations | |
US8601310B2 (en) | Partial memory mirroring and error containment | |
EP2026356B1 (en) | Method for creating a memory defect map and optimizing performance using the memory defect map | |
US8874979B2 (en) | Three dimensional(3D) memory device sparing | |
US20180217751A1 (en) | System and method for dynamic folding or direct write based on block health in a non-volatile memory system | |
CN112543909B (en) | Enhanced codewords for media persistence and diagnostics | |
US8990646B2 (en) | Memory error test routine | |
US20190034270A1 (en) | Memory system having an error correction function and operating method of memory module and memory controller | |
US20090187806A1 (en) | System and method for error detection in a redundant memory system | |
US20080270826A1 (en) | Redundant memory to mask dram failures | |
US7185246B2 (en) | Monitoring of solid state memory devices in active memory system utilizing redundant devices | |
US11182262B2 (en) | Efficient and selective sparing of bits in memory systems | |
EP3770764B1 (en) | Method of controlling repair of volatile memory device and storage device performing the same | |
CN113672430A (en) | System for running virtual machine, method, medium and storage device for operating the same | |
CN112447252A (en) | Method of controlling repair of volatile memory device and memory device | |
TWI514400B (en) | Repairing a memory device | |
US20240013851A1 (en) | Data line (dq) sparing with adaptive error correction coding (ecc) mode switching | |
CN110737539B (en) | Die level error recovery scheme | |
Singh et al. | Software based in-system memory test for highly available systems | |
US20220350715A1 (en) | Runtime sparing for uncorrectable errors based on fault-aware analysis | |
CN114783491A (en) | Memory controller, operating method thereof and memory system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: "NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC" EPO FORM 1205A DATED 23.10.2008 |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 06846830 Country of ref document: EP Kind code of ref document: A2 |