US20200395092A1 - Nand field use erase plus defect detections - Google Patents
Nand field use erase plus defect detections Download PDFInfo
- Publication number
- US20200395092A1 US20200395092A1 US16/440,212 US201916440212A US2020395092A1 US 20200395092 A1 US20200395092 A1 US 20200395092A1 US 201916440212 A US201916440212 A US 201916440212A US 2020395092 A1 US2020395092 A1 US 2020395092A1
- Authority
- US
- United States
- Prior art keywords
- memory
- defect detection
- defect
- detection operation
- controller
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000007547 defect Effects 0.000 title claims abstract description 258
- 238000001514 detection method Methods 0.000 title claims abstract description 128
- 230000015654 memory Effects 0.000 claims abstract description 405
- 238000000034 method Methods 0.000 claims abstract description 81
- 230000004044 response Effects 0.000 claims abstract description 26
- 238000004891 communication Methods 0.000 claims description 12
- 238000010586 diagram Methods 0.000 description 10
- 238000004519 manufacturing process Methods 0.000 description 10
- 239000012634 fragment Substances 0.000 description 8
- 239000010410 layer Substances 0.000 description 7
- 230000006870 function Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 239000000872 buffer Substances 0.000 description 3
- 238000007596 consolidation process Methods 0.000 description 3
- 230000002950 deficient Effects 0.000 description 3
- 238000005056 compaction Methods 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000012937 correction Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 238000007667 floating Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 239000003990 capacitor Substances 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 239000002356 single layer Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C29/38—Response verification devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/14—Handling requests for interconnection or transfer
- G06F13/16—Handling requests for interconnection or transfer for access to memory bus
- G06F13/1668—Details of memory controller
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C16/00—Erasable programmable read-only memories
- G11C16/02—Erasable programmable read-only memories electrically programmable
- G11C16/06—Auxiliary circuits, e.g. for writing into memory
- G11C16/10—Programming or data input circuits
- G11C16/14—Circuits for erasing electrically, e.g. erase voltage switching circuits
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C16/00—Erasable programmable read-only memories
- G11C16/02—Erasable programmable read-only memories electrically programmable
- G11C16/06—Auxiliary circuits, e.g. for writing into memory
- G11C16/10—Programming or data input circuits
- G11C16/14—Circuits for erasing electrically, e.g. erase voltage switching circuits
- G11C16/16—Circuits for erasing electrically, e.g. erase voltage switching circuits for erasing blocks, e.g. arrays, words, groups
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/02—Detection or location of defective auxiliary circuits, e.g. defective refresh counters
- G11C29/025—Detection or location of defective auxiliary circuits, e.g. defective refresh counters in signal lines
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C29/44—Indication or identification of errors, e.g. for repair
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C29/08—Functional testing, e.g. testing during refresh, power-on self testing [POST] or distributed testing
- G11C29/12—Built-in arrangements for testing, e.g. built-in self testing [BIST] or interconnection details
- G11C29/44—Indication or identification of errors, e.g. for repair
- G11C29/4401—Indication or identification of errors, e.g. for repair for self repair
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C16/00—Erasable programmable read-only memories
- G11C16/02—Erasable programmable read-only memories electrically programmable
- G11C16/04—Erasable programmable read-only memories electrically programmable using variable threshold transistors, e.g. FAMOS
- G11C16/0483—Erasable programmable read-only memories electrically programmable using variable threshold transistors, e.g. FAMOS comprising cells having several storage transistors connected in series
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C2029/0409—Online test
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C2029/0411—Online error correction
Definitions
- This disclosure relates to memory systems and in particular to systems and methods for NAND field use erase plus defect detections.
- Non-volatile memory systems are a type of memory that retains stored information without requiring an external power source.
- Non-volatile memory is widely used in various electronic devices and in stand-alone memory devices.
- non-volatile memory can be found in laptops, digital audio player, digital cameras, smart phones, video games, scientific instruments, industrial robots, medical electronics, solid-state drives, USB drives, memory cards, and the like.
- Non-volatile memory can be electronically programmed/reprogrammed and erased.
- such a memory system is tested for defects during production or manufacturing.
- the memory system may be tested in a production environment (e.g., in a manufacturing factory) of the memory system using various test modes.
- defects may occur in the memory system as the memory system is used in a customer or user environment.
- systems and methods for detecting defects in such an environment may be difficult and may be limited to detecting defects associated with strong shorts in the memory system.
- This disclosure relates generally to memory management systems and methods.
- An aspect of the disclosed embodiments is a method for detecting defects in a memory system.
- the method includes receiving a command to perform a standard erase operation on at least one memory cell of the memory system.
- the method also includes performing a first defect detection operation on the at least one memory cell.
- the method also includes setting, in response to the first defect detection operation detecting a defect, a defect status indicator.
- the method also includes performing the standard erase operation on the at least one memory cell.
- the method also includes performing a second defect detection operation on the at least one memory cell.
- the method also includes setting, in response to the second defect detection operation detecting a defect, the defect status indicator.
- a controller that includes a bus interface and a processor.
- the bus interface is in communication with one or more memory blocks of a memory system.
- the processor is in communication with the bus interface and configured to: receive a command to perform a standard erase operation on at least one memory block of the memory system; perform a first defect detection operation on the at least one memory block; set, in response to the first defect detection operation detecting a defect, a defect status indicator; perform the standard erase operation on the at least one memory block; perform a second defect detection operation on the at least one memory block; and set, in response to the second defect detection operation detecting a defect, the defect status indicator.
- the method includes receiving a command to perform a standard erase operation on at least one memory cell of a memory system.
- the method also includes performing, prior to performing the standard erase operation on the at least one memory cell, a first plurality of defect detection operations on the at least one memory cell.
- the method also includes setting, in response to the first plurality of defect detection operations detecting at least one defect, a defect status indicator.
- the method also includes performing the standard erase operation on the at least one memory cell.
- the method also includes performing a second plurality of defect detection operations on the at least one memory cell.
- the method also includes setting, in response to the second plurality of defect detection operations detecting at least one defect, the defect status indicator.
- FIGS. 1A-1B generally illustrates a block diagram of an example non-volatile memory system according to the principles of the present disclosure.
- FIG. 2A generally illustrates a block diagram of example components of a controller according to the principles of the present disclosure.
- FIG. 2B generally illustrates a block diagram of example components of a non-volatile memory storage system according to the principles of the present disclosure.
- FIG. 3 generally illustrates a memory block according to the principles of the present disclosure.
- FIG. 4 is a flow diagram generally illustrating a memory defect detection method according to the principles of the present disclosure.
- non-volatile memory systems are a type of memory that retains stored information without requiring an external power source.
- Non-volatile memory is widely used in various electronic devices and in stand-alone memory devices.
- non-volatile memory can be found in laptops, digital audio player, digital cameras, smart phones, video games, scientific instruments, industrial robots, medical electronics, solid-state drives, USB drives, memory cards, and the like.
- Non-volatile memory can be electronically programmed/reprogrammed and erased.
- the non-volatile memory may include any suitable type of memory, such as read only memory, NAND flash memory, NOR flash memory, ferroelectric random access memory, or other suitable memory type.
- the non-volatile memory can include two-dimensional memory, three-dimensional memory, and the like.
- the non-volatile memory may include bit column stacked (BiCS) NAND flash memory.
- BiCS bit column stacked
- Such a memory system is tested for defects during production or manufacturing.
- the memory blocks of the memory system may be tested in a production environment (e.g., in a manufacturing factory) of the memory system using various test modes, operations, or schemes.
- one or more memory leakage detection operations may be performed on the memory blocks of the memory system.
- Such leakage detection operations typically include custom command sequences that run standalone (e.g., not together in an expanded sequence).
- defects may occur in the memory blocks as the memory system is used in a customer or user environment (e.g., not in the production environment).
- detecting defects in the memory blocks in the production environment may be difficult and the typical systems and methods used for detecting defects may be limited to detecting defects associated with strong shorts in the memory system (e.g., such as shorts that bring down the voltage on pump circuity associated with the memory system).
- Such typical systems and methods are not sensitive enough to detect defects, such as memory leakage, before a point of failure in the memory system (e.g., component failure, loss of data, and the like) and typically are not capable of indicating that a defect exists until after the defect, such as memory leakage, is affecting delivered voltage.
- systems and methods such as those described herein, that are configured to detect defects in memory systems being used in the customer or user environment before such defects result in component failure, data loss, data corruption, and the like, may be desirable.
- the systems and methods described herein may perform one or more defect detection operations on the memory blocks of the memory system during performance of an erase operation on the memory blocks.
- the systems and methods described herein may perform one or more defect detection operations on the memory blocks after receiving a command to perform the erase operation on the memory blocks. In some embodiments, the systems and methods described herein may be configured to perform one or more defect detection operations on the memory blocks after performing the erase operation on the memory blocks. The systems and methods described herein may be configured to set a defect status indicator in response to detecting one or more defects.
- the systems and methods described herein may be configured to detected defects in the memory blocks before the defects result in component failure in the memory system, data loss or data corruption in the memory system, inefficient performance of the memory system, other undesirable conditions of the defects, or a combination thereof. Additionally, or alternatively, by setting the defect status indicator in response to detecting defects, the systems and methods described herein may be configured to skip defective memory blocks during subsequent performance of operations on the memory blocks, which may improve performance of the memory system and reduce the risk of data loss or data corruption. Further, by performing the defect detection operations during performance of the erase operation on the memory blocks, the systems and methods described herein may be configured to reduce the risk of data loss or data corruption because the memory blocks do not include valid data during the erase operation.
- the systems and methods described herein are transparent to the memory system, which may allow relatively simple firmware architectures to benefit from the systems and methods described herein (e.g., because the defect status indicator will signal the memory system to skip the defective memory blocks).
- FIG. 1A illustrates a block diagram of an example system architecture 100 including non-volatile memory.
- the example system architecture 100 includes storage system 102 (e.g., which may be referred to as a memory system), a controller 104 , and a host 106 .
- the host 106 can include any device or system that utilizes the storage system 102 .
- various aspects of the controller 104 may be implemented by the host 106 or the host 106 can include its own controller (e.g., a processor) configured to execute instructions stored in the storage system 102 and further the host 106 can access data stored in the storage system 102 .
- Examples of the host 106 include computing devices such as a desktop computer, rack mounted server, a laptop, a smartphone, a tablet, or other suitable computing devices. Host 106 can also include systems and devices such as a gaming system, a digital phone, a digital camera (e.g., digital still cameras and digital movie cameras), portable media player, digital photo frame, remote control, television stick, smart television, and the like.
- the system architecture 100 can be implemented in a memory card such as secure digital (SD) card or a micro secure digital (micro-SD) card.
- the system architecture 100 is embedded in the host, for example as a solid-state disk (SSD) drive installed in a laptop computer.
- SSD solid-state disk
- the host 106 can include a built-in receptacle for one or more types of memory cards or flash drives (e.g., a universal serial bus (USB) port, or a memory card slot). Additionally, or alternatively, the host 106 can include adapters into which a memory card may be plugged.
- USB universal serial bus
- the host 106 can include adapters into which a memory card may be plugged.
- a host 106 can include any type of device, system, and apparatus that accesses the storage system 102 .
- the storage system 102 includes a memory controller and drivers (e.g., controller 104 )—as will be described further below—however, in some embodiments of the storage system 102 , the storage system 102 may include memory-only units that are instead controlled by software executed by a controller on the host 106 (e.g., a processor of a computing device controls, including error handling of, the storage system 102 ). Furthermore, although FIG. 1A illustrates the storage system 102 as separate from the host 106 , in some embodiments, the storage system 102 is embedded with the host 106 , where the memory, controller, and drivers are formed on a single integrated circuit chip.
- the host 106 can communicate with the storage system 102 using of a bus 112 that implements any known or after developed communication protocol that enables the storage system 102 and the host 106 to communicate.
- the communication protocol may include Secure Digital (SD) protocol, Memory stick (MS) protocol, USB protocol, Advanced Microcontroller Bus Architecture (AMBA), or other suitable communication protocol.
- the controller 104 acts as an interface between the host 106 and the storage system 102 .
- the host 106 may communicate with the controller 104 via a bus interface associated with the bus 112 .
- the controller 104 can include individual circuit components, processing circuitry (e.g., logic gates and switches), a processor, a microprocessor, a microcontroller with controlling software, or a field programmable gate array (FPGA).
- the example controller 104 includes a computer-readable medium that stores computer-readable program code (e.g., software or firmware) executable by the processor.
- the controller 104 is a flash memory controller.
- the controller 104 is a processor executing within the host 106 .
- the controller 104 acts as an interface between the host 106 and the storage system 102 and manages data stored on the storage system 102 .
- the controller 104 may receive commands or instructions from the host 106 and may perform read operations, write operations, programming operations, erase operations, other suitable operations, or a combination thereof on the memory of the storage system 102 in response to the commands or instructions communicated by the host 106 .
- the host 106 can access data stored in the storage system 102 by providing a logical address, via the bus interface associated with the bus 112 , to the controller 104 , which, the controller 104 converts to a physical address.
- the controller 104 can access data and/or a particular storage location associated with the physical address and facilitate transferring data between the storage system 102 and the host 106 .
- the controller 104 formats the flash memory to ensure the memory is operating properly, maps out bad flash memory cells, and allocates spare cells to be substituted for future failed cells or used to hold firmware to operate the flash memory controller (e.g., the controller 104 ).
- the controller 104 performs various memory management functions such as wear leveling (e.g., distributing writes to extend the lifetime of the memory blocks), garbage collection (e.g., moving valid pages of data to a new block and erasing the previously used block), and error detection and correction (e.g., read error handling).
- wear leveling e.g., distributing writes to extend the lifetime of the memory blocks
- garbage collection e.g., moving valid pages of data to a new block and erasing the previously used block
- error detection and correction e.g., read error handling
- the storage system 102 includes the non-volatile memory (NVM) block 110 which may include several memory die 110 - 1 - 110 -N.
- the NVM block 110 defines a physical set of memory die, such as the memory die 110 - 1 - 110 -N.
- the NVM block 110 defines a logical set of memory die, where the NVM block 110 includes memory die from several physically different sets of memory die. The manner in which the NVM block 110 is defined in FIG. 1A is not meant to be limiting.
- Each memory die for example memory die 110 - 1 , includes non-volatile memory cells, such as NAND flash memory cells, NOR flash memory cells, or other suitable memory cells.
- non-volatile memory cells such as NAND flash memory cells, NOR flash memory cells, or other suitable memory cells.
- the memory cells in the storage system 102 retain data even when there is an interruption in power supplied to the memory cells and/or the storage system 102 .
- the storage system 102 can be easily transported and the storage system 102 can be used in memory cards and other memory devices that are not always connected to a power supply.
- the memory cells in the memory die 110 are solid-state memory cells (e.g., flash) and are one-time programmable, few-time programmable, or many time programmable. Additionally, the memory cells in the memory die 110 can include single-level cells (SLC), multiple-level cells (MLC), or triple-level cells (TLC). In some embodiments, the memory cells are fabricated in a planar manner (e.g., 2D NAND (NOT-AND) flash) or in a stacked or layered manner (e.g., 3D NAND flash). That is, planar flash memory includes a single layer of memory cell, while stacked flash memory includes memory cells that are stacked vertically in multiple layers (e.g., referred to as planes).
- planar flash memory includes a single layer of memory cell
- stacked flash memory includes memory cells that are stacked vertically in multiple layers (e.g., referred to as planes).
- the controller 104 and the NVM block 110 are communicatively coupled by an interface 114 that implements any known or after developed communication protocol.
- the interface 114 is a flash interface, such as Toggle Mode 200, 400, 800, or Common Flash Memory Interface (CFI).
- the interface 114 can be implemented by several channels (i.e., physical connections) disposed between the controller 104 and the individual memory die 110 - 1 - 110 -N.
- the number of channels over which the interface 114 is established varies based on the capabilities of the controller 104 .
- a single channel can be configured to communicatively couple more than one memory die.
- the depiction of a single interface 114 is not meant to be limiting. To the contrary, the single interface is representative of an example interface that can be used between components, and one or more interfaces can be used to communicatively couple the same components.
- FIG. 1B generally illustrates a block diagram of a system architecture 100 according to the principles of the present disclosure.
- the system architecture 100 can be implemented as part of a larger system architecture.
- the system architecture 150 includes a storage module 156 that further includes several storage systems 102 .
- the storage module 156 is communicatively coupled with the host 106 by way of a storage controller 152 .
- an interface 154 between the host 106 and the storage module 156 includes a bus interface that implements any known or after developed communication protocol, such as a serial advanced technology attachment (SATA) or peripheral component interface express (PCIe) interface.
- the storage module 156 is an SSD (e.g., in a laptop computer or a tablet).
- a hierarchical storage system can include a plurality of storage controllers 152 , each of which control a respective storage system 102 . Furthermore, a plurality of hosts 106 can each access the hierarchical storage system. Hosts 106 can access memories within the hierarchical storage system via a bus interface that implements any known or after developed communication protocol including a non-volatile memory express (NVMe) or a fiber channel over Ethernet (FCoE) interface.
- NVMe non-volatile memory express
- FCoE fiber channel over Ethernet
- the hierarchical storage system can be implemented as a rack mounted storage system that is accessible by multiple host computers (e.g., a data center).
- the interface 154 can be implemented by several channels (i.e., physical connections) disposed between the storage controller 152 and the storage module 156 . In some embodiments, the number of channels over which an interface 154 is established varies based on the capabilities of the storage controller 152 .
- the depiction of a single interface is not meant to be limiting and the single interface is representative of an example interface that can be used between components, where one or more interfaces can be used to communicatively couple various components.
- FIG. 2A generally illustrates a block diagram 200 of the storage system 102 , according to the principles of the present disclosure.
- the block diagram 200 of the storage system 102 includes components previously described in FIG. 1A , such as the controller 104 and the NVM memory block 110 . Additional components that can be present within the storage system 102 include a random access memory (RAM) 230 , a read only memory (ROM) 232 , and other components 234 .
- the ROM 232 stores system boot code.
- the RAM 230 and the ROM 232 are shown as separate modules within the storage system 102 , the illustrated architecture is not meant to be limiting.
- the RAM 230 and the ROM 232 can be located within the controller 104 .
- portions of the RAM 230 or ROM 232 , respectively, are located outside the controller 104 and within the controller 104 .
- the controller 104 , the RAM 230 , and the ROM 232 can be located on separate semiconductor die.
- the other components 234 include external electrical interfaces, external RAM, resistors, capacitors, logic gates, or other components that interface with the controller 104 .
- the controller 104 includes a module 202 that interfaces with the host 106 , a module 204 that interfaces with the NVM memory block 110 , as well as various other modules, described further below.
- the modules within the controller e.g., modules 202 and 204 ) are communicatively coupled to each other by a bus 206 .
- controller 104 The following discussion of the various modules depicted within the controller 104 are meant to be illustrative and not limiting.
- the various modules generally illustrated in FIG. 2A are not limited to being executed within the controller 104 , and in some embodiments, one or more modules can be executed outside the controller 104 .
- the module 202 interfaces with the host 106 and includes a host interface 208 and a physical layer interface 210 that provides the electrical interface between the host 106 or next level storage controller and the controller 104 .
- the host interface 208 facilitates transferring of data, control signals, and timing signals. Examples of the host interface 208 include SATA, SATA express, Serial Attached SCSI (SAS), Fibre Channel, USB, PCIe, and NVMe.
- the module 204 is configured to communicate with the NVM block 110 and includes an error correcting code (ECC) engine 212 .
- ECC error correcting code
- the ECC engine 212 encodes data received from the host 106 and stores the encoded data in the NVM block 110 .
- the ECC engine 212 decodes the data and corrects errors detected within the data
- the ECC engine 212 implements various types of error checking using algorithms such as low-density parity-check (LDPC) code, Bose-Chaudhuri-Hocquenghem (BCH) code, a soft read, and/or extra parity.
- LDPC low-density parity-check
- BCH Bose-Chaudhuri-Hocquenghem
- the example module 204 also includes a sequencer 214 and a Redundant Array of Independent Drives (RAID) module 216 .
- the sequencer 214 generates command sequences, such as program and erase command sequences that are transmitted to the NVM memory block 110 .
- the RAID module 216 generates RAID parity and recovery of failed data. The RAID parity can be used to provide an additional level of integrity protection for data written into the NVM memory block 110 .
- the ECC engine 212 implements the functions of the RAID module 216 .
- the example module 204 also includes a memory interface 218 that provides the command sequences to the NVM memory block 110 and receives status information from the NVM memory block 110 .
- the memory interface 218 implements any known or after developed communication protocol including a double data rate (DDR) interface, such as a Toggle Mode 200, 400, or 800 interface.
- DDR double data rate
- the module 204 also includes a flash control layer 220 that controls the overall operation of the module 204 .
- additional modules within the controller 104 includes a dummy word line (DW) pattern generation module 222 , a DW error analysis module 224 , and a read parameter adjustment module 226 .
- Dummy word lines are placed on non-volatile memory die that are used for the purposes of analyzing and tracking behavior and health of a respective non-volatile memory die.
- the DW pattern generation module 222 puts a known data pattern into a dummy word line and tracks or periodically check for errors by reading the data back out of the dummy word line and comparing the data to the known data pattern.
- the read parameter adjustment module 226 adjusts parameters associated with a particular non-volatile memory die.
- the read parameters adjustment module 226 can adjust parameters associated with a particular non-volatile memory die during an operation—i.e., a read or write—to adjust or re-adjust the read parameters.
- the read parameter adjustment module 226 adjusts the read parameters for a particular memory block, reads data out of the memory block, and verifies a resulting BER. If the resulting BER falls at or below a target or expected BER, the read parameters adjustment module 226 stores the read parameters for the memory block. Subsequently, the stored read parameters are used during a read of any word line within the memory block.
- read parameters can be unique to a memory block.
- Additional modules within the example controller 104 include a buffer manager/bus controller 228 that manages, for example, buffers in the RAM 230 and controls the internal bus arbitration of the bus 206 in the controller 104 .
- the controller 104 can include a media management layer 236 that performs wear leveling of the NVM memory block 110 .
- the various modules described with respect to the controller 104 are not meant to be limiting as to the architecture of the controller 104 .
- the physical layer interface 210 , the RAID module 216 , the media management layer 236 , and the buffer management/bus controller 228 can be examples of optional components within the controller 104 .
- the media management layer 236 can be integrated as part of the flash management that handles flash error and interfaces with the host 106 .
- the media management layer 236 can include an algorithm (e.g., firmware in the memory device), that translates a write command received from the host 106 into a write to the NVM memory block 110 .
- FIG. 2B generally illustrates a block diagram with various features of the NVM memory block 110 within the storage system 102 .
- the controller 104 As details of the controller 104 have been previously described (in FIG. 2A ), in FIG. 2B the controller 104 is illustrated as a single block. Additionally, previously described RAM 230 , the ROM 232 , and the other components 234 are included in FIG. 2B to help orient the reader.
- FIG. 2B generally illustrates a block diagram with various features of the NVM memory block 110 within the storage system 102 .
- the controller 104 is illustrated as a single block.
- FIG. 2B Next, details within an example memory die 110 - 1 are discussed. Although the discussion centers on the memory die 110 - 1 , each of the features discussed in relation to the memory die 110 - 1 equally applies to all of the memory dies within NVM
- the example memory die 110 - 1 includes control circuit 250 , read/write circuits 252 , a row decoder 254 , a column decoder 256 , and a memory array 260 .
- the memory array 260 can include a two-dimensional array or a three-dimensional array of memory cells.
- the read/write circuits 252 read and program pages of memory within the memory die 110 - 1 , in parallel.
- the memory array 260 is accessed by word lines via the row decoder 254 and by bit lines via the column decoder 256 .
- the architecture of the memory die 110 - 1 is not meant to be limiting and any known architecture that can perform the functions of accessing the memory array 260 can be used without departing from the scope of this disclosure.
- access to the memory array 260 by various peripheral circuits can be implemented in a symmetric fashion on opposite sides of the memory array 260 , which reduces the densities of access lines, and circuitry on each side of the memory array 260 .
- the example control circuit 250 includes a power control circuit 266 , an address decoder 268 , and a state machine 270 .
- the power control circuit 266 , the address decoder 268 , and the state machine 270 can be collectively referred to as managing circuits.
- the control circuit 250 and its various managing circuits are communicatively coupled by various interfaces (e.g., interfaces 262 and 264 ) to the row decoder 254 and the column decoder 256 .
- the control circuit 250 performs various operations on the memory array 260 that include reading or writing to the memory cells.
- the power control circuit 266 controls the power and voltage supplied to the word lines and bit lines during operation of the memory array 260 .
- the address decoder 268 provides an address interface that translates addresses between addresses provided by the host 106 and addresses used by the row decoder 254 and the column decoder 256 .
- the example address decoder 268 converts an address provided by the host 106 to an address that is understood and compatible with a format used by the row decoder 254 and the column decoder 256 .
- the state machine 270 provides chip-level control of memory operations.
- the storage system 102 includes various components including the controller 104 and the NVM memory block 110 , details of which have been described above in FIGS. 1A, 1B, 2A, and 2B .
- FIG. 3 further illustrates the memory array 260 .
- the memory array 260 is divided into several memory blocks 302 .
- a memory block is defined as a unit of erase. That is, each memory block 302 includes a number of memory cells that are erased together or as a block.
- the memory array 260 can be partitioned into any number of blocks, for example, the memory array 260 includes 1,024 blocks.
- each of the memory blocks 302 can conceptually be divided into a number of pages defined as a unit of programming.
- a page of data can be stored in one row of memory cells.
- Each page can include user data and overhead data, where the overhead data includes CC that has been calculated from the user data.
- the memory blocks 302 - 1 to 302 -N may include solid-state NAND memory blocks.
- Each memory block 302 includes multiple bit lines 304 , word lines 306 , and select lines 308 .
- Each bit line for example bit line 304 - 1 , is connected to several memory cells connected in series. More particularly, in an embodiment where each memory cell is a floating gate transistor, the floating gate transistors are connected in series to form a NAND string 310 (e.g., illustrated within the dashed box). Although four memory cells are shown in FIG. 3 , the number of memory cells within the NAND string is not meant to be limiting. For example, 16, 32, 64, 128, or any other number of memory cells can be connected in a NAND string.
- Each respective bit line 304 is coupled to a respective NAND string within the block 302 .
- a method of reading data stored in a particular memory cell includes applying a voltage to the select lines 308 of the block 302 , which in turn are coupled to respective NAND strings within the block 302 , including the NAND string 310 the includes the memory cell 316 .
- the voltage applied to the select lines 308 is greater than threshold voltages of the select transistors 312 and 314 .
- the select transistor 312 is controlled by the select gate drain line (SGD) 308 - 1 and the select transistor 314 is controlled by the select gate source line (SGS) 308 - 2 .
- all other memory cells or unselected memory cells in the NAND string 319 are turned on (e.g., conducting current regardless of whether they are programmed or erased).
- the unselected memory cells have a read pass voltage—i.e., read parameters—applied to their respective word lines that turn on the unselected memory cells.
- various read compare levels i.e., voltages—are applied to the word line 306 - 2 to determine the value stored in the memory cell 316 .
- the conduction current of the memory cell 316 is measured to determine the value stored within the memory cell 316 .
- the method in which each memory cell is accessed and the number of memory cells accessed during a read or write varies.
- all of the bit lines of the memory block 302 - 1 can be simultaneously programmed or read.
- memory cells along a shared word line can be programmed at the same time (i.e., concurrently).
- the bit lines can be divided into even bit lines and odd bit lines. In an odd/even bit line architecture, memory cells along a shared word line and connected to the odd bit lines are programmed at one time, while memory cells along a shared word line and connected to an even bit line are programmed at a different time.
- the data is processed by the ECC engine 212 which includes decoding the data, correcting errors (e.g., tracked as the BER), and returning the data to a user (by way of the controller 104 ).
- the amount of time the ECC engine 212 takes to return data to the controller 104 is defined as the throughput time.
- the controller 104 performs data consolidation operations on the memory array 260 .
- the controller 104 selects a source block from the memory block 302 - 1 to memory block 302 -N of the memory array 260 , for consolidation or compaction.
- the controller 104 may select memory block 302 - 1 as the source block for consolidation or compaction.
- the memory block 302 - 1 may be referred to as the source block 302 - 1 throughout the example embodiments described herein.
- the source block 302 - 1 may include a plurality of memory fragments, such as 16 memory fragments or any suitable number of memory fragments.
- the memory fragments may include data written by the host 106 during a host write operation.
- the memory fragments may belong to respective logical groups and may be scattered or disorganized in the source block 302 - 1 , such that memory fragments associated with the same logical group may not be sequentially stored or organized in the source block 302 - 1 . Additionally, or alternatively, while some memory fragments include data written by the host 106 during a host write operation, other memory fragments scattered throughout the source block 302 - 1 may be blank (e.g., having been erased by the host 106 or the controller 104 or having not been written to by the host 106 ).
- the controller 104 may be configured to detect defects in the memory blocks 302 - 1 to 302 -N by performing one or more defect detection operations on the memory blocks 302 - 1 to 302 -N during performance of a standard erase operation on the memory blocks 302 - 1 to 302 -N.
- the controller 104 may receive a command to perform a standard erase operation on one or more of the memory blocks 302 - 1 to 302 -N. It should be understood that the command to perform the standard erase operation may be performed on one or more memory cells of the memory blocks 302 - 1 to 302 -N or one or more memory blocks of the memory blocks 302 - 1 to 302 -N.
- the controller 104 may receive the command to perform the standard erase operation from the host 106 or other suitable source.
- the controller 104 may perform one or more defect detection operations of a plurality of defect detection operations.
- the plurality of defect detection operations may include operations to detect word line to word line defects of the one or more memory blocks 302 - 1 to 302 -N, word line to memory hole defects of the one or more memory blocks 302 - 1 to 302 -N, word line to dummy memory hole defects of the one or more memory blocks 302 - 1 to 302 -N, word line to hole replacement defects of the one or more memory blocks 302 - 1 to 302 -N, select gate source line defects of the one or more memory blocks 302 - 1 to 302 -N, memory hole open defects of the one or more memory blocks 302 - 1 to 302 -N, other suitable defect detection operations for detecting other defects, or a combination thereof.
- the controller 104 may perform any number of the plurality of defect detection operations on the one or more memory blocks 302 - 1 to
- the controller 104 When the controller 104 detects one or more defects in a memory block of the one or more memory blocks 302 - 1 to 302 -N by performing one or more of the plurality of defect detection operations before performing the standard erase operation on the one or more memory blocks 302 - 1 to 302 -N, the controller 104 sets a defect status indicator. It should be understood that the controller 104 performs the one or more defect detection operations on each memory blocks of the one or more memory blocks 302 - 1 to 302 -N.
- the one or more defects may include any defect, such as memory leakage, other suitable defects, or a combination thereof.
- the defect status indicator indicates that a defect will occur in the memory block or that a defect has occurred in the memory block.
- the defect status indicator may include any suitable indicator, such as a value set in a register, an indication in the header information of the defective memory block, other suitable indicators, or a combination thereof.
- the status indicator may be set to a first value indicating a defect in the memory block and may be set to a second value indicating no defects were detected in the memory block.
- the controller 104 may then perform the standard erase operation on the one or more memory blocks 302 - 1 to 302 -N. After performing the standard erase operation on the one or more memory blocks 302 - 1 to 302 -N, the controller 104 may perform one or more defect detection operations of a plurality of defect detection operations. The controller 104 may perform any number of the plurality of defect detection operations on the one or more memory blocks 302 - 1 to 302 -N.
- the controller 104 When the controller 104 detects one or more defects in a memory block of the one or more memory blocks 302 - 1 to 302 -N by performing one or more of the plurality of defect detection operations after performing the standard erase operation on the one or more memory blocks 302 - 1 to 302 -N, the controller 104 sets the defect status indicator, as described.
- the controller 104 reads the defect status indicator in response to receiving a subsequent command to perform operations on the memory blocks 302 - 1 to 302 -N.
- the controller 104 identifies memory blocks of the memory blocks 302 - 1 to 302 -N to skip or not use during performance of the subsequent operations based on the defect status indicator. For example, when the defect status indicator indicates that a first memory block of the memory blocks 302 - 1 to 302 -N has a defect or that a defect will occur, the controller 104 determines to not use (e.g., skip) the first memory block when performing the subsequent operations on the memory blocks 302 - 1 to 302 -N.
- the controller 104 may perform the methods described herein.
- the methods described herein as performed by the controller 104 are not meant to be limiting, and any type of software executed on a controller can perform the methods described herein without departing from the scope of this disclosure.
- a controller such as a processor executing software within the host 106 or firmware within the storage system 102 (e.g., stored on ROM 232 or NVM memory block 110 ) can perform the methods described herein.
- FIG. 4 is a flow diagram illustrating a memory defect detection method 400 according to the principles of the present disclosure.
- the method 400 receives a command to perform a standard erase operation.
- the controller 104 receives the command to perform the standard erase operation on the one or more memory blocks 302 - 1 to 302 -N, as described.
- the method 400 performs one or more defect detection operations.
- the controller 104 performs one or more defect detection operations of the plurality of defect detection operations on the one or more memory blocks 302 - 1 to 302 -N before performing the standard erase operation on the one or more memory blocks 302 - 1 to 302 -N.
- the method determines whether a defect was detected. For example, the controller 104 determines whether one or more defects were detected in memory blocks of the one or more memory blocks 302 - 1 to 302 -N before performing the standard erase operation. When the controller 104 determines that one or more defects were detected in at least one memory block of the one or more memory blocks 302 - 1 to 302 -N, the method 400 continues at 408 . When the controller 104 determines that no defects were detected in the one or more memory blocks 302 - 1 to 302 -N, the method 400 continues at 410 . At 408 , the method 400 sets a defect status indicator. For example, the controller 104 sets the defect status indicator indicating that one or more defects exist in or may occur in the at least one memory block of the one or more memory blocks 302 - 1 to 302 -N.
- the method 400 performs the standard erase operation.
- the controller 104 performs the standard erase operation on the one or more memory blocks 302 - 1 to 302 -N.
- the method 400 performs one or more defect detection operations.
- the controller 104 performs one or more defect detection operations of the plurality of defect detection operations on the one or more memory blocks 302 - 1 to 302 -N after performing the standard erase operation on the one or more memory blocks 302 - 1 to 302 -N.
- the method determines whether a defect was detected. For example, the controller 104 determines whether one or more defects were detected in memory blocks of the one or more memory blocks 302 - 1 to 302 -N, after performing the standard erase operation. When the controller 104 determines that one or more defects were detected in at least one memory block of the one or more memory blocks 302 - 1 to 302 -N, the method 400 continues at 416 . When the controller 104 determines that no defects were detected in the one or more memory blocks 302 - 1 to 302 -N, the method 400 continues at 418 . At 416 , the method 400 sets the defect status indicator. For example, the controller 104 sets the defect status indicator indicating that one or more defects exist in or may occur in the at least one memory block of the one or more memory blocks 302 - 1 to 302 -N. At 418 , the method 400 ends.
- a method for detecting defects in a memory system includes receiving a command to perform a standard erase operation on at least one memory cell of the memory system. The method also includes performing a first defect detection operation on the at least one memory cell. The method also includes setting, in response to the first defect detection operation detecting a defect, a defect status indicator. The method also includes performing the standard erase operation on the at least one memory cell. The method also includes performing a second defect detection operation on the at least one memory cell. The method also includes setting, in response to the second defect detection operation detecting a defect, the defect status indicator.
- At least one of the first defect detection operation and the second defect detection operation is configured to detect word line to word line defects of the at least one memory cell. In some embodiments, at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to memory hole defects of the at least one memory cell. In some embodiments, at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to dummy memory hole defects of the at least one memory cell. In some embodiments, at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to hole replacement defects of the at least one memory cell. In some embodiments, at least one of the first defect detection operation and the second defect detection operation is configured to detect select gate source line defects of the at least one memory cell.
- At least one of the first defect detection operation and the second defect detection operation is configured to detect memory hole open defects of the at least one memory cell.
- the method also includes performing one or more other defect detection operations on the at least one memory cell, prior to performing the standard erase operation on the at least one memory cell.
- the method also includes performing one or more other defect detection operations on the at least one memory cell, after performing the standard erase operation on the at least one memory cell.
- a controller includes a bus interface and a processor.
- the bus interface is in communication with one or more memory blocks of a memory system.
- the processor is in communication with the bus interface and configured to: receive a command to perform a standard erase operation on at least one memory block of the memory system; perform a first defect detection operation on the at least one memory block; set, in response to the first defect detection operation detecting a defect, a defect status indicator; perform the standard erase operation on the at least one memory block; perform a second defect detection operation on the at least one memory block; and set, in response to the second defect detection operation detecting a defect, the defect status indicator.
- At least one of the first defect detection operation and the second defect detection operation is configured to detect word line to word line defects of the at least one memory block. In some embodiments, at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to memory hole defects of the at least one memory block. In some embodiments, at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to dummy memory hole defects of the at least one memory block. In some embodiments, at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to hole replacement defects of the at least one memory block. In some embodiments, at least one of the first defect detection operation and the second defect detection operation is configured to detect select gate source line defects of the at least one memory block.
- At least one of the first defect detection operation and the second defect detection operation is configured to detect memory hole open defects of the at least one memory block.
- the processor is further configured to perform one or more other defect detection operations on the at least one memory block, prior to performing the standard erase operation on the at least one memory block.
- the processor is further configured to perform one or more other defect detection operations on the at least one memory block, after performing the standard erase operation on the at least one memory block.
- a memory defect detection method includes receiving a command to perform a standard erase operation on at least one memory cell of a memory system. The method also includes performing, prior to performing the standard erase operation on the at least one memory cell, a first plurality of defect detection operations on the at least one memory cell. The method also includes setting, in response to the first plurality of defect detection operations detecting at least one defect, a defect status indicator. The method also includes performing the standard erase operation on the at least one memory cell. The method also includes performing a second plurality of defect detection operations on the at least one memory cell. The method also includes setting, in response to the second plurality of defect detection operations detecting at least one defect, the defect status indicator.
- the method also includes, in response to the defect status indicator being set, skipping the at least one memory cell during performance of a subsequent operation.
- example is used herein to mean serving as an example, instance, or illustration. Any aspect or design described herein as “example” is not necessarily to be construed as preferred or advantageous over other aspects or designs. Rather, use of the word “example” is intended to present concepts in a concrete fashion.
- the term “or” is intended to mean an inclusive “or” rather than an exclusive “or.” That is, unless specified otherwise, or clear from context, “X includes A or B” is intended to mean any of the natural inclusive permutations. That is, if X includes A; X includes B; or X includes both A and B, then “X includes A or B” is satisfied under any of the foregoing instances.
- Implementations the systems, algorithms, methods, instructions, etc., described herein can be realized in hardware, software, or any combination thereof.
- the hardware can include, for example, computers, intellectual property (IP) cores, application-specific integrated circuits (ASICs), programmable logic arrays, optical processors, programmable logic controllers, microcode, microcontrollers, servers, microprocessors, digital signal processors, or any other suitable circuit.
- IP intellectual property
- ASICs application-specific integrated circuits
- programmable logic arrays optical processors
- programmable logic controllers microcode, microcontrollers
- servers microprocessors, digital signal processors, or any other suitable circuit.
- signal processors digital signal processors, or any other suitable circuit.
- the term module can include a packaged functional hardware unit designed for use with other components, a set of instructions executable by a controller (e.g., a processor executing software or firmware), processing circuitry configured to perform a particular function, and a self-contained hardware or software component that interfaces with a larger system.
- a module can include an application specific integrated circuit (ASIC), a Field Programmable Gate Array (FPGA), a circuit, digital logic circuit, an analog circuit, a combination of discrete circuits, gates, and other types of hardware or combination thereof.
- a module can include memory that stores instructions executable by a controller to implement a feature of the module.
- the controller 104 is implemented within the host 106 can be configured with hardware and/or firmware to perform the various functions described herein.
- Controller shall mean individual circuit components, an application-specific integrated circuit (ASIC), a microcontroller with controlling software, a digital signal processor (DSP), a processor with controlling software, a field programmable gate array (FPGA), or combinations thereof.
- ASIC application-specific integrated circuit
- DSP digital signal processor
- FPGA field programmable gate array
- systems described herein can be implemented using a general-purpose computer or general-purpose processor with a computer program that, when executed, carries out any of the respective methods, algorithms, and/or instructions described herein.
- a special purpose computer/processor can be utilized which can contain other hardware for carrying out any of the methods, algorithms, or instructions described herein.
- implementations of the present disclosure can take the form of a computer program product accessible from, for example, a computer-usable or computer-readable medium.
- a computer-usable or computer-readable medium can be any device that can, for example, tangibly contain, store, communicate, or transport the program for use by or in connection with any processor.
- the medium can be, for example, an electronic, magnetic, optical, electromagnetic, or a semiconductor device. Other suitable mediums are also available.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Techniques For Improving Reliability Of Storages (AREA)
- For Increasing The Reliability Of Semiconductor Memories (AREA)
- Read Only Memory (AREA)
Abstract
A method for detecting defects in a memory system includes receiving a command to perform a standard erase operation on at least one memory cell of the memory system. The method also includes performing a first defect detection operation on the at least one memory cell. The method also includes setting, in response to the first defect detection operation detecting a defect, a defect status indicator. The method also includes performing the standard erase operation on the at least one memory cell. The method also includes performing a second defect detection operation on the at least one memory cell. The method also includes setting, in response to the second defect detection operation detecting a defect, the defect status indicator.
Description
- This disclosure relates to memory systems and in particular to systems and methods for NAND field use erase plus defect detections.
- Non-volatile memory systems are a type of memory that retains stored information without requiring an external power source. Non-volatile memory is widely used in various electronic devices and in stand-alone memory devices. For example, non-volatile memory can be found in laptops, digital audio player, digital cameras, smart phones, video games, scientific instruments, industrial robots, medical electronics, solid-state drives, USB drives, memory cards, and the like. Non-volatile memory can be electronically programmed/reprogrammed and erased.
- Typically, such a memory system is tested for defects during production or manufacturing. For example, the memory system may be tested in a production environment (e.g., in a manufacturing factory) of the memory system using various test modes. However, such defects may occur in the memory system as the memory system is used in a customer or user environment. Typically, systems and methods for detecting defects in such an environment may be difficult and may be limited to detecting defects associated with strong shorts in the memory system.
- This disclosure relates generally to memory management systems and methods.
- An aspect of the disclosed embodiments is a method for detecting defects in a memory system. The method includes receiving a command to perform a standard erase operation on at least one memory cell of the memory system. The method also includes performing a first defect detection operation on the at least one memory cell. The method also includes setting, in response to the first defect detection operation detecting a defect, a defect status indicator. The method also includes performing the standard erase operation on the at least one memory cell. The method also includes performing a second defect detection operation on the at least one memory cell. The method also includes setting, in response to the second defect detection operation detecting a defect, the defect status indicator.
- Another aspect of the disclosed embodiments is a controller that includes a bus interface and a processor. The bus interface is in communication with one or more memory blocks of a memory system. The processor is in communication with the bus interface and configured to: receive a command to perform a standard erase operation on at least one memory block of the memory system; perform a first defect detection operation on the at least one memory block; set, in response to the first defect detection operation detecting a defect, a defect status indicator; perform the standard erase operation on the at least one memory block; perform a second defect detection operation on the at least one memory block; and set, in response to the second defect detection operation detecting a defect, the defect status indicator.
- Another aspect of the disclosed embodiments is a memory defect detection method. The method includes receiving a command to perform a standard erase operation on at least one memory cell of a memory system. The method also includes performing, prior to performing the standard erase operation on the at least one memory cell, a first plurality of defect detection operations on the at least one memory cell. The method also includes setting, in response to the first plurality of defect detection operations detecting at least one defect, a defect status indicator. The method also includes performing the standard erase operation on the at least one memory cell. The method also includes performing a second plurality of defect detection operations on the at least one memory cell. The method also includes setting, in response to the second plurality of defect detection operations detecting at least one defect, the defect status indicator.
- These and other aspects of the present disclosure are disclosed in the following detailed description of the embodiments, the appended claims, and the accompanying figures.
- The disclosure is best understood from the following detailed description when read in conjunction with the accompanying drawings. It is emphasized that, according to common practice, the various features of the drawings are not to-scale. On the contrary, the dimensions of the various features are arbitrarily expanded or reduced for clarity.
-
FIGS. 1A-1B generally illustrates a block diagram of an example non-volatile memory system according to the principles of the present disclosure. -
FIG. 2A generally illustrates a block diagram of example components of a controller according to the principles of the present disclosure. -
FIG. 2B generally illustrates a block diagram of example components of a non-volatile memory storage system according to the principles of the present disclosure. -
FIG. 3 generally illustrates a memory block according to the principles of the present disclosure. -
FIG. 4 is a flow diagram generally illustrating a memory defect detection method according to the principles of the present disclosure. - The following discussion is directed to various embodiments of the invention. Although one or more of these embodiments may be preferred, the embodiments disclosed should not be interpreted, or otherwise used, as limiting the scope of the disclosure, including the claims. In addition, one skilled in the art will understand that the following description has broad application, and the discussion of any embodiment is meant only to be exemplary of that embodiment, and not intended to intimate that the scope of the disclosure, including the claims, is limited to that embodiment.
- As described, non-volatile memory systems are a type of memory that retains stored information without requiring an external power source. Non-volatile memory is widely used in various electronic devices and in stand-alone memory devices. For example, non-volatile memory can be found in laptops, digital audio player, digital cameras, smart phones, video games, scientific instruments, industrial robots, medical electronics, solid-state drives, USB drives, memory cards, and the like. Non-volatile memory can be electronically programmed/reprogrammed and erased. The non-volatile memory may include any suitable type of memory, such as read only memory, NAND flash memory, NOR flash memory, ferroelectric random access memory, or other suitable memory type. The non-volatile memory can include two-dimensional memory, three-dimensional memory, and the like. For example, the non-volatile memory may include bit column stacked (BiCS) NAND flash memory.
- Typically, such a memory system is tested for defects during production or manufacturing. The memory blocks of the memory system may be tested in a production environment (e.g., in a manufacturing factory) of the memory system using various test modes, operations, or schemes. For example, one or more memory leakage detection operations may be performed on the memory blocks of the memory system. Such leakage detection operations typically include custom command sequences that run standalone (e.g., not together in an expanded sequence).
- However, such defects may occur in the memory blocks as the memory system is used in a customer or user environment (e.g., not in the production environment). Unlike detecting defects in the memory blocks in the production environment, detecting defects in the memory blocks in the customer or user environment may be difficult and the typical systems and methods used for detecting defects may be limited to detecting defects associated with strong shorts in the memory system (e.g., such as shorts that bring down the voltage on pump circuity associated with the memory system). Such typical systems and methods are not sensitive enough to detect defects, such as memory leakage, before a point of failure in the memory system (e.g., component failure, loss of data, and the like) and typically are not capable of indicating that a defect exists until after the defect, such as memory leakage, is affecting delivered voltage.
- Accordingly, systems and methods, such as those described herein, that are configured to detect defects in memory systems being used in the customer or user environment before such defects result in component failure, data loss, data corruption, and the like, may be desirable. In some embodiments, the systems and methods described herein may perform one or more defect detection operations on the memory blocks of the memory system during performance of an erase operation on the memory blocks.
- In some embodiments, the systems and methods described herein may perform one or more defect detection operations on the memory blocks after receiving a command to perform the erase operation on the memory blocks. In some embodiments, the systems and methods described herein may be configured to perform one or more defect detection operations on the memory blocks after performing the erase operation on the memory blocks. The systems and methods described herein may be configured to set a defect status indicator in response to detecting one or more defects.
- In some embodiments, the systems and methods described herein may be configured to detected defects in the memory blocks before the defects result in component failure in the memory system, data loss or data corruption in the memory system, inefficient performance of the memory system, other undesirable conditions of the defects, or a combination thereof. Additionally, or alternatively, by setting the defect status indicator in response to detecting defects, the systems and methods described herein may be configured to skip defective memory blocks during subsequent performance of operations on the memory blocks, which may improve performance of the memory system and reduce the risk of data loss or data corruption. Further, by performing the defect detection operations during performance of the erase operation on the memory blocks, the systems and methods described herein may be configured to reduce the risk of data loss or data corruption because the memory blocks do not include valid data during the erase operation. This may also reduce recovery time in the event of a failure (e.g., because there is no data to recover). In some embodiments, the systems and methods described herein are transparent to the memory system, which may allow relatively simple firmware architectures to benefit from the systems and methods described herein (e.g., because the defect status indicator will signal the memory system to skip the defective memory blocks).
-
FIG. 1A illustrates a block diagram of anexample system architecture 100 including non-volatile memory. In particular, theexample system architecture 100 includes storage system 102 (e.g., which may be referred to as a memory system), acontroller 104, and ahost 106. In various embodiments, thehost 106 can include any device or system that utilizes thestorage system 102. In some embodiments, various aspects of thecontroller 104 may be implemented by thehost 106 or thehost 106 can include its own controller (e.g., a processor) configured to execute instructions stored in thestorage system 102 and further thehost 106 can access data stored in thestorage system 102. - Examples of the
host 106 include computing devices such as a desktop computer, rack mounted server, a laptop, a smartphone, a tablet, or other suitable computing devices. Host 106 can also include systems and devices such as a gaming system, a digital phone, a digital camera (e.g., digital still cameras and digital movie cameras), portable media player, digital photo frame, remote control, television stick, smart television, and the like. Furthermore, thesystem architecture 100 can be implemented in a memory card such as secure digital (SD) card or a micro secure digital (micro-SD) card. In some embodiments, thesystem architecture 100 is embedded in the host, for example as a solid-state disk (SSD) drive installed in a laptop computer. - In embodiments where the
system architecture 100 is implemented within a memory card, thehost 106 can include a built-in receptacle for one or more types of memory cards or flash drives (e.g., a universal serial bus (USB) port, or a memory card slot). Additionally, or alternatively, thehost 106 can include adapters into which a memory card may be plugged. The foregoing examples of a host are not meant to be limiting examples. On the contrary, ahost 106 can include any type of device, system, and apparatus that accesses thestorage system 102. - In
FIG. 1A , thestorage system 102 includes a memory controller and drivers (e.g., controller 104)—as will be described further below—however, in some embodiments of thestorage system 102, thestorage system 102 may include memory-only units that are instead controlled by software executed by a controller on the host 106 (e.g., a processor of a computing device controls, including error handling of, the storage system 102). Furthermore, althoughFIG. 1A illustrates thestorage system 102 as separate from thehost 106, in some embodiments, thestorage system 102 is embedded with thehost 106, where the memory, controller, and drivers are formed on a single integrated circuit chip. - The
host 106 can communicate with thestorage system 102 using of abus 112 that implements any known or after developed communication protocol that enables thestorage system 102 and thehost 106 to communicate. The communication protocol may include Secure Digital (SD) protocol, Memory stick (MS) protocol, USB protocol, Advanced Microcontroller Bus Architecture (AMBA), or other suitable communication protocol. - In various embodiments, the
controller 104 acts as an interface between thehost 106 and thestorage system 102. Thehost 106 may communicate with thecontroller 104 via a bus interface associated with thebus 112. Thecontroller 104 can include individual circuit components, processing circuitry (e.g., logic gates and switches), a processor, a microprocessor, a microcontroller with controlling software, or a field programmable gate array (FPGA). Furthermore, theexample controller 104 includes a computer-readable medium that stores computer-readable program code (e.g., software or firmware) executable by the processor. In some embodiments, thecontroller 104 is a flash memory controller. In some embodiments, thecontroller 104 is a processor executing within thehost 106. - Still referring to
FIG. 1A , according to some embodiments, thecontroller 104 acts as an interface between thehost 106 and thestorage system 102 and manages data stored on thestorage system 102. For example, thecontroller 104 may receive commands or instructions from thehost 106 and may perform read operations, write operations, programming operations, erase operations, other suitable operations, or a combination thereof on the memory of thestorage system 102 in response to the commands or instructions communicated by thehost 106. Thehost 106 can access data stored in thestorage system 102 by providing a logical address, via the bus interface associated with thebus 112, to thecontroller 104, which, thecontroller 104 converts to a physical address. Thecontroller 104 can access data and/or a particular storage location associated with the physical address and facilitate transferring data between thestorage system 102 and thehost 106. In some embodiments, where thestorage system 102 includes flash memory, thecontroller 104 formats the flash memory to ensure the memory is operating properly, maps out bad flash memory cells, and allocates spare cells to be substituted for future failed cells or used to hold firmware to operate the flash memory controller (e.g., the controller 104). - Accordingly, the
controller 104 performs various memory management functions such as wear leveling (e.g., distributing writes to extend the lifetime of the memory blocks), garbage collection (e.g., moving valid pages of data to a new block and erasing the previously used block), and error detection and correction (e.g., read error handling). - Still referring to
FIG. 1A , thestorage system 102 includes the non-volatile memory (NVM) block 110 which may include several memory die 110-1-110-N. In some embodiments, theNVM block 110 defines a physical set of memory die, such as the memory die 110-1-110-N. In other embodiments, theNVM block 110 defines a logical set of memory die, where theNVM block 110 includes memory die from several physically different sets of memory die. The manner in which theNVM block 110 is defined inFIG. 1A is not meant to be limiting. - Each memory die, for example memory die 110-1, includes non-volatile memory cells, such as NAND flash memory cells, NOR flash memory cells, or other suitable memory cells. As the memory cells are non-volatile, the memory cells in the
storage system 102 retain data even when there is an interruption in power supplied to the memory cells and/or thestorage system 102. Thus, thestorage system 102 can be easily transported and thestorage system 102 can be used in memory cards and other memory devices that are not always connected to a power supply. - In various embodiments, the memory cells in the memory die 110 are solid-state memory cells (e.g., flash) and are one-time programmable, few-time programmable, or many time programmable. Additionally, the memory cells in the memory die 110 can include single-level cells (SLC), multiple-level cells (MLC), or triple-level cells (TLC). In some embodiments, the memory cells are fabricated in a planar manner (e.g., 2D NAND (NOT-AND) flash) or in a stacked or layered manner (e.g., 3D NAND flash). That is, planar flash memory includes a single layer of memory cell, while stacked flash memory includes memory cells that are stacked vertically in multiple layers (e.g., referred to as planes).
- In some embodiments, and as shown in
FIG. 1A , thecontroller 104 and the NVM block 110 are communicatively coupled by aninterface 114 that implements any known or after developed communication protocol. In embodiments where thestorage system 102 is flash memory, theinterface 114 is a flash interface, such asToggle Mode interface 114 can be implemented by several channels (i.e., physical connections) disposed between thecontroller 104 and the individual memory die 110-1-110-N. Furthermore, the number of channels over which theinterface 114 is established varies based on the capabilities of thecontroller 104. Additionally, a single channel can be configured to communicatively couple more than one memory die. The depiction of asingle interface 114 is not meant to be limiting. To the contrary, the single interface is representative of an example interface that can be used between components, and one or more interfaces can be used to communicatively couple the same components. -
FIG. 1B generally illustrates a block diagram of asystem architecture 100 according to the principles of the present disclosure. Thesystem architecture 100 can be implemented as part of a larger system architecture. For example, as shown inFIG. 1B , thesystem architecture 150 includes astorage module 156 that further includesseveral storage systems 102. Within theexample system architecture 150, thestorage module 156 is communicatively coupled with thehost 106 by way of astorage controller 152. In particular, aninterface 154 between thehost 106 and thestorage module 156 includes a bus interface that implements any known or after developed communication protocol, such as a serial advanced technology attachment (SATA) or peripheral component interface express (PCIe) interface. In some embodiments, thestorage module 156 is an SSD (e.g., in a laptop computer or a tablet). - Some implementations of the
system architecture 100 include a hierarchical storage system. A hierarchical storage system can include a plurality ofstorage controllers 152, each of which control arespective storage system 102. Furthermore, a plurality ofhosts 106 can each access the hierarchical storage system.Hosts 106 can access memories within the hierarchical storage system via a bus interface that implements any known or after developed communication protocol including a non-volatile memory express (NVMe) or a fiber channel over Ethernet (FCoE) interface. The hierarchical storage system can be implemented as a rack mounted storage system that is accessible by multiple host computers (e.g., a data center). - The
interface 154 can be implemented by several channels (i.e., physical connections) disposed between thestorage controller 152 and thestorage module 156. In some embodiments, the number of channels over which aninterface 154 is established varies based on the capabilities of thestorage controller 152. The depiction of a single interface is not meant to be limiting and the single interface is representative of an example interface that can be used between components, where one or more interfaces can be used to communicatively couple various components. -
FIG. 2A generally illustrates a block diagram 200 of thestorage system 102, according to the principles of the present disclosure. The block diagram 200 of thestorage system 102 includes components previously described inFIG. 1A , such as thecontroller 104 and theNVM memory block 110. Additional components that can be present within thestorage system 102 include a random access memory (RAM) 230, a read only memory (ROM) 232, andother components 234. In some embodiments, theROM 232 stores system boot code. - Although the
RAM 230 and theROM 232 are shown as separate modules within thestorage system 102, the illustrated architecture is not meant to be limiting. For example, theRAM 230 and theROM 232 can be located within thecontroller 104. In some embodiments, portions of theRAM 230 orROM 232, respectively, are located outside thecontroller 104 and within thecontroller 104. In other embodiments, thecontroller 104, theRAM 230, and theROM 232 can be located on separate semiconductor die. In various embodiments, theother components 234 include external electrical interfaces, external RAM, resistors, capacitors, logic gates, or other components that interface with thecontroller 104. - In some embodiments, the
controller 104 includes amodule 202 that interfaces with thehost 106, amodule 204 that interfaces with theNVM memory block 110, as well as various other modules, described further below. The modules within the controller (e.g.,modules 202 and 204) are communicatively coupled to each other by a bus 206. - The following discussion of the various modules depicted within the
controller 104 are meant to be illustrative and not limiting. For example, the various modules generally illustrated inFIG. 2A are not limited to being executed within thecontroller 104, and in some embodiments, one or more modules can be executed outside thecontroller 104. - The
module 202 interfaces with thehost 106 and includes ahost interface 208 and aphysical layer interface 210 that provides the electrical interface between thehost 106 or next level storage controller and thecontroller 104. Thehost interface 208 facilitates transferring of data, control signals, and timing signals. Examples of thehost interface 208 include SATA, SATA express, Serial Attached SCSI (SAS), Fibre Channel, USB, PCIe, and NVMe. - Still referring to
FIG. 2A , in various embodiments, themodule 204 is configured to communicate with theNVM block 110 and includes an error correcting code (ECC)engine 212. In some embodiments, theECC engine 212 encodes data received from thehost 106 and stores the encoded data in theNVM block 110. When the data is read out from theNVM memory block 110, theECC engine 212 decodes the data and corrects errors detected within the data To detect errors, theECC engine 212 implements various types of error checking using algorithms such as low-density parity-check (LDPC) code, Bose-Chaudhuri-Hocquenghem (BCH) code, a soft read, and/or extra parity. - The
example module 204 also includes asequencer 214 and a Redundant Array of Independent Drives (RAID)module 216. In various embodiments, thesequencer 214 generates command sequences, such as program and erase command sequences that are transmitted to theNVM memory block 110. TheRAID module 216 generates RAID parity and recovery of failed data. The RAID parity can be used to provide an additional level of integrity protection for data written into theNVM memory block 110. In some embodiments, theECC engine 212 implements the functions of theRAID module 216. - The
example module 204 also includes amemory interface 218 that provides the command sequences to theNVM memory block 110 and receives status information from theNVM memory block 110. For example, thememory interface 218 implements any known or after developed communication protocol including a double data rate (DDR) interface, such as aToggle Mode module 204 also includes aflash control layer 220 that controls the overall operation of themodule 204. - Still referring to example modules within the
controller 104 inFIG. 2A , additional modules within thecontroller 104 includes a dummy word line (DW)pattern generation module 222, a DWerror analysis module 224, and a readparameter adjustment module 226. Dummy word lines are placed on non-volatile memory die that are used for the purposes of analyzing and tracking behavior and health of a respective non-volatile memory die. In various embodiments, the DWpattern generation module 222 puts a known data pattern into a dummy word line and tracks or periodically check for errors by reading the data back out of the dummy word line and comparing the data to the known data pattern. - In various embodiments, the read
parameter adjustment module 226 adjusts parameters associated with a particular non-volatile memory die. For example—and as discussed further below—the readparameters adjustment module 226 can adjust parameters associated with a particular non-volatile memory die during an operation—i.e., a read or write—to adjust or re-adjust the read parameters. During the operation to re-adjust the read parameters, the readparameter adjustment module 226 adjusts the read parameters for a particular memory block, reads data out of the memory block, and verifies a resulting BER. If the resulting BER falls at or below a target or expected BER, the readparameters adjustment module 226 stores the read parameters for the memory block. Subsequently, the stored read parameters are used during a read of any word line within the memory block. Thus, read parameters can be unique to a memory block. - Additional modules within the
example controller 104 include a buffer manager/bus controller 228 that manages, for example, buffers in theRAM 230 and controls the internal bus arbitration of the bus 206 in thecontroller 104. Additionally, or alternatively, thecontroller 104 can include a media management layer 236 that performs wear leveling of theNVM memory block 110. As previously mentioned, the various modules described with respect to thecontroller 104 are not meant to be limiting as to the architecture of thecontroller 104. For example, thephysical layer interface 210, theRAID module 216, the media management layer 236, and the buffer management/bus controller 228 can be examples of optional components within thecontroller 104. - Furthermore, in embodiments where the
storage system 102 includes flash memory, the media management layer 236 can be integrated as part of the flash management that handles flash error and interfaces with thehost 106. In particular, the media management layer 236 can include an algorithm (e.g., firmware in the memory device), that translates a write command received from thehost 106 into a write to theNVM memory block 110. -
FIG. 2B generally illustrates a block diagram with various features of theNVM memory block 110 within thestorage system 102. As details of thecontroller 104 have been previously described (inFIG. 2A ), inFIG. 2B thecontroller 104 is illustrated as a single block. Additionally, previously describedRAM 230, theROM 232, and theother components 234 are included inFIG. 2B to help orient the reader. Next, details within an example memory die 110-1 are discussed. Although the discussion centers on the memory die 110-1, each of the features discussed in relation to the memory die 110-1 equally applies to all of the memory dies withinNVM memory block 110. - In some embodiments, the example memory die 110-1 includes
control circuit 250, read/writecircuits 252, a row decoder 254, acolumn decoder 256, and amemory array 260. Thememory array 260 can include a two-dimensional array or a three-dimensional array of memory cells. The read/write circuits 252 read and program pages of memory within the memory die 110-1, in parallel. In various embodiments, thememory array 260 is accessed by word lines via the row decoder 254 and by bit lines via thecolumn decoder 256. - The architecture of the memory die 110-1 is not meant to be limiting and any known architecture that can perform the functions of accessing the
memory array 260 can be used without departing from the scope of this disclosure. For example, in various embodiments, access to thememory array 260 by various peripheral circuits can be implemented in a symmetric fashion on opposite sides of thememory array 260, which reduces the densities of access lines, and circuitry on each side of thememory array 260. - Still referring to
FIG. 2B , in various embodiments, theexample control circuit 250 includes apower control circuit 266, anaddress decoder 268, and astate machine 270. In some embodiments, thepower control circuit 266, theaddress decoder 268, and thestate machine 270 can be collectively referred to as managing circuits. Thecontrol circuit 250 and its various managing circuits are communicatively coupled by various interfaces (e.g., interfaces 262 and 264) to the row decoder 254 and thecolumn decoder 256. In various embodiments, thecontrol circuit 250 performs various operations on thememory array 260 that include reading or writing to the memory cells. - The
power control circuit 266 controls the power and voltage supplied to the word lines and bit lines during operation of thememory array 260. Theaddress decoder 268 provides an address interface that translates addresses between addresses provided by thehost 106 and addresses used by the row decoder 254 and thecolumn decoder 256. Theexample address decoder 268 converts an address provided by thehost 106 to an address that is understood and compatible with a format used by the row decoder 254 and thecolumn decoder 256. Thestate machine 270 provides chip-level control of memory operations. - Thus, the
storage system 102 includes various components including thecontroller 104 and theNVM memory block 110, details of which have been described above inFIGS. 1A, 1B, 2A, and 2B . The discussion now turns to an example architecture of anexample memory array 260 and in particular methods that can be performed to improve a performance of a read in thestorage system 102. -
FIG. 3 further illustrates thememory array 260. Thememory array 260 is divided into several memory blocks 302. In flash memory, a memory block is defined as a unit of erase. That is, eachmemory block 302 includes a number of memory cells that are erased together or as a block. In some embodiments, thememory array 260 can be partitioned into any number of blocks, for example, thememory array 260 includes 1,024 blocks. Additionally, or alternatively, each of the memory blocks 302 can conceptually be divided into a number of pages defined as a unit of programming. In some embodiments, a page of data can be stored in one row of memory cells. Each page can include user data and overhead data, where the overhead data includes CC that has been calculated from the user data. In some embodiments, the memory blocks 302-1 to 302-N may include solid-state NAND memory blocks. - Each
memory block 302, for example memory block 302-1, includes multiple bit lines 304, word lines 306, and select lines 308. Each bit line, for example bit line 304-1, is connected to several memory cells connected in series. More particularly, in an embodiment where each memory cell is a floating gate transistor, the floating gate transistors are connected in series to form a NAND string 310 (e.g., illustrated within the dashed box). Although four memory cells are shown inFIG. 3 , the number of memory cells within the NAND string is not meant to be limiting. For example, 16, 32, 64, 128, or any other number of memory cells can be connected in a NAND string. Each respective bit line 304 is coupled to a respective NAND string within theblock 302. - Still referring to
FIG. 3 , a method of reading data stored in a particular memory cell—e.g.,memory cell 316—includes applying a voltage to the select lines 308 of theblock 302, which in turn are coupled to respective NAND strings within theblock 302, including theNAND string 310 the includes thememory cell 316. The voltage applied to the select lines 308 is greater than threshold voltages of theselect transistors select transistor 312 is controlled by the select gate drain line (SGD) 308-1 and theselect transistor 314 is controlled by the select gate source line (SGS) 308-2. Additionally, in order to read data in thememory cell 316, all other memory cells or unselected memory cells in the NAND string 319 are turned on (e.g., conducting current regardless of whether they are programmed or erased). The unselected memory cells have a read pass voltage—i.e., read parameters—applied to their respective word lines that turn on the unselected memory cells. - During the example read operation, various read compare levels—i.e., voltages—are applied to the word line 306-2 to determine the value stored in the
memory cell 316. In some embodiments, the conduction current of thememory cell 316 is measured to determine the value stored within thememory cell 316. The method in which each memory cell is accessed and the number of memory cells accessed during a read or write varies. For example, all of the bit lines of the memory block 302-1 can be simultaneously programmed or read. In various embodiments, memory cells along a shared word line can be programmed at the same time (i.e., concurrently). In other embodiments, the bit lines can be divided into even bit lines and odd bit lines. In an odd/even bit line architecture, memory cells along a shared word line and connected to the odd bit lines are programmed at one time, while memory cells along a shared word line and connected to an even bit line are programmed at a different time. - Each time data is written to a memory block the data is processed by the
ECC engine 212 which includes encoding the data (e.g., using a particular error correction code) and storing the encoded data in the memory block. When the data is read back out of the memory block, the data is processed by theECC engine 212 which includes decoding the data, correcting errors (e.g., tracked as the BER), and returning the data to a user (by way of the controller 104). In some embodiments, the amount of time theECC engine 212 takes to return data to thecontroller 104 is defined as the throughput time. - In some embodiments, the
controller 104 performs data consolidation operations on thememory array 260. Thecontroller 104 selects a source block from the memory block 302-1 to memory block 302-N of thememory array 260, for consolidation or compaction. For example, thecontroller 104 may select memory block 302-1 as the source block for consolidation or compaction. The memory block 302-1 may be referred to as the source block 302-1 throughout the example embodiments described herein. The source block 302-1 may include a plurality of memory fragments, such as 16 memory fragments or any suitable number of memory fragments. The memory fragments may include data written by thehost 106 during a host write operation. The memory fragments may belong to respective logical groups and may be scattered or disorganized in the source block 302-1, such that memory fragments associated with the same logical group may not be sequentially stored or organized in the source block 302-1. Additionally, or alternatively, while some memory fragments include data written by thehost 106 during a host write operation, other memory fragments scattered throughout the source block 302-1 may be blank (e.g., having been erased by thehost 106 or thecontroller 104 or having not been written to by the host 106). - In some embodiments, the
controller 104 may be configured to detect defects in the memory blocks 302-1 to 302-N by performing one or more defect detection operations on the memory blocks 302-1 to 302-N during performance of a standard erase operation on the memory blocks 302-1 to 302-N. Thecontroller 104 may receive a command to perform a standard erase operation on one or more of the memory blocks 302-1 to 302-N. It should be understood that the command to perform the standard erase operation may be performed on one or more memory cells of the memory blocks 302-1 to 302-N or one or more memory blocks of the memory blocks 302-1 to 302-N. Thecontroller 104 may receive the command to perform the standard erase operation from thehost 106 or other suitable source. - Before performing the standard erase operation on the one or more memory blocks 302-1 to 302-N, the
controller 104 may perform one or more defect detection operations of a plurality of defect detection operations. The plurality of defect detection operations may include operations to detect word line to word line defects of the one or more memory blocks 302-1 to 302-N, word line to memory hole defects of the one or more memory blocks 302-1 to 302-N, word line to dummy memory hole defects of the one or more memory blocks 302-1 to 302-N, word line to hole replacement defects of the one or more memory blocks 302-1 to 302-N, select gate source line defects of the one or more memory blocks 302-1 to 302-N, memory hole open defects of the one or more memory blocks 302-1 to 302-N, other suitable defect detection operations for detecting other defects, or a combination thereof. Thecontroller 104 may perform any number of the plurality of defect detection operations on the one or more memory blocks 302-1 to 302-N. - When the
controller 104 detects one or more defects in a memory block of the one or more memory blocks 302-1 to 302-N by performing one or more of the plurality of defect detection operations before performing the standard erase operation on the one or more memory blocks 302-1 to 302-N, thecontroller 104 sets a defect status indicator. It should be understood that thecontroller 104 performs the one or more defect detection operations on each memory blocks of the one or more memory blocks 302-1 to 302-N. The one or more defects may include any defect, such as memory leakage, other suitable defects, or a combination thereof. The defect status indicator indicates that a defect will occur in the memory block or that a defect has occurred in the memory block. The defect status indicator may include any suitable indicator, such as a value set in a register, an indication in the header information of the defective memory block, other suitable indicators, or a combination thereof. In some embodiments, the status indicator may be set to a first value indicating a defect in the memory block and may be set to a second value indicating no defects were detected in the memory block. - The
controller 104 may then perform the standard erase operation on the one or more memory blocks 302-1 to 302-N. After performing the standard erase operation on the one or more memory blocks 302-1 to 302-N, thecontroller 104 may perform one or more defect detection operations of a plurality of defect detection operations. Thecontroller 104 may perform any number of the plurality of defect detection operations on the one or more memory blocks 302-1 to 302-N. When thecontroller 104 detects one or more defects in a memory block of the one or more memory blocks 302-1 to 302-N by performing one or more of the plurality of defect detection operations after performing the standard erase operation on the one or more memory blocks 302-1 to 302-N, thecontroller 104 sets the defect status indicator, as described. - In some embodiments, the
controller 104 reads the defect status indicator in response to receiving a subsequent command to perform operations on the memory blocks 302-1 to 302-N. Thecontroller 104 identifies memory blocks of the memory blocks 302-1 to 302-N to skip or not use during performance of the subsequent operations based on the defect status indicator. For example, when the defect status indicator indicates that a first memory block of the memory blocks 302-1 to 302-N has a defect or that a defect will occur, thecontroller 104 determines to not use (e.g., skip) the first memory block when performing the subsequent operations on the memory blocks 302-1 to 302-N. - In some embodiments, the
controller 104 may perform the methods described herein. However, the methods described herein as performed by thecontroller 104 are not meant to be limiting, and any type of software executed on a controller can perform the methods described herein without departing from the scope of this disclosure. For example, a controller such as a processor executing software within thehost 106 or firmware within the storage system 102 (e.g., stored onROM 232 or NVM memory block 110) can perform the methods described herein. -
FIG. 4 is a flow diagram illustrating a memorydefect detection method 400 according to the principles of the present disclosure. At 402, themethod 400 receives a command to perform a standard erase operation. For example, thecontroller 104 receives the command to perform the standard erase operation on the one or more memory blocks 302-1 to 302-N, as described. At 404, themethod 400 performs one or more defect detection operations. For example, thecontroller 104 performs one or more defect detection operations of the plurality of defect detection operations on the one or more memory blocks 302-1 to 302-N before performing the standard erase operation on the one or more memory blocks 302-1 to 302-N. - At 406, the method determines whether a defect was detected. For example, the
controller 104 determines whether one or more defects were detected in memory blocks of the one or more memory blocks 302-1 to 302-N before performing the standard erase operation. When thecontroller 104 determines that one or more defects were detected in at least one memory block of the one or more memory blocks 302-1 to 302-N, themethod 400 continues at 408. When thecontroller 104 determines that no defects were detected in the one or more memory blocks 302-1 to 302-N, themethod 400 continues at 410. At 408, themethod 400 sets a defect status indicator. For example, thecontroller 104 sets the defect status indicator indicating that one or more defects exist in or may occur in the at least one memory block of the one or more memory blocks 302-1 to 302-N. - At 410, the
method 400 performs the standard erase operation. For example, thecontroller 104 performs the standard erase operation on the one or more memory blocks 302-1 to 302-N. At 412, themethod 400 performs one or more defect detection operations. For example, thecontroller 104 performs one or more defect detection operations of the plurality of defect detection operations on the one or more memory blocks 302-1 to 302-N after performing the standard erase operation on the one or more memory blocks 302-1 to 302-N. - At 414, the method determines whether a defect was detected. For example, the
controller 104 determines whether one or more defects were detected in memory blocks of the one or more memory blocks 302-1 to 302-N, after performing the standard erase operation. When thecontroller 104 determines that one or more defects were detected in at least one memory block of the one or more memory blocks 302-1 to 302-N, themethod 400 continues at 416. When thecontroller 104 determines that no defects were detected in the one or more memory blocks 302-1 to 302-N, themethod 400 continues at 418. At 416, themethod 400 sets the defect status indicator. For example, thecontroller 104 sets the defect status indicator indicating that one or more defects exist in or may occur in the at least one memory block of the one or more memory blocks 302-1 to 302-N. At 418, themethod 400 ends. - In some embodiments, a method for detecting defects in a memory system includes receiving a command to perform a standard erase operation on at least one memory cell of the memory system. The method also includes performing a first defect detection operation on the at least one memory cell. The method also includes setting, in response to the first defect detection operation detecting a defect, a defect status indicator. The method also includes performing the standard erase operation on the at least one memory cell. The method also includes performing a second defect detection operation on the at least one memory cell. The method also includes setting, in response to the second defect detection operation detecting a defect, the defect status indicator.
- In some embodiments, at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to word line defects of the at least one memory cell. In some embodiments, at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to memory hole defects of the at least one memory cell. In some embodiments, at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to dummy memory hole defects of the at least one memory cell. In some embodiments, at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to hole replacement defects of the at least one memory cell. In some embodiments, at least one of the first defect detection operation and the second defect detection operation is configured to detect select gate source line defects of the at least one memory cell. In some embodiments, at least one of the first defect detection operation and the second defect detection operation is configured to detect memory hole open defects of the at least one memory cell. In some embodiments, the method also includes performing one or more other defect detection operations on the at least one memory cell, prior to performing the standard erase operation on the at least one memory cell. In some embodiments, the method also includes performing one or more other defect detection operations on the at least one memory cell, after performing the standard erase operation on the at least one memory cell.
- In some embodiments, a controller includes a bus interface and a processor. The bus interface is in communication with one or more memory blocks of a memory system. The processor is in communication with the bus interface and configured to: receive a command to perform a standard erase operation on at least one memory block of the memory system; perform a first defect detection operation on the at least one memory block; set, in response to the first defect detection operation detecting a defect, a defect status indicator; perform the standard erase operation on the at least one memory block; perform a second defect detection operation on the at least one memory block; and set, in response to the second defect detection operation detecting a defect, the defect status indicator.
- In some embodiments, at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to word line defects of the at least one memory block. In some embodiments, at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to memory hole defects of the at least one memory block. In some embodiments, at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to dummy memory hole defects of the at least one memory block. In some embodiments, at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to hole replacement defects of the at least one memory block. In some embodiments, at least one of the first defect detection operation and the second defect detection operation is configured to detect select gate source line defects of the at least one memory block. In some embodiments, at least one of the first defect detection operation and the second defect detection operation is configured to detect memory hole open defects of the at least one memory block. In some embodiments, the processor is further configured to perform one or more other defect detection operations on the at least one memory block, prior to performing the standard erase operation on the at least one memory block. In some embodiments, the processor is further configured to perform one or more other defect detection operations on the at least one memory block, after performing the standard erase operation on the at least one memory block.
- In some embodiments, a memory defect detection method includes receiving a command to perform a standard erase operation on at least one memory cell of a memory system. The method also includes performing, prior to performing the standard erase operation on the at least one memory cell, a first plurality of defect detection operations on the at least one memory cell. The method also includes setting, in response to the first plurality of defect detection operations detecting at least one defect, a defect status indicator. The method also includes performing the standard erase operation on the at least one memory cell. The method also includes performing a second plurality of defect detection operations on the at least one memory cell. The method also includes setting, in response to the second plurality of defect detection operations detecting at least one defect, the defect status indicator.
- In some embodiments, the method also includes, in response to the defect status indicator being set, skipping the at least one memory cell during performance of a subsequent operation.
- The above discussion is meant to be illustrative of the principles and various embodiments of the present invention. Numerous variations and modifications will become apparent to those skilled in the art once the above disclosure is fully appreciated. It is intended that the following claims be interpreted to embrace all such variations and modifications. In the preceding description and in the claims, the terms “including” and “comprising” are used in an open-ended fashion, and thus should be interpreted to mean “including, but not limited to . . . .” In addition, the term “couple” or “couples” is intended to mean either an indirect or a direct connection. Thus, if a first device couples to a second device, that connection may be through a direct connection or through an indirect connection via other devices and connections.
- The word “example” is used herein to mean serving as an example, instance, or illustration. Any aspect or design described herein as “example” is not necessarily to be construed as preferred or advantageous over other aspects or designs. Rather, use of the word “example” is intended to present concepts in a concrete fashion. As used in this application, the term “or” is intended to mean an inclusive “or” rather than an exclusive “or.” That is, unless specified otherwise, or clear from context, “X includes A or B” is intended to mean any of the natural inclusive permutations. That is, if X includes A; X includes B; or X includes both A and B, then “X includes A or B” is satisfied under any of the foregoing instances. In addition, the articles “a” and “an” as used in this application and the appended claims should generally be construed to mean “one or more” unless specified otherwise or clear from context to be directed to a singular form. Moreover, use of the term “an implementation” or “one implementation” throughout is not intended to mean the same embodiment or implementation unless described as such.
- Implementations the systems, algorithms, methods, instructions, etc., described herein can be realized in hardware, software, or any combination thereof. The hardware can include, for example, computers, intellectual property (IP) cores, application-specific integrated circuits (ASICs), programmable logic arrays, optical processors, programmable logic controllers, microcode, microcontrollers, servers, microprocessors, digital signal processors, or any other suitable circuit. In the claims, the term “processor” should be understood as encompassing any of the foregoing hardware, either singly or in combination. The terms “signal” and “data” are used interchangeably.
- As used herein, the term module can include a packaged functional hardware unit designed for use with other components, a set of instructions executable by a controller (e.g., a processor executing software or firmware), processing circuitry configured to perform a particular function, and a self-contained hardware or software component that interfaces with a larger system. For example, a module can include an application specific integrated circuit (ASIC), a Field Programmable Gate Array (FPGA), a circuit, digital logic circuit, an analog circuit, a combination of discrete circuits, gates, and other types of hardware or combination thereof. In other embodiments, a module can include memory that stores instructions executable by a controller to implement a feature of the module. In some embodiments, the
controller 104 is implemented within thehost 106 can be configured with hardware and/or firmware to perform the various functions described herein. - “Controller” shall mean individual circuit components, an application-specific integrated circuit (ASIC), a microcontroller with controlling software, a digital signal processor (DSP), a processor with controlling software, a field programmable gate array (FPGA), or combinations thereof.
- Further, in one aspect, for example, systems described herein can be implemented using a general-purpose computer or general-purpose processor with a computer program that, when executed, carries out any of the respective methods, algorithms, and/or instructions described herein. In addition, or alternatively, for example, a special purpose computer/processor can be utilized which can contain other hardware for carrying out any of the methods, algorithms, or instructions described herein.
- Further, all or a portion of implementations of the present disclosure can take the form of a computer program product accessible from, for example, a computer-usable or computer-readable medium. A computer-usable or computer-readable medium can be any device that can, for example, tangibly contain, store, communicate, or transport the program for use by or in connection with any processor. The medium can be, for example, an electronic, magnetic, optical, electromagnetic, or a semiconductor device. Other suitable mediums are also available.
- The above-described embodiments, implementations, and aspects have been described in order to allow easy understanding of the present invention and do not limit the present invention. On the contrary, the invention is intended to cover various modifications and equivalent arrangements included within the scope of the appended claims, which scope is to be accorded the broadest interpretation to encompass all such modifications and equivalent structure as is permitted under the law.
Claims (20)
1. A method for detecting defects in a memory system, the method comprising:
receiving a command to perform a standard erase operation on at least one memory cell of the memory system;
performing a first defect detection operation on the at least one memory cell;
setting, in response to the first defect detection operation detecting a defect, a defect status indicator;
performing the standard erase operation on the at least one memory cell;
performing a second defect detection operation on the at least one memory cell; and
setting, in response to the second defect detection operation detecting a defect, the defect status indicator, wherein
at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to dummy memory hole defects of the at least one memory cell.
2. The method of claim 1 , wherein at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to word line defects of the at least one memory cell.
3. The method of claim 1 , wherein at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to memory hole defects of the at least one memory cell.
4. (canceled)
5. The method of claim 1 , wherein at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to hole replacement defects of the at least one memory cell.
6. The method of claim 1 , wherein at least one of the first defect detection operation and the second defect detection operation is configured to detect select gate source line defects of the at least one memory cell.
7. The method of claim 1 , wherein at least one of the first defect detection operation and the second defect detection operation is configured to detect memory hole open defects of the at least one memory cell.
8. The method of claim 1 , further comprising, performing one or more other defect detection operations on the at least one memory cell, prior to performing the standard erase operation on the at least one memory cell.
9. The method of claim 1 , further comprising, performing one or more other defect detection operations on the at least one memory cell, after performing the standard erase operation on the at least one memory cell.
10. A controller comprising:
a bus interface in communication with one or more memory blocks of a memory system; and
a processor configured to:
receive a command to perform a standard erase operation on at least one memory block of the memory system;
perform a first defect detection operation on the at least one memory block;
set, in response to the first defect detection operation detecting a defect, a defect status indicator;
perform the standard erase operation on the at least one memory block;
perform a second defect detection operation on the at least one memory block; and
set, in response to the second defect detection operation detecting a defect, the defect status indicator, wherein
at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to dummy memory hole defects of the at least one memory block.
11. The controller of claim 10 , wherein at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to word line defects of the at least one memory block.
12. The controller of claim 10 , wherein at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to memory hole defects of the at least one memory block.
13. (canceled)
14. The controller of claim 10 , wherein at least one of the first defect detection operation and the second defect detection operation is configured to detect word line to hole replacement defects of the at least one memory block.
15. The controller of claim 10 , wherein at least one of the first defect detection operation and the second defect detection operation is configured to detect select gate source line defects of the at least one memory block.
16. The controller of claim 10 , wherein at least one of the first defect detection operation and the second defect detection operation is configured to detect memory hole open defects of the at least one memory block.
17. The controller of claim 10 , wherein the processor is further configured to perform one or more other defect detection operations on the at least one memory block, prior to performing the standard erase operation on the at least one memory block.
18. The controller of claim 10 , wherein the processor is further configured to perform one or more other defect detection operations on the at least one memory block, after performing the standard erase operation on the at least one memory block.
19. A memory defect detection method comprising:
receiving a command to perform a standard erase operation on at least one memory cell of a memory system;
performing, prior to performing the standard erase operation on the at least one memory cell, a first plurality of defect detection operations on the at least one memory cell;
setting, in response to the first plurality of defect detection operations detecting at least one defect, a defect status indicator;
performing the standard erase operation on the at least one memory cell;
performing a second plurality of defect detection operations on the at least one memory cell; and
setting, in response to the second plurality of defect detection operations detecting at least one defect, the defect status indicator.
20. The method of claim 19 , wherein, in response to the defect status indicator being set, skipping the at least one memory cell during performance of a subsequent operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/440,212 US10886002B1 (en) | 2019-06-13 | 2019-06-13 | NAND field use erase plus defect detections |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/440,212 US10886002B1 (en) | 2019-06-13 | 2019-06-13 | NAND field use erase plus defect detections |
Publications (2)
Publication Number | Publication Date |
---|---|
US20200395092A1 true US20200395092A1 (en) | 2020-12-17 |
US10886002B1 US10886002B1 (en) | 2021-01-05 |
Family
ID=73746044
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/440,212 Active US10886002B1 (en) | 2019-06-13 | 2019-06-13 | NAND field use erase plus defect detections |
Country Status (1)
Country | Link |
---|---|
US (1) | US10886002B1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11587618B2 (en) | 2021-03-26 | 2023-02-21 | Sandisk Technologies Llc | Prevention of latent block fails in three-dimensional NAND |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007265589A (en) * | 2006-03-30 | 2007-10-11 | Fujitsu Ltd | Nonvolatile semiconductor memory |
US8902657B2 (en) * | 2012-09-07 | 2014-12-02 | Kabushiki Kaisha Toshiba | Semiconductor memory device and controller |
US10002042B2 (en) * | 2015-10-22 | 2018-06-19 | Sandisk Technologies Llc | Systems and methods of detecting errors during read operations and skipping word line portions |
US9997258B2 (en) * | 2016-05-10 | 2018-06-12 | Sandisk Technologies Llc | Using non-volatile memory bad blocks |
CN114546293A (en) * | 2017-09-22 | 2022-05-27 | 慧荣科技股份有限公司 | Data internal moving method of flash memory and device using the same |
KR102461103B1 (en) * | 2018-07-10 | 2022-11-01 | 에스케이하이닉스 주식회사 | Memory device, memory system and operating method of memory device |
US11030096B2 (en) * | 2019-01-10 | 2021-06-08 | Western Digital Technologies, Inc. | Method of identifying and preparing a key block in a flash memory system and memory controller therefor |
-
2019
- 2019-06-13 US US16/440,212 patent/US10886002B1/en active Active
Also Published As
Publication number | Publication date |
---|---|
US10886002B1 (en) | 2021-01-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10002042B2 (en) | Systems and methods of detecting errors during read operations and skipping word line portions | |
US9886341B2 (en) | Optimizing reclaimed flash memory | |
US11030096B2 (en) | Method of identifying and preparing a key block in a flash memory system and memory controller therefor | |
US11003373B2 (en) | Systems and methods for managing physical-to- logical address information | |
US11487454B2 (en) | Systems and methods for defining memory sub-blocks | |
US10658045B1 (en) | Enhanced solid-state drive write performance with background erase | |
US11126368B2 (en) | Systems and methods for finding a last good page in NAND open block | |
US10725687B1 (en) | Settable replay protected memory block characteristics in a logic unit | |
US10884628B2 (en) | Performance of a read in a memory system | |
KR20200100167A (en) | Uncorrectable ECC | |
US11106518B2 (en) | Failure mode study based error correction | |
US10734081B1 (en) | Pulse-amplitude modulation for a multiple die memory device | |
US11082036B2 (en) | Memory interface system for duty-cycle error detection and correction | |
US10755798B2 (en) | Recovering data from a faulty memory block in a memory system | |
US10886002B1 (en) | NAND field use erase plus defect detections | |
US20200226064A1 (en) | Method of reverse mapping and data consolidation to enhance random performance | |
US11244735B2 (en) | Systems and methods for program verification on a memory system | |
US10991447B2 (en) | Clock frequency counting during high-voltage operations for immediate leakage detection and response | |
US11106575B2 (en) | Systems and methods for data storage in a memory system | |
US10984883B1 (en) | Systems and methods for capacity management of a memory system | |
CN113508434B (en) | System and method for defining memory subblocks | |
US10937510B2 (en) | Multidimensional pseudorandom binary sequence analysis for a memory device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: SANDISK TECHNOLOGIES LLC, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:RAJAGIRI, AVINASH;KRISHNAMOORTHY, YUVARAJ;LINNEN, DANIEL;AND OTHERS;SIGNING DATES FROM 20190525 TO 20191113;REEL/FRAME:050995/0957 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |