Micron Technology, Inc.
IDENTIFICATION AND CACHING OF FREQUENT READ DISTURB AGGRESSORS
Last updated:
Abstract:
Exemplary methods, apparatuses, and systems include receiving a read operation directed to an aggressor location. An integrity scan of a victim location of the aggressor location is performed to determine an error value for the victim location. Data from the aggressor location is copied to a cache in response to determining the error value for the victim location satisfies a first error value threshold. The cache is a different type of memory from the aggressor location.
Status:
Application
Type:
Utility
Filling date:
4 Dec 2020
Issue date:
9 Jun 2022