Micron Technology, Inc.
Managing probabilistic data integrity scans in workloads with localized read patterns

Last updated:

Abstract:

Exemplary methods, apparatuses, and systems include receiving read operations. The read operations are divided into a current set of a sequence of read operations and one or more other sets of sequences of read operations. An aggressor read operation is selected from the current set. A data integrity scan is performed on a victim of the aggressor read operation. A read margin for a victim of the aggressor read operation is determined based on the error rate. An identifier associated with the aggressor is added to a cache and a counter for the identifier added to the cache is initialized based upon the determined read margin.

Status:
Grant
Type:

Utility

Filling date:

4 Dec 2020

Issue date:

9 Aug 2022