Abstract:
Error correction is tailored for the use of an ECC for correcting asymmetric errors with low magnitude in a data device, with minimal modifications to the conventional data device architecture. The technique permits error correction and data recovery to be performed with reduced-size error correcting code alphabets. For particular cases, the technique can reduce the problem of constructing codes for correcting limited magnitude asymmetric errors to the problem of constructing codes for symmetric errors over small alphabets. Also described are speed up techniques for reaching target data levels more quickly, using more aggressive memory programming operations.
Abstract:
An embodiment of the present invention implements some or all major servo subfunctions for a storage device in integrated servo fields comprising sequences of encoded bits having selected mathematical properties. The integrated servo field is composed of a number of encoded sequences, which are members of a selected sequence set that is constrained to preferably provide some or all of the following functions: the Servo Track Mark (STM), the Position Error Signal (PES) and positional information such as the track-ID. In one embodiment the plurality sequences encoding a location identifier such as a track-ID are distributed across a set of servo wedges. A method of encoding the location identifier using a Chinese Remainder Theorem is described.
Abstract:
Error correction is tailored for the use of an ECC for correcting asymmetric errors with low magnitude in a data device, with minimal modifications to the conventional data device architecture. The technique permits error correction and data recovery to be performed with reduced-size error correcting code alphabets. For particular cases, the technique can reduce the problem of constructing codes for correcting limited magnitude asymmetric errors to the problem of constructing codes for symmetric errors over small alphabets. Also described are speed up techniques for reaching target data levels more quickly, using more aggressive memory programming operations.
Abstract:
A multi-level cell flash memory storage device has cells wherein different charge levels represent different information. The storage device can read stored charge from one or more cells, store a rewrite generation value for a group of a plurality of cells in a block of cells, and write to cells, wherein writing to one or more cells without an erase includes an increment of the rewrite generation value, and includes circuitry for reading from cells, including circuitry for reading the rewrite generation value. The storage device can include circuitry for reading from cells includes within the multi-level cell flash memory storage device logic for calculating a stored value of the cells using the rewrite generation value and relative levels of charge on a plurality of cells. The storage device can track hot addresses and cold addresses and perform static or dynamic wear leveling based on accumulated rewrite generation values.
Abstract:
A method is described for allowing disk drives, such as shingle-written magnetic recording (SMR) drives, to be shipped for customer use with portions of the magnetic media being left untested. The testing is then completed by the drive self-testing in the field. The drive is made functional at the factory by fully testing at least one operational set of regions including an I-region, an E-region and a write cache region. The operational set of regions works as a separate self-contained virtual disk drive and can be used immediately. The remaining untested areas on the media can be tested in the field by a background task and/or when the first write command is received that requires a new track or operational set of regions (on-the fly testing).
Abstract:
Methods are described that allow disk drives, such as shingle-written magnetic recording (SMR) drives, to recover an Indirection Address Table mapping of LBAs to PBAs after an emergency power off (EPO). Indirection Address Table (IAT) snapshots are periodically written inline with user data stores, and in one embodiment Cumulative Delta Lists (CDLs) with incremental address update information are stored between snapshots. In an embodiment of the invention, when an imminent loss of power is detected, the current CDL, covering IAT updates not yet written to disk, is saved to a nonvolatile memory. The IAT snapshots combined with the set of CDLs provide the information needed to recreate the current Indirection Address Table when power is restored after an emergency power loss. In an alternative embodiment the CDL is obviated by including metadata in the sector that encodes the address indirection mapping and the last snapshot ID.
Abstract:
A method and apparatus are provided for implementing secure erase for solid state drives (SSDs). An encryption key is used to encrypt data being written to SSD. A controller identifies a key storage option, and responsive to the identified key storage option, stores a key for data encryption and decryption. The controller deletes the key within the SSD responsive to the identified key storage option, ensuring that once the key is deleted, the key is not recoverable and data is effectively erased.
Abstract:
A method is described for allowing disk drives, such as shingle-written magnetic recording (SMR) drives, to be shipped for customer use with portions of the magnetic media being left untested. The testing is then completed by the drive self-testing in the field. The drive is made functional at the factory by fully testing at least one operational set of regions including an I-region, an E-region and a write cache region. The operational set of regions works as a separate self-contained virtual disk drive and can be used immediately. The remaining untested areas on the media can be tested in the field by a background task and/or when the first write command is received that requires a new track or operational set of regions (on-the fly testing).
Abstract:
A method and apparatus are provided for implementing secure erase for solid state drives (SSDs). An encryption key is used to encrypt data being written to SSD. A controller identifies a key storage option, and responsive to the identified key storage option, stores a key for data encryption and decryption. The controller deletes the key within the SSD responsive to the identified key storage option, ensuring that once the key is deleted, the key is not recoverable and data is effectively erased.
Abstract:
Methods are described that allow disk drives, such as shingle-written magnetic recording (SMR) drives, to recover an Indirection Address Table mapping of LBAs to PBAs after an emergency power off (EPO). Indirection Address Table (IAT) snapshots are periodically written inline with user data stores, and in one embodiment Cumulative Delta Lists (CDLs) with incremental address update information are stored between snapshots. In an embodiment of the invention, when an imminent loss of power is detected, the current CDL, covering IAT updates not yet written to disk, is saved to a nonvolatile memory. The IAT snapshots combined with the set of CDLs provide the information needed to recreate the current Indirection Address Table when power is restored after an emergency power loss. In an alternative embodiment the CDL is obviated by including metadata in the sector that encodes the address indirection mapping and the last snapshot ID.