US20140157043A1 - Memories utilizing hybrid error correcting code techniques - Google Patents
Memories utilizing hybrid error correcting code techniques Download PDFInfo
- Publication number
- US20140157043A1 US20140157043A1 US13/997,713 US201213997713A US2014157043A1 US 20140157043 A1 US20140157043 A1 US 20140157043A1 US 201213997713 A US201213997713 A US 201213997713A US 2014157043 A1 US2014157043 A1 US 2014157043A1
- Authority
- US
- United States
- Prior art keywords
- memory
- ecc
- region
- techniques
- addresses
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/1666—Error detection or correction of the data by redundancy in hardware where the redundant component is memory or memory area
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
- G06F11/1008—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's in individual solid state devices
- G06F11/1048—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's in individual solid state devices using arrangements adapted for a specific error detection or correction feature
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C29/00—Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
- G11C29/04—Detection or location of defective memory elements, e.g. cell constructio details, timing of test signals
- G11C2029/0411—Online error correction
Definitions
- Embodiments of the invention relate to memory systems. More particularly, embodiments of the invention relate to utilization of hybrid error correcting code techniques to provide more efficient memories.
- ECC Error correcting code
- FIG. 1 is a conceptual illustration of an example memory map including both ECC protected regions and non-ECC protected regions.
- FIG. 2 is a block diagram of one embodiment of an electronic system.
- FIG. 3 is a block diagram of one embodiment of a memory subsystem with selectable ECC processing.
- FIG. 4 is a flow diagram of a technique for selective use of ECC techniques.
- Partial write memory throughput performance as part of ECC protection can experience up to a 70% degradation due to a Read/Modify/Write process for the checksum calculation required by ECC techniques.
- This performance degradation in partial writes can be a severe problem, for example, for integrated graphics performance because integrated graphics frequently update the frame buffer stored in system memory with numerous partial writes.
- applying ECC to integrated graphics results in performance degradation that may outweigh the benefits of ECC protection. This may be applicable to other situations as well.
- non-ECC window or area in a memory map This is an area in the memory map where ECC operations (e.g., Read/Modify/Write, compute checksum) do not apply. In one embodiment, this area is specified by a starting address and size or range; however, other techniques for specifying the non-ECC window can also be utilized.
- the area of system memory reserved for integrated graphics would be assigned to a non-ECC window.
- the same may also apply to video encode and video decode blocks that also share system memory normally protected by ECC.
- These regions for integrated graphics as well as video encode and decode do not require the protection that ECC affords because, if a pixel has an error and appears as the wrong color, it will be on the screen for 1/24 or 1/60 of a second, for example, depending on the refresh rate. This may not be noticeable to a user.
- Various embodiments of the techniques described herein utilize one or more registers (or other storage mechanisms) to define one or more non-ECC windows in a memory protected by ECC techniques, as well as logic that checks incoming addresses for reads and writes in the memory controller against the window. For addresses that fall within the non-ECC window, the partial writes will not incur the read-merge-checksum-compute-write penalty, but rather be written directly with the checksum value being a “don't care.” For reads, the checksum may be ignored and checksum errors suppressed.
- FIG. 1 is a conceptual illustration of an example memory map including both ECC protected regions and non-ECC protected regions.
- the example of FIG. 1 illustrates only one ECC-free region; however, any number of ECC-free regions can be supported in a similar manner.
- the example of FIG. 1 illustrates the ECC-free region near the “top” of the memory region; however, the ECC-free region(s) can be placed in other locations as well.
- ECC-Protected region 130 includes conventional memory space (e.g., 0 to 640 kb), upper memory space (e.g., 640 kb to 1 Mb) and a portion of extended memory space (e.g., 1 Mb and higher).
- ECC-free region 120 is within the extended memory space.
- there is also ECC-protected region 110 above ECC-free area 120 In alternate embodiments, multiple ECC-free areas may be created within the extended memory space.
- FIG. 2 is a block diagram of one embodiment of an electronic system.
- the electronic system illustrated in FIG. 2 is intended to represent a range of electronic systems (either wired or wireless) including, for example, desktop computer systems, laptop computer systems, cellular telephones, personal digital assistants (PDAs) including cellular-enabled PDAs, set top boxes.
- Alternative electronic systems may include more, fewer and/or different components.
- the electronic system of FIG. 2 may represent any of the electronic systems of FIG. 1 .
- Electronic system 200 includes bus 205 or other communication device to communicate information, and processor 210 coupled to bus 205 that may process information. While electronic system 200 is illustrated with a single processor, electronic system 200 may include multiple processors and/or co-processors. Electronic system 200 further may include random access memory (RAM) or other dynamic storage device 220 (referred to as main memory), coupled to bus 205 and may store information and instructions that may be executed by processor 210 . Memory 220 may also be used to store temporary variables or other intermediate information during execution of instructions by processor 210 . In one embodiment, memory 220 may be a memory system organized as described above with respect to FIG. 1 .
- RAM random access memory
- main memory main memory
- Electronic system 200 may also include read only memory (ROM) and/or other static storage device 230 coupled to bus 205 that may store static information and instructions for processor 210 .
- Data storage device 240 may be coupled to bus 205 to store information and instructions.
- Data storage device 240 such as a magnetic disk or optical disc and corresponding drive may be coupled to electronic system 200 .
- Electronic system 200 may also be coupled via bus 205 to display device 250 , such as a cathode ray tube (CRT) or liquid crystal display (LCD), to display information to a user.
- display device 250 such as a cathode ray tube (CRT) or liquid crystal display (LCD)
- Alphanumeric input device 260 may be coupled to bus 205 to communicate information and command selections to processor 210 .
- cursor control 270 is Another type of user input device, such as a mouse, a trackball, or cursor direction keys to communicate direction information and command selections to processor 210 and to control cursor movement on display 250 .
- Electronic system 200 further may include network interface(s) 280 to provide access to a network, such as a local area network.
- Network interface(s) 280 may include, for example, a wireless network interface having antenna 285 , which may represent one or more antenna(e).
- Network interface(s) 280 may also include, for example, a wired network interface to communicate with remote devices via network cable 287 , which may be, for example, an Ethernet cable, a coaxial cable, a fiber optic cable, a serial cable, or a parallel cable.
- network interface(s) 280 may provide access to a local area network, for example, by conforming to IEEE 802.11b and/or IEEE 802.11g standards, and/or the wireless network interface may provide access to a personal area network, for example, by conforming to Bluetooth standards. Other wireless network interfaces and/or protocols can also be supported.
- IEEE 802.11b corresponds to IEEE Std. 802.11b-1999 entitled “Local and Metropolitan Area Networks, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Higher-Speed Physical Layer Extension in the 2.4 GHz Band,” approved Sep. 16, 1999 as well as related documents.
- IEEE 802.11g corresponds to IEEE Std. 802.11g-2003 entitled “Local and Metropolitan Area Networks, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 4: Further Higher Rate Extension in the 2.4 GHz Band,” approved Jun. 27, 2003 as well as related documents.
- Bluetooth protocols are described in “Specification of the Bluetooth System: Core, Version 1.1,” published Feb. 22, 2001 by the Bluetooth Special Interest Group, Inc. Associated as well as previous or subsequent versions of the Bluetooth standard may also be supported.
- network interface(s) 280 may provide wireless communications using, for example, Time Division, Multiple Access (TDMA) protocols, Global System for Mobile Communications (GSM) protocols, Code Division, Multiple Access (CDMA) protocols, and/or any other type of wireless communications protocol.
- TDMA Time Division, Multiple Access
- GSM Global System for Mobile Communications
- CDMA Code Division, Multiple Access
- FIG. 3 is a block diagram of one embodiment of a memory subsystem with selectable ECC processing.
- the memory subsystem supports four main types of memory transactions: 1) writes with ECC disabled, 2) reads with or without ECC enabled, 3) writes with ECC enabled, and 4) prefetch reads associated with read/write/modify (RMW) cycles needed for partial writes with ECC.
- RMW read/write/modify
- ECC Error Correction Code
- all writes are completed via two memory accesses: a read of the memory location to prefetch the data already present (via path 340 - 345 ), an internal merging of the read data with the new write data on a byte-by-byte basis (via path 378 ), and a rewrite of the memory location including new ECC values (via path 330 - 335 ).
- path 310 - 315 includes mechanisms (e.g., bus lines) to transmit memory write command information, byte write enable signals, and the data to be written from a memory transaction queue to a memory interface (e.g., DDR-3, DDR-4).
- path 320 - 325 includes mechanisms (e.g., bus lines) to transmit memory read command information from the memory transaction queue to the memory interface.
- path 330 - 335 includes mechanisms (e.g., bus lines) to transmit memory write command information, byte write enable signals, ECC write data as generated by ECC data generator 360 and data to be written.
- Path 340 - 345 includes mechanisms (e.g., bus lines) to transmit memory read command information to the memory interface. The memory read command information is also transmitted to transaction location store 375 that utilizes the memory read command information for RMW rewrite operations on path 378 .
- the memory transaction queue provides write data and BWE to write data and BWE store 365 , which stores the data and forwards it to transaction location store 375 that utilizes it for RMW rewrite operations on path 378 .
- Path 378 provides the data to the memory transaction queue.
- the memory subsystem of FIG. 3 is enhanced by providing a mechanism to identify system memory regions that require no ECC processing and memory regions that do require ECC processing. With this enhanced capability, ECC can be enabled or disabled for each transaction type.
- software-programmable ECC-free address range registers and comparison circuitry e.g., 390 ) are provided in the memory subsystem.
- the corresponding memory transaction is performed without ECC processing.
- the ECC data returning is “ignored” and ECC error processing proceeds as if no CC error is encountered (i.e., no error flags assert, no error processing is done, etc.).
- the case of a write only one memory access is required (via path 310 - 315 ), instead of needing to do a RMW (via one or more of paths 330 - 335 , 340 - 345 , 378 ).
- address range comparator(s) 390 compare memory access addresses sent to the memory transactions queue to one or more addresses stored in ECC-Free Address Range Registers 395 that define the boundaries of one or more ECC-free regions in memory. In response to the comparison, address range comparator(s) 390 an ECC transaction enable signal is selectively asserted to the path(s) utilized by the memory transaction queue to send data to the memory interface depending on whether ECC techniques should be applied or not.
- ECC data inspection circuitry 380 and error processing circuitry 385 operate to selectively utilize ECC data as described above.
- data read form memory may be combined for rewrite operations through per byte write data combining circuitry 370 .
- FIG. 4 is a flow diagram of a technique for selective use of ECC techniques.
- the technique of FIG. 4 may be used to provide a memory mapping similar to the one illustrated in FIG. 1 and may be supported, for example, by using the arrangement of FIG. 3 .
- a memory address corresponding to a memory access is received, 410 .
- This memory address can be received in any manner known in the art. In the example of FIG. 3 , the memory address is received and compared in the memory subsystem; however, other configurations may also be supported.
- the memory address is compared to one or more ECC-free regions, 420 .
- the memory subsystem includes two or more registers that are used to define the boundaries of one or more ECC-free regions; however, other configurations can also be supported.
- the memory address is received and compared in the memory subsystem; however, other configurations may also be supported.
- a path through the memory subsystem that does not apply ECC protection is selected, 440 .
- the comparison circuitry controls an enabling signal to determine whether ECC protection is applied or not.
- the non-ECC protected data is written to memory, 450 .
- the memory can be any type of memory, for example, DDR-3 or DDR-4 compliant memory. Other memory types can be similarly supported.
- a path through the memory subsystem that does apply ECC protection is selected, 445 .
- the comparison circuitry controls an enabling signal to determine whether ECC protection is applied or not.
- ECC protection is applied to the data, 455 . Any ECC techniques known in the art can be supported.
- the ECC protected data is written to memory, 465 .
- the memory can be any type of memory, for example, DDR-3 or DDR-4 compliant memory. Other memory types can be similarly supported.
- Identification of the ECC-free regions can be done by mechanisms other than address range mapping. For example, particular application streams (e.g., video or graphics pixel updates) might be tagged in such a way that the memory subsystem chooses the ECC-free path for transactions originating from these application sources.
- particular application streams e.g., video or graphics pixel updates
- ECC error correcting code
- the memory access request can be a read request.
- the memory access request comprises a write request.
- the second portion of the memory addresses can be configurable.
- the second portion of the memory addresses can be utilized to store graphics data.
- the second portion of the memory addresses may reside in an expended memory region.
- the memory devices can be dynamic random access memory (DRAM) devices.
- a system may be utilized, the system can include memory devices to provide data storage corresponding to a range of memory addresses. A first portion of the memory addresses are protected by an error correcting code (ECC) technique and a second portion of the memory addresses are not protected by the ECC technique.
- ECC error correcting code
- a memory control device can be coupled with the memory devices. The memory control device can have a plurality of processing paths. A first set of the processing paths apply the ECC technique to data and a second set of the processing paths cause the data to be stored without applying the ECC technique. The memory control device selectively applies the ECC technique based on an address corresponding to a memory access request.
- the memory access request can be a read request.
- the memory access request comprises a write request.
- the second portion of the memory addresses can be configurable.
- the second portion of the memory addresses can be utilized to store graphics data.
- the second portion of the memory addresses may reside in an expended memory region.
- the memory devices can be dynamic random access memory (DRAM) devices.
- a memory control circuit can include a first interface to communicate with processing circuitry and a second interface to communicate with memory devices and control circuitry coupled with the first interface and the second interface.
- the control circuitry receives a memory access request having an associated address via the first interface, determines whether the address corresponds to a first region of a memory for which error correcting code (ECC) techniques are applied or a second region of the memory for which ECC techniques are not applied, processes the memory access utilizing ECC techniques if the address corresponds to the first region of the memory, and processes the memory access without utilizing the ECC techniques if the address corresponds to the second region of the memory.
- ECC error correcting code
- the memory access request can be a read request.
- the memory access request comprises a write request.
- the second portion of the memory addresses can be configurable.
- the second portion of the memory addresses can be utilized to store graphics data.
- the second portion of the memory addresses may reside in an expended memory region.
- the memory devices can be dynamic random access memory (DRAM) devices.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Techniques For Improving Reliability Of Storages (AREA)
Abstract
Use of hybrid error correcting code (ECC) techniques. A memory access request having an associated address is received. A memory controller determines whether the address corresponds to a first region of a memory for which ECC techniques are applied or a second region of the memory for which ECC techniques are not applied. The memory access is processed utilizing ECC techniques if the address corresponds to the first region of the memory and processed without utilizing the ECC techniques if the address corresponds to the second region of the memory.
Description
- Embodiments of the invention relate to memory systems. More particularly, embodiments of the invention relate to utilization of hybrid error correcting code techniques to provide more efficient memories.
- Error correcting code (ECC) techniques are utilized to detect and/or correct errors in memory, and may be used, for example, in mission-critical applications. Memory errors with ECC do not cause a system failure, but allow a system to detect and correct the error and continue operating. Use of ECC techniques is expanding and is desirable in other applications as well. However, ECC overhead may excessive for some applications where ECC is desirable.
- Embodiments of the invention are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings in which like reference numerals refer to similar elements.
-
FIG. 1 is a conceptual illustration of an example memory map including both ECC protected regions and non-ECC protected regions. -
FIG. 2 is a block diagram of one embodiment of an electronic system. -
FIG. 3 is a block diagram of one embodiment of a memory subsystem with selectable ECC processing. -
FIG. 4 is a flow diagram of a technique for selective use of ECC techniques. - In the following description, numerous specific details are set forth. However, embodiments of the invention may be practiced without these specific details. In other instances, well-known circuits, structures and techniques have not been shown in detail in order not to obscure the understanding of this description.
- Partial write memory throughput performance as part of ECC protection can experience up to a 70% degradation due to a Read/Modify/Write process for the checksum calculation required by ECC techniques. This performance degradation in partial writes can be a severe problem, for example, for integrated graphics performance because integrated graphics frequently update the frame buffer stored in system memory with numerous partial writes. Thus, applying ECC to integrated graphics results in performance degradation that may outweigh the benefits of ECC protection. This may be applicable to other situations as well.
- Techniques described herein provide a “non-ECC” window or area in a memory map. This is an area in the memory map where ECC operations (e.g., Read/Modify/Write, compute checksum) do not apply. In one embodiment, this area is specified by a starting address and size or range; however, other techniques for specifying the non-ECC window can also be utilized.
- Returning to the integrated graphics example, the area of system memory reserved for integrated graphics would be assigned to a non-ECC window. The same may also apply to video encode and video decode blocks that also share system memory normally protected by ECC. These regions for integrated graphics as well as video encode and decode do not require the protection that ECC affords because, if a pixel has an error and appears as the wrong color, it will be on the screen for 1/24 or 1/60 of a second, for example, depending on the refresh rate. This may not be noticeable to a user.
- Various embodiments of the techniques described herein utilize one or more registers (or other storage mechanisms) to define one or more non-ECC windows in a memory protected by ECC techniques, as well as logic that checks incoming addresses for reads and writes in the memory controller against the window. For addresses that fall within the non-ECC window, the partial writes will not incur the read-merge-checksum-compute-write penalty, but rather be written directly with the checksum value being a “don't care.” For reads, the checksum may be ignored and checksum errors suppressed.
- Currently, a system designer must choose between higher-level graphics performance protection and ECC protection. Some systems address this problem by adding a shared cache to a graphics core. This causes the memory controller to see a full cache line instead of a partial cache line, thus not needing the Read/Modify/Write operation. This is a costly addition to a graphics core that is not applicable, for example, to embedded systems, where power and cost must be kept as low as possible.
-
FIG. 1 is a conceptual illustration of an example memory map including both ECC protected regions and non-ECC protected regions. The example ofFIG. 1 illustrates only one ECC-free region; however, any number of ECC-free regions can be supported in a similar manner. The example ofFIG. 1 illustrates the ECC-free region near the “top” of the memory region; however, the ECC-free region(s) can be placed in other locations as well. - In the example of
FIG. 1 , ECC-Protected region 130 includes conventional memory space (e.g., 0 to 640 kb), upper memory space (e.g., 640 kb to 1 Mb) and a portion of extended memory space (e.g., 1 Mb and higher). In one embodiment, ECC-free region 120 is within the extended memory space. In one embodiment, there is also ECC-protectedregion 110 above ECC-free area 120. In alternate embodiments, multiple ECC-free areas may be created within the extended memory space. -
FIG. 2 is a block diagram of one embodiment of an electronic system. The electronic system illustrated inFIG. 2 is intended to represent a range of electronic systems (either wired or wireless) including, for example, desktop computer systems, laptop computer systems, cellular telephones, personal digital assistants (PDAs) including cellular-enabled PDAs, set top boxes. Alternative electronic systems may include more, fewer and/or different components. The electronic system ofFIG. 2 may represent any of the electronic systems ofFIG. 1 . -
Electronic system 200 includes bus 205 or other communication device to communicate information, andprocessor 210 coupled to bus 205 that may process information. Whileelectronic system 200 is illustrated with a single processor,electronic system 200 may include multiple processors and/or co-processors.Electronic system 200 further may include random access memory (RAM) or other dynamic storage device 220 (referred to as main memory), coupled to bus 205 and may store information and instructions that may be executed byprocessor 210.Memory 220 may also be used to store temporary variables or other intermediate information during execution of instructions byprocessor 210. In one embodiment,memory 220 may be a memory system organized as described above with respect toFIG. 1 . -
Electronic system 200 may also include read only memory (ROM) and/or otherstatic storage device 230 coupled to bus 205 that may store static information and instructions forprocessor 210.Data storage device 240 may be coupled to bus 205 to store information and instructions.Data storage device 240 such as a magnetic disk or optical disc and corresponding drive may be coupled toelectronic system 200. -
Electronic system 200 may also be coupled via bus 205 to displaydevice 250, such as a cathode ray tube (CRT) or liquid crystal display (LCD), to display information to a user.Alphanumeric input device 260, including alphanumeric and other keys, may be coupled to bus 205 to communicate information and command selections toprocessor 210. Another type of user input device iscursor control 270, such as a mouse, a trackball, or cursor direction keys to communicate direction information and command selections toprocessor 210 and to control cursor movement ondisplay 250. -
Electronic system 200 further may include network interface(s) 280 to provide access to a network, such as a local area network. Network interface(s) 280 may include, for example, a wireless networkinterface having antenna 285, which may represent one or more antenna(e). Network interface(s) 280 may also include, for example, a wired network interface to communicate with remote devices vianetwork cable 287, which may be, for example, an Ethernet cable, a coaxial cable, a fiber optic cable, a serial cable, or a parallel cable. - In one embodiment, network interface(s) 280 may provide access to a local area network, for example, by conforming to IEEE 802.11b and/or IEEE 802.11g standards, and/or the wireless network interface may provide access to a personal area network, for example, by conforming to Bluetooth standards. Other wireless network interfaces and/or protocols can also be supported.
- IEEE 802.11b corresponds to IEEE Std. 802.11b-1999 entitled “Local and Metropolitan Area Networks, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Higher-Speed Physical Layer Extension in the 2.4 GHz Band,” approved Sep. 16, 1999 as well as related documents. IEEE 802.11g corresponds to IEEE Std. 802.11g-2003 entitled “Local and Metropolitan Area Networks, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 4: Further Higher Rate Extension in the 2.4 GHz Band,” approved Jun. 27, 2003 as well as related documents. Bluetooth protocols are described in “Specification of the Bluetooth System: Core, Version 1.1,” published Feb. 22, 2001 by the Bluetooth Special Interest Group, Inc. Associated as well as previous or subsequent versions of the Bluetooth standard may also be supported.
- In addition to, or instead of, communication via wireless LAN standards, network interface(s) 280 may provide wireless communications using, for example, Time Division, Multiple Access (TDMA) protocols, Global System for Mobile Communications (GSM) protocols, Code Division, Multiple Access (CDMA) protocols, and/or any other type of wireless communications protocol.
-
FIG. 3 is a block diagram of one embodiment of a memory subsystem with selectable ECC processing. In one embodiment, the memory subsystem supports four main types of memory transactions: 1) writes with ECC disabled, 2) reads with or without ECC enabled, 3) writes with ECC enabled, and 4) prefetch reads associated with read/write/modify (RMW) cycles needed for partial writes with ECC. - When ECC is enabled, for example, through software selection, all writes (at least al partial writes) are completed via two memory accesses: a read of the memory location to prefetch the data already present (via path 340-345), an internal merging of the read data with the new write data on a byte-by-byte basis (via path 378), and a rewrite of the memory location including new ECC values (via path 330-335).
- In one embodiment, path 310-315 includes mechanisms (e.g., bus lines) to transmit memory write command information, byte write enable signals, and the data to be written from a memory transaction queue to a memory interface (e.g., DDR-3, DDR-4). In one embodiment, path 320-325 includes mechanisms (e.g., bus lines) to transmit memory read command information from the memory transaction queue to the memory interface.
- In one embodiment, path 330-335 includes mechanisms (e.g., bus lines) to transmit memory write command information, byte write enable signals, ECC write data as generated by
ECC data generator 360 and data to be written. Path 340-345 includes mechanisms (e.g., bus lines) to transmit memory read command information to the memory interface. The memory read command information is also transmitted totransaction location store 375 that utilizes the memory read command information for RMW rewrite operations onpath 378. - In one embodiment, the memory transaction queue provides write data and BWE to write data and
BWE store 365, which stores the data and forwards it totransaction location store 375 that utilizes it for RMW rewrite operations onpath 378.Path 378 provides the data to the memory transaction queue. - The memory subsystem of
FIG. 3 is enhanced by providing a mechanism to identify system memory regions that require no ECC processing and memory regions that do require ECC processing. With this enhanced capability, ECC can be enabled or disabled for each transaction type. In the example above, software-programmable ECC-free address range registers and comparison circuitry (e.g., 390) are provided in the memory subsystem. - In one embodiment, when a particular transaction address maps to one of the ECC-free ranges, the corresponding memory transaction is performed without ECC processing. In the case of a memory read, the ECC data returning is “ignored” and ECC error processing proceeds as if no CC error is encountered (i.e., no error flags assert, no error processing is done, etc.). In the case of a write, only one memory access is required (via path 310-315), instead of needing to do a RMW (via one or more of paths 330-335, 340-345, 378).
- In one embodiment, address range comparator(s) 390 compare memory access addresses sent to the memory transactions queue to one or more addresses stored in ECC-Free Address Range Registers 395 that define the boundaries of one or more ECC-free regions in memory. In response to the comparison, address range comparator(s) 390 an ECC transaction enable signal is selectively asserted to the path(s) utilized by the memory transaction queue to send data to the memory interface depending on whether ECC techniques should be applied or not.
- For read operations, ECC
data inspection circuitry 380 anderror processing circuitry 385 operate to selectively utilize ECC data as described above. In some situations, data read form memory may be combined for rewrite operations through per byte writedata combining circuitry 370. -
FIG. 4 is a flow diagram of a technique for selective use of ECC techniques. The technique ofFIG. 4 may be used to provide a memory mapping similar to the one illustrated inFIG. 1 and may be supported, for example, by using the arrangement ofFIG. 3 . - A memory address corresponding to a memory access is received, 410. This memory address can be received in any manner known in the art. In the example of
FIG. 3 , the memory address is received and compared in the memory subsystem; however, other configurations may also be supported. - The memory address is compared to one or more ECC-free regions, 420. In one embodiment, the memory subsystem includes two or more registers that are used to define the boundaries of one or more ECC-free regions; however, other configurations can also be supported. In the example of
FIG. 3 , the memory address is received and compared in the memory subsystem; however, other configurations may also be supported. - If the address corresponds to an ECC-free region, 430, a path through the memory subsystem that does not apply ECC protection is selected, 440. As described above with respect to
FIG. 3 , one or more paths through the memory subsystem may be provided that do not utilize ECC protection. In one embodiment, the comparison circuitry controls an enabling signal to determine whether ECC protection is applied or not. - The non-ECC protected data is written to memory, 450. The memory can be any type of memory, for example, DDR-3 or DDR-4 compliant memory. Other memory types can be similarly supported.
- If the address does not correspond to an ECC-free region, 430, a path through the memory subsystem that does apply ECC protection is selected, 445. As described above with respect to
FIG. 3 , one or more paths through the memory subsystem may be provided that do utilize ECC protection. In one embodiment, the comparison circuitry controls an enabling signal to determine whether ECC protection is applied or not. - ECC protection is applied to the data, 455. Any ECC techniques known in the art can be supported. The ECC protected data is written to memory, 465. The memory can be any type of memory, for example, DDR-3 or DDR-4 compliant memory. Other memory types can be similarly supported.
- This has the effect of making more efficient use of existing memory bandwidth, reducing average latency for each memory transaction, and increasing the total memory bandwidth available for each application. Identification of the ECC-free regions can be done by mechanisms other than address range mapping. For example, particular application streams (e.g., video or graphics pixel updates) might be tagged in such a way that the memory subsystem chooses the ECC-free path for transactions originating from these application sources.
- Use of hybrid error correcting code (ECC) techniques. A memory access request having an associated address is received. A memory controller determines whether the address corresponds to a first region of a memory for which ECC techniques are applied or a second region of the memory for which ECC techniques are not applied. The memory access is processed utilizing ECC techniques if the address corresponds to the first region of the memory and processed without utilizing the ECC techniques if the address corresponds to the second region of the memory.
- The memory access request can be a read request. The memory access request comprises a write request. The second portion of the memory addresses can be configurable. The second portion of the memory addresses can be utilized to store graphics data. The second portion of the memory addresses may reside in an expended memory region. The memory devices can be dynamic random access memory (DRAM) devices.
- A system may be utilized, the system can include memory devices to provide data storage corresponding to a range of memory addresses. A first portion of the memory addresses are protected by an error correcting code (ECC) technique and a second portion of the memory addresses are not protected by the ECC technique. A memory control device can be coupled with the memory devices. The memory control device can have a plurality of processing paths. A first set of the processing paths apply the ECC technique to data and a second set of the processing paths cause the data to be stored without applying the ECC technique. The memory control device selectively applies the ECC technique based on an address corresponding to a memory access request.
- The memory access request can be a read request. The memory access request comprises a write request. The second portion of the memory addresses can be configurable. The second portion of the memory addresses can be utilized to store graphics data. The second portion of the memory addresses may reside in an expended memory region. The memory devices can be dynamic random access memory (DRAM) devices.
- A memory control circuit can include a first interface to communicate with processing circuitry and a second interface to communicate with memory devices and control circuitry coupled with the first interface and the second interface. The control circuitry receives a memory access request having an associated address via the first interface, determines whether the address corresponds to a first region of a memory for which error correcting code (ECC) techniques are applied or a second region of the memory for which ECC techniques are not applied, processes the memory access utilizing ECC techniques if the address corresponds to the first region of the memory, and processes the memory access without utilizing the ECC techniques if the address corresponds to the second region of the memory.
- The memory access request can be a read request. The memory access request comprises a write request. The second portion of the memory addresses can be configurable. The second portion of the memory addresses can be utilized to store graphics data. The second portion of the memory addresses may reside in an expended memory region. The memory devices can be dynamic random access memory (DRAM) devices.
- Reference in the specification to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the invention. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment.
- While the invention has been described in terms of several embodiments, those skilled in the art will recognize that the invention is not limited to the embodiments described, but can be practiced with modification and alteration within the spirit and scope of the appended claims. The description is thus to be regarded as illustrative instead of limiting.
Claims (20)
1. A system comprising:
memory devices to provide data storage corresponding to a range of memory addresses, a first portion of the memory addresses are protected by an error correcting code (ECC) technique and a second portion of the memory addresses are not protected by the ECC technique;
a memory control device coupled with the memory devices, the memory control device having a plurality of processing paths, wherein a first set of the processing paths operate to apply the ECC technique to data and a second set of the processing paths operate to cause the data to be stored without applying the ECC technique, the memory control device to selectively apply the ECC technique based on an address corresponding to a memory access request.
2. The system of claim 1 wherein the memory access request comprises a read request.
3. The system of claim 1 wherein the memory access request comprises a write request.
4. The system of claim 1 wherein the second portion of the memory addresses is configurable.
5. The system of claim 1 wherein the second portion of the memory addresses is utilized to store graphics data.
6. The system of claim 1 wherein the second portion of the memory addresses reside in an expended memory region.
7. The system of claim 1 wherein the memory devices comprise dynamic random access memory (DRAM) devices.
8. A method comprising:
receiving a memory access request having an associated address;
determining whether the address corresponds to a first region of a memory for which error correcting code (ECC) techniques are applied or a second region of the memory for which ECC techniques are not applied;
processing the memory access utilizing ECC techniques if the address corresponds to the first region of the memory;
processing the memory access without utilizing the ECC techniques if the address corresponds to the second region of the memory.
9. The method of claim 8 wherein the memory access comprises a read operation.
10. The method of claim 8 wherein the memory access comprises a write operation.
11. The method of claim 8 wherein determining whether the address corresponds to a first region of a memory for which error correcting code (ECC) techniques are applied or a second region of the memory for which ECC techniques are not applied comprises comparing the address to at least two addresses stored in registers that correspond to boundaries of the second region of the memory.
12. The method of claim 8 wherein the processing of the memory access request comprises selecting one of a plurality of paths through a memory controller corresponding to whether or not ECC techniques are applied to the memory access.
13. The method of claim 8 wherein the second region of the memory addresses is utilized to store graphics data.
14. The method of claim 8 wherein the second region of the memory addresses reside in an expended memory region.
15. An apparatus comprising:
a first interface to communicate with processing circuitry;
a second interface to communicate with memory devices;
control circuitry coupled with the first interface and the second interface, the control circuitry to receive a memory access request having an associated address via the first interface, to determine whether the address corresponds to a first region of a memory for which error correcting code (ECC) techniques are applied or a second region of the memory for which ECC techniques are not applied, to process the memory access utilizing ECC techniques if the address corresponds to the first region of the memory, and to process the memory access without utilizing the ECC techniques if the address corresponds to the second region of the memory.
16. The apparatus of claim 15 wherein determining whether the address corresponds to a first region of a memory for which error correcting code (ECC) techniques are applied or a second region of the memory for which ECC techniques are not applied comprises comparing the address to at least two addresses stored in registers that correspond to boundaries of the second region of the memory.
17. The apparatus of claim 15 wherein the processing of the memory access request comprises selecting one of a plurality of paths through a memory controller corresponding to whether or not ECC techniques are applied to the memory access.
18. The apparatus of claim 15 wherein the second region of the memory addresses is utilized to store graphics data.
19. The apparatus of claim 15 wherein the memory devices comprise dynamic random access memory (DRAM) devices.
20. The apparatus of claim 19 wherein the DRAM devices comprise DDR-4 compliant devices.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2012/031683 WO2013147888A1 (en) | 2012-03-30 | 2012-03-30 | Memories utilizing hybrid error correcting code techniques |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140157043A1 true US20140157043A1 (en) | 2014-06-05 |
Family
ID=49260942
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/997,713 Abandoned US20140157043A1 (en) | 2012-03-30 | 2012-03-30 | Memories utilizing hybrid error correcting code techniques |
Country Status (3)
Country | Link |
---|---|
US (1) | US20140157043A1 (en) |
DE (1) | DE112012006154T5 (en) |
WO (1) | WO2013147888A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130262958A1 (en) * | 2012-03-30 | 2013-10-03 | Joshua D. Ruggiero | Memories utilizing hybrid error correcting code techniques |
US20150254148A1 (en) * | 2014-03-05 | 2015-09-10 | Renesas Electronics Corporation | Semiconductor device |
US20170060682A1 (en) * | 2015-08-28 | 2017-03-02 | Kabushiki Kaisha Toshiba | Memory device that changes a writable region of a data buffer based on an operational state of an ecc circuit |
US10855529B2 (en) * | 2018-11-26 | 2020-12-01 | Stmicroelectronics Application Gmbh | Processing system, related integrated circuit, device and method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7117421B1 (en) * | 2002-05-31 | 2006-10-03 | Nvidia Corporation | Transparent error correction code memory system and method |
US7461320B2 (en) * | 2004-06-24 | 2008-12-02 | Micron Technology, Inc. | Memory system and method having selective ECC during low power refresh |
US20120124448A1 (en) * | 2009-09-10 | 2012-05-17 | Ted Emerson | Memory subsystem having a first portion to store data with error correction code information and a second portion to store data without error correction code information |
US20130007574A1 (en) * | 2011-06-29 | 2013-01-03 | Texas Instruments Incorporated | Partial-Writes to ECC (Error Check Code) Enabled Memories |
US20130262958A1 (en) * | 2012-03-30 | 2013-10-03 | Joshua D. Ruggiero | Memories utilizing hybrid error correcting code techniques |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7904786B2 (en) * | 2003-03-06 | 2011-03-08 | Hewlett-Packard Development Company, L.P. | Assisted memory system |
US7640297B2 (en) * | 2005-07-14 | 2009-12-29 | Gemini Mobile Technologies, Inc. | Protocol optimization for wireless networks |
US8135935B2 (en) * | 2007-03-20 | 2012-03-13 | Advanced Micro Devices, Inc. | ECC implementation in non-ECC components |
KR100866970B1 (en) * | 2007-06-08 | 2008-11-05 | 삼성전자주식회사 | Semiconductor apparatus being able to set ecc latency and data latency separately |
-
2012
- 2012-03-30 US US13/997,713 patent/US20140157043A1/en not_active Abandoned
- 2012-03-30 DE DE112012006154.3T patent/DE112012006154T5/en active Pending
- 2012-03-30 WO PCT/US2012/031683 patent/WO2013147888A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7117421B1 (en) * | 2002-05-31 | 2006-10-03 | Nvidia Corporation | Transparent error correction code memory system and method |
US7461320B2 (en) * | 2004-06-24 | 2008-12-02 | Micron Technology, Inc. | Memory system and method having selective ECC during low power refresh |
US20120124448A1 (en) * | 2009-09-10 | 2012-05-17 | Ted Emerson | Memory subsystem having a first portion to store data with error correction code information and a second portion to store data without error correction code information |
US20130007574A1 (en) * | 2011-06-29 | 2013-01-03 | Texas Instruments Incorporated | Partial-Writes to ECC (Error Check Code) Enabled Memories |
US20130262958A1 (en) * | 2012-03-30 | 2013-10-03 | Joshua D. Ruggiero | Memories utilizing hybrid error correcting code techniques |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130262958A1 (en) * | 2012-03-30 | 2013-10-03 | Joshua D. Ruggiero | Memories utilizing hybrid error correcting code techniques |
US9612901B2 (en) * | 2012-03-30 | 2017-04-04 | Intel Corporation | Memories utilizing hybrid error correcting code techniques |
US20150254148A1 (en) * | 2014-03-05 | 2015-09-10 | Renesas Electronics Corporation | Semiconductor device |
US9684466B2 (en) * | 2014-03-05 | 2017-06-20 | Renesas Electronics Corporation | Semiconductor device |
US9990154B2 (en) | 2014-03-05 | 2018-06-05 | Renesas Electronics Corporation | Semiconductor device |
US10558379B2 (en) | 2014-03-05 | 2020-02-11 | Renesas Electronics Corporation | Semiconductor device |
US20170060682A1 (en) * | 2015-08-28 | 2017-03-02 | Kabushiki Kaisha Toshiba | Memory device that changes a writable region of a data buffer based on an operational state of an ecc circuit |
US10621034B2 (en) | 2015-08-28 | 2020-04-14 | Toshiba Memory Corporation | Memory device that changes a writable region of a data buffer based on an operational state of an ECC circuit |
US10769011B2 (en) * | 2015-08-28 | 2020-09-08 | Toshiba Memory Corporation | Memory device that changes a writable region of a data buffer based on an operational state of an ECC circuit |
US10855529B2 (en) * | 2018-11-26 | 2020-12-01 | Stmicroelectronics Application Gmbh | Processing system, related integrated circuit, device and method |
Also Published As
Publication number | Publication date |
---|---|
DE112012006154T5 (en) | 2015-02-05 |
WO2013147888A1 (en) | 2013-10-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9612901B2 (en) | Memories utilizing hybrid error correcting code techniques | |
US20200301836A1 (en) | Storage system and method for accessing same | |
US10042576B2 (en) | Method and apparatus for compressing addresses | |
US10121532B2 (en) | Apparatus, method and system for performing successive writes to a bank of a dynamic random access memory | |
US9391637B2 (en) | Error correcting code scheme utilizing reserved space | |
US9063860B2 (en) | Method and system for optimizing prefetching of cache memory lines | |
US8495464B2 (en) | Reliability support in memory systems without error correcting code support | |
US9747038B2 (en) | Systems and methods for a hybrid parallel-serial memory access | |
EP3513295A1 (en) | Providing memory bandwidth compression in chipkill-correct memory architectures | |
US20160224241A1 (en) | PROVIDING MEMORY BANDWIDTH COMPRESSION USING BACK-TO-BACK READ OPERATIONS BY COMPRESSED MEMORY CONTROLLERS (CMCs) IN A CENTRAL PROCESSING UNIT (CPU)-BASED SYSTEM | |
US20140157043A1 (en) | Memories utilizing hybrid error correcting code techniques | |
US20120254700A1 (en) | Mechanisms and techniques for providing cache tags in dynamic random access memory | |
US11275683B2 (en) | Method, apparatus, device and computer-readable storage medium for storage management | |
CN106055516B (en) | System on chip, electronic device including the same, and method of initializing memory | |
US11822474B2 (en) | Storage system and method for accessing same | |
US10152261B2 (en) | Providing memory bandwidth compression using compression indicator (CI) hint directories in a central processing unit (CPU)-based system | |
US20120246407A1 (en) | Method and system to improve unaligned cache memory accesses | |
US20120166686A1 (en) | Method, apparatus and system for aggregating interrupts of a data transfer | |
US20230409332A1 (en) | Devices transferring cache lines, including metadata on external links | |
US20240311321A1 (en) | Multi-core system and reading method | |
CN116348856A (en) | Method, apparatus and system for checking memory tags at run-time in a processor-based system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTEL CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:RUGGIERO, JOSHUA D.;COLEMAN, JAMES A.;LAVELLE, GARY J.;SIGNING DATES FROM 20120717 TO 20120724;REEL/FRAME:029999/0878 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |