Abstract:
A storage device includes an integrity checking module checking integrity of data stored in a first host memory buffer (HMB) address of an HMB in a host coupled to the storage device, and an HMB mapping module mapping, if the integrity checking module determines the data as corrupted, the first HMB address to a second address
Abstract:
A storage controller receives a first transmission preset value and a first coefficient value at a first time from outside, at a phase 3 stage of a PCIe link training and equalization, checks whether the first transmission preset value and the first coefficient value are optimal with reference to a database, transmits signals corresponding to the first transmission preset value and the first coefficient value to the outside when the first transmission preset value and the first coefficient value are determined to be optimal and transmits signals corresponding to a second transmission preset value and a second coefficient value from the database, which are different from the first transmission preset value and the first coefficient value and optimal for the phase 3 stage of the PCIe link training and equalization, to the outside when the first transmission preset value and the first coefficient value are determined not to be optimal.
Abstract:
Embodiments of the inventive concept include computer-implemented method for shadowing one or more boot images of a mobile device. The technique can include duplicating boot images to shadow partitions in a user area of a non-volatile memory device such as a flash memory. The technique can include detecting boot image corruption, and causing a mobile device to boot from the shadow partitions. The technique can include dynamically shadowing and releasing blocks used by the shadow partitions. The technique can include boot failure recovery and bad image preservation through firmware flash translation layer (FTL) logical to physical mapping updates. Boot image corruption failures can be recovered from and/or debugged using the shadow partitions.
Abstract:
A storage device includes a nonvolatile memory device and a storage controller. The storage controller accesses the nonvolatile memory device based on a request of an external host device. The storage controller sends a signal to the external host device, based a throughput of accessing the nonvolatile memory device being within a specific range.
Abstract:
A memory device, and an operating method of the memory device and a host device are provided. The method of operating a memory device includes receiving a command for requesting an Eye Open Monitor (EOM) operation performance from a host device, receiving pattern data including data and non-data from the host device, performing the EOM operation which performs an error count to correspond to the data, and does not perform the error count on the non-data, and transmitting an EOM response signal including the error count result to the host device.
Abstract:
Embodiments of the inventive concept include computer-implemented method for shadowing one or more boot images of a mobile device. The technique can include duplicating boot images to shadow partitions in a user area of a non-volatile memory device such as a flash memory. The technique can include detecting boot image corruption, and causing a mobile device to boot from the shadow partitions. The technique can include dynamically shadowing and releasing blocks used by the shadow partitions. The technique can include boot failure recovery and bad image preservation through firmware flash translation layer (FTL) logical to physical mapping updates. Boot image corruption failures can be recovered from and/or debugged using the shadow partitions.
Abstract:
Provided is a method of updating firmware of a memory device including a memory and a controller driving firmware to control the memory. The method includes updating the firmware of the memory device by transmitting at least one normal command and an address corresponding to the at least one normal command to the memory device. The normal command is a command to issue a normal operation, and the normal operation is not an update operation of the firmware.
Abstract:
Provided are an operating method of a host device, an operating method of a memory device, and a memory system. The operating method of a host device includes transmitting a request command for performing an eye-opening monitor (EOM) operation to a memory device, transmitting a parameter for performing the EOM operation to the memory device, transmitting pattern data for performing the EOM operation to the memory device, and receiving a first response signal including a result of the EOM operation performed based on the parameter and the pattern data from the memory device.