Rewrite with embedded reassign for data recovery from...

Dynamic magnetic information storage or retrieval – General processing of a digital signal – Data verification

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C360S031000, C714S006130, C714S704000

Reexamination Certificate

active

06384999

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to hard disk drives. More particularly, the present invention relates to a method for recovering data from marginally defective data sites on a disk surface.
2. Description of the Related Art
Hard disk drives store large volumes of data on one or more disks mounted on a spindle assembly. Disk drives employ a disk control system for interfacing with a host (e.g., a computer) to control the reading and writing of data on a disk. Each disk includes at least one disk surface which is capable of storing data. On each disk surface, user data is stored in concentric circular tracks between an outside diameter and an inside diameter of the disk.
As a result of the manufacturing process, defective data sites may exist on the disk surfaces of the disk drive. These defective data sites are termed “primary defects.” A defect discovery procedure is performed to locate these defects and mark them out as defective locations on the disk surface which are not available for use. A typical defect discovery procedure includes writing a known data pattern to the disk surface and subsequently reading the data pattern from the disk surface. Defective data sites are identified by comparing the data pattern read from the disk surface with the known data pattern written to the disk surface.
Following the defect discovery procedure, defective data sites are put in a primary defect list (PLIST). The primary defect list is used during formatting of the disk surface to generate a defect management table. The defective data sites contained within the primary defect management table are skipped during normal operation of the disk drive. Once identified in the primary defect management table, the defective data site may not be used for storing data.
Defective data sites encountered after formatting the disk surface are known as “grown defects” or “secondary defects”. Grown defects often occur in locations adjacent to defective data sites found during defect discovery. Grown defects are also written to a list known as the grown defect list (GLIST), similar to that utilized for the primary defects. Grown defects encountered during the operation of the disk drive are added to a secondary defect management table. The secondary defect management table is utilized along with the primary defect management table during the operation of the disk drive for the identification of defective data sites on the disk surface. The defective data sites residing within the secondary defect management table are reassigned or “vectored” (i.e., mapped via an index pointer) to spare data site locations via a cross-reference entry (cylinder number, head number, and data sector number).
Defects such as “primary defects” and “grown defects” are known as hard sector errors. A hard sector error is essentially permanent in nature, thus the sector cannot be recovered. A disk may also contain transient or “soft” errors. A transient error is defined as an error or defect which clears over a period of time. For example, a transient error may occur due to a thermal asperity on the disk surface. A retry mode may be entered, wherein the command (such as a read) is retried a number of times allowing sufficient time to pass for the transient error to clear. Transient errors are also logged on the drive as they occur.
If the transient or “soft” error rate on a particular sector reaches an unacceptable level during normal read operations, the hard drive may attempt to rewrite the data to the data sector encountering the soft errors. The rewrite operation typically reads the data from the sector encountering the soft errors, copies the data to a data buffer, then attempts to rewrite the data to the data sector encountering the soft errors. Data is copied to the data buffer so that if the rewrite operation fails, the data is still available. After the data has been rewritten, the drive verifies the rewrite operation. If no problems are encountered after the rewrite, the drive resumes normal operation. If the rewrite operation fails, the data in the data buffer must be reassigned to alternative data sectors on the disk.
Several methods have been developed for reassigning defective data sites on a disk. Chan (U.S. Pat. No. 5,271,018) describes a data site slipping scheme to reassign defective data sites on a disk's surface. In data site slipping, a defined number of spare sites are located at the end of a data track, data partition, or data zone for handling defects. When a defect is discovered, the defective data site is marked as defective (i.e., to be skipped in the future), the data from the next non-defective data site is saved in a data buffer, and the data from the defective data site is “slipped” to the next non-defective data site. The saved data from the data buffer is then slipped in a similar manner to the next non-defective data site until the last slipped data site occupies the first available spare data site. While the data site slipping scheme of Chan allows data to remain contiguous, the scheme of Chan may result in time consuming, inefficient reassignments of data blocks when a defective site is discovered thereby impacting disk drive performance.
Bish et al. (U.S. Pat. No. 5,235,585) provides another method for reassigning defective data sites on a disk via a vectoring operation. Bish et al. locates spare data sites for replacing grown secondary defects found during use. A secondary defect management table is maintained for tracking the spare data sites that have been previously used for replacements of other secondary defects. When a secondary defect address is found, a secondary defect list is updated both on the disk and in the drive's memory. A spare data site for replacing the secondary defect is located by first calculating a group number to determine which group the secondary defect is located in. Next, the boundaries for a plurality of spare data sites allocated for that group is determined. After searching the replacement data site list, the first available spare data site of the plurality of spare data sites is identified as the replacement data site. If all of the plurality of spare data sites have been previously assigned as replacement data sites, a spare data site is instead located from a plurality of spare data sites allocated to a neighboring group. After locating the spare data site, its physical address is returned and the spare data site is logged in the secondary defect management table as a “vectored” data site. The reassignment scheme of Bish eliminates the inefficiencies of the Chan slip data site reassignment scheme, since only a single block of data is moved during the reassignment. However, reassigning data to non-contiguous spare data sites eliminates contiguous ordering of the data, resulting in additional seeks to and from the spare data site location during a read operation.
Rewriting data to the same data sector is almost always preferable to reassigning data to an alternate data sector. By rewriting data to the same data sector, the inefficiencies of moving potentially thousands of blocks of blocks via data slip scheme described in Chan can be avoided. Also, rewriting preserves the contiguous ordering of the data. Thus, during read operations, no time-consuming data vector seek operations to alternative data sectors in a remote area of the disk are necessary, as is required by reassignment schemes such as described in Bish et al.
Unfortunately, the rewrite operation is sometimes unsuccessful even after multiple retries, so a reassignment operation is required to preserve the data. Also, the rewrite operation is susceptible to data loss. Even though data is preserved in a data buffer while the rewrite operation is attempted, the data in the data buffer can be lost if a power cycle occurs while the rewrite operation is executing. Furthermore, the time required to reassign the sector is sequential and additive to the rewrite process.
There is a continuing need therefore for a defect management scheme which minim

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Rewrite with embedded reassign for data recovery from... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Rewrite with embedded reassign for data recovery from..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Rewrite with embedded reassign for data recovery from... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2862037

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.