CN110781042A - Method, device and medium for detecting UBM (Universal boot Module) backboard based on BMC (baseboard management controller) - Google Patents
Method, device and medium for detecting UBM (Universal boot Module) backboard based on BMC (baseboard management controller) Download PDFInfo
- Publication number
- CN110781042A CN110781042A CN201910933030.0A CN201910933030A CN110781042A CN 110781042 A CN110781042 A CN 110781042A CN 201910933030 A CN201910933030 A CN 201910933030A CN 110781042 A CN110781042 A CN 110781042A
- Authority
- CN
- China
- Prior art keywords
- ubm
- backplane
- bmc
- command
- backboard
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/22—Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
- G06F11/2205—Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing using arrangements specific to the hardware being tested
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/22—Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
- G06F11/2273—Test methods
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
Abstract
The invention discloses a method for detecting a UBM (universal UBM backplane) based on BMC (baseboard management controller), which comprises the following steps of: receiving commands to be executed by the UBM backboard, and setting different sequence numbers for each command; matching the received execution result with the command according to the sequence number, and recording the result into a log; monitoring the UBM backplane; and responding to the UBM backboard, analyzing the log and positioning the position where the abnormality occurs. The invention also discloses a computer device and a readable storage medium. The method, the device and the medium for detecting the UBM backplane based on the BMC carry out unified out-of-band management on the UBM backplane command through the BMC, so that a user can conveniently log in a BMC interface to analyze the execution result of the corresponding command, and the position of the backplane with a problem is quickly positioned.
Description
Technical Field
The present invention relates to the field of UBM backplanes, and more particularly, to a method, device and readable medium for detecting a UBM backplane based on BMC.
Background
A Controller of Host communicates with UBM Controller through an I2C link on HFC (Host facility) according to the definition of Command of UBM protocol, the sending and receiving of relevant read-write commands are processed in an interrupt mode, the UBM Controller is used as Slave to firstly judge whether the received Slave Address is matched, then the key words of Commandbyte are analyzed, for write commands, a backboard executes corresponding Action, for read commands, the Slave prepares to-be-returned data to be put into a Buffer of the interrupt Controller after the analysis Command is completed, and triggers the sending interrupt to return the data byte by byte to the Host, thereby completing the execution process of one Command.
The backboard is communicated with the Host through the UBM Command, the sending, receiving and executing conditions of the related read-write commands are not brought into a unified BMC out-of-band management platform, and a user cannot analyze and judge the executing historical conditions of the commands by logging in a BMC to look up a specific backboard operation log in real time. When the UBM backboard breaks down, the reason can only be searched through the host, and the method is difficult and not visual enough.
Disclosure of Invention
In view of this, an object of the embodiments of the present invention is to provide a method, a device, and a medium for detecting a UBM backplane based on a BMC, where the UBM backplane command is managed by the BMC in a unified out-of-band manner, and a user can conveniently log in a BMC interface to analyze an execution result of the corresponding command, so as to quickly locate a location of the backplane where a problem occurs.
Based on the above object, an aspect of the embodiments of the present invention provides a method for detecting a UBM backplane based on a BMC, including the following steps performed in the BMC: receiving commands to be executed by the UBM backboard, and setting different sequence numbers for each command; matching the received execution result with the command according to the sequence number, and recording the matching result into a log; monitoring the UBM backplane; and responding to the UBM backboard, analyzing the log and positioning the position where the abnormality occurs.
In some embodiments, said analyzing said log and locating a location of an anomaly in response to said UBM backplane occurrence comprises: the execution results are analyzed in response to the execution results not having been received for more than a threshold time and/or an error between the execution results and the expected execution results exceeding a threshold.
In some embodiments, further comprising: the host sends a command to be executed by the UBM backplane to the UBM backplane controller and the BMC through I2C respectively.
In some embodiments, further comprising: and the host receives the execution result returned by the UBM backboard and sends the execution result to the BMC.
In some embodiments, the each command corresponds to a different sequence number, including: each command is sequentially set with an increasing number according to the order of execution.
In another aspect of the embodiments of the present invention, there is also provided a computer device, including: at least one processor; and a memory storing computer instructions executable on the processor, the instructions being executable by the processor to perform the steps of: receiving commands to be executed by the UBM backboard, and setting different sequence numbers for each command; matching the received execution result with the command according to the sequence number, and recording the matching result into a log; monitoring the UBM backplane; and responding to the UBM backboard, analyzing the log and positioning the position where the abnormality occurs.
In some embodiments, said analyzing said log and locating a location of an anomaly in response to said UBM backplane occurrence comprises: the execution results are analyzed in response to the execution results not having been received for more than a threshold time and/or an error between the execution results and the expected execution results exceeding a threshold.
In some embodiments, the steps further comprise: the host sends a command to be executed by the UBM backplane to the UBM backplane controller and the BMC through I2C respectively.
In some embodiments, the steps further comprise: and the host receives the execution result returned by the UBM backboard and sends the execution result to the BMC.
In a further aspect of the embodiments of the present invention, a computer-readable storage medium is also provided, in which a computer program for implementing the above method steps is stored when the computer program is executed by a processor.
The invention has the following beneficial technical effects: unified out-of-band management is carried out on UBM backboard commands through BMC, a user can conveniently log in a BMC interface to analyze the execution result of the corresponding command, and the position of the backboard with problems is quickly positioned.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained by using the drawings without creative efforts.
FIG. 1 is a schematic diagram of an embodiment of a method for detecting a UBM backplane based on BMC according to the present invention;
fig. 2 is a flowchart of an embodiment of a method for detecting a UBM backplane based on BMC according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used for distinguishing two entities with the same name but different names or different parameters, and it should be noted that "first" and "second" are merely for convenience of description and should not be construed as limitations of the embodiments of the present invention, and they are not described in any more detail in the following embodiments.
In view of the foregoing, a first aspect of the embodiments of the present invention provides an embodiment of a method for detecting a UBM backplane based on a BMC. Fig. 1 is a schematic diagram illustrating an embodiment of a method for detecting a UBM backplane based on BMC according to the present invention. As shown in fig. 1, the embodiment of the present invention includes the following steps performed in the BMC:
s1, receiving commands to be executed by the UBM backplane, and setting different sequence numbers for each command;
s2, matching the received execution result with the command according to the sequence number, and recording the result in a log;
s3, monitoring the UBM backboard; and
s4, responding to the UBM backboard, analyzing the log and positioning the position where the abnormality occurs.
UBM (Universal backplate management) is a new type of universal Backplane management scheme. UBM provides a generic backplane management framework through which Host can determine backplane functionality, DFC (device fabric connector) status and control information, and read DFC to HFC interconnection information on the backplane, etc.
On the UBM backplane, the HFC's Sideband I/O (Sideband input/output) signals need to be connected to the UBM controller and UBM FRU, with the high speed signals being connected directly from the HFC to the DFC. The UBM controller manages the Sideband I/O signals of HFC and DFC at the same time, uses I2C protocol to communicate with Host connected with HFC, and responds to the read-write command related to various UBM protocols sent by Host.
In the embodiment of the invention, a new I2C link is added between the Host and the BMC, the Host sends the corresponding Command to the BMC when sending the read-write Command to the UBM backboard, and simultaneously, the Host sends the received return state and the execution result to the BMC to record and store after the execution of the UBM Command is finished, so that when the backboard is in trouble, a user can conveniently log in a BMC interface to analyze the execution result of the corresponding Command and quickly locate the fault position.
The BMC receives commands to be executed by the UBM backplane, and each command corresponds to a different sequence number. In some embodiments, further comprising: the host sends a command to be executed by the UBM backplane to the UBM backplane controller and the BMC through I2C respectively. And the Host simultaneously sends the code of the UBM Command to be executed to a Controller and a BMC (baseboard management Controller) of the backboard through the I2C, and the Host simultaneously carries out sequence numbering on the Command when sending the code to the BMC so that the BMC carries out one-to-one matching on the Command and the execution result. In some embodiments, the each command corresponds to a different sequence number, including: each command is sequentially set with an increasing number according to the order of execution. Of course, this is not a limitation on the sequence number, which serves to distinguish commands, as long as any numbering is possible that achieves this effect.
In some embodiments, further comprising: and the host receives the execution result returned by the UBM backboard and sends the execution result to the BMC. After receiving the execution result returned by the UBM backplane, the Host sends the sequence number of the Command, the Command Command word and the execution result to the BMC, the BMC performs matching recording on the Command and the execution result to the log according to the received sequence number, and the specific Command code and the return result are processed in a differentiated manner according to the different Command. The specific communication formats of BMC and Host may be as follows:
in some embodiments, said analyzing said log and locating a location of an anomaly in response to said UBM backplane occurrence comprises: the execution results are analyzed in response to the execution results not having been received for more than a threshold time and/or an error between the execution results and the expected execution results exceeding a threshold. For example, the time threshold may be set to 1 second, and if the corresponding execution result is not received within 1 second after the BMC receives the command to be executed by the UBM backplane, it is determined that the UBM backplane is abnormal. Or, the expected execution result may be preset according to the command, for example, the expected execution result is 8-10, and the execution result obtained from the host is 7, and it is considered that the UBM backplane is abnormal. After the UBM backboard is abnormal, the position of the fault can be determined according to a specific execution result, and the fault can be solved quickly.
Fig. 2 is a flowchart illustrating an embodiment of a method for detecting a UBM backplane based on BMC according to the present invention. As shown in fig. 2, beginning at block 101 and proceeding to block 102, commands to be executed by the UBM backplane are received, each command corresponding to a different sequence number; proceeding to block 103, matching the execution result with the command according to the sequence number, and recording the result in the log; then proceed to block 104, monitor the UBM backplane; then, the process proceeds to block 105, whether the UBM backplane is abnormal is judged, if yes, the process proceeds to block 106, the log is analyzed, the abnormal position is located, and then the process proceeds to block 107 to end, and if not, the process ends directly.
It should be particularly noted that, the steps in the embodiments of the BMC-based UBM backplane detection method described above may be mutually intersected, replaced, added, or deleted, and therefore, these reasonable permutations and combinations should also fall within the scope of the present invention, and should not limit the scope of the present invention to the embodiments.
In view of the above object, a second aspect of the embodiments of the present invention provides a computer device, including: at least one processor; and a memory storing computer instructions executable on the processor, the instructions being executable by the processor to perform the steps of: s1, receiving commands to be executed by the UBM backplane, and setting different sequence numbers for each command; s2, matching the received execution result with the command according to the sequence number, and recording the result in a log; s3, monitoring the UBM backboard; and S4, responding to the UBM backboard, analyzing the log and positioning the position where the abnormity occurs.
In some embodiments, said analyzing said log and locating a location of an anomaly in response to said UBM backplane occurrence comprises: the execution results are analyzed in response to the execution results not having been received for more than a threshold time and/or an error between the execution results and the expected execution results exceeding a threshold.
In some embodiments, further comprising: the host sends a command to be executed by the UBM backplane to the UBM backplane controller and the BMC through I2C respectively.
In some embodiments, further comprising: and the host receives the execution result returned by the UBM backboard and sends the execution result to the BMC.
In some embodiments, the each command corresponds to a different sequence number, including: each command is sequentially set with an increasing number according to the order of execution.
The invention also provides a computer readable storage medium storing a computer program which, when executed by a processor, performs the method as above.
Finally, it should be noted that, as one of ordinary skill in the art can appreciate, all or part of the processes of the methods of the above embodiments may be implemented by instructing relevant hardware by a computer program, and the program of the method for detecting a UBM backplane based on BMC may be stored in a computer readable storage medium, and when executed, may include the processes of the embodiments of the methods described above. The storage medium of the program may be a magnetic disk, an optical disk, a Read Only Memory (ROM), a Random Access Memory (RAM), or the like. The embodiments of the computer program may achieve the same or similar effects as any of the above-described method embodiments.
Furthermore, the methods disclosed according to embodiments of the present invention may also be implemented as a computer program executed by a processor, which may be stored in a computer-readable storage medium. Which when executed by a processor performs the above-described functions defined in the methods disclosed in embodiments of the invention.
Further, the above method steps and system elements may also be implemented using a controller and a computer readable storage medium for storing a computer program for causing the controller to implement the functions of the above steps or elements.
Further, it should be appreciated that the computer-readable storage media (e.g., memory) herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. By way of example, and not limitation, nonvolatile memory can include Read Only Memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which can act as external cache memory. By way of example and not limitation, RAM is available in a variety of forms such as synchronous RAM (DRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The storage devices of the disclosed aspects are intended to comprise, without being limited to, these and other suitable types of memory.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as software or hardware depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments of the present invention.
The various illustrative logical blocks, modules, and circuits described in connection with the disclosure herein may be implemented or performed with the following components designed to perform the functions herein: a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination of these components. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP, and/or any other such configuration.
The steps of a method or algorithm described in connection with the disclosure herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.
In one or more exemplary designs, the functions may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy disk, blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
The foregoing is an exemplary embodiment of the present disclosure, but it should be noted that various changes and modifications could be made herein without departing from the scope of the present disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. Furthermore, although elements of the disclosed embodiments of the invention may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
It should be understood that, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The numbers of the embodiments disclosed in the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, and the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, of embodiments of the invention is limited to these examples; within the idea of an embodiment of the invention, also technical features in the above embodiment or in different embodiments may be combined and there are many other variations of the different aspects of the embodiments of the invention as described above, which are not provided in detail for the sake of brevity. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the embodiments of the present invention are intended to be included within the scope of the embodiments of the present invention.
Claims (10)
1. A method for detecting a UBM backplane based on BMC is characterized by comprising the following steps executed in the BMC:
receiving commands to be executed by the UBM backboard, and setting different sequence numbers for each command;
matching the received execution result with the command according to the sequence number, and recording the matching result into a log;
monitoring the UBM backplane; and
and responding to the UBM backboard, analyzing the log and positioning the position where the abnormality occurs.
2. The method of claim 1, wherein analyzing the log and locating a location of an occurrence of an anomaly in response to the UBM backplane occurrence of an anomaly comprises:
the execution results are analyzed in response to the execution results not having been received for more than a threshold time and/or an error between the execution results and the expected execution results exceeding a threshold.
3. The method of claim 1, further comprising:
the host sends a command to be executed by the UBM backplane to the UBM backplane controller and the BMC through I2C respectively.
4. The method of claim 3, further comprising:
and the host receives the execution result returned by the UBM backboard and sends the execution result to the BMC.
5. The method of claim 1, wherein the step of each command corresponding to a different sequence number comprises:
each command is sequentially set with an increasing number according to the order of execution.
6. A computer device, comprising:
at least one processor; and
a memory storing computer instructions executable on the processor, the instructions when executed by the processor implementing the steps of:
receiving commands to be executed by the UBM backboard, and setting different sequence numbers for each command;
matching the received execution result with the command according to the sequence number, and recording the matching result into a log;
monitoring the UBM backplane; and
and responding to the UBM backboard, analyzing the log and positioning the position where the abnormality occurs.
7. The computer device of claim 6, wherein analyzing the log and locating a location of an anomaly in response to the UBM backplane having the anomaly comprises:
the execution results are analyzed in response to the execution results not having been received for more than a threshold time and/or an error between the execution results and the expected execution results exceeding a threshold.
8. The computer device of claim 6, wherein the steps further comprise:
the host sends a command to be executed by the UBM backplane to the UBM backplane controller and the BMC through I2C respectively.
9. The computer device of claim 8, wherein the steps further comprise:
and the host receives the execution result returned by the UBM backboard and sends the execution result to the BMC.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910933030.0A CN110781042B (en) | 2019-09-29 | 2019-09-29 | Method, device and medium for detecting UBM (Universal boot Module) backboard based on BMC (baseboard management controller) |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910933030.0A CN110781042B (en) | 2019-09-29 | 2019-09-29 | Method, device and medium for detecting UBM (Universal boot Module) backboard based on BMC (baseboard management controller) |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110781042A true CN110781042A (en) | 2020-02-11 |
CN110781042B CN110781042B (en) | 2022-11-29 |
Family
ID=69384727
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910933030.0A Active CN110781042B (en) | 2019-09-29 | 2019-09-29 | Method, device and medium for detecting UBM (Universal boot Module) backboard based on BMC (baseboard management controller) |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110781042B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112463528A (en) * | 2020-11-20 | 2021-03-09 | 苏州浪潮智能科技有限公司 | In-band and out-band data interaction method, device, equipment and readable medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109634686A (en) * | 2018-12-17 | 2019-04-16 | 郑州云海信息技术有限公司 | A kind of method and system by BMC remote configuration server state |
CN110058821A (en) * | 2019-04-24 | 2019-07-26 | 苏州浪潮智能科技有限公司 | A kind of method and device of query service device storage information |
CN110138776A (en) * | 2019-05-14 | 2019-08-16 | 重庆天蓬网络有限公司 | Docker intrusion detection method, device and medium based on order monitoring |
-
2019
- 2019-09-29 CN CN201910933030.0A patent/CN110781042B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109634686A (en) * | 2018-12-17 | 2019-04-16 | 郑州云海信息技术有限公司 | A kind of method and system by BMC remote configuration server state |
CN110058821A (en) * | 2019-04-24 | 2019-07-26 | 苏州浪潮智能科技有限公司 | A kind of method and device of query service device storage information |
CN110138776A (en) * | 2019-05-14 | 2019-08-16 | 重庆天蓬网络有限公司 | Docker intrusion detection method, device and medium based on order monitoring |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112463528A (en) * | 2020-11-20 | 2021-03-09 | 苏州浪潮智能科技有限公司 | In-band and out-band data interaction method, device, equipment and readable medium |
Also Published As
Publication number | Publication date |
---|---|
CN110781042B (en) | 2022-11-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111090545B (en) | Method, device and medium for recovering failed CPLD | |
CN110659181A (en) | Method and device for monitoring server mainboard and readable medium | |
CN111124722B (en) | Method, equipment and medium for isolating fault memory | |
CN111026576A (en) | Method, equipment and medium for analyzing mainboard faults | |
CN111367807B (en) | Log analysis method, system, device and medium | |
CN112988439B (en) | Server fault discovery method and device, electronic equipment and storage medium | |
CN111045710B (en) | Method, equipment and medium for upgrading SAS-Expander firmware based on IPMI command | |
CN110781042B (en) | Method, device and medium for detecting UBM (Universal boot Module) backboard based on BMC (baseboard management controller) | |
CN111309553B (en) | Method, system, equipment and medium for monitoring storage Jbod | |
CN111209606A (en) | Method, device and equipment for early warning of hard disk change behind RAID card | |
CN111856257B (en) | Method, system, equipment and medium for detecting and protecting CPLD (complex programmable logic device) firmware | |
WO2024124862A1 (en) | Server-based memory processing method and apparatus, processor and an electronic device | |
CN109408272B (en) | Storage fault processing method and device | |
CN111193818A (en) | Method, system, equipment and medium for obtaining IP address | |
CN111274140A (en) | Device, method and server for automatic case execution site recovery | |
CN111124771B (en) | Method, equipment and medium for positioning fault | |
CN114936135A (en) | Abnormity detection method and device and readable storage medium | |
US20230025081A1 (en) | Model training method, failure determining method, electronic device, and program product | |
CN111611135B (en) | CPLD or FPGA signal processing method, device, equipment and readable medium | |
CN111078528A (en) | Management method, equipment and medium for automatic test | |
CN113886165B (en) | Verification method, device and equipment for firmware diagnosis function and readable medium | |
CN110601905A (en) | Fault detection method and device | |
CN110647464A (en) | Method, equipment and medium for analyzing test cases | |
CN114490217B (en) | Fault testing method, device and equipment for ME and BIOS interaction and readable medium | |
TWI847064B (en) | Equipment detection method and equipment detection device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |