CN111857753A - BMC starting method and related device - Google Patents

BMC starting method and related device Download PDF

Info

Publication number
CN111857753A
CN111857753A CN202010710037.9A CN202010710037A CN111857753A CN 111857753 A CN111857753 A CN 111857753A CN 202010710037 A CN202010710037 A CN 202010710037A CN 111857753 A CN111857753 A CN 111857753A
Authority
CN
China
Prior art keywords
storage medium
bmc
firmware image
identifier
starting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010710037.9A
Other languages
Chinese (zh)
Inventor
林玉兵
鞠荣荣
靳先奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Electronic Information Industry Co Ltd
Original Assignee
Inspur Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Electronic Information Industry Co Ltd filed Critical Inspur Electronic Information Industry Co Ltd
Priority to CN202010710037.9A priority Critical patent/CN111857753A/en
Publication of CN111857753A publication Critical patent/CN111857753A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • G06F8/63Image based installation; Cloning; Build to order
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/004Error avoidance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Stored Programmes (AREA)

Abstract

The application discloses a BMC starting method, which comprises the following steps: performing firmware image flash operation on a first storage medium of the BMC, and marking a hardware upgrading identifier; performing firmware image holding operation on a second storage medium of the BMC; when the BMC is started from the first storage medium, judging whether the hardware upgrading identifier is a successful identifier; if yes, starting the BMC from the first storage medium; and if not, executing the BMC starting operation from the second storage medium. By executing the BMC starting operation from the second storage medium when the program is unsuccessful, the problem that the program fails to start is avoided, and the reliability and the stability of the BMC are improved. The application also discloses a BMC starting device, a server and a computer readable storage medium, which have the beneficial effects.

Description

BMC starting method and related device
Technical Field
The present application relates to the field of server management technologies, and in particular, to a BMC starting method, a BMC starting apparatus, a server, and a computer-readable storage medium.
Background
With the continuous development of information technology, the demand of each industry on a server is increased, and BMC (baseboard management Controller) as a server management control system is also greatly developed, and with the different customized demands of each large manufacturer on the server, BMC is also continuously subject to technical innovation.
In the prior art, there are three methods for upgrading dual BMC storage media: the memory medium of the BMC is required to be taken down by programming the mirror image through the burner; a serial port brush is used for mirroring into a storage medium in a Network File System (NFS) mounting mode; and refreshing BMC mirror image data through the network page. The latter two ways are more commonly used because the burning threshold is more difficult when the chip is removed, but in the latter two ways, occasionally, the situation that the BMC firmware data of the previous two storage media cannot be burned after being erased occurs, which results in that the BMC cannot be restarted because the boot path is erased. Therefore, no matter what starting mode is adopted in the prior art, the situation that the BMC cannot be normally started after being upgraded is possible, and the reliability and the stability of the BMC are reduced.
Therefore, how to avoid the problem of incapability of starting due to BMC programming failure is a key issue that is focused on by those skilled in the art.
Disclosure of Invention
The application aims to provide a BMC starting method, a BMC starting device, a server and a computer readable storage medium.
In order to solve the above technical problem, the present application provides a BMC starting method, including:
performing firmware image flash operation on a first storage medium of the BMC, and marking a hardware upgrading identifier;
performing firmware image holding operation on a second storage medium of the BMC;
when the BMC is started from the first storage medium, judging whether the hardware upgrading identifier is a successful identifier;
if yes, starting the BMC from the first storage medium;
and if not, executing the BMC starting operation from the second storage medium.
Optionally, performing a firmware image flash operation on the first storage medium of the BMC, and marking a hardware upgrade identifier, including:
performing firmware image flash operation on a first storage medium of the BMC;
when the firmware image flash operation is completed, marking the hardware upgrading identification as a successful identification;
and when the firmware image flash operation fails, marking the hardware upgrading identifier as a failure identifier.
Optionally, the performing a firmware image retention operation on the second storage medium of the BMC includes:
judging whether the second storage medium of the BMC stores the same firmware image data as the first storage medium before flashing;
If yes, judging that the maintenance is successful;
and if not, copying the firmware image data before the first storage medium is flushed to the second storage medium.
Optionally, the method further includes:
when the BMC is started from the first storage medium, the firmware image data in the first storage medium is written into the second storage medium in a flash mode.
Optionally, the method further includes:
when the BMC starting operation is executed from the second storage medium, the firmware image data in the second storage medium is written into the first storage medium in a flash mode.
The present application further provides a BMC starting device, including:
the firmware flashing operation module is used for carrying out firmware image flashing operation on a first storage medium of the BMC and marking a hardware upgrading identifier;
the firmware image holding module is used for carrying out firmware image holding operation on a second storage medium of the BMC;
the starting judgment module is used for judging whether the hardware upgrading identifier is a successful identifier or not when the BMC is started from the first storage medium;
the normal starting module is used for starting the BMC from the first storage medium when the hardware upgrading identifier is a successful identifier;
and the fault starting module is used for executing BMC starting operation from the second storage medium when the hardware upgrading identifier is not a successful identifier.
Optionally, the firmware flashing operation module includes:
the firmware flashing unit is used for carrying out firmware image flashing operation on a first storage medium of the BMC;
the success marking unit is used for marking the hardware upgrading identification as a success identification when the firmware image flashing operation is completed;
and the failure marking unit is used for marking the hardware upgrading identifier as a failure identifier when the firmware image flash operation fails.
Optionally, the method further includes:
and the firmware data updating module is used for flashing the firmware image data in the first storage medium into the second storage medium when the BMC is started from the first storage medium.
The present application further provides a server, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the BMC boot method as described above when executing the computer program.
The present application also provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the BMC boot method as described above.
The application provides a BMC starting method, which comprises the following steps: performing firmware image flash operation on a first storage medium of the BMC, and marking a hardware upgrading identifier; performing firmware image holding operation on a second storage medium of the BMC; when the BMC is started from the first storage medium, judging whether the hardware upgrading identifier is a successful identifier; if yes, starting the BMC from the first storage medium; and if not, executing the BMC starting operation from the second storage medium.
The corresponding flash operation is executed on the first storage medium, the firmware mirror image in the second storage medium is kept, then the BMC is started, the first storage medium is started when the start is successful, and the BMC starting operation is executed from the second storage medium when the start is unsuccessful, so that the problem that the BMC cannot be started due to the failed programming is solved, and the reliability and the stability of the BMC are improved.
The application also provides a BMC starting device, a server and a computer readable storage medium, which have the above beneficial effects and are not described herein again.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a BMC starting method according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a BMC boot apparatus according to an embodiment of the present disclosure.
Detailed Description
The core of the application is to provide a BMC starting method, a BMC starting device, a server and a computer readable storage medium, corresponding flash operation is executed on a first storage medium firstly, a firmware mirror image in a second storage medium is kept to operate, then BMC is started, when the starting is successful, the first storage medium is used for starting, and when the starting is unsuccessful, BMC starting operation is executed from the second storage medium, so that the problem that the BMC cannot be started due to programming failure is solved, and the reliability and the stability of the BMC are improved.
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the prior art, there are three methods for upgrading dual BMC storage media: the memory medium of the BMC is required to be taken down by programming the mirror image through the burner; mirroring the serial brush into a storage medium in an NFS mounting mode; and refreshing BMC mirror image data through the network page. The latter two ways are more commonly used because the burning threshold is more difficult when the chip is removed, but in the latter two ways, occasionally, the situation that the BMC firmware data of the previous two storage media cannot be burned after being erased occurs, which results in that the BMC cannot be restarted because the boot path is erased. Therefore, no matter what starting mode is adopted in the prior art, the situation that the BMC cannot be normally started after being upgraded is possible, and the reliability and the stability of the BMC are reduced.
Therefore, the application provides a BMC starting method, which includes executing corresponding flash operation on a first storage medium, maintaining a firmware image in a second storage medium, starting BMC, starting through the first storage medium when starting is successful, and executing BMC starting operation from the second storage medium when starting is unsuccessful, so that the problem that the BMC cannot be started due to programming failure is solved, and reliability and stability of the BMC are improved.
A BMC boot method provided in the present application is described below with reference to a specific embodiment.
Referring to fig. 1, fig. 1 is a flowchart of a BMC starting method according to an embodiment of the present disclosure.
In this embodiment, the method may include:
s101, performing firmware image flash operation on a first storage medium of the BMC, and marking a hardware upgrading identifier;
the step aims to perform firmware image flash operation on a first storage medium of the BMC and mark a hardware upgrading identifier. Namely, the normal firmware image flash operation is executed on the first storage medium in the BMC, so as to update the firmware data of the BMC.
Optionally, this step may include:
step 1, performing firmware image flash operation on a first storage medium of the BMC;
Step 2, when the firmware image flash operation is completed, marking the hardware upgrading identification as a successful identification;
and 3, when the firmware image flashing operation fails, marking the hardware upgrading identifier as a failure identifier.
It can be seen that this alternative is primarily illustrative of how a firmware image flash operation may be performed. Specifically, in this alternative, the firmware image flash operation is first performed on the first storage medium of the BMC. The executed firmware image flash operation can adopt the prior art to provide any kind of firmware image flash operation. Then, when the firmware image flash operation is completed, marking the hardware upgrading identification as a successful identification; and when the firmware image flash operation fails, marking the hardware upgrading identifier as a failure identifier.
S102, carrying out firmware image holding operation on a second storage medium of the BMC;
and on the basis of the S101, performing firmware image holding operation on a second storage medium of the BMC. I.e. keeping the original firmware image data stored in the second storage medium.
In the prior art, when firmware data is updated for a BMC with dual storage media, firmware data update operations are performed for both a first storage medium and a second storage medium. I.e. all data in the storage medium is subjected to a refresh operation. Therefore, when the refreshed firmware data is wrong and normal starting operation cannot be performed, the BMC thoroughly has a problem and cannot be started, so that normal BMC operation is influenced, and the reliability of the BMC is reduced.
Therefore, in this step, the firmware image holding operation is performed on the second storage medium of the BMC, so that the second storage medium holds and stores the firmware image data that is stably started before the firmware is updated. So that when the first storage medium fails to boot, the firmware image in the second storage medium is used for booting.
In this embodiment, the first storage medium refers to a master storage medium in the BMC device, and the second storage medium refers to a slave storage medium in the BMC device.
Optionally, this step may include:
step 1, judging whether firmware mirror image data which is the same as that before the flash of the first storage medium is stored in a second storage medium of the BMC; if yes, executing step 2; if not, executing the step 3;
step 2, judging to keep successful;
and 3, copying the firmware image data before the first storage medium is flushed to a second storage medium.
It can be seen that this alternative is intended to illustrate how the firmware image retention operation is performed on the second storage medium. In the alternative, firstly, whether the same firmware image data as that before the flash of the first storage medium is stored in the second storage medium of the BMC is judged; if so, judging that the storage is successful, namely storing firmware image data which can be normally started before the flash in the second storage medium; and if not, copying the firmware image data before the first storage medium is flushed to the second storage medium. Therefore, the alternative scheme can always keep the firmware image data which can be normally started before the first storage medium is flushed and stored in the second storage medium.
S103, when the BMC is started from the first storage medium, judging whether the hardware upgrading identifier is a successful identifier; if yes, executing S104; if not, executing S105;
on the basis of S102, this step is intended to determine whether the hardware upgrade flag is a successful flag when the BMC is started from the first storage medium. That is, when the BMC is started, it is determined whether the hardware upgrade flag of the first storage medium in the BMC is a successful flag. If yes, the firmware image data in the first storage medium can be normally started at the moment. If not, the firmware image data in the first storage medium has problems and cannot be normally started.
Therefore, the step mainly judges whether the firmware image data can be normally started, and also can execute the pre-starting operation on the firmware image data in the first storage medium, so as to judge whether the firmware image data can be normally started according to the operation result.
S104, starting the BMC from the first storage medium;
this step is intended to boot the BMC from the first storage medium. That is, the firmware image data in the first storage medium is correct data and can be used directly. Thus, the BMC may be booted from the first storage medium.
Optionally, this embodiment may further include:
When the BMC is started from the first storage medium, the firmware image data in the first storage medium is flushed into the second storage medium.
Therefore, in this alternative, when the first storage medium can be normally started, it is indicated that the firmware image data in the first storage medium is correct data, and then the data is flushed into the second storage medium, so as to complete the firmware flushing operation of the BMC.
And S105, executing the BMC starting operation from the second storage medium.
This step is intended to start the BMC from the second storage medium. That is, the firmware image data in the first storage medium cannot be normally started, and a start operation needs to be performed from the firmware image data in the second storage medium.
Optionally, this embodiment may further include:
when the BMC starting operation is executed from the second storage medium, the firmware image data in the second storage medium is written into the first storage medium in a flash mode.
It can be seen that the present alternative is primarily intended to illustrate that when the BMC is booted from the second storage medium, the firmware image data in the second storage medium is available and the firmware image data in the first storage medium is not available. Therefore, the firmware image data in the second storage medium is flash-written into the first storage medium, so that the BMC stores the normal firmware image data.
In summary, in this embodiment, the corresponding flash operation is executed on the first storage medium, the firmware image in the second storage medium is kept, then the BMC is started, the first storage medium is used for starting when the start is successful, and the BMC start operation is executed from the second storage medium when the start is unsuccessful, so that the problem that the boot cannot be performed due to the burn-in failure is avoided, and the reliability and the stability of the BMC are improved.
A BMC boot method provided in the present application is described below with reference to a specific embodiment.
In this embodiment, the method may include:
step 1, erasing the firmware image data of the main storage medium and reserving the firmware image data of the auxiliary storage medium.
And 2, brushing the latest firmware image data into a main storage medium, and marking an upgrading mark in hardware.
And 3, starting the BMC from the main storage medium and checking a hardware mark.
Step 4, if the upgrade fails, the slave storage medium is started through the watchdog, and the firmware image data of the slave storage medium is flushed into the master storage medium; and if the upgrade is successful, erasing the secondary storage medium, and flushing the firmware image data of the primary storage medium into the secondary storage medium.
It can be seen that, in this embodiment, the corresponding flash operation is executed on the first storage medium, the firmware image in the second storage medium is kept, then the BMC is started, the first storage medium is used for starting when the start is successful, and the BMC start operation is executed from the second storage medium when the start is unsuccessful, so that the problem that the boot cannot be performed due to the burn-in failure is avoided, and the reliability and the stability of the BMC are improved.
In the following, a BMC starting device provided in an embodiment of the present application is introduced, and a BMC starting device described below and a BMC starting method described above may be referred to correspondingly.
Referring to fig. 2, fig. 2 is a schematic structural diagram of a BMC boot apparatus according to an embodiment of the present disclosure.
In this embodiment, the apparatus may include:
the firmware flashing operation module 100 is used for performing firmware image flashing operation on a first storage medium of the BMC and marking a hardware upgrading identifier;
a firmware image holding module 200, configured to perform a firmware image holding operation on a second storage medium of the BMC;
a start judging module 300, configured to judge whether the hardware upgrade flag is a successful flag when the BMC is started from the first storage medium;
A normal starting module 400, configured to start the BMC from the first storage medium when the hardware upgrade flag is a successful flag;
and a failure starting module 500, configured to execute a BMC starting operation from the second storage medium when the hardware upgrade flag is not a successful flag.
Optionally, the firmware flashing operation module 100 may include:
the firmware flashing unit is used for performing firmware image flashing operation on a first storage medium of the BMC;
the success marking unit is used for marking the hardware upgrading identification as a success identification when the firmware image flashing operation is completed;
and the failure marking unit is used for marking the hardware upgrading identifier as a failure identifier when the firmware image flash operation fails.
Optionally, the apparatus may further include:
and the firmware data updating module is used for flushing the firmware image data in the first storage medium into the second storage medium when the BMC is started from the first storage medium.
An embodiment of the present application further provides a server, including:
a memory for storing a computer program;
a processor for implementing the steps of the BMC boot method according to the above embodiments when executing the computer program.
An embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the BMC starting method according to the above embodiment are implemented.
The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
A BMC boot method, a BMC boot apparatus, a server, and a computer-readable storage medium provided by the present application are described in detail above. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.

Claims (10)

1. A BMC starting method is characterized by comprising the following steps:
performing firmware image flash operation on a first storage medium of the BMC, and marking a hardware upgrading identifier;
performing firmware image holding operation on a second storage medium of the BMC;
when the BMC is started from the first storage medium, judging whether the hardware upgrading identifier is a successful identifier;
if yes, starting the BMC from the first storage medium;
and if not, executing the BMC starting operation from the second storage medium.
2. The BMC boot method of claim 1, wherein performing a firmware image flush operation on a first storage medium of the BMC and marking a hardware upgrade flag comprises:
Performing firmware image flash operation on a first storage medium of the BMC;
when the firmware image flash operation is completed, marking the hardware upgrading identification as a successful identification;
and when the firmware image flash operation fails, marking the hardware upgrading identifier as a failure identifier.
3. The BMC boot method of claim 1, wherein performing a firmware image retention operation on a second storage medium of the BMC comprises:
judging whether the second storage medium of the BMC stores the same firmware image data as the first storage medium before flashing;
if yes, judging that the maintenance is successful;
and if not, copying the firmware image data before the first storage medium is flushed to the second storage medium.
4. The BMC boot method of claim 1, further comprising:
when the BMC is started from the first storage medium, the firmware image data in the first storage medium is written into the second storage medium in a flash mode.
5. The BMC boot method of claim 1, further comprising:
when the BMC starting operation is executed from the second storage medium, the firmware image data in the second storage medium is written into the first storage medium in a flash mode.
6. A BMC boot apparatus, comprising:
the firmware flashing operation module is used for carrying out firmware image flashing operation on a first storage medium of the BMC and marking a hardware upgrading identifier;
the firmware image holding module is used for carrying out firmware image holding operation on a second storage medium of the BMC;
the starting judgment module is used for judging whether the hardware upgrading identifier is a successful identifier or not when the BMC is started from the first storage medium;
the normal starting module is used for starting the BMC from the first storage medium when the hardware upgrading identifier is a successful identifier;
and the fault starting module is used for executing BMC starting operation from the second storage medium when the hardware upgrading identifier is not a successful identifier.
7. The BMC boot device of claim 6, wherein the firmware flush operation module comprises:
the firmware flashing unit is used for carrying out firmware image flashing operation on a first storage medium of the BMC;
the success marking unit is used for marking the hardware upgrading identification as a success identification when the firmware image flashing operation is completed;
and the failure marking unit is used for marking the hardware upgrading identifier as a failure identifier when the firmware image flash operation fails.
8. The BMC enabled device of claim 6, further comprising:
and the firmware data updating module is used for flashing the firmware image data in the first storage medium into the second storage medium when the BMC is started from the first storage medium.
9. A server, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the BMC boot method according to any of claims 1 to 5 when executing said computer program.
10. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the BMC boot method according to any of the claims 1 to 5.
CN202010710037.9A 2020-07-22 2020-07-22 BMC starting method and related device Withdrawn CN111857753A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010710037.9A CN111857753A (en) 2020-07-22 2020-07-22 BMC starting method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010710037.9A CN111857753A (en) 2020-07-22 2020-07-22 BMC starting method and related device

Publications (1)

Publication Number Publication Date
CN111857753A true CN111857753A (en) 2020-10-30

Family

ID=73002034

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010710037.9A Withdrawn CN111857753A (en) 2020-07-22 2020-07-22 BMC starting method and related device

Country Status (1)

Country Link
CN (1) CN111857753A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108845814A (en) * 2018-06-14 2018-11-20 郑州云海信息技术有限公司 A kind of guard method of firmware update, device and computer readable storage medium
CN109814908A (en) * 2019-01-17 2019-05-28 深圳忆联信息系统有限公司 Firmware stablizes method, apparatus, computer equipment and the storage medium of upgrading
CN110008689A (en) * 2019-04-15 2019-07-12 苏州浪潮智能科技有限公司 A kind of BMC starting method, apparatus, equipment and computer readable storage medium
CN110990045A (en) * 2019-12-20 2020-04-10 苏州浪潮智能科技有限公司 double-BMC FLASH upgrading method and equipment
CN111324366A (en) * 2020-02-14 2020-06-23 苏州浪潮智能科技有限公司 BMC (baseboard management controller) starting firmware rollback method and device, BMC and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108845814A (en) * 2018-06-14 2018-11-20 郑州云海信息技术有限公司 A kind of guard method of firmware update, device and computer readable storage medium
CN109814908A (en) * 2019-01-17 2019-05-28 深圳忆联信息系统有限公司 Firmware stablizes method, apparatus, computer equipment and the storage medium of upgrading
CN110008689A (en) * 2019-04-15 2019-07-12 苏州浪潮智能科技有限公司 A kind of BMC starting method, apparatus, equipment and computer readable storage medium
CN110990045A (en) * 2019-12-20 2020-04-10 苏州浪潮智能科技有限公司 double-BMC FLASH upgrading method and equipment
CN111324366A (en) * 2020-02-14 2020-06-23 苏州浪潮智能科技有限公司 BMC (baseboard management controller) starting firmware rollback method and device, BMC and storage medium

Similar Documents

Publication Publication Date Title
US8060662B2 (en) Recording control apparatus, recording control method, and computer program product
TWI384367B (en) System of updating firmware and method thereof
CN102667716A (en) Methods and devices for updating firmware of a component using a firmware update application
CN101667128B (en) Method for updating and repairing basic input and output system
CN111142911B (en) Embedded system with abnormal recovery function and upgrading method thereof
CN102141921A (en) Method for upgrading system of terminal equipment and terminal equipment
CN111552592A (en) Double-backup starting method and system
CN111562934A (en) Software system upgrading method based on hot patch, terminal and storage medium
CN111651304B (en) Software recovery method and device based on double-core intelligent ammeter and computer equipment
CN112433769A (en) BMC starting method and device, computer equipment and storage medium
CN113157303A (en) Upgrading method, embedded system, terminal and computer storage medium
WO2022194048A1 (en) Method and device for data update, and vehicle
CN114895845A (en) EMmC data storage control method and embedded mainboard
CN109375953B (en) Operating system starting method and device
CN110597532A (en) Data acquisition module, firmware upgrading method thereof and storage medium
CN110688141A (en) Firmware updating method
CN111858119A (en) BIOS fault repairing method and related device
CN111857753A (en) BMC starting method and related device
CN112579179A (en) Partition mounting method of embedded system
JP2005284902A (en) Terminal device, control method and control program thereof, host device, control method and control program thereof, and method, system, and program for remote updating
CN113467805A (en) Firmware rollback method of network equipment and related device
CN115686946A (en) Firmware updating method, firmware updating device and vehicle
CN108920210B (en) Method, system and related assembly for loading storage control software
CN113377425A (en) BMC firmware generation method and device, BMC starting method and device and storage medium
CN115437670B (en) Automobile controller program upgrading system based on TFTP

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20201030