[go: up one dir, main page]

CN104834575B - A kind of firmware restoration method and device - Google Patents

A kind of firmware restoration method and device Download PDF

Info

Publication number
CN104834575B
CN104834575B CN201510229002.2A CN201510229002A CN104834575B CN 104834575 B CN104834575 B CN 104834575B CN 201510229002 A CN201510229002 A CN 201510229002A CN 104834575 B CN104834575 B CN 104834575B
Authority
CN
China
Prior art keywords
firmware
module
current version
version
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510229002.2A
Other languages
Chinese (zh)
Other versions
CN104834575A (en
Inventor
肖翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Information Technologies Co Ltd
Original Assignee
Unis Huashan Information Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Unis Huashan Information Technologies Co Ltd filed Critical Unis Huashan Information Technologies Co Ltd
Priority to CN201510229002.2A priority Critical patent/CN104834575B/en
Publication of CN104834575A publication Critical patent/CN104834575A/en
Application granted granted Critical
Publication of CN104834575B publication Critical patent/CN104834575B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Stored Programmes (AREA)

Abstract

The application provides a kind of firmware restoration method and device, applied on the baseboard management controller BMC central processor CPUs in server, the server includes host CPU, the BMC CPU and multiple modules, the multiple module is connected with the BMC CPU, include in each module comprising the firmware needed for each self-operating, this method:When the host CPU starts failure, each described module is handled as follows:Whether current version firmware can use in determining module;When the current version firmware is unavailable, the version firmware that respective modules successfully upgraded is obtained from storage device;Firmware restoration is carried out to the respective modules according to the version firmware successfully upgraded.The application can effectively reduce the risk that host CPU can not start, and can detect because system caused by incompatible version can not start.

Description

A kind of firmware restoration method and device
Technical field
The application is related to server technology field, more particularly to a kind of firmware restoration method and device.
Background technology
Firmware is the program code of the bottom that equipment is able to run.Due to leak or newly-increased be present in the firmware in server Function needs constantly upgrading, and when firmware upgrade fails, server will have very that maximum probability can not start, and maintenance difficulty is very big, Influence normal use.
Firmware is stored in ROM (Read-Only Memory, read-only storage) by prior art, and uses two panels The mode of ROM backups, in main ROM in the case of firmware upgrade failure, backup ROM operations are switched to, to avoid upgrading from failing System is caused not start.But when existing in server, when largely needing the firmware backed up, the technical scheme, which will increase, services The cost of device, and can not solve firmware upgrade success but can not start caused by incompatible version.
The content of the invention
In view of this, the application provides a kind of firmware restoration method and device.
Specifically, the application is achieved by the following technical solution:
The application provides a kind of firmware restoration method, applied to the baseboard management controller BMC central processings in server On device CPU, the server includes host CPU, the BMC CPU and multiple modules, the multiple module and the BMC CPU Connect, include in each module comprising the firmware needed for each self-operating, this method:
When the host CPU starts failure, each described module is handled as follows:
Whether current version firmware can use in determining module;
When the current version firmware is unavailable, the version that acquisition respective modules successfully upgraded from storage device is consolidated Part;
Firmware restoration is carried out to the respective modules according to the version firmware successfully upgraded.
The application provides a kind of firmware restoration device, applied to the baseboard management controller BMC central processings in server On device CPU, the server includes host CPU, the BMC CPU and multiple modules, the multiple module and the BMC CPU Connect, include in each module comprising the firmware needed for each self-operating, the device:
Determining unit, for when the host CPU starts failure, determining that current version firmware whether may be used in each module With;
Acquiring unit, for when the current version firmware is unavailable, respective modules success to be obtained from storage device The version firmware upgraded;
Recovery unit, for carrying out firmware restoration to the respective modules according to the version firmware successfully upgraded.
It can be seen from above description the application use independently of main system BMC systems carry out firmware restoration, it is determined that When starting failure due to host CPU caused by firmware upgrade, it can obtain what respective modules had successfully upgraded from storage device Any version firmware carries out firmware restoration.The risk that host CPU can not start can effectively be reduced by the application, and can be detected Because system caused by incompatible version can not start.
Brief description of the drawings
Fig. 1 is the server architecture schematic diagram shown in the exemplary embodiment of the application one;
Fig. 2 is a kind of firmware restoration method flow diagram shown in the exemplary embodiment of the application one;
Fig. 3 is a kind of underlying hardware structure of firmware restoration device place equipment shown in the exemplary embodiment of the application one Schematic diagram;
Fig. 4 is a kind of structural representation of firmware restoration device shown in the exemplary embodiment of the application one.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended The example of the consistent apparatus and method of some aspects be described in detail in claims, the application.
It is only merely for the purpose of description specific embodiment in term used in this application, and is not intended to be limiting the application. " one kind " of singulative used in the application and appended claims, " described " and "the" are also intended to including majority Form, unless context clearly shows that other implications.It is also understood that term "and/or" used herein refers to and wrapped Containing the associated list items purpose of one or more, any or all may be combined.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the application A little information should not necessarily be limited by these terms.These terms are only used for same type of information being distinguished from each other out.For example, do not departing from In the case of the application scope, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determining ".
HOST (master) CPU (Central Processing Unit, central processing unit) and BMC is generally comprised in server (Baseboard Management Controller, baseboard management controller) CPU, wherein, host CPU is used for business processing, BMC CPU are used for server state monitoring, outband management and firmware upgrade etc..When the firmware upgrade error in server, For example, server power failure in escalation process, then server will be unable to normally start.
In order to avoid above mentioned problem, prior art increases a piece of ROM in the server by the way of ROM backups Firmware backup is carried out, when main ROM, which upgrades, to malfunction, is switched to backup ROM, starts server using the firmware backed up in ROM;Or Person directly selects a piece of Large Copacity ROM for server, and boot section, main area and spare area, normal condition are marked off from the ROM Lower boot section is first run, and guiding CPU is operated in main area, when main area, which upgrades, to malfunction, is switched to spare area and is started server. Above-mentioned technical proposal reduces the probability that server can not start to a certain extent, but also increase simultaneously server into This, and can not solve firmware upgrade success but can not start caused by incompatible version.
The problem of existing for prior art, the application propose a kind of firmware restoration method, and this method is using independent In main system BMC systems carry out firmware restoration, it is determined that due to caused by firmware upgrade host CPU start failure when, Ke Yicong Any version firmware that respective modules had successfully upgraded is obtained in storage device and carries out firmware restoration.
It is the server architecture schematic diagram shown in the embodiment of the present application referring to Fig. 1, the schematic diagram illustrate only in server Main modular.HOST CPU are used for business processing;PCH (Platform Controller Hub, south bridge) is used for extension CPU Peripheral Interface;BMC CPU are used for server state monitoring, outband management and firmware upgrade etc.;BMC ROM are used to store The program of BMC systems;ME (Management Engine, management engine) is used to initializing and managing whole system;BIOS (Basic Input Output System, basic input output system) is used to preserve system setting and system self-starting journey Sequence etc.;LOGIC (logic) is a kind of user according to respective need and voluntarily digital integrated electronic circuit of constitutive logic function;Storage is set It is ready for use on and preserves the information such as server log.Wherein, respective module operation institute is preserved in ME, BIOS and LOGIC module respectively Need firmware.
Referring to Fig. 2, for one embodiment flow chart of the application firmware restoration method, the embodiment is to firmware restoration process It is described.
Step 201, when the host CPU starts failure, whether current version firmware can use in determining module.
Referring to Fig. 1, need to carry out module (ME, BIOS and LOGIC of firmware upgrade and recovery in the embodiment of the present application Module) all it is connected on BMC CPU, so that BMC CPU operate to corresponding module.Module mentioned in description refers both to below Module comprising firmware.
When host CPU starts failure, whether BMC CPU inquire about current version firmware in coupled modules may be used With to determine whether because firmware upgrade causes host CPU not start.BMC CPU proceed as follows to each module:
The firmware information of current version firmware in acquisition module, is verified to the firmware information of acquisition, is tied according to verification Fruit is handled as follows.
When the firmware information of verification is incorrect, illustrates that the module may malfunction in upper once firmware upgrade, cause to write The firmware entered into module is incorrect, or, the firmware damages in the process of running, now, confirms current version in the module Firmware is unavailable.
When the firmware information of verification is correct, illustrate to be successfully written into module during last firmware upgrade.Now, one can be entered Step judges whether the upgrading mark of the module, and the upgrading is masked as BMC CPU and is successfully written what is set after firmware to module Mark.
When the upgrading mark be present, after illustrating last firmware upgrade, host CPU does not successfully start up, it may be possible to due to Incompatible version causes host CPU not start, and now, equally determines that current version firmware is unavailable in the module.
When in the absence of the upgrading mark, illustrate last firmware upgrade success, and host CPU once normally started after upgrading Cross.Need exist for supplementary notes a bit, after module is successfully written firmware (set upgrading mark), if host CPU start into Work(, BMC CPU can remove upgrading mark.Therefore, when firmware information is correct and upgrading mark (the current version in module is not present again This firmware once successfully started up) when, confirm that current version firmware can use in the module, this time host CPU start failure be not by Cause in firmware upgrade mistake, without carrying out firmware version recovery, prompt keeper to carry out other investigations.
Step 202, when the current version firmware is unavailable, acquisition respective modules successfully upgraded from storage device Version firmware.
When the current version firmware in by step 201 determining module is unavailable, start firmware restoration flow.The application In embodiment, all version firmwares once successfully upgraded are maintained in storage device, unavailable in current version firmware When, any version firmware successfully upgraded before being obtained from storage device is recovered, and would generally be selected certainly in the recent period The version firmware that success upgrades.It is without restriction to storage device, if firmware can be stored, for example expansion ROM, system are Some memories such as external memory storage etc..Preferably, storage device is configured in server it is used to protect in described above mentioned The files such as daily record are deposited, the application preferred embodiment directly preserves the firmware version of each module using the storage device, therefore, will not Increase extra hardware cost.For example, can select SD (Secure Digital Memory Card, safe digital card), The external memories such as eMMC (Embedded Multi Media Card, embedded multi-media card) are as storage device.
Step 203, firmware restoration is carried out to the respective modules according to the version firmware successfully upgraded.
As it was previously stated, preserving all version firmwares successfully upgraded in storage device, each version firmware can successfully write Just it is saved in after entering module in storage device, can also be after firmware is successfully written module and when host CPU be successfully restarted, then carry out Firmware preserves.For latter preserving type, specifically, when host CPU starts successfully, current version firmware is in judge module It is no to have preserved, if current version firmware does not preserve in module, the current version firmware in the module is saved in storage and set In standby.Each version firmware that the processing mode can ensure to preserve in storage device is all to restart to test through host CPU after successfully upgrading The firmware demonstrate,proved and (eliminate incompatible version problem), improves the validity that firmware is preserved in storage device, saves and deposit Store up space.
In addition, it can also preserve modules except can individually preserve each module firmware in storage device and currently transport The compatible support relation of row firmware version, detailed process are:Current version firmware in module is being saved in it in storage device Afterwards, the current version information of firmware in all modules is obtained, records the corresponding pass of the current version information of firmware in modules System, the corresponding relation is saved in storage device, so as in service exception (due between disparate modules firmware or firmware and behaviour Incompatible caused upper-layer service processing is abnormal between making system, such as, network is obstructed, and running software reports an error, CPU process performances Decline etc.) when, BMC CPU can recover order (for example, user can pass through when judging service exception according to the version received The operation interface input version of server recovers order), a version information pair preserved is automatically selected from storage device It should be related to, firmware restoration be carried out simultaneously to multiple modules, to ensure the normal operation of business.
It can be seen from above description the application use independently of main system BMC systems carry out firmware restoration, it is determined that When starting failure due to host CPU caused by firmware upgrade, it can obtain what respective modules had successfully upgraded from storage device Any version firmware carries out firmware restoration.The risk that host CPU can not start can effectively be reduced by the application, and can be detected Because system caused by incompatible version can not start.
Now still by taking Fig. 1 as an example, firmware restoration process is discussed in detail.
BMC CPU can carry out firmware upgrade and recovery to ME, BIOS and LOGIC module in Fig. 1.It is assumed that each mould The current version of firmware number run in block is ME2.0, BIOS3.0 and LOGIC2.0, and has been saved in storage device The firmware and edition compatibility relation (ME2.0, BIOS3.0 and LOGIC2.0 version corresponding relation) of version are stated, current Under edition compatibility relation, server service normal operation.
Firmware upgrade is carried out to ME modules, after upgraded version ME3.0, ME3.0 firmware is successfully written ME modules, sets and rises Level is identified as 1.Now, host CPU is restarted.If host CPU is restarted unsuccessfully, host CPU notices unexpected message to BMC CPU.BMC CPU are obtained After knowing that host CPU is restarted unsuccessfully, the firmware information in modules is verified, to determine whether because host CPU caused by upgrading starts Failure.
Specifically, when BIOS module and LOGIC modules verify successfully, and the verification of ME modules fails, illustrate in ME modules Current version firmware is unavailable, it is necessary to carry out firmware restoration;Or when BIOS module, LOGIC modules and ME modules all verify Successfully, when but upgrading is identified as 1, illustrate that firmware upgrade write-in is successful, but host CPU can not normally start, therefore, ME moulds Upgraded version in block is unavailable, it is necessary to carry out firmware restoration.
When BIOS module, LOGIC modules and ME modules all verify success, and upgrading is identified as 0, illustrate that host CPU exists Once successfully restarted after firmware upgrade, and therefore, this time started and be unsuccessfully not due to caused by firmware upgrade, keeper needs to carry out Other investigations.
When it is determined that ME modules need to carry out firmware restoration, obtain from storage device and once successfully upgraded in ME modules Version firmware, for example, ME2.0, re-write ME modules and carry out firmware restoration, it is assumed that ME2.0 once cross by normal operation Version, therefore, after firmware restoration, host CPU can normally start, so as to ensure the normal processing of business.
Above-mentioned is firmware restoration process when host CPU starts failure.It is assumed that ME3.0 is successfully written ME modules, and host CPU Start successfully, current upgrading is masked as 1, illustrate it is currently first successfully starting up after firmware upgrade, setting upgrading is masked as 0.
BMC CPU can judge that ME3.0 versions whether had been preserved in storage device to be consolidated after host CPU normally starts Part, when not preserving, ME3.0 firmwares are saved in storage device, and preserve the firmware being currently running in current modules Edition compatibility relation (ME3.0, BIOS3.0 and LOGIC2.0 version corresponding relation).
It is assumed that current host CPU starts normally, but business can not be handled normally, and user can pass through operation circle of server Version is issued towards BMC CPU and recovers order, and it is simultaneous that BMC CPU can recover the version that order deletion is currently unavailable according to version Appearance relation, the other edition compatibility relations for selecting once to preserve from storage device carry out overall firmware restoration, for example, choosing The version corresponding relation for selecting ME2.0, BIOS3.0 and LOGIC2.0 for preserving carries out firmware restoration, to ensure that server can To carry out normal business processing.
Corresponding with the embodiment of foregoing firmware restoration method, present invention also provides the embodiment of firmware restoration device.
The embodiment of the application firmware restoration device can be applied on the server.Device embodiment can be real by software It is existing, it can also be realized by way of hardware or software and hardware combining.Exemplified by implemented in software, as on a logical meaning Device, it is to run corresponding computer program instructions in BMC ROM by the BMC CPU of server where it to be formed.From hard For part aspect, as shown in figure 3, being a kind of hardware structure diagram of the application firmware restoration device place server, except Fig. 3 institutes Outside BMC CPU, module and the BMC ROM that show, the reality of server in embodiment where device generally according to the server Border function, other hardware can also be included, this is repeated no more.
Fig. 4 is refer to, is the structural representation of the firmware restoration device in the application one embodiment.The firmware restoration fills Put including determining unit 401, acquiring unit 402 and recovery unit 403, wherein:
Determining unit 401, for when the host CPU starts failure, determining that current version firmware is in each module It is no available;
Acquiring unit 402, for when the current version firmware is unavailable, obtained from storage device respective modules into The version firmware that work(upgraded;
Recovery unit 403, it is extensive for carrying out firmware to the respective modules according to the version firmware successfully upgraded It is multiple.
Further,
The storage device is external memory.
Further,
The determining unit 401, the firmware information specifically for obtaining current version firmware in the module;When described solid Part information is incorrect, or, the firmware information is correct and when upgrading mark be present, confirms current version firmware in the module Unavailable, the upgrading is masked as the BMC CPU and the mark set after firmware is successfully written to module;When the firmware information During correctly and in the absence of upgrading mark, confirm that current version firmware can use in the module.
Further, the firmware restoration device, in addition to:
Clearing cell, for when the host CPU starts successfully and upgrading mark be present, removing the upgrading mark.
Further, the firmware restoration device, in addition to:
Storage unit, for when the host CPU starts successfully, whether current version firmware to have preserved in judge module; When current version firmware does not preserve in the module, current version firmware in the module is saved in the storage device In.
Further, the firmware restoration device, in addition to:
The storage unit, it is additionally operable to current version firmware in the module being saved in it in the storage device Afterwards, the current version information of firmware in the multiple module is obtained;By the current version information of firmware in the multiple module Corresponding relation is saved in the storage device;
The recovery unit 403, the version for being additionally operable to, when service exception, receive input recover order, and selection preserved Multiple modules version information corresponding relation;Firmware is carried out to the multiple module according to the version information corresponding relation of selection Recover.
The function of unit and the implementation process of effect specifically refer to and step are corresponded in the above method in said apparatus Implementation process, it will not be repeated here.
For device embodiment, because it corresponds essentially to embodiment of the method, so related part is real referring to method Apply the part explanation of example.Device embodiment described above is only schematical, wherein described be used as separating component The unit of explanation can be or may not be physically separate, can be as the part that unit is shown or can also It is not physical location, you can with positioned at a place, or can also be distributed on multiple NEs.Can be according to reality Need to select some or all of module therein to realize the purpose of application scheme.Those of ordinary skill in the art are not paying In the case of going out creative work, you can to understand and implement.
The preferred embodiment of the application is the foregoing is only, not limiting the application, all essences in the application God any modification, equivalent substitution and improvements done etc., should be included within the scope of the application protection with principle.

Claims (12)

1. a kind of firmware restoration method, applied on the baseboard management controller BMC central processor CPUs in server, it is special Sign is that the server includes host CPU, the BMC CPU and multiple modules, the multiple module and the BMC CPU Connect, include in each module comprising the firmware needed for each self-operating, this method:
When the host CPU starts failure, each described module is handled as follows:
Based on the firmware information of current version firmware in module and upgrading mark, whether current version firmware may be used in determining module With the upgrading is masked as the BMC CPU and the mark set after firmware is successfully written to module;
When the current version firmware is unavailable, the version firmware that respective modules successfully upgraded is obtained from storage device;
Firmware restoration is carried out to the respective modules according to the version firmware successfully upgraded.
2. the method as described in claim 1, it is characterised in that:
The storage device is external memory.
3. the method as described in claim 1, it is characterised in that whether current version firmware can use in the determining module, bag Include:
Obtain the firmware information of current version firmware in the module;
When the firmware information is incorrect, or, the firmware information is correct and when upgrading mark be present, confirms in the module Current version firmware is unavailable;
When the firmware information is correct and in the absence of upgrading mark, confirm that current version firmware can use in the module.
4. method as claimed in claim 3, it is characterised in that methods described also includes:
When the host CPU starts successfully and upgrading mark be present, the upgrading mark is removed.
5. the method as described in Claims 1-4 is any, it is characterised in that methods described also includes:
When the host CPU starts successfully, whether current version firmware has preserved in judge module;
When current version firmware does not preserve in the module, current version firmware in the module is saved in the storage and set In standby.
6. method as claimed in claim 5, it is characterised in that:
It is described by after current version firmware is saved in the storage device in the module, in addition to:
Obtain the current version information of firmware in the multiple module;
The corresponding relation of the current version information of firmware in the multiple module is saved in the storage device;
Methods described also includes:
When service exception, the version for receiving input recovers order, and the version information for the multiple modules for selecting to preserve is corresponding to close System;Firmware restoration is carried out to the multiple module according to the version information corresponding relation of selection.
7. a kind of firmware restoration device, applied on the baseboard management controller BMC central processor CPUs in server, it is special Sign is that the server includes host CPU, the BMC CPU and multiple modules, the multiple module and the BMC CPU Connect, include in each module comprising the firmware needed for each self-operating, the device:
Determining unit, for when the host CPU start failure when, based on the firmware information of current version firmware and upgrading in module Mark, determines whether current version firmware can use in each module, and the upgrading is masked as the BMC CPU to module success The mark set after write-in firmware;
Acquiring unit, for when the current version firmware is unavailable, acquisition respective modules successfully to upgrade from storage device The version firmware crossed;
Recovery unit, for carrying out firmware restoration to the respective modules according to the version firmware successfully upgraded.
8. device as claimed in claim 7, it is characterised in that:
The storage device is external memory.
9. device as claimed in claim 7, it is characterised in that:
The determining unit, the firmware information specifically for obtaining current version firmware in the module;When the firmware information It is incorrect, or, the firmware information is correct and when upgrading mark be present, confirms that current version firmware can not in the module With;When the firmware information is correct and in the absence of upgrading mark, confirm that current version firmware can use in the module.
10. device as claimed in claim 9, it is characterised in that described device also includes:
Clearing cell, for when the host CPU starts successfully and upgrading mark be present, removing the upgrading mark.
11. the device as described in claim 7 to 10 is any, it is characterised in that described device also includes:
Storage unit, for when the host CPU starts successfully, whether current version firmware to have preserved in judge module;Work as institute When stating that current version firmware does not preserve in module, current version firmware in the module is saved in the storage device.
12. device as claimed in claim 11, it is characterised in that described device also includes:
The storage unit, it is additionally operable to, by after current version firmware is saved in the storage device in the module, obtain Take the current version information of firmware in the multiple module;The corresponding of the current version information of firmware in the multiple module is closed System is saved in the storage device;
The recovery unit, the version for being additionally operable to, when service exception, receive input recover order, select the multiple moulds preserved The version information corresponding relation of block;Firmware restoration is carried out to the multiple module according to the version information corresponding relation of selection.
CN201510229002.2A 2015-05-07 2015-05-07 A kind of firmware restoration method and device Active CN104834575B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510229002.2A CN104834575B (en) 2015-05-07 2015-05-07 A kind of firmware restoration method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510229002.2A CN104834575B (en) 2015-05-07 2015-05-07 A kind of firmware restoration method and device

Publications (2)

Publication Number Publication Date
CN104834575A CN104834575A (en) 2015-08-12
CN104834575B true CN104834575B (en) 2018-04-06

Family

ID=53812483

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510229002.2A Active CN104834575B (en) 2015-05-07 2015-05-07 A kind of firmware restoration method and device

Country Status (1)

Country Link
CN (1) CN104834575B (en)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105589712B (en) * 2015-08-24 2019-09-06 新华三信息技术有限公司 BMC module update method and device
CN107046605A (en) * 2016-02-05 2017-08-15 日本冲信息株式会社 Image processing apparatus, image processing system and its firmware program updating method
CN105897623B (en) * 2016-03-25 2019-04-30 新华三信息技术有限公司 A kind of transmission method and device of data
CN106775636B (en) * 2016-11-17 2021-06-15 广州极飞科技股份有限公司 Battery firmware processing method and device and charging cabinet system
CN108123815A (en) * 2016-11-29 2018-06-05 郑州云海信息技术有限公司 A kind of ARM servers and the BIOS upgrade methods for retaining configuration information
CN107220545A (en) * 2017-05-31 2017-09-29 郑州云海信息技术有限公司 A kind of hardware encryption system, method and server
CN107239312A (en) * 2017-06-09 2017-10-10 深圳天珑无线科技有限公司 A kind of method and device of system upgrade
CN107729038A (en) * 2017-11-27 2018-02-23 英业达科技有限公司 The baseboard management controller of firmware update and renewable firmware
CN108009054A (en) * 2017-12-27 2018-05-08 江苏徐工信息技术股份有限公司 A kind of double eMMC backup storage systems and method
CN108304198A (en) * 2018-01-29 2018-07-20 郑州云海信息技术有限公司 A kind of firmware update, device and the medium of Intel ME
CN109918135A (en) * 2019-02-21 2019-06-21 新华三技术有限公司 Logical code restoration methods and electronic equipment in a kind of CPLD
CN111130856A (en) * 2019-12-06 2020-05-08 山东英信计算机技术有限公司 A server configuration method, system, device, and computer-readable storage medium
CN111198832B (en) * 2020-01-02 2022-09-23 联想(北京)有限公司 Processing method and electronic equipment
CN111538624A (en) * 2020-04-23 2020-08-14 苏州浪潮智能科技有限公司 A maintenance method, device, equipment and medium for a server power supply
CN112214353B (en) * 2020-10-16 2024-11-29 深圳市广和通无线股份有限公司 Firmware recovery method, device, computer equipment and storage medium
CN113064813A (en) * 2021-03-04 2021-07-02 山东英信计算机技术有限公司 A kind of onboard firmware version detection method and device
CN112783536A (en) * 2021-03-15 2021-05-11 英业达科技有限公司 Server system for updating firmware by using baseboard management controller
CN113220332B (en) * 2021-06-07 2024-07-19 宁畅信息产业(北京)有限公司 BIOS firmware refreshing test method and device, electronic equipment and storage medium
CN113703535B (en) * 2021-07-30 2023-08-18 苏州浪潮智能科技有限公司 Connection configuration method and system for multi-node server and OCP card
CN113867767A (en) * 2021-09-29 2021-12-31 新华三技术有限公司 A kind of server component upgrade method and server
CN114860292A (en) * 2022-04-25 2022-08-05 潍柴动力股份有限公司 Terminal device firmware upgrade control method, device, computer device and medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6113652A (en) * 1995-04-27 2000-09-05 General Data Comm, Inc. Communications network equipment capable of non-disruptive software upgrade
CN101587451A (en) * 2008-05-20 2009-11-25 研祥智能科技股份有限公司 Data backup and recovery method based on extensible firmware interface (EFI) firmware
CN101657794A (en) * 2007-04-13 2010-02-24 国际商业机器公司 Automated firmware restoration to a peer programmable hardware device
CN102141940A (en) * 2010-12-29 2011-08-03 Tcl集团股份有限公司 Device, method and system for recovering firmware update
CN102455945A (en) * 2010-10-27 2012-05-16 鸿富锦精密工业(深圳)有限公司 Baseboard management controller recovery system and method of use thereof
CN103970567A (en) * 2014-04-28 2014-08-06 浪潮电子信息产业股份有限公司 Method for on-line upgrading of cloud storage system firmware
CN104536848A (en) * 2014-12-22 2015-04-22 小米科技有限责任公司 Firmware recovery method, device and terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6113652A (en) * 1995-04-27 2000-09-05 General Data Comm, Inc. Communications network equipment capable of non-disruptive software upgrade
CN101657794A (en) * 2007-04-13 2010-02-24 国际商业机器公司 Automated firmware restoration to a peer programmable hardware device
CN101587451A (en) * 2008-05-20 2009-11-25 研祥智能科技股份有限公司 Data backup and recovery method based on extensible firmware interface (EFI) firmware
CN102455945A (en) * 2010-10-27 2012-05-16 鸿富锦精密工业(深圳)有限公司 Baseboard management controller recovery system and method of use thereof
CN102141940A (en) * 2010-12-29 2011-08-03 Tcl集团股份有限公司 Device, method and system for recovering firmware update
CN103970567A (en) * 2014-04-28 2014-08-06 浪潮电子信息产业股份有限公司 Method for on-line upgrading of cloud storage system firmware
CN104536848A (en) * 2014-12-22 2015-04-22 小米科技有限责任公司 Firmware recovery method, device and terminal

Also Published As

Publication number Publication date
CN104834575A (en) 2015-08-12

Similar Documents

Publication Publication Date Title
CN104834575B (en) A kind of firmware restoration method and device
US6535998B1 (en) System recovery by restoring hardware state on non-identical systems
CN103119554B (en) The memory logic that platform is irrelevant is provided
US8468389B2 (en) Firmware recovery system and method of baseboard management controller of computing device
US7401249B2 (en) Method for backing up and recovering data in a hard disk
US6851073B1 (en) Extensible system recovery architecture
CN101593083B (en) device, computer and method for protecting and restoring computer configuration information
US20020163760A1 (en) Disaster recovery tape drive
CN113626256B (en) Virtual machine disk data backup method, device, terminal and storage medium
CN102906710B (en) A kind of Bootrom backup method and device
US20090210456A1 (en) Methods, Systems and Media for TPM Recovery Key Backup and Restoration
US20090271660A1 (en) Motherboard, a method for recovering the bios thereof and a method for booting a computer
CN100367225C (en) BIOS shadowed small-print hard disk drive as robust, always on, backup for hard disk image and software failure
US7818622B2 (en) Method for recovering data processing system failures
CN107368384A (en) A kind of Linux server abnormal information dump system and method
CN109086085B (en) Operating system start management method and device
EP0886211A2 (en) Initial program load
US8949588B1 (en) Mobile telephone as bootstrap device
CN101923500A (en) Backup and update method and device of bootstrap program in embedded equipment
US20120017111A1 (en) Kernel swapping systems and methods for recovering a network device
CN118524006A (en) Operating system restoration method and device
KR101393034B1 (en) Apparatus and method for restoring system
CN108509252B (en) Virtual machine startup device, method and host
CN112463240B (en) Method for restarting access to WinPE
CN100530122C (en) Method for guarantying consistency of data in embedded system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 310052 Binjiang District, Zhejiang Province, Changhe Road, No. 11, building 466, building

Applicant after: Huashan Information Technology Co., Ltd.

Address before: 310052 Binjiang District, Zhejiang Province, Changhe Road, No. 11, building 466, building

Applicant before: Hangzhou Kun Hai Information Technology Co., Ltd

GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 310052 11th Floor, 466 Changhe Road, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Xinhua Sanxin Information Technology Co., Ltd.

Address before: 310052 11th Floor, 466 Changhe Road, Binjiang District, Hangzhou City, Zhejiang Province

Patentee before: Huashan Information Technology Co., Ltd.