CN114924897A - BIOS (basic input output System) and BMC (baseboard management controller) firmware automatic mutual recovery method, structure and storage medium - Google Patents

BIOS (basic input output System) and BMC (baseboard management controller) firmware automatic mutual recovery method, structure and storage medium Download PDF

Info

Publication number
CN114924897A
CN114924897A CN202210428802.7A CN202210428802A CN114924897A CN 114924897 A CN114924897 A CN 114924897A CN 202210428802 A CN202210428802 A CN 202210428802A CN 114924897 A CN114924897 A CN 114924897A
Authority
CN
China
Prior art keywords
bmc
bios
firmware
communication interface
request command
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210428802.7A
Other languages
Chinese (zh)
Other versions
CN114924897B (en
Inventor
周炳荫
李岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202210428802.7A priority Critical patent/CN114924897B/en
Publication of CN114924897A publication Critical patent/CN114924897A/en
Application granted granted Critical
Publication of CN114924897B publication Critical patent/CN114924897B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0793Remedial or corrective actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The invention relates to a method, a structure and a storage medium for automatically mutually recovering BIOS (basic input output System) and BMC (baseboard management controller) firmware. In the invention, the BIOS and the BMC verify whether the opposite party works normally by mutually sending a setting request command and detecting a corresponding reply mode of the request command; if one of the BIOS and the BMC is abnormal, the normal side communicates with the nonvolatile memory for storing the firmware backup image of the other side, acquires the firmware backup image of the abnormal side, communicates with the firmware configuration memory of the abnormal side, and refreshes the firmware backup image of the abnormal side to the firmware configuration memory of the abnormal side. According to the method and the device, when the firmware of the BMC is damaged, the firmware backup image of the BMC can be acquired from the nonvolatile memory through the normally-working BIOS and is written to the firmware configuration memory of the BMC in a flashing mode, and when the firmware of the BIOS is damaged, the firmware backup image of the BIOS can be acquired from the nonvolatile memory through the normally-working BMC and is written to the firmware configuration memory of the BIOS in a flashing mode, so that automatic mutual assistance recovery of the BIOS and the BMC firmware is achieved.

Description

BIOS (basic input output System) and BMC (baseboard management controller) firmware automatic mutual recovery method, structure and storage medium
Technical Field
The invention relates to the technical field of server BIOS and BMC design, in particular to a method, a structure and a storage medium for automatically mutually recovering BIOS and BMC firmware.
Background
The BMC (Baseboard Management Controller) is a special chip/Controller, and is mainly used for monitoring and managing a server. The BIOS (Basic Input Output System) is a set of programs that are fixed on a ROM chip on a computer motherboard, and stores the most important Basic Input and Output programs of the computer, a self-test program after power-on, and a System self-start program, and can read and write specific information set by the System from the CMOS. Its primary function is to provide the lowest level, most direct hardware setup and control for the computer.
The normal operation of the server can not be separated from the normal operation of the BMC firmware and the BIOS firmware. Once the BIOS firmware or the BMC firmware is damaged, the server can operate normally only if the firmware should be timely restored. At present, a BIOS firmware recovery structure applied to a server is a firmware configuration memory configured with a redundant BIOS, a CPU and a BMC are respectively connected to two firmware configuration memories through a data selection link, and when one firmware configuration memory is damaged, the CPU is connected to the other firmware configuration memory, and recovers the damaged firmware by using an out-of-band management mode based on the BMC. This provides redundancy of the BIOS firmware, which is repaired by the BMC when a BIOS firmware is damaged. However, if the BMC firmware is damaged, it cannot be operated, and a redundant firmware configuration memory needs to be configured, which requires more hardware. Based on the improvement of the method, a redundant BMC firmware configuration memory is provided, and the BMC is connected with the two BMC firmware configuration memories through a data selection link. When firmware of one BMC firmware configuration memory is damaged, the BMC is connected with the other firmware configuration memory. However, the repair of the BMC firmware by the BIOS cannot be realized after the improvement.
Disclosure of Invention
To solve the above technical problems or at least partially solve the above technical problems, the present invention provides a method, structure and storage medium for automatically restoring BIOS and BMC firmware to each other.
In a first aspect, the present invention provides a method for automatically restoring BIOS and BMC firmware to each other, including:
after the BIOS and the BMC are electrified, verifying whether the opposite party works normally or not in a mode of mutually sending a setting request command and detecting a corresponding reply of the request command;
if one of the BIOS and the BMC is abnormal, the normal side communicates with the nonvolatile memory for storing the firmware backup image of the other side, acquires the firmware backup image of the abnormal side, communicates with the firmware configuration memory of the abnormal side, and refreshes the firmware backup image of the abnormal side to the firmware configuration memory of the abnormal side.
Furthermore, after the BIOS and the BMC are powered on, verifying whether the other side works normally by mutually sending a setting request command and detecting a corresponding reply of the request command includes:
after the BMC is electrified to work and detects that the server system is electrified and started and the state S5 is changed to the state S0, the BMC sends a first preset request command to the BIOS according to a preset first time interval so as to obtain a first target reply corresponding to the first preset request command;
the BMC polls and detects the first target reply to determine whether the first target reply is received within a time length range determined by a first time threshold length set from the moment of sending a first preset request command, and otherwise, the BIOS is judged to be abnormal.
Furthermore, after the BIOS and the BMC are powered on, verifying whether the other side works normally by mutually sending a setting request command and detecting a corresponding reply of the request command includes:
the BIOS is electrified to work;
the BIOS sends a second preset request command to the BMC according to a second preset time interval to acquire a second target reply corresponding to the second preset request command;
and the BMC polls and detects the second target reply to determine whether the second target reply is received within a time length range determined by a second time threshold length set from the moment of sending a second preset request command, and otherwise, judges that the BMC is abnormal.
Furthermore, the nonvolatile memory is a server NVMe hard disk, the nonvolatile memory is configured with a first NVMe Boot Partition storage interval for storing a firmware backup image of the BIOS and a second NVMe Boot Partition storage interval for storing a firmware backup image of the BMC, and the BIOS and the BMC access the second NVMe Boot Partition storage interval and the first NVMe Boot Partition storage interval respectively through an NVMe Boot Partition technology to acquire the firmware backup image of the other.
Furthermore, the BMC is connected with a first communication interface which is arranged on a data link between the BMC and the nonvolatile memory through a GPIO and can be controlled to be connected and disconnected; the BMC is connected with a second communication interface which is arranged on a data link between the BMC and a firmware configuration memory of the BIOS and can be controlled to be connected and disconnected through a GPIO.
Furthermore, the CPU is connected with a third communication interface which is arranged on a data link between the CPU and the nonvolatile memory and can be controlled to be connected and disconnected through a GPIO; and the CPU is connected with a fourth communication interface which is arranged on a data link between the CPU and the BIOS firmware configuration memory through a GPIO and can be controlled to be connected and disconnected.
Furthermore, the BMC controls the first communication interface and the second communication interface to be disconnected by default, and controls the first communication interface and the second communication interface to be connected when the firmware backup image of the BIOS is restored; the CPU controls the third communication interface and the fourth communication interface to be disconnected by default, and controls the third communication interface and the fourth communication interface to be connected when the firmware backup image of the BMC is recovered.
In a second aspect, the present invention provides a structure for automatically restoring BIOS and BMC firmware to each other, including: the CPU is connected with a BIOS ROM serving as a firmware configuration memory of the BIOS through a first SPI bus, connected with the nonvolatile memory through a first I2C bus provided with a third communication interface which can be controlled to be connected and disconnected, and connected with a BMC BIOS serving as a firmware configuration memory of the BMC through a third SPI bus provided with a fourth communication interface which can be controlled to be connected and disconnected;
the BMC is in interactive communication with the CPU, the BMC is connected with the BMC BIOS through a second SPI bus, the BMC is connected with the nonvolatile memory through a second I2C bus provided with a first communication interface capable of being controlled to be connected and disconnected, and the BMC is connected with the BIOS ROM through a fourth SPI bus provided with a second communication interface capable of being controlled to be connected and disconnected;
the BIOS ROM and the BMC ROM are configured with at least one instruction, and the CPU and the BMC respectively read and execute the corresponding instruction to realize the automatic mutual recovery method of the BIOS and the BMC firmware.
Furthermore, the third communication interface and the fourth communication interface are controlled to be connected to a GPIO of the CPU, and the first communication interface and the second communication interface are controlled to be connected to a GPIO of the BMC.
In a third aspect, the present invention provides a storage medium, where the storage medium stores at least one instruction, and reads and executes the instruction to implement the method for automatically restoring the BIOS and the BMC firmware to each other.
Compared with the prior art, the technical scheme provided by the embodiment of the invention has the following advantages:
in the invention, whether the opposite party works normally is verified by mutually sending the setting request command and detecting the corresponding reply of the request command between the BMC and the BIOS. If the BMC is abnormal, the BIOS establishes communication with the nonvolatile memory and communication with a firmware configuration memory of the BMC, acquires the firmware backup image of the BMC from the nonvolatile memory and writes the acquired firmware backup image of the BMC to the firmware configuration memory of the BMC in a flashing manner. If the BIOS is abnormal, the BMC establishes communication with the nonvolatile memory and establishes communication with the firmware configuration memory of the BIOS, and the BMC acquires the firmware backup image of the BIOS from the nonvolatile memory and writes the acquired firmware backup image of the BIOS to the firmware configuration memory of the BIOS. Compared with the mode of setting the redundant BIOS firmware configuration memory and the redundant BMC firmware configuration memory, the method only applies one BIOS firmware configuration memory and one BMC firmware configuration memory to realize the autonomous recovery of the firmware by utilizing the cooperation of the nonvolatile memory in the server, saves the hardware and has lower cost.
The first communication interface, the second communication interface, the third communication interface and the fourth communication interface which are controllably connected and disconnected are kept disconnected in the non-recovery process, so that the safety of the configured firmware in the firmware configuration memory of the BMC and the BIOS can be protected, and the safety of the firmware backup images of the BMC and the BIOS in the nonvolatile memory can be protected.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present invention, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art to obtain other drawings without inventive labor.
FIG. 1 is a flowchart illustrating an automatic mutual recovery method for BIOS and BMC firmware according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating the BMC verifying BIOS exception according to the embodiment of the present invention;
FIG. 3 is a flow chart of the BIOS verifying a BMC exception according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating a process for a BMC to obtain a BIOS firmware backup image from a non-volatile memory according to an embodiment of the invention;
FIG. 5 is a flowchart illustrating a BIOS obtaining a BMC firmware backup image from a non-volatile memory according to an embodiment of the invention;
fig. 6 is a flowchart illustrating that the BMC flushes the acquired BIOS firmware backup image to the firmware configuration memory of the BIOS according to the embodiment of the present invention;
fig. 7 is a flowchart illustrating that the BIOS flashes the acquired BMC firmware backup image to a firmware configuration memory of the BIOS according to an embodiment of the present invention;
fig. 8 is a schematic diagram of a structure in which BIOS and BMC firmware automatically recover from each other according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Example 1
Referring to fig. 1, an embodiment of the present invention provides a method for automatically restoring BIOS and BMC firmware to each other, including:
s100, after the BIOS and the BMC are powered on, whether the opposite party works normally is verified in a mode of mutually sending a setting request command and detecting a corresponding reply of the request command.
The method comprises two processes of verifying whether the opposite party works normally by mutually sending a setting request command and detecting a corresponding reply of the request command, wherein the two processes comprise that the BIOS verifies whether the BIOS is normal and the BIOS verifies whether the BMC is normal. In the specific implementation process, referring to fig. 2, the method for the BMC to verify whether the BIOS is working normally includes:
and S101, powering up the BMC to execute the program.
S102, the BMC executes S103 after detecting that the server system is powered on and is in the state S5 to the state S0.
S103, the BMC sends a first preset request command to the BIOS according to a preset first time interval to obtain a first target reply corresponding to the first preset request command. Specifically, if the BIOS is working normally, the BIOS responds to a first preset request command sent by the BMC to reply to the BMC first target.
S104, the BMC polls and detects the first target reply to determine whether the first target reply is received within a time length range determined by a first time threshold length set from the moment of sending a first preset request command. Otherwise, S105 is performed.
S105, judging the BIOS is abnormal.
Referring to FIG. 3, the method for BIOS to verify whether BMC is working properly includes:
s110, the BIOS powers on the work executive program.
And S120, in a preset stage of the BIOS in the POST process, the BIOS sends a second preset request command to the BMC according to a preset second time interval so as to obtain a second target reply corresponding to the second preset request command. Specifically, if the BMC is working normally, the BMC responds to a second preset request command sent by the BIOS to reply to a second target reply of the BIOS.
And S130, the BMC polls and detects the second target reply to determine whether the second target reply is received within a time length range determined by a second time threshold length set from the moment of sending a second preset request command, and otherwise, executes S140.
S140, judging that the BMC is abnormal.
If one of the BIOS and the BMC is abnormal, S200 is executed, and the normal side communicates with the nonvolatile memory for storing the firmware backup image of the other side to acquire the firmware backup image of the abnormal side.
In the specific implementation process, referring to fig. 4, if the BMC is normal and the BIOS is abnormal, the BMC performs step S201 after determining that the BIOS is abnormal in step S105.
S201, the BMC controls the first communication interface to be connected through the GPIO connected with the first communication interface. The data link where the first communication interface is located is communicated with the BMC and the nonvolatile memory. In a specific implementation process, the BMC is connected with a first communication interface which is arranged on a data link between the BMC and the nonvolatile memory through a GPIO and can be controlled to be connected or disconnected; the nonvolatile memory adopts a server NVMe hard disk, and is configured with a first NVMe Boot Partition storage interval for storing a firmware backup image of a BIOS and a second NVMe Boot Partition storage interval for storing a firmware backup image of a BMC.
S202, the BMC acquires a firmware backup image of the BIOS from a first NVMe Boot Partition storage interval of the nonvolatile memory. Specifically, a first bias and a first length of a first NVMe Boot Partition storage interval are configured in advance at the BMC, and the BMC directly reads a firmware backup image of the BIOS in the first NVMe Boot Partition storage interval by using the first bias and the first length based on an NVMe Boot Partition technology.
In the specific implementation process, referring to fig. 5, if the BIOS is normal and the BMC is abnormal, the BIOS determines that the BMC is abnormal in step S140 and then executes step S210.
S210, the CPU controls the third communication interface to be communicated through the GPIO connected with the third communication interface. The data link where the third communication interface is located is communicated with the CPU and the nonvolatile memory. The CPU is connected with a third communication interface which is arranged on a data link between the CPU and the nonvolatile memory through GPIO and can be controlled to be connected and disconnected. The third communication interface is turned on and the BIOS can access the nonvolatile memory.
S220, the CPU obtains a firmware backup image of the BMC from a second NVMe Boot Partition storage interval of the nonvolatile memory. The BIOS is pre-configured with a second bias and a second length of a second NVMe Boot Partition storage interval, and the BIOS directly reads a firmware backup image of the BMC in the second NVMe Boot Partition storage interval through an NVMe Boot Partition technology based on the second bias and the second length.
And S300, the normal party is communicated with the firmware configuration memory of the abnormal party, and the firmware backup image of the abnormal party is refreshed in the firmware configuration memory of the abnormal party.
In the specific implementation process, as shown in fig. 6, the BMC performs step S301 after performing step S202.
And S301, the BMC controls the second communication interface to be connected through the GPIO connected with the second communication interface. And the data link where the second communication interface is positioned is communicated with the firmware configuration memories of the BMC and the BIOS. Specifically, the BMC is connected with a second communication interface which is arranged on a data link between the BMC and a firmware configuration memory of the BIOS and can be controlled to be connected and disconnected through a GPIO, and the second communication interface is connected, so that the BMC can access the firmware configuration memory of the BIOS.
S302, the BMC writes the acquired firmware backup image of the BIOS to a firmware configuration memory of the BIOS through a data link where the second communication interface is located.
And S303, after the flash is successful, the BMC controls the first communication interface and the second communication interface to be disconnected.
In the implementation process, referring to fig. 7, after the BIOS performs step S220, step S310 is performed.
And S310, the CPU controls the fourth communication interface to be connected through the GPIO connected with the fourth communication interface, and the data link where the fourth communication interface is located is communicated with the CPU and a firmware configuration memory of the BMC. Specifically, the CPU is connected to a fourth communication interface which is arranged on a data link between the CPU and the firmware configuration memory of the BMC and can be controlled to be connected and disconnected through a GPIO, and the fourth communication interface is connected, so that the BIOS can access the firmware configuration memory of the BMC.
And S320, the BIOS writes the acquired firmware backup image of the BMC into a firmware configuration memory of the BMC through the data link where the fourth communication interface is located.
S330, after the flash is successful, the BIOS controls the third communication interface and the fourth communication interface to be disconnected.
The BMC controls the first communication interface and the second communication interface to be disconnected by default, and controls the first communication interface and the second communication interface to be connected when the firmware backup image of the BIOS is recovered; the CPU controls the third communication interface and the fourth communication interface to be disconnected by default, and controls the third communication interface and the fourth communication interface to be connected when the firmware backup image of the BMC is recovered. The safety of the configured BIOS firmware BMC firmware is ensured to a certain extent, and the safety of the BIOS firmware backup image and the firmware backup image of the BMC stored in the nonvolatile memory is ensured to a certain extent.
Example 2
Referring to fig. 8, an embodiment of the present invention provides a structure for automatically restoring BIOS and BMC firmware from each other, including: the CPU is connected with a BIOS ROM serving as a firmware configuration memory of the BIOS through a first SPI bus, connected with the nonvolatile memory through a first I2C bus provided with a third communication interface which can be controlled to be connected and disconnected, and connected with a BMC BIOS serving as a firmware configuration memory of the BMC through a third SPI bus provided with a fourth communication interface which can be controlled to be connected and disconnected; the first communication interface and the second communication interface are controlled to be connected with GPIO of BMC.
The BMC is connected with the BMC BIOS through a second SPI bus, the BMC is connected with the nonvolatile memory through a second I2C bus of a first communication interface which can be controlled to be connected and disconnected, and the BMC is connected with the BIOS ROM through a fourth SPI bus of a second communication interface which can be controlled to be connected and disconnected; the third communication interface and the fourth communication interface are controlled to be connected to GPIO of the CPU.
The BIOS ROM and the BMC ROM are configured with at least one instruction, and the CPU and the BMC respectively read and execute the corresponding instruction to realize the automatic mutual recovery method of the BIOS and the BMC firmware.
Example 3
The embodiment of the invention provides a storage medium, wherein the storage medium stores at least one instruction, reads and executes the instruction, and realizes an automatic mutual recovery method of the BIOS and the BMC firmware.
In the invention, whether the opposite party works normally is verified by mutually sending the setting request command and detecting the corresponding reply of the request command between the BMC and the BIOS. If the BMC is abnormal, the BIOS establishes communication with the nonvolatile memory and communication with the firmware configuration memory of the BMC, and the BIOS acquires the firmware backup image of the BMC from the nonvolatile memory and writes the acquired firmware backup image of the BMC to the firmware configuration memory of the BMC in a flashing manner. If the BIOS is abnormal, the BMC establishes communication with the nonvolatile memory and the firmware configuration memory of the BIOS, acquires the firmware backup image of the BIOS from the nonvolatile memory and writes the acquired firmware backup image of the BIOS into the firmware configuration memory of the BIOS. Compared with the mode of setting the redundant BIOS firmware configuration memory and the redundant BMC firmware configuration memory, the method only applies one BIOS firmware configuration memory and one BMC firmware configuration memory to realize the autonomous recovery of the firmware by utilizing the cooperation of the nonvolatile memory in the server, saves the hardware and has lower cost.
In the embodiments provided herein, it should be understood that the disclosed structures and methods may be implemented in other ways. For example, the above-described structural embodiments are merely illustrative, and for example, the division of the units is only one type of logical functional division, and there may be other divisions when the actual implementation is performed, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, structures or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may also be implemented in the form of a software functional unit.
The foregoing are merely exemplary embodiments of the present invention, which enable those skilled in the art to understand or practice the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A mutual automatic recovery method for BIOS and BMC firmware is characterized by comprising the following steps:
after the BIOS and the BMC are electrified, the BIOS and the BMC verify whether the opposite party works normally or not in a mode of mutually sending a setting request command and detecting a corresponding reply of the request command;
if one of the BIOS and the BMC is verified to be abnormal, the normal side is communicated with a nonvolatile memory for storing the firmware backup image of the other side, the firmware backup image of the abnormal side is obtained, the firmware configuration memory of the abnormal side is communicated, and the firmware backup image of the abnormal side is refreshed in the firmware configuration memory of the abnormal side.
2. The method of claim 1, wherein after the BIOS and the BMC are powered on, verifying whether the other side is working normally by sending a set request command to the other side and detecting a response corresponding to the request command comprises:
after the BMC is powered on to work and detects that the server system is powered on and started and goes from the state S5 to the state S0, the BMC sends a first preset request command to the BIOS according to a preset first time interval to obtain a first target reply corresponding to the first preset request command;
the BMC polls and detects the first target reply to determine whether the first target reply is received within a time length range determined by a first time threshold length set from the moment of sending a first preset request command, and otherwise, the BIOS is judged to be abnormal.
3. The method of claim 1, wherein verifying whether the BIOS and the BMC firmware are working properly by sending a set request command to each other and detecting a response from the request command after the BIOS and the BMC are powered on comprises:
the BIOS is electrified to work;
the BIOS sends a second preset request command to the BMC according to a second preset time interval to obtain a second target reply corresponding to the second preset request command;
and the BMC polls and detects the second target reply to determine whether the second target reply is received within a time length range determined by a second time threshold length set from the moment of sending a second preset request command, and otherwise, the BMC is judged to be abnormal.
4. The automatic mutual recovery method of the BIOS and the BMC firmware, according to claim 1, wherein the nonvolatile memory is a server NVMe hard disk, the nonvolatile memory is configured with a first NVMe Boot Partition storage interval for storing a firmware backup image of the BIOS and a second NVMe Boot Partition storage interval for storing a firmware backup image of the BMC, and the BIOS and the BMC access the second NVMe Boot Partition storage interval and the first NVMe Boot Partition storage interval respectively through an NVMe Boot Partition technology to obtain a firmware backup image of the other party.
5. The BIOS and BMC firmware automatic mutual recovery method of claim 1, wherein the BMC connects a first communication interface capable of controlled connection and disconnection on a data link between the BMC and the non-volatile memory through a GPIO; the BMC is connected with a second communication interface which is arranged on a data link between the BMC and a firmware configuration memory of the BIOS and can be controlled to be connected and disconnected through a GPIO.
6. The BIOS and BMC firmware automatic mutual recovery method of claim 1, wherein the CPU connects a third communication interface capable of controlled connection and disconnection on a data link between the CPU and the nonvolatile memory through GPIO; and the CPU is connected with a fourth communication interface which is arranged on a data link between the CPU and the BIOS firmware configuration memory through a GPIO and can be controlled to be connected and disconnected.
7. The BIOS and BMC firmware automatic mutual recovery method of claim 5 or 6, wherein the BMC controls the first communication interface and the second communication interface to be disconnected by default, and when the BIOS firmware backup image is recovered, the BMC controls the first communication interface and the second communication interface to be connected; the CPU controls the third communication interface and the fourth communication interface to be disconnected by default, and controls the third communication interface and the fourth communication interface to be connected when the firmware backup image of the BMC is recovered.
8. A BIOS and BMC firmware automatic mutual recovery structure is characterized by comprising: the CPU is connected with a BIOS ROM serving as a firmware configuration memory of the BIOS through a first SPI bus, connected with the nonvolatile memory through a first I2C bus provided with a third communication interface which can be controlled to be connected and disconnected, and connected with a BMC BIOS serving as a firmware configuration memory of the BMC through a third SPI bus provided with a fourth communication interface which can be controlled to be connected and disconnected;
the BMC is in interactive communication with the CPU, the BMC is connected with the BMC BIOS through a second SPI bus, the BMC is connected with the nonvolatile memory through a second I2C bus provided with a first communication interface capable of being controlled to be connected and disconnected, and the BMC is connected with the BIOS ROM through a fourth SPI bus provided with a second communication interface capable of being controlled to be connected and disconnected;
the BIOS ROM and the BMC ROM are configured with at least one instruction, and the CPU and the BMC read and execute the corresponding instruction respectively to realize the automatic mutual recovery method of the BIOS and the BMC firmware according to any one of claims 1 to 7.
9. The BIOS and BMC firmware auto-recovery structure of claim 8, wherein the third communication interface and the fourth communication interface are controlled to connect to GPIO of CPU, and the first communication interface and the second communication interface are controlled to connect to GPIO of BMC.
10. A storage medium storing at least one instruction, wherein the instruction is read and executed to implement the method for automatically restoring BIOS and BMC firmware to each other as claimed in any one of claims 1 to 7.
CN202210428802.7A 2022-04-22 2022-04-22 Automatic mutual recovery method, structure and storage medium for BIOS and BMC firmware Active CN114924897B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210428802.7A CN114924897B (en) 2022-04-22 2022-04-22 Automatic mutual recovery method, structure and storage medium for BIOS and BMC firmware

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210428802.7A CN114924897B (en) 2022-04-22 2022-04-22 Automatic mutual recovery method, structure and storage medium for BIOS and BMC firmware

Publications (2)

Publication Number Publication Date
CN114924897A true CN114924897A (en) 2022-08-19
CN114924897B CN114924897B (en) 2024-06-28

Family

ID=82807019

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210428802.7A Active CN114924897B (en) 2022-04-22 2022-04-22 Automatic mutual recovery method, structure and storage medium for BIOS and BMC firmware

Country Status (1)

Country Link
CN (1) CN114924897B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2016173744A (en) * 2015-03-17 2016-09-29 日本電気株式会社 Blade server, blade system, bmc, chipset, and enclosure manager
US20160328300A1 (en) * 2015-05-07 2016-11-10 Dell Products, Lp System and Method for Self-Healing Basic Input/Output System Boot Image and Secure Recovery
CN113032788A (en) * 2021-03-24 2021-06-25 山东英信计算机技术有限公司 Firmware image switching method, device and medium in computer system
CN113626803A (en) * 2021-06-28 2021-11-09 苏州浪潮智能科技有限公司 BMC firmware protection method, system and device and readable storage medium
CN113806811A (en) * 2021-07-16 2021-12-17 苏州浪潮智能科技有限公司 Method and device for automatically recovering tampered firmware and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2016173744A (en) * 2015-03-17 2016-09-29 日本電気株式会社 Blade server, blade system, bmc, chipset, and enclosure manager
US20160328300A1 (en) * 2015-05-07 2016-11-10 Dell Products, Lp System and Method for Self-Healing Basic Input/Output System Boot Image and Secure Recovery
CN113032788A (en) * 2021-03-24 2021-06-25 山东英信计算机技术有限公司 Firmware image switching method, device and medium in computer system
CN113626803A (en) * 2021-06-28 2021-11-09 苏州浪潮智能科技有限公司 BMC firmware protection method, system and device and readable storage medium
CN113806811A (en) * 2021-07-16 2021-12-17 苏州浪潮智能科技有限公司 Method and device for automatically recovering tampered firmware and storage medium

Also Published As

Publication number Publication date
CN114924897B (en) 2024-06-28

Similar Documents

Publication Publication Date Title
JP5431111B2 (en) Information processing apparatus and system setting method
US9015458B2 (en) Computer system and method for updating basic input/output system by switching between local mode and bypass mode through baseboard management controller
US8468389B2 (en) Firmware recovery system and method of baseboard management controller of computing device
US10860425B2 (en) Method for recovering basic input/output system image file of a computer system and the computer system
JP7002358B2 (en) Information processing system, information processing device, BIOS update method of information processing device, and BIOS update program of information processing device
US20040153738A1 (en) Redundancy management method for BIOS, data processing apparatus and storage system for using same
CN110865822B (en) Boot architecture and method for Bootloader brush writing program for whole vehicle controller
CN108345464A (en) A kind of the startup method and Android vehicle device of Android system
CN113064757A (en) Server firmware self-recovery system and server
JP2003316582A (en) Method and device for controlling dual bios
CN111552592A (en) Double-backup starting method and system
CN114090107A (en) Computer and system starting method
JP5314731B2 (en) Method and computer system for synchronizing basic input / output program between data processing devices
CN110308935B (en) Electronic device and operation method thereof
CN113626262A (en) BMC recovery method, system, equipment and medium
TW202223655A (en) Computer system and method capable of self-monitoring and restoring an operation of operating system
CN114924897A (en) BIOS (basic input output System) and BMC (baseboard management controller) firmware automatic mutual recovery method, structure and storage medium
CN113377425B (en) BMC firmware generation method and device, BMC starting method and device and storage medium
KR100697086B1 (en) Mobile communication terminal enable to backup and its operating method
JP6911591B2 (en) Information processing device, control device and control method of information processing device
KR20030062793A (en) Apparatus and Method for operating recovery and backup of linux operting system
JP7001236B2 (en) Information processing equipment, fault monitoring method, and fault monitoring computer program
JP5345655B2 (en) Redundancy management method and data processing apparatus for basic input / output program
JP2005078336A (en) Image forming apparatus and program rewriting method for image forming apparatus
CN118093240A (en) Hard disk fault processing method, device, computer equipment, storage medium and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant