Method and apparatus for disabling corrupted memory by using BMC

A memory and memory slot technology, applied in the computer field, can solve problems such as server crash and loss of key data

Inactive Publication Date: 2017-08-18
南京百敖软件有限公司
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Memory problems are particularly prominent in server operation. When the server is performing massive data calculations, if the problematic memory is not found in time and continues to use the problematic memory, it will generally cause the server to crash, resulting in loss of key data, resulting in immeasurable losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for disabling corrupted memory by using BMC
  • Method and apparatus for disabling corrupted memory by using BMC
  • Method and apparatus for disabling corrupted memory by using BMC

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] After the computer is powered on, the first program BIOS is executed. Taking the memory as the research object, the BIOS first initializes the memory, then self-tests and uses the memory, and finally starts the operating system by loading the bootloader (Boot Loader). like figure 2 As shown, this embodiment provides a method of using the BMC to disable the damaged memory. Before the BIOS is ready to initialize the memory, the "method 1 of disabling the damaged memory" is created to analyze whether there is a damaged memory, and if there is, disable it. . Before the boot operating system is started, the present invention creates a "method 2 for disabling damaged memory" to collect the self-test results of the memory by the BIOS and analyze the wrong use of the memory.

[0039] Among them, such as image 3 As shown, method 1 to disable corrupt memory includes:

[0040] (1) After the computer is started, when the BIOS runs to prepare for memory initialization, obtain ...

Embodiment 2

[0052] This embodiment provides a device for disabling damaged memory by using BMC, including:

[0053] The initialization flag acquisition module is used to obtain the preset initialization flag value pi for the memory on each memory slot i when the computer is started and the BIOS runs to prepare for memory initialization; wherein, when the memory slot i When the memory on the slot i is damaged, the initialization flag value pi=1 is set, and when the memory on the memory slot i is intact, the initialization flag value pi=0 is set;

[0054] The system event log acquisition module is used to determine whether there is memory error information in the system event log of the BMC when the initialization flag value pi corresponding to the memory on the memory slot i is 0;

[0055] The damaged memory replacement judging module is used to determine whether the damaged memory is replaced by the user based on whether the serial number of the memory is changed when there is memory error ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method for disabling a corrupted memory by using the BMC. The method comprises: (1) obtaining a preset initialization flag value pi for the memory on each memory slot i when the BIOS is running until the memory is ready to be initialized after the computer is started; (2) when the initialization flag value pi corresponding to the memory on the memory slot i is 0, determining whether there is a memory error message in the BMC system event log, and if so, executing (3); (3) taking whether the serial number of the memory is changed as the basis, determining whether the corrupted memory is replaced by the user, and if not, executing (4); (4) carrying out the or operation on the initialization flag value corresponding to the corrupted memory and the number i of the memory slot, and taking the result as the updated initialization flag value; (5) creating the UEFI event, so that after the BIOS runs to the BIOS boot interface, a memory corruption message is prompted to the user; and (6) initializing the memory. The present invention also discloses an apparatus for disabling a corrupted memory by using the BMC. According to the method and apparatus disclosed by the present invention, the bad memory can be disabled, and system crash can be prevented.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a method and a device for disabling damaged memory by using a BMC. Background technique [0002] In real life, computers that have been used for many years are prone to problems of one kind or another, and there are many peripheral devices in the computer, and the root of the problem is often difficult to locate. Among many peripheral devices, memory is the core component of computer data exchange. Whether the memory is good or not is directly related to whether the computer can be used normally. [0003] Memory problems are particularly prominent in server operation. When the server is performing massive data calculations, if the problematic memory is not found in time and continues to use the problematic memory, it will generally cause the server to crash, resulting in the loss of key data, resulting in immeasurable losses. [0004] In the field of computer science, it is we...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/22G06F11/07
CPCG06F11/073G06F11/0766G06F11/0793G06F11/2273
Inventor 刘意
Owner 南京百敖软件有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products