1. Field of the Invention
The field of the invention is data processing, or, more specifically, methods, apparatus, and products for OS-firmware interface update recovery.
2. Description of Related Art
In modern personal computers, the system BIOS (Basic Input/Output System), a form of operating system-firmware interface, resides in nonvolatile EEPROM or flash memory. The BIOS is updated to add new functions, to provide new hardware support, or to fix known problems. Although flash updating the BIOS EEPROM, overwriting the older BIOS with a newer version, is a widely accepted method for BIOS updating, any un-expected interruption that occurs during the BIOS update process may cause the system to become disabled. Unexpected interruptions may come from sources such as power loss, bad or wrong code image, or signal quality. The conventional BIOS update recovery process usually involves a sequence of steps carried out by an end user. Such steps typically include disconnecting the power from the system, removing system from the rack, removing the mechanical cover, removing the adapter(s) to find a jumper on the board using the jumper on the board to boot up again from either an alternate BIOS image, or a Boot Block.
Operating system (‘OS’)-firmware interface update recovery including determining, by an OS-firmware interface update recovery module for each of a plurality of available OS-firmware interface images for booting a computer, whether each available OS-firmware interface image is corrupted or uncorrupted, wherein the OS-firmware interface update recovery module comprises a module of automated computing machinery; setting, by the OS-firmware interface update recovery module for each corrupted OS-firmware interface image, a predictive failure analysis (‘PFA’) bit in nonvolatile memory available to the OS-firmware interface update recovery module; selecting, by the OS-firmware interface update recovery module, an uncorrupted OS-firmware interface image; initiating, by the OS-firmware interface update recovery module, a boot for the computer with the selected OS-firmware interface image; determining, by the OS-firmware interface update recovery module during the POST function of booting the computer in dependence upon a flash-in-progress bit set in nonvolatile memory available to the OS-firmware interface update recovery module, whether a previous update to one of the available OS-firmware interface images was interrupted; and notifying, by the OS-firmware interface update recovery module, a user that the previous update was interrupted if the previous update to one of the available OS-firmware interface images interrupted.
The foregoing and other objects, features and advantages of the invention will be apparent from the following more particular descriptions of exemplary embodiments of the invention as illustrated in the accompanying drawings wherein like reference numbers generally represent like parts of exemplary embodiments of the invention.
Exemplary methods, apparatus, and products for OS-firmware interface update recovery in accordance with the present invention are described with reference to the accompanying drawings, beginning with
The computer of
BIOS (basic input/output system) is the program originally conceived to get a personal computer (‘PC’) started after power-on. The BIOS also manages pre-boot data flow between the computer's operating system and attached devices such as the hard disk, video adapter, keyboard, and mouse. When the BIOS starts up a computer, it first determines whether all of the attachments are in place and operational and then it loads the operating system, or key parts of the operating system, into the computer's RAM memory from non-volatile storage.
UEFI (Unified Extensible Firmware Interface) is a community effort of many companies in the personal-computer industry to modernize the booting process. UEFI is a specification detailing an interface that passes control of the system for the pre-boot environment to an operating system. UEFI provides an interface between operating systems and platform firmware at boot time, and supports an architecture-independent mechanism for initializing add-in cards, such as expansion boards, adaptor cards, accessory cards and so on.
Also stored in the nonvolatile memory (134) is an OS-firmware interface update recovery module (136) a module of computer program instructions for OS-firmware interface update recovery according to embodiments of the present invention. The OS-firmware interface update recovery module (136) is capable of OS-firmware interface update recovery by determining for each of a plurality of available OS-firmware interface images (138 and 140) for booting a computer, whether each available OS-firmware interface image (138 and 140) is corrupted or uncorrupted and setting a predictive failure analysis (‘PFA’) bit in nonvolatile memory available (134) to the OS-firmware interface update recovery module for each corrupted OS-firmware interface image (140). The OS-firmware interface update recovery module (136) of
The OS-firmware interface update recovery module (136) of
The OS-firmware interface update recovery module (136) is also capable of determining (216), during the POST function of booting the computer in dependence upon a flash-in-progress bit set in nonvolatile memory (134) available to the OS-firmware interface update recovery module (136) whether a previous update to one of the available OS-firmware interface images (138 and 140) was interrupted. A flash-in-progress bit is a well-known bit in nonvolatile memory used to designate that an OS-firmware interface image is currently being updated. If the flash-in-progress bit is set to true then an OS-firmware interface image is currently being updated and if the bit is set to false then the OS-firmware interface image is currently not being updated. If during the POST function of booting the computer the flash-in-progress bit is set to true, then the a previous update to an OS-firmware interface image was interrupted prior to completing because if the update was properly completed the flash-in-progress bit would have been restored to false.
In some embodiments of the present invention, a single flash-in-progress bit is used for all the OS-firmware interface images. In such cases, if during the POST function of booting the computer the flash-in-progress bit is set to true, then the a previous update to any one of the OS-firmware interface images was interrupted prior to completing. In other embodiments of the present invention, a flash-in-progress bit is used for each of the OS-firmware interface images. In such cases, if during the POST function of booting the computer the flash-in-progress bit is set to true, then a previous update to the selected uncorrupted OS-firmware interface images currently booting the computer was interrupted.
The OS-firmware interface update recovery module (136) of
The OS-firmware interface update recovery module (136) of
The OS-firmware interface update recovery module (136) of
In the example of
In the computer of
The computer (152) of
The example computer (152) of
The exemplary computer (152) of
For further explanation,
The method of
The method of
The method of
In an alternative embodiment, more than one identical OS-firmware interface images are stored in nonvolatile memory. One such identical OS-firmware interface image maybe designated as a primary OS-firmware interface image and another may be designated as a backup OS-firmware interface image for use in cases where the primary image is corrupted. In such embodiments, selecting (210), by the OS-firmware interface update recovery module, an uncorrupted OS-firmware interface image includes selecting the primary OS-firmware interface image if it is uncorrupted and selecting an uncorrupted backup OS-firmware interface image if the primary OS-firmware interface image is corrupted.
The method of
The method of
The method of
A flash-in-progress bit is a well-known bit in nonvolatile memory used to designate that an OS-firmware interface image is currently being updated. If the flash-in-progress bit is set to true then an OS-firmware interface image is currently being updated and if the bit is set to false then the OS-firmware interface image is currently not being updated. If during the POST function of booting the computer the flash-in-progress bit is set to true, then the a previous update to an OS-firmware interface image was interrupted prior to completing because if the update was properly completed then the flash-in-progress bit would have been restored to false.
In some embodiments of the present invention, a single flash-in-progress bit is used for all the OS-firmware interface images. In such cases, if during the POST function of booting the computer the flash-in-progress bit is set to true, then the a previous update to any one of the OS-firmware interface images was interrupted prior to completing. In other embodiments of the present invention, a flash-in-progress bit is used for each of the OS-firmware interface images. In such cases, if during the POST function of booting the computer the flash-in-progress bit is set to true, then the a previous update to the selected uncorrupted OS-firmware interface images currently booting the computer was interrupted.
The method of
In some embodiments of the present invention, notifying a user that the previous update was interrupted if the previous update to one of the available OS-firmware interface images interrupted includes notifying the user without specifying the particular OS-firmware interface image whose update was interrupted. In other embodiments of the present invention, notifying (224) a user that the previous update was interrupted if the previous update to one of the available OS-firmware interface images interrupted includes specifying the particular OS-firmware interface image that was interrupted.
The method of
The method of
The method of
The method of
Exemplary embodiments of the present invention are described largely in the context of a fully functional computer system for OS-firmware interface update recovery. Readers of skill in the art will recognize, however, that the present invention also may be embodied in a computer program product disposed on signal bearing media for use with any suitable data processing system. Such signal bearing media may be transmission media or recordable media for machine-readable information, including magnetic media, optical media, or other suitable media. Examples of recordable media include magnetic disks in hard drives or diskettes, compact disks for optical drives, magnetic tape, and others as will occur to those of skill in the art. Examples of transmission media include telephone networks for voice communications and digital data communications networks such as, for example, Ethernets™ and networks that communicate with the Internet Protocol and the World Wide Web as well as wireless transmission media such as, for example, networks implemented according to the IEEE 802.11 family of specifications. Persons skilled in the art will immediately recognize that any computer system having suitable programming means will be capable of executing the steps of the method of the invention as embodied in a program product. Persons skilled in the art will recognize immediately that, although some of the exemplary embodiments described in this specification are oriented to software installed and executing on computer hardware, nevertheless, alternative embodiments implemented as firmware or as hardware are well within the scope of the present invention.
It will be understood from the foregoing description that modifications and changes may be made in various embodiments of the present invention without departing from its true spirit. The descriptions in this specification are for purposes of illustration only and are not to be construed in a limiting sense. The scope of the present invention is limited only by the language of the following claims.
Number | Name | Date | Kind |
---|---|---|---|
5864698 | Krau et al. | Jan 1999 | A |
6167532 | Wisecup | Dec 2000 | A |
6640316 | Martin et al. | Oct 2003 | B1 |
6732267 | Wu et al. | May 2004 | B1 |
6986034 | Tyner et al. | Jan 2006 | B2 |
7047352 | Khu et al. | May 2006 | B1 |
7131026 | Denninghoff et al. | Oct 2006 | B2 |
7203831 | Wu et al. | Apr 2007 | B2 |
7313685 | Broyles, III et al. | Dec 2007 | B2 |
7337309 | Nguyen et al. | Feb 2008 | B2 |
7487345 | Khatri et al. | Feb 2009 | B2 |
7500095 | Mahmoud et al. | Mar 2009 | B2 |
7840796 | Dayan et al. | Nov 2010 | B2 |
20020066009 | Tung | May 2002 | A1 |
20040205329 | Wu et al. | Oct 2004 | A1 |
20050081024 | Khatri et al. | Apr 2005 | A1 |
20050132179 | Glaum et al. | Jun 2005 | A1 |
20050160257 | Kruger et al. | Jul 2005 | A1 |
20050229173 | Mihm et al. | Oct 2005 | A1 |
20050278518 | Ko et al. | Dec 2005 | A1 |
20070050612 | Chen | Mar 2007 | A1 |
20080126784 | Iima et al. | May 2008 | A1 |
20090320012 | Lee et al. | Dec 2009 | A1 |
20110055533 | Mudusuru et al. | Mar 2011 | A1 |
Number | Date | Country | |
---|---|---|---|
20110126043 A1 | May 2011 | US |