Patent classifications
G06F11/2284
TEMPERATURE BASED DECISION FEEDBACK EQUALIZATION RETRAINING
An information handling system includes a memory subsystem and a basic/input out system (BIOS). The BIOS performs multiple trainings of the memory subsystem, and each of the trainings is performed at a different temperature. The BIOS stores multiple derating values in a derating table of the BIOS, and each of the derating values corresponds to a respective tap value at a respective temperature. During a subsequent power on self test of the information handling system, the BIOS performs a first training of the memory subsystem, and stores a first set of tap values. During a runtime of the information handling system, a memory controller determines whether a temperature of the information handling system has changed by a predetermined amount. In response to the temperature changing by the predetermined amount, the memory controller utilizes the derating values in the derating table to automatically update the tap values.
ERROR INFORMATION STORAGE
An example computing device includes a power supply. The computing device also includes a storage device to receive power from the power supply during an error collection operation. The storage device is also to receive power via radio waves from a client device during a diagnostic operation. The computing device further includes a controller to receive error information associated with a component of the computing device. The controller is also to store the error information in the storage device during the error collection operation.
MECHANISM FOR INTEGRATING I/O HYPERVISOR WITH A COMBINED DPU AND SERVER SOLUTION
A combined data processing unit (DPU) and server solution with DPU operating system (OS) integration is described. A DPU OS is executed on a DPU or other computing device, where the DPU OS exercises secure calls provided by a DPU's trusted firmware component, that may be invoked by DPU OS components to abstract DPU vendor-specific and server vendor-specific integration details. An invocation of one of the secure calls made on the DPU to communicate with its associated server computing device is identified. In an instance in which the one of the secure calls is invoked, the secure call invoked is translated into a call or request specific to an architecture of the server computing device and the call is performed, which may include sending a signal to the server computing device in a format interpretable by the server computing device.
Synchronizing a device that has been power cycled to an already operational system
A method comprises a system comprising a host device coupled to a first remote device actively operating according to a state diagram that the host device and all remote devices follow during operation of the system. The method further comprises powering up a second remote device while the host device and first remote device are actively operating according to the state diagram. The second remote device waits for a synchronization point sequence. Upon detecting the synchronization point sequence, the second remote device implements a predetermined feature set and synchronizes itself to the state diagram at a common point as the host device and first remote device.
Method and system for indicating BIOS POST status from a chassis identifying LED
A system and method for providing status information during a power-on self-test routine. The system includes a basic input output system operable to execute the power-on self-test routine and output the status of the power-on self-test routine. The system includes an externally visible indicator such as a server chassis identify LED. A controller is coupled to the basic input output system and the externally visible indicator. The controller is operable to receive the status from the basic input output system, and to control the externally visible indicator in response to the status received from the basic input output system.
SYSTEM AND METHOD FOR REMOTELY BOOTING A SYSTEM
A system for configuring an information handling system into a minimum configuration mode. If an information handling system hangs, embodiments may communicate with a remote access controller to set a configuration flag corresponding to a minimum configuration mode. When the information handling system starts a POST process, the BIOS checks the configuration flag. If the flag is set, the BIOS initializes a single DIMM and bypasses any PCIe slot driver initializations and any non-essential services to allow the information handling system to complete the boot process. The information handling system may boot to a UEFI code to allow a user to diagnose a problem or boot to a BIOS setup code to allow the user to enable additional DIMMs, PCIe slots and turn on non-essential services.
SECURE BOOT POLICY FOR PLATFORM SECURITY USING NEUTRAL PROCESSORS IN AN INFORMATION HANDLING SYSTEM
A secure boot policy may be stored in the information handling system and used to create a trusted relationship with a CPU, including a neutral CPU that has not been fused with an OEM key. The secure boot policy may be a data blob including platform-specific identification information (e.g., one or more of flash memory unique ID, motherboard ePPID), a boot policy (e.g., specifying to enable or disable neutral CPU fusing), and a signature. The secure boot policy may be stored in a one-time-programmable (OTP) storage of the information handling system, such as an OTP region in the serial peripheral interface (SPI) flash memory part storing the basic input/output system (BIOS). The BIOS may verify the secure boot policy using a public key and check if the boot policy is bound to current BIOS flash part and/or system configuration, and then apply the boot policy if the verification is passed.
CONTAINERIZED FIRMWARE SERVICES
Temporary firmware is provided as cloud services. Different temporary firmware containers are downloaded via a communications network. A light-weight operating system launches and executes the temporary firmware containers during a boot operation, POST operation, or other scheme. The temporary firmware containers thus detect and perhaps resolve POST errors. The light-weight operating system may also download a full-service/resource operating system. A second or subsequent boot operation may be performed, but control is ceded to the full-service/resource operating system. Multiple firmware tenants may thus be temporarily downloaded to a bare metal machine to support POST error detection activities. Advanced OS serviceability, diagnostics, and other containerized firmware may thus be quickly and simply launched without requiring the excessive time and difficulties of using the full-service/resource operating system.
SYSTEM AND METHOD FOR DEVICE AUTHENTICATION USING A BASEBOARD MANAGEMENT CONTROLLER (BMC)
An Information Handling System (IHS) includes multiple hardware devices, and a baseboard Management Controller (BMC) in communication with the plurality of hardware devices. The BMC includes executable instructions for causing the one hardware device to be inhibited from functioning with the IHS when at least one of the hardware devices is powered on, and performing an authentication procedure with that hardware device. After that hardware device has been successfully authenticated, the instructions then enable the one hardware device to function with the IHS.
Enhanced in-system test coverage based on detecting component degradation
In various examples, permanent faults in hardware component(s) and/or connections to the hardware component(s) of a computing platform may be predicted before they occur using in-system testing. As a result of this prediction, one or more remedial actions may be determined to enhance the safety of the computing platform (e.g., an autonomous vehicle). A degradation rate of a performance characteristic associated with the hardware component may be determined, detected, and/or computed by monitoring values of performance characteristics over time using fault testing.