CN113504932A - Firmware data updating method and device - Google Patents
Firmware data updating method and device Download PDFInfo
- Publication number
- CN113504932A CN113504932A CN202110901114.3A CN202110901114A CN113504932A CN 113504932 A CN113504932 A CN 113504932A CN 202110901114 A CN202110901114 A CN 202110901114A CN 113504932 A CN113504932 A CN 113504932A
- Authority
- CN
- China
- Prior art keywords
- firmware
- target
- equipment
- updated
- updating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/71—Version control; Configuration management
Abstract
The invention provides a firmware data updating method and a firmware data updating device, which are used for confirming a target device with a specific model and a type of firmware to be upgraded used by the target device through predefined updating configuration parameters. And scanning the target equipment, determining the target equipment with the model matched with the equipment model supported by the updating configuration parameter as equipment to be updated, starting a concurrent thread, and updating data of the firmware in the equipment to be updated based on the updating configuration parameter, so that the batch upgrading operation of the firmware is realized, and the upgrading speed and the upgrading efficiency are improved.
Description
Technical Field
The invention relates to the technical field of computer data processing, in particular to a firmware data updating method and a related device.
Background
The BMC is a dedicated Controller for monitoring and managing a server, and is generally called a Baseboard Management Controller (BMC). The BMC is a stand-alone system that does not rely on other hardware on the system (e.g., CPU, memory, etc.), nor on the BIOS, OS, etc. Generally, each modern server has a BMC, and the BMC can monitor the running state of the server, power on and off the server, upgrade the firmware of the server (BIOS/FPGA/CPLD/BMC), remotely install an operating system, and the like.
Different product series have different BMC firmware, and in the prior art, when updating the BMC firmware, the update mode of manual checking and manual updating is usually adopted, so that the processing speed is low and the update efficiency is low.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method and an apparatus for updating firmware data to improve the updating speed and efficiency of firmware of a device.
In order to achieve the above purpose, the embodiments of the present invention provide the following technical solutions:
a firmware data update method, comprising:
acquiring an updating configuration parameter, and acquiring the device model of the target device supported by the updating configuration parameter;
scanning the target equipment, and determining the target equipment with the model matched with the equipment model supported by the updating configuration parameters as equipment to be updated;
and starting a concurrent thread, and updating data of the firmware in the equipment to be updated based on the update configuration parameters.
Optionally, in the firmware data updating method, before scanning the target device, the method further includes:
judging whether the firmware corresponding to the firmware directory configured in the update configuration parameters can be accessed, if the firmware directory does not exist or is not accessed, not responding to the acquired update configuration parameters;
and when the firmware directory can be accessed, reading the firmware information in the firmware directory, authenticating the firmware information, and when the authentication of the firmware information in the firmware directory fails, not responding to the acquired update configuration parameters.
Optionally, in the firmware data updating method, before scanning the target device, the method further includes:
acquiring a detection method corresponding to the device type of each target device, detecting the target devices based on the acquired detection method to detect whether the target devices can be accessed and whether the target ports of the target devices are opened, and taking the target devices which can be accessed and have the target ports opened as target devices which can be subjected to subsequent processing.
Optionally, in the firmware data updating method, scanning the target device, and determining the target device with a model matching the device model supported by the update configuration parameter as the device to be updated includes:
starting threads with target quantity based on preset concurrency parameters, concurrently reading FRU information of target equipment with an accessible target port, writing the read address information of the target equipment with the same equipment model as that supported by the update configuration parameters into an update list if the FRU information of the target equipment with the accessible target port is successfully read, and taking the target equipment in the update list as equipment to be updated.
Optionally, in the firmware data updating method, the updating data of the firmware in the device to be updated based on the update configuration parameter includes:
judging whether the version number of the firmware to be upgraded on the equipment to be upgraded is consistent with the version number of the firmware in the updating configuration parameters, if not, upgrading the firmware to be upgraded on the equipment to be upgraded, writing the relevant information of the successfully upgraded equipment to be upgraded and the upgraded firmware into a first list, and writing the relevant information of the unsuccessfully upgraded equipment to be upgraded and the upgraded firmware into a second list.
Optionally, in the firmware data updating method, after the firmware is upgraded, it is determined whether the successfully upgraded firmware needs to be restarted based on the update configuration parameter, when the firmware needs to be restarted, the successfully upgraded target device is restarted, it is determined whether the successfully upgraded firmware is restarted by a preset method, after the firmware is restarted successfully, it is determined whether the successfully restarted firmware is restarted, and it is determined whether the firmware is upgraded successfully based on the version information of the successfully restarted firmware and the version number of the firmware in the update configuration parameter.
A firmware data update apparatus, comprising:
the updating data acquisition unit is used for acquiring updating configuration parameters and acquiring the equipment model of the target equipment supported by the updating configuration parameters;
the device to be updated determining unit is used for scanning the target device and determining the target device with the model matched with the device model supported by the update configuration parameter as the device to be updated;
and the upgrading unit is used for starting a concurrent thread and updating data of the firmware in the equipment to be updated based on the updating configuration parameters.
Optionally, in the firmware data updating apparatus, before the unit for determining the device to be updated scans the target device, the unit for determining the device to be updated is further configured to:
judging whether the firmware corresponding to the firmware directory configured in the update configuration parameters can be accessed, if the firmware directory does not exist or is not accessed, not responding to the acquired update configuration parameters;
and when the firmware directory can be accessed, reading the firmware information in the firmware directory, authenticating the firmware information, and when the authentication of the firmware information in the firmware directory fails, not responding to the acquired update configuration parameters.
Optionally, in the firmware data updating apparatus, before the to-be-updated device determining unit scans the target device, the to-be-updated device determining unit is further configured to:
acquiring a detection method corresponding to the device type of each target device, detecting the target devices based on the acquired detection method to detect whether the target devices can be accessed and whether the target ports of the target devices are opened, and taking the target devices which can be accessed and have the target ports opened as target devices which can be subjected to subsequent processing.
Optionally, in the firmware data updating apparatus, when the to-be-updated device determining unit scans the target device and determines that the target device whose model matches the device model supported by the update configuration parameter is used as the to-be-updated device, the to-be-updated device determining unit is specifically configured to:
starting threads with target quantity based on preset concurrency parameters, concurrently reading FRU information of target equipment with an accessible target port, writing the read address information of the target equipment with the same equipment model as that supported by the update configuration parameters into an update list if the FRU information of the target equipment with the accessible target port is successfully read, and taking the target equipment in the update list as equipment to be updated.
Based on the above technical solution, in the above solution provided in the embodiment of the present invention, the target device of the specific model and the type of the firmware to be upgraded used by the target device are confirmed through predefined update configuration parameters. And scanning the target equipment, determining the target equipment with the model matched with the equipment model supported by the updating configuration parameter as equipment to be updated, starting a concurrent thread, and updating data of the firmware in the equipment to be updated based on the updating configuration parameter, so that the batch upgrading operation of the firmware is realized, and the upgrading speed and the upgrading efficiency are improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a general flowchart of a firmware data update method disclosed in an embodiment of the present application;
FIG. 2 is a detailed flowchart of the determination process of the device to be upgraded in the firmware data updating method;
FIG. 3 is a detailed flowchart of a firmware upgrade process in the firmware data update method;
fig. 4 is a schematic structural diagram of a firmware data updating apparatus according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to improve the upgrade efficiency of the BMC firmware, the present application discloses a firmware data updating method, which may include, referring to fig. 1:
step S101: and acquiring the updated configuration parameters.
In this step, by analyzing the update configuration parameters, the device model of the device to be updated, the firmware type of the firmware to be updated, the version number of the updated firmware, the update content, and the like may be determined, and of course, the related instruction of whether to restart the updated firmware may also be included, and other preset instructions or data may also be included, for example, the number of concurrent threads, a firmware directory, a login account of the firmware, the update type, and the like.
Step S102: and acquiring the device model of the target device supported by the updated configuration parameters.
In this step, in the technical solution disclosed in the embodiment of the present application, devices associated with a system to which the method is applied are called target devices, and the firmware in each of these devices is upgraded by the system to which the method is applied; and analyzing the updated configuration parameters to obtain the equipment model of the target equipment updated this time.
Step S103: and scanning the target equipment, and determining the target equipment with the model matched with the equipment model supported by the updating configuration parameters as the equipment to be updated.
In the scheme, the device model of the target device is identified, the identified device model is compared with the device model of the target device supported by the updated configuration parameter, and the device with the same device model as the device model listed in the updated configuration parameter in the target device is taken as the device to be updated based on the comparison result.
Step S104: and starting a concurrent thread, and updating data of the firmware in the equipment to be updated based on the update configuration parameters.
In this step, the number of concurrent threads calibrated in the update configuration parameter may be obtained, a concurrent thread is started based on the number of concurrent threads, and data update is performed on the firmware in the device to be updated based on the update configuration parameter.
In summary, the present invention confirms the target device of a specific model and the type of firmware to be upgraded used by the target device through predefined update configuration parameters. And scanning the target equipment, determining the target equipment with the model matched with the equipment model supported by the updating configuration parameter as equipment to be updated, starting a concurrent thread, and updating data of the firmware in the equipment to be updated based on the updating configuration parameter, so that the batch upgrading operation of the firmware is realized, and the upgrading speed and the upgrading efficiency are improved.
In a technical solution disclosed in another embodiment of the present application, in order to ensure safety and reliability of the update content, security verification may be performed on the update content of each firmware in the update configuration parameter, and only when the security verification passes, the firmware in the target device may be updated according to the update configuration parameter, specifically, referring to fig. 2, in the method, before scanning the target device, the method further includes:
step S201: and judging whether the firmware corresponding to the firmware directory configured in the update configuration parameters can be accessed, if the firmware directory does not exist or is not accessed, executing the step S202, otherwise, executing the step S203.
In this step, accessing each firmware in the firmware directory based on the firmware directory configured in the update configuration parameter, and when an access object does not exist or has no access right, executing step S202 and exiting the upgrade program;
step S202: and not responding to the acquired updated configuration parameters.
Step S203: when the firmware directory can be accessed, the firmware information in the firmware directory is read, the firmware information is authenticated, when the authentication of the firmware information in the firmware directory fails, the step S202 is executed, and if the authentication is successful, the subsequent processes are continuously executed.
In this step, when it is determined that the firmware directory is accessible, after the firmware information in the firmware directory is checked and determined by using a preset checking logic, it may be determined whether the firmware corresponding to the firmware directory meets an upgrade condition, and if the upgrade condition is not met, a corresponding prompt message is fed back, and the upgrade program is exited.
In this step, after the corresponding firmware in the firmware directory is successfully accessed, the firmware information is continuously read to confirm the validity of the firmware file, and when the security of the firmware file is verified, the subsequent processes are continuously executed, otherwise, step S202 is executed.
In a technical solution disclosed in another embodiment of the present application, referring to fig. 2, a detection method for determining a corresponding target device may be further determined according to a preset detection type of the target device, and the target device is detected, and different detection methods of the target device correspond to different working scenarios.
In this regard, in the above method, before scanning the target device, the method further includes:
acquiring a detection method corresponding to the device type of each target device, detecting the target devices based on the acquired detection method, detecting whether the target IP (IP of the target device) can be accessed or not and whether a target port of the target device is opened or not through an nmap interface, and taking the target device which can be accessed and has the opened target port as the target device which can be subjected to subsequent processing.
After determining whether the target device is accessible and whether a target port of the target device is open, the method may further include:
scanning the target equipment, and determining the target equipment with the model matched with the equipment model supported by the update configuration parameters as the equipment to be updated, wherein the method comprises the following steps:
scanning the target equipment which can be accessed and has an opened target port, extracting the scanned target equipment which meets the preset condition, scanning the target devices meeting preset conditions and the number of the target devices according to the scanning result, starting the threads of the target number based on preset concurrent parameters, concurrently reading the FRU information of the target equipment which can be accessed, has the target port opened and meets the preset condition, if the reading of the FRU information of the target equipment which can be accessed and has the target port opened is successful, indicating that all the devices may be target devices (such as BMC devices) that need to be updated, writing address information of target devices of which the device models of the target devices in the read FRU information are the same as the device models supported by the update configuration parameters into an upgrade list (this process may exclude the target devices that are not supported), and taking the target devices in the upgrade list as the devices to be updated.
Further, under some conditions, when the target device is a BMC device, the BMC device may start multiple IP addresses at the same time, and in this process, according to information such as a device model and a serial number in the FRU, the FRU information is compared, duplication removal work may be completed, duplicate removal may be performed on the same target device, and the IP address of the target device after duplication removal is added to an upgrade list, so as to ensure that the firmware is not repeatedly upgraded on one target device, thereby completing the selected work of the device to be upgraded.
And waiting for the completion of all FRU information reading and comparing threads, ensuring that all scanned BMC IP addresses are subjected to FRU information verification, and starting a certain number of threads according to the set concurrency parameters after all information is confirmed to be correct, and starting a process of updating the firmware concurrently. In the process of checking the FRU information, if the IP check of the target device is not passed, the IP is skipped. If all IPs are skipped, indicating no scalable devices, the routine returns to process 103 to perform an exit operation.
In a technical solution disclosed in another embodiment of the present application, referring to fig. 3, the performing data update on the firmware in the device to be updated based on the update configuration parameter may specifically include:
and preparing to update the firmware, reading the version number of the firmware to be updated on the equipment to be updated recorded in the update table, judging whether the read version number of the firmware to be updated is consistent with the version number of the firmware in the update configuration parameters, and if not, updating the firmware to be updated on the equipment to be updated. And if the updated device and the updated firmware are consistent, skipping the firmware, writing the related information of the successfully updated device to be updated and the updated firmware into the first list, and writing the related information of the unsuccessfully updated device to be updated and the updated firmware into the second list.
In this scheme, when upgrading the firmware to be upgraded on the device to be updated, a corresponding firmware upgrading method needs to be called based on the device type of the target device and the firmware type of the firmware, and then the firmware is upgraded based on the firmware upgrading method.
In a technical solution disclosed in another embodiment of the present application, after all the firmware to be upgraded in a certain target device is upgraded, it may be determined whether the successfully upgraded firmware needs to be restarted based on the upgrade configuration parameter, when the successfully upgraded target device needs to be restarted, the successfully upgraded firmware is determined whether the successfully upgraded firmware is restarted by a preset method (for example, a ping BMC IP and a method of attempting to log in), and after the successfully restarted firmware is judged, whether the successfully upgraded firmware is upgraded is determined again based on version information of the successfully restarted firmware and a version number of the firmware in the upgrade configuration parameter.
And when the upgraded firmware does not need to be restarted, the target equipment is not restarted, and the firmware upgrading process is ended.
In the scheme, the target device which fails to restart can be written into a preset log, the failed node is started, and manual intervention is needed for checking, so as to further confirm the reason of the failure.
Further, in the technical solution disclosed in another embodiment of the present application, in order to further ensure reliability of the upgrade result, after the target device is restarted successfully, the method may further include obtaining a firmware version number that is currently used on the target device or is to be used for next startup. And comparing the obtained version number with the firmware version number in the updating configuration parameters, and judging whether the updating is successful. The version information is not consistent. And marking the node to have failure in applying the new version, and writing related information into a log. The application of nodes with a failed new version requires manual intervention for troubleshooting. And if the version information is consistent, marking the node firmware version to be successfully confirmed, successfully upgrading the node firmware, and writing the related information into the log.
In summary, the FRU information is analyzed to obtain the actual device model of the specific IP, which is compared with the predefined device model in the updated configuration parameters to determine the firmware type, and further determine the upgrading method to be used. The invention can quickly identify the target equipment in the appointed network segment (namely, the target equipment belongs to the same local area network) by the local area network scanning technology. The invention improves the concurrent upgrading capability by utilizing the thread pool technology and improves the efficiency in large-scale upgrading. Moreover, the target equipment is verified and deduplicated by multiple means, and the methods can effectively ensure that the phenomenon of upgrading by mistake can not occur in the scene of mixed deployment of equipment of multiple manufacturers.
Corresponding to the above method, the present embodiment further discloses a firmware data updating apparatus, and the specific working contents of each unit in the apparatus are described below with reference to the contents of the above method embodiment, where the firmware data updating apparatus provided in the embodiment of the present invention is described below, and the firmware data updating apparatus described below and the above firmware data updating method described above may be referred to correspondingly.
Referring to fig. 4, corresponding to the method, the firmware data updating apparatus may include:
an update data acquisition unit 100, configured to obtain an update configuration parameter, and obtain an equipment model of a target device supported by the update configuration parameter;
a device to be updated determining unit 200, configured to scan a target device, and determine, as a device to be updated, a target device whose model matches a device model supported by the update configuration parameter;
and the upgrading unit 300 is configured to start a concurrent thread, and perform data update on the firmware in the device to be updated based on the update configuration parameter.
Optionally, corresponding to the method, before the device to be updated determining unit scans the target device, the method further includes:
judging whether the firmware corresponding to the firmware directory configured in the update configuration parameters can be accessed, if the firmware directory does not exist or is not accessed, not responding to the acquired update configuration parameters;
and when the firmware directory can be accessed, reading the firmware information in the firmware directory, authenticating the firmware information, and when the authentication of the firmware information in the firmware directory fails, not responding to the acquired update configuration parameters.
Optionally, corresponding to the method, before the device to be updated determining unit scans the target device, the method further includes:
acquiring a detection method corresponding to the device type of each target device, detecting the target devices based on the acquired detection method to detect whether the target devices can be accessed and whether the target ports of the target devices are opened, and taking the target devices which can be accessed and have the target ports opened as target devices which can be subjected to subsequent processing.
Optionally, corresponding to the method, when the device to be updated determining unit scans the target device and determines that the target device with the model matching the device model supported by the update configuration parameter is the device to be updated, the method is specifically configured to:
starting threads with target quantity based on preset concurrency parameters, concurrently reading FRU information of target equipment with an accessible target port, writing the read address information of the target equipment with the same equipment model as that supported by the update configuration parameters into an update list if the FRU information of the target equipment with the accessible target port is successfully read, and taking the target equipment in the update list as equipment to be updated.
For convenience of description, the above system is described with the functions divided into various modules, which are described separately. Of course, the functionality of the various modules may be implemented in the same one or more software and/or hardware implementations of the invention.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, the system or system embodiments are substantially similar to the method embodiments and therefore are described in a relatively simple manner, and reference may be made to some of the descriptions of the method embodiments for related points. The above-described system and system embodiments are only illustrative, wherein the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (10)
1. A firmware data update method, comprising:
acquiring an updating configuration parameter, and acquiring the device model of the target device supported by the updating configuration parameter;
scanning the target equipment, and determining the target equipment with the model matched with the equipment model supported by the updating configuration parameters as equipment to be updated;
and starting a concurrent thread, and updating data of the firmware in the equipment to be updated based on the update configuration parameters.
2. The firmware data updating method according to claim 1, wherein before scanning the target device, the method further comprises:
judging whether the firmware corresponding to the firmware directory configured in the update configuration parameters can be accessed, if the firmware directory does not exist or is not accessed, not responding to the acquired update configuration parameters;
and when the firmware directory can be accessed, reading the firmware information in the firmware directory, authenticating the firmware information, and when the authentication of the firmware information in the firmware directory fails, not responding to the acquired update configuration parameters.
3. The firmware data updating method according to claim 1, wherein before scanning the target device, further comprising:
acquiring a detection method corresponding to the device type of each target device, detecting the target devices based on the acquired detection method to detect whether the target devices can be accessed and whether the target ports of the target devices are opened, and taking the target devices which can be accessed and have the target ports opened as target devices which can be subjected to subsequent processing.
4. The firmware data updating method according to claim 3, wherein scanning the target device to determine the target device with a model matching the device model supported by the update configuration parameter as the device to be updated comprises:
starting threads with target quantity based on preset concurrency parameters, concurrently reading FRU information of target equipment with an accessible target port, writing the read address information of the target equipment with the same equipment model as that supported by the update configuration parameters into an update list if the FRU information of the target equipment with the accessible target port is successfully read, and taking the target equipment in the update list as equipment to be updated.
5. The firmware data updating method according to claim 1, wherein the data updating the firmware in the device to be updated based on the update configuration parameters comprises:
judging whether the version number of the firmware to be upgraded on the equipment to be upgraded is consistent with the version number of the firmware in the updating configuration parameters, if not, upgrading the firmware to be upgraded on the equipment to be upgraded, writing the relevant information of the successfully upgraded equipment to be upgraded and the upgraded firmware into a first list, and writing the relevant information of the unsuccessfully upgraded equipment to be upgraded and the upgraded firmware into a second list.
6. The firmware data updating method according to claim 5, wherein after the firmware is upgraded, it is determined whether the firmware that is successfully upgraded needs to be restarted based on the update configuration parameter, when the firmware needs to be restarted, the target device that is successfully upgraded is restarted, and it is determined whether the firmware that is successfully upgraded is restarted by a preset method, and after the firmware that is successfully restarted is determined, and it is determined whether the firmware is successfully upgraded again based on version information of the firmware that is successfully restarted and the version number of the firmware in the update configuration parameter.
7. A firmware data update apparatus, comprising:
the updating data acquisition unit is used for acquiring updating configuration parameters and acquiring the equipment model of the target equipment supported by the updating configuration parameters;
the device to be updated determining unit is used for scanning the target device and determining the target device with the model matched with the device model supported by the update configuration parameter as the device to be updated;
and the upgrading unit is used for starting a concurrent thread and updating data of the firmware in the equipment to be updated based on the updating configuration parameters.
8. The firmware data updating apparatus according to claim 7, wherein the device to be updated determining unit, before scanning the target device, is further configured to:
judging whether the firmware corresponding to the firmware directory configured in the update configuration parameters can be accessed, if the firmware directory does not exist or is not accessed, not responding to the acquired update configuration parameters;
and when the firmware directory can be accessed, reading the firmware information in the firmware directory, authenticating the firmware information, and when the authentication of the firmware information in the firmware directory fails, not responding to the acquired update configuration parameters.
9. The firmware data updating apparatus according to claim 7, wherein before the unit for determining the device to be updated scans the target device, the apparatus for determining the device to be updated is further configured to:
acquiring a detection method corresponding to the device type of each target device, detecting the target devices based on the acquired detection method to detect whether the target devices can be accessed and whether the target ports of the target devices are opened, and taking the target devices which can be accessed and have the target ports opened as target devices which can be subjected to subsequent processing.
10. The firmware data updating apparatus according to claim 9, wherein the to-be-updated device determining unit is configured to, when scanning the target device and determining that the target device whose model matches the device model supported by the update configuration parameter is used as the to-be-updated device, specifically:
starting threads with target quantity based on preset concurrency parameters, concurrently reading FRU information of target equipment with an accessible target port, writing the read address information of the target equipment with the same equipment model as that supported by the update configuration parameters into an update list if the FRU information of the target equipment with the accessible target port is successfully read, and taking the target equipment in the update list as equipment to be updated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110901114.3A CN113504932B (en) | 2021-08-06 | 2021-08-06 | Firmware data updating method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110901114.3A CN113504932B (en) | 2021-08-06 | 2021-08-06 | Firmware data updating method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113504932A true CN113504932A (en) | 2021-10-15 |
CN113504932B CN113504932B (en) | 2022-05-20 |
Family
ID=78015710
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110901114.3A Active CN113504932B (en) | 2021-08-06 | 2021-08-06 | Firmware data updating method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113504932B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114880001A (en) * | 2022-07-11 | 2022-08-09 | 苏州景昱医疗器械有限公司 | Firmware updating method and related device |
CN115085973A (en) * | 2022-05-17 | 2022-09-20 | 度小满科技(北京)有限公司 | White list processing method and device, storage medium and computer terminal |
CN117615367A (en) * | 2024-01-18 | 2024-02-27 | 深圳飞思通科技有限公司 | Firmware program updating method, device and system |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040210800A1 (en) * | 2003-04-17 | 2004-10-21 | Ghislain Gabriel Vecoven Frederic Louis | Error management |
CN101778376A (en) * | 2009-12-31 | 2010-07-14 | 中兴通讯股份有限公司 | Method and device for realizing wireless firmware update |
CN110134417A (en) * | 2019-04-16 | 2019-08-16 | 深圳市国鑫恒宇科技有限公司 | A method of BMC batch upgrade is realized based on Python |
CN110764798A (en) * | 2019-09-06 | 2020-02-07 | 深圳平安通信科技有限公司 | Microcode upgrading method, device, computer equipment and storage medium |
CN110943860A (en) * | 2019-11-22 | 2020-03-31 | 苏州浪潮智能科技有限公司 | BMC (baseboard management controller) firmware updating method and system, electronic equipment and storage medium |
CN111625263A (en) * | 2020-05-22 | 2020-09-04 | 苏州浪潮智能科技有限公司 | Server component firmware updating method |
US20200301696A1 (en) * | 2017-11-30 | 2020-09-24 | Nanjing Chervon Industry Co., Ltd. | Electrical device and program update method thereof |
CN111756574A (en) * | 2020-06-19 | 2020-10-09 | 浪潮电子信息产业股份有限公司 | Method and device for remotely updating firmware in batch mode and computer readable storage medium |
CN111800946A (en) * | 2020-07-15 | 2020-10-20 | 恒为科技(上海)股份有限公司 | Method and device for setting Artwork Film in Allegro |
US20210216637A1 (en) * | 2020-01-10 | 2021-07-15 | Beijing Xiaomi Mobile Software Co., Ltd. | Firmware upgrade method and device, and storage medium |
-
2021
- 2021-08-06 CN CN202110901114.3A patent/CN113504932B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040210800A1 (en) * | 2003-04-17 | 2004-10-21 | Ghislain Gabriel Vecoven Frederic Louis | Error management |
CN101778376A (en) * | 2009-12-31 | 2010-07-14 | 中兴通讯股份有限公司 | Method and device for realizing wireless firmware update |
US20200301696A1 (en) * | 2017-11-30 | 2020-09-24 | Nanjing Chervon Industry Co., Ltd. | Electrical device and program update method thereof |
CN110134417A (en) * | 2019-04-16 | 2019-08-16 | 深圳市国鑫恒宇科技有限公司 | A method of BMC batch upgrade is realized based on Python |
CN110764798A (en) * | 2019-09-06 | 2020-02-07 | 深圳平安通信科技有限公司 | Microcode upgrading method, device, computer equipment and storage medium |
CN110943860A (en) * | 2019-11-22 | 2020-03-31 | 苏州浪潮智能科技有限公司 | BMC (baseboard management controller) firmware updating method and system, electronic equipment and storage medium |
US20210216637A1 (en) * | 2020-01-10 | 2021-07-15 | Beijing Xiaomi Mobile Software Co., Ltd. | Firmware upgrade method and device, and storage medium |
CN111625263A (en) * | 2020-05-22 | 2020-09-04 | 苏州浪潮智能科技有限公司 | Server component firmware updating method |
CN111756574A (en) * | 2020-06-19 | 2020-10-09 | 浪潮电子信息产业股份有限公司 | Method and device for remotely updating firmware in batch mode and computer readable storage medium |
CN111800946A (en) * | 2020-07-15 | 2020-10-20 | 恒为科技(上海)股份有限公司 | Method and device for setting Artwork Film in Allegro |
Non-Patent Citations (1)
Title |
---|
"ATCA携手"多核"成为下一代通信技术新宠", 《通讯世界》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115085973A (en) * | 2022-05-17 | 2022-09-20 | 度小满科技(北京)有限公司 | White list processing method and device, storage medium and computer terminal |
CN115085973B (en) * | 2022-05-17 | 2024-03-12 | 度小满科技(北京)有限公司 | White list processing method, white list processing device, storage medium and computer terminal |
CN114880001A (en) * | 2022-07-11 | 2022-08-09 | 苏州景昱医疗器械有限公司 | Firmware updating method and related device |
WO2024012134A1 (en) * | 2022-07-11 | 2024-01-18 | 景昱医疗科技(苏州)股份有限公司 | Firmware update method, apparatus, device and system, and medium |
CN117615367A (en) * | 2024-01-18 | 2024-02-27 | 深圳飞思通科技有限公司 | Firmware program updating method, device and system |
CN117615367B (en) * | 2024-01-18 | 2024-04-09 | 深圳飞思通科技有限公司 | Firmware program updating method, device and system |
Also Published As
Publication number | Publication date |
---|---|
CN113504932B (en) | 2022-05-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113504932B (en) | Firmware data updating method and device | |
CN107451040B (en) | Method and device for positioning fault reason and computer readable storage medium | |
CN110943860B (en) | BMC (baseboard management controller) firmware updating method and system, electronic equipment and storage medium | |
CN110750396B (en) | Server operating system compatibility testing method and device and storage medium | |
CN104536875A (en) | Automatic server restart testing method based on IPMI | |
US20090132999A1 (en) | Secure and fault-tolerant system and method for testing a software patch | |
CN112256505A (en) | Server stability testing method and device and related components | |
CN115061885A (en) | Complete machine aging automatic test method and device, electronic equipment and storage medium | |
CN112099825A (en) | Method, device and equipment for upgrading component and storage medium | |
CN112948190A (en) | Hardware testing method, system and related device of server | |
CN112100048B (en) | Self-adaptive inspection method and device for server | |
CN110134558B (en) | Method and device for detecting server | |
CN111723374A (en) | Vulnerability scanning method and device | |
WO2019056545A1 (en) | Test machine automation management method and apparatus, device, and storage medium | |
CN111666200A (en) | Testing method and terminal for time consumption of cold start of PC software | |
CN114528350A (en) | Cluster split brain processing method, device and equipment and readable storage medium | |
CN114153503A (en) | BIOS control method, device and medium | |
CN114448788A (en) | Installation method, system, equipment and medium of switch system | |
CN113657702A (en) | Automatic operation and maintenance method and device for internet data center and readable storage medium | |
CN112395619A (en) | Vulnerability scanning method and device | |
CN111400113A (en) | Complete machine self-checking method, device and system of computer system | |
CN114860549B (en) | Buried data verification method, buried data verification device, buried data verification equipment and storage medium | |
CN115291957B (en) | Initialization method and device of multiprocessor mainboard | |
CN110908725A (en) | Application program starting method and device, electronic equipment and readable medium | |
CN114791832B (en) | IOS system repairing method and device when equipment space is insufficient and related components |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20221230 Address after: 200090 Building 1, 488 Gongqing Road, Yangpu District, Shanghai Patentee after: SHANGHAI LINGHENG INFORMATION TECHNOLOGY Co.,Ltd. Address before: 6 / F, building 8, 2388 Chenhang Road, Minhang District, Shanghai, 201114 Patentee before: EMBEDWAY TECHNOLOGIES (SHANGHAI) Corp. |