CN113504932A - Firmware data updating method and device - Google Patents

Firmware data updating method and device Download PDF

Info

Publication number
CN113504932A
CN113504932A CN202110901114.3A CN202110901114A CN113504932A CN 113504932 A CN113504932 A CN 113504932A CN 202110901114 A CN202110901114 A CN 202110901114A CN 113504932 A CN113504932 A CN 113504932A
Authority
CN
China
Prior art keywords
firmware
target
equipment
updated
updating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110901114.3A
Other languages
Chinese (zh)
Other versions
CN113504932B (en
Inventor
王丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Lingheng Information Technology Co ltd
Original Assignee
Embedway Technologies Shanghai Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Embedway Technologies Shanghai Corp filed Critical Embedway Technologies Shanghai Corp
Priority to CN202110901114.3A priority Critical patent/CN113504932B/en
Publication of CN113504932A publication Critical patent/CN113504932A/en
Application granted granted Critical
Publication of CN113504932B publication Critical patent/CN113504932B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management

Abstract

The invention provides a firmware data updating method and a firmware data updating device, which are used for confirming a target device with a specific model and a type of firmware to be upgraded used by the target device through predefined updating configuration parameters. And scanning the target equipment, determining the target equipment with the model matched with the equipment model supported by the updating configuration parameter as equipment to be updated, starting a concurrent thread, and updating data of the firmware in the equipment to be updated based on the updating configuration parameter, so that the batch upgrading operation of the firmware is realized, and the upgrading speed and the upgrading efficiency are improved.

Description

Firmware data updating method and device
Technical Field
The invention relates to the technical field of computer data processing, in particular to a firmware data updating method and a related device.
Background
The BMC is a dedicated Controller for monitoring and managing a server, and is generally called a Baseboard Management Controller (BMC). The BMC is a stand-alone system that does not rely on other hardware on the system (e.g., CPU, memory, etc.), nor on the BIOS, OS, etc. Generally, each modern server has a BMC, and the BMC can monitor the running state of the server, power on and off the server, upgrade the firmware of the server (BIOS/FPGA/CPLD/BMC), remotely install an operating system, and the like.
Different product series have different BMC firmware, and in the prior art, when updating the BMC firmware, the update mode of manual checking and manual updating is usually adopted, so that the processing speed is low and the update efficiency is low.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method and an apparatus for updating firmware data to improve the updating speed and efficiency of firmware of a device.
In order to achieve the above purpose, the embodiments of the present invention provide the following technical solutions:
a firmware data update method, comprising:
acquiring an updating configuration parameter, and acquiring the device model of the target device supported by the updating configuration parameter;
scanning the target equipment, and determining the target equipment with the model matched with the equipment model supported by the updating configuration parameters as equipment to be updated;
and starting a concurrent thread, and updating data of the firmware in the equipment to be updated based on the update configuration parameters.
Optionally, in the firmware data updating method, before scanning the target device, the method further includes:
judging whether the firmware corresponding to the firmware directory configured in the update configuration parameters can be accessed, if the firmware directory does not exist or is not accessed, not responding to the acquired update configuration parameters;
and when the firmware directory can be accessed, reading the firmware information in the firmware directory, authenticating the firmware information, and when the authentication of the firmware information in the firmware directory fails, not responding to the acquired update configuration parameters.
Optionally, in the firmware data updating method, before scanning the target device, the method further includes:
acquiring a detection method corresponding to the device type of each target device, detecting the target devices based on the acquired detection method to detect whether the target devices can be accessed and whether the target ports of the target devices are opened, and taking the target devices which can be accessed and have the target ports opened as target devices which can be subjected to subsequent processing.
Optionally, in the firmware data updating method, scanning the target device, and determining the target device with a model matching the device model supported by the update configuration parameter as the device to be updated includes:
starting threads with target quantity based on preset concurrency parameters, concurrently reading FRU information of target equipment with an accessible target port, writing the read address information of the target equipment with the same equipment model as that supported by the update configuration parameters into an update list if the FRU information of the target equipment with the accessible target port is successfully read, and taking the target equipment in the update list as equipment to be updated.
Optionally, in the firmware data updating method, the updating data of the firmware in the device to be updated based on the update configuration parameter includes:
judging whether the version number of the firmware to be upgraded on the equipment to be upgraded is consistent with the version number of the firmware in the updating configuration parameters, if not, upgrading the firmware to be upgraded on the equipment to be upgraded, writing the relevant information of the successfully upgraded equipment to be upgraded and the upgraded firmware into a first list, and writing the relevant information of the unsuccessfully upgraded equipment to be upgraded and the upgraded firmware into a second list.
Optionally, in the firmware data updating method, after the firmware is upgraded, it is determined whether the successfully upgraded firmware needs to be restarted based on the update configuration parameter, when the firmware needs to be restarted, the successfully upgraded target device is restarted, it is determined whether the successfully upgraded firmware is restarted by a preset method, after the firmware is restarted successfully, it is determined whether the successfully restarted firmware is restarted, and it is determined whether the firmware is upgraded successfully based on the version information of the successfully restarted firmware and the version number of the firmware in the update configuration parameter.
A firmware data update apparatus, comprising:
the updating data acquisition unit is used for acquiring updating configuration parameters and acquiring the equipment model of the target equipment supported by the updating configuration parameters;
the device to be updated determining unit is used for scanning the target device and determining the target device with the model matched with the device model supported by the update configuration parameter as the device to be updated;
and the upgrading unit is used for starting a concurrent thread and updating data of the firmware in the equipment to be updated based on the updating configuration parameters.
Optionally, in the firmware data updating apparatus, before the unit for determining the device to be updated scans the target device, the unit for determining the device to be updated is further configured to:
judging whether the firmware corresponding to the firmware directory configured in the update configuration parameters can be accessed, if the firmware directory does not exist or is not accessed, not responding to the acquired update configuration parameters;
and when the firmware directory can be accessed, reading the firmware information in the firmware directory, authenticating the firmware information, and when the authentication of the firmware information in the firmware directory fails, not responding to the acquired update configuration parameters.
Optionally, in the firmware data updating apparatus, before the to-be-updated device determining unit scans the target device, the to-be-updated device determining unit is further configured to:
acquiring a detection method corresponding to the device type of each target device, detecting the target devices based on the acquired detection method to detect whether the target devices can be accessed and whether the target ports of the target devices are opened, and taking the target devices which can be accessed and have the target ports opened as target devices which can be subjected to subsequent processing.
Optionally, in the firmware data updating apparatus, when the to-be-updated device determining unit scans the target device and determines that the target device whose model matches the device model supported by the update configuration parameter is used as the to-be-updated device, the to-be-updated device determining unit is specifically configured to:
starting threads with target quantity based on preset concurrency parameters, concurrently reading FRU information of target equipment with an accessible target port, writing the read address information of the target equipment with the same equipment model as that supported by the update configuration parameters into an update list if the FRU information of the target equipment with the accessible target port is successfully read, and taking the target equipment in the update list as equipment to be updated.
Based on the above technical solution, in the above solution provided in the embodiment of the present invention, the target device of the specific model and the type of the firmware to be upgraded used by the target device are confirmed through predefined update configuration parameters. And scanning the target equipment, determining the target equipment with the model matched with the equipment model supported by the updating configuration parameter as equipment to be updated, starting a concurrent thread, and updating data of the firmware in the equipment to be updated based on the updating configuration parameter, so that the batch upgrading operation of the firmware is realized, and the upgrading speed and the upgrading efficiency are improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a general flowchart of a firmware data update method disclosed in an embodiment of the present application;
FIG. 2 is a detailed flowchart of the determination process of the device to be upgraded in the firmware data updating method;
FIG. 3 is a detailed flowchart of a firmware upgrade process in the firmware data update method;
fig. 4 is a schematic structural diagram of a firmware data updating apparatus according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to improve the upgrade efficiency of the BMC firmware, the present application discloses a firmware data updating method, which may include, referring to fig. 1:
step S101: and acquiring the updated configuration parameters.
In this step, by analyzing the update configuration parameters, the device model of the device to be updated, the firmware type of the firmware to be updated, the version number of the updated firmware, the update content, and the like may be determined, and of course, the related instruction of whether to restart the updated firmware may also be included, and other preset instructions or data may also be included, for example, the number of concurrent threads, a firmware directory, a login account of the firmware, the update type, and the like.
Step S102: and acquiring the device model of the target device supported by the updated configuration parameters.
In this step, in the technical solution disclosed in the embodiment of the present application, devices associated with a system to which the method is applied are called target devices, and the firmware in each of these devices is upgraded by the system to which the method is applied; and analyzing the updated configuration parameters to obtain the equipment model of the target equipment updated this time.
Step S103: and scanning the target equipment, and determining the target equipment with the model matched with the equipment model supported by the updating configuration parameters as the equipment to be updated.
In the scheme, the device model of the target device is identified, the identified device model is compared with the device model of the target device supported by the updated configuration parameter, and the device with the same device model as the device model listed in the updated configuration parameter in the target device is taken as the device to be updated based on the comparison result.
Step S104: and starting a concurrent thread, and updating data of the firmware in the equipment to be updated based on the update configuration parameters.
In this step, the number of concurrent threads calibrated in the update configuration parameter may be obtained, a concurrent thread is started based on the number of concurrent threads, and data update is performed on the firmware in the device to be updated based on the update configuration parameter.
In summary, the present invention confirms the target device of a specific model and the type of firmware to be upgraded used by the target device through predefined update configuration parameters. And scanning the target equipment, determining the target equipment with the model matched with the equipment model supported by the updating configuration parameter as equipment to be updated, starting a concurrent thread, and updating data of the firmware in the equipment to be updated based on the updating configuration parameter, so that the batch upgrading operation of the firmware is realized, and the upgrading speed and the upgrading efficiency are improved.
In a technical solution disclosed in another embodiment of the present application, in order to ensure safety and reliability of the update content, security verification may be performed on the update content of each firmware in the update configuration parameter, and only when the security verification passes, the firmware in the target device may be updated according to the update configuration parameter, specifically, referring to fig. 2, in the method, before scanning the target device, the method further includes:
step S201: and judging whether the firmware corresponding to the firmware directory configured in the update configuration parameters can be accessed, if the firmware directory does not exist or is not accessed, executing the step S202, otherwise, executing the step S203.
In this step, accessing each firmware in the firmware directory based on the firmware directory configured in the update configuration parameter, and when an access object does not exist or has no access right, executing step S202 and exiting the upgrade program;
step S202: and not responding to the acquired updated configuration parameters.
Step S203: when the firmware directory can be accessed, the firmware information in the firmware directory is read, the firmware information is authenticated, when the authentication of the firmware information in the firmware directory fails, the step S202 is executed, and if the authentication is successful, the subsequent processes are continuously executed.
In this step, when it is determined that the firmware directory is accessible, after the firmware information in the firmware directory is checked and determined by using a preset checking logic, it may be determined whether the firmware corresponding to the firmware directory meets an upgrade condition, and if the upgrade condition is not met, a corresponding prompt message is fed back, and the upgrade program is exited.
In this step, after the corresponding firmware in the firmware directory is successfully accessed, the firmware information is continuously read to confirm the validity of the firmware file, and when the security of the firmware file is verified, the subsequent processes are continuously executed, otherwise, step S202 is executed.
In a technical solution disclosed in another embodiment of the present application, referring to fig. 2, a detection method for determining a corresponding target device may be further determined according to a preset detection type of the target device, and the target device is detected, and different detection methods of the target device correspond to different working scenarios.
In this regard, in the above method, before scanning the target device, the method further includes:
acquiring a detection method corresponding to the device type of each target device, detecting the target devices based on the acquired detection method, detecting whether the target IP (IP of the target device) can be accessed or not and whether a target port of the target device is opened or not through an nmap interface, and taking the target device which can be accessed and has the opened target port as the target device which can be subjected to subsequent processing.
After determining whether the target device is accessible and whether a target port of the target device is open, the method may further include:
scanning the target equipment, and determining the target equipment with the model matched with the equipment model supported by the update configuration parameters as the equipment to be updated, wherein the method comprises the following steps:
scanning the target equipment which can be accessed and has an opened target port, extracting the scanned target equipment which meets the preset condition, scanning the target devices meeting preset conditions and the number of the target devices according to the scanning result, starting the threads of the target number based on preset concurrent parameters, concurrently reading the FRU information of the target equipment which can be accessed, has the target port opened and meets the preset condition, if the reading of the FRU information of the target equipment which can be accessed and has the target port opened is successful, indicating that all the devices may be target devices (such as BMC devices) that need to be updated, writing address information of target devices of which the device models of the target devices in the read FRU information are the same as the device models supported by the update configuration parameters into an upgrade list (this process may exclude the target devices that are not supported), and taking the target devices in the upgrade list as the devices to be updated.
Further, under some conditions, when the target device is a BMC device, the BMC device may start multiple IP addresses at the same time, and in this process, according to information such as a device model and a serial number in the FRU, the FRU information is compared, duplication removal work may be completed, duplicate removal may be performed on the same target device, and the IP address of the target device after duplication removal is added to an upgrade list, so as to ensure that the firmware is not repeatedly upgraded on one target device, thereby completing the selected work of the device to be upgraded.
And waiting for the completion of all FRU information reading and comparing threads, ensuring that all scanned BMC IP addresses are subjected to FRU information verification, and starting a certain number of threads according to the set concurrency parameters after all information is confirmed to be correct, and starting a process of updating the firmware concurrently. In the process of checking the FRU information, if the IP check of the target device is not passed, the IP is skipped. If all IPs are skipped, indicating no scalable devices, the routine returns to process 103 to perform an exit operation.
In a technical solution disclosed in another embodiment of the present application, referring to fig. 3, the performing data update on the firmware in the device to be updated based on the update configuration parameter may specifically include:
and preparing to update the firmware, reading the version number of the firmware to be updated on the equipment to be updated recorded in the update table, judging whether the read version number of the firmware to be updated is consistent with the version number of the firmware in the update configuration parameters, and if not, updating the firmware to be updated on the equipment to be updated. And if the updated device and the updated firmware are consistent, skipping the firmware, writing the related information of the successfully updated device to be updated and the updated firmware into the first list, and writing the related information of the unsuccessfully updated device to be updated and the updated firmware into the second list.
In this scheme, when upgrading the firmware to be upgraded on the device to be updated, a corresponding firmware upgrading method needs to be called based on the device type of the target device and the firmware type of the firmware, and then the firmware is upgraded based on the firmware upgrading method.
In a technical solution disclosed in another embodiment of the present application, after all the firmware to be upgraded in a certain target device is upgraded, it may be determined whether the successfully upgraded firmware needs to be restarted based on the upgrade configuration parameter, when the successfully upgraded target device needs to be restarted, the successfully upgraded firmware is determined whether the successfully upgraded firmware is restarted by a preset method (for example, a ping BMC IP and a method of attempting to log in), and after the successfully restarted firmware is judged, whether the successfully upgraded firmware is upgraded is determined again based on version information of the successfully restarted firmware and a version number of the firmware in the upgrade configuration parameter.
And when the upgraded firmware does not need to be restarted, the target equipment is not restarted, and the firmware upgrading process is ended.
In the scheme, the target device which fails to restart can be written into a preset log, the failed node is started, and manual intervention is needed for checking, so as to further confirm the reason of the failure.
Further, in the technical solution disclosed in another embodiment of the present application, in order to further ensure reliability of the upgrade result, after the target device is restarted successfully, the method may further include obtaining a firmware version number that is currently used on the target device or is to be used for next startup. And comparing the obtained version number with the firmware version number in the updating configuration parameters, and judging whether the updating is successful. The version information is not consistent. And marking the node to have failure in applying the new version, and writing related information into a log. The application of nodes with a failed new version requires manual intervention for troubleshooting. And if the version information is consistent, marking the node firmware version to be successfully confirmed, successfully upgrading the node firmware, and writing the related information into the log.
In summary, the FRU information is analyzed to obtain the actual device model of the specific IP, which is compared with the predefined device model in the updated configuration parameters to determine the firmware type, and further determine the upgrading method to be used. The invention can quickly identify the target equipment in the appointed network segment (namely, the target equipment belongs to the same local area network) by the local area network scanning technology. The invention improves the concurrent upgrading capability by utilizing the thread pool technology and improves the efficiency in large-scale upgrading. Moreover, the target equipment is verified and deduplicated by multiple means, and the methods can effectively ensure that the phenomenon of upgrading by mistake can not occur in the scene of mixed deployment of equipment of multiple manufacturers.
Corresponding to the above method, the present embodiment further discloses a firmware data updating apparatus, and the specific working contents of each unit in the apparatus are described below with reference to the contents of the above method embodiment, where the firmware data updating apparatus provided in the embodiment of the present invention is described below, and the firmware data updating apparatus described below and the above firmware data updating method described above may be referred to correspondingly.
Referring to fig. 4, corresponding to the method, the firmware data updating apparatus may include:
an update data acquisition unit 100, configured to obtain an update configuration parameter, and obtain an equipment model of a target device supported by the update configuration parameter;
a device to be updated determining unit 200, configured to scan a target device, and determine, as a device to be updated, a target device whose model matches a device model supported by the update configuration parameter;
and the upgrading unit 300 is configured to start a concurrent thread, and perform data update on the firmware in the device to be updated based on the update configuration parameter.
Optionally, corresponding to the method, before the device to be updated determining unit scans the target device, the method further includes:
judging whether the firmware corresponding to the firmware directory configured in the update configuration parameters can be accessed, if the firmware directory does not exist or is not accessed, not responding to the acquired update configuration parameters;
and when the firmware directory can be accessed, reading the firmware information in the firmware directory, authenticating the firmware information, and when the authentication of the firmware information in the firmware directory fails, not responding to the acquired update configuration parameters.
Optionally, corresponding to the method, before the device to be updated determining unit scans the target device, the method further includes:
acquiring a detection method corresponding to the device type of each target device, detecting the target devices based on the acquired detection method to detect whether the target devices can be accessed and whether the target ports of the target devices are opened, and taking the target devices which can be accessed and have the target ports opened as target devices which can be subjected to subsequent processing.
Optionally, corresponding to the method, when the device to be updated determining unit scans the target device and determines that the target device with the model matching the device model supported by the update configuration parameter is the device to be updated, the method is specifically configured to:
starting threads with target quantity based on preset concurrency parameters, concurrently reading FRU information of target equipment with an accessible target port, writing the read address information of the target equipment with the same equipment model as that supported by the update configuration parameters into an update list if the FRU information of the target equipment with the accessible target port is successfully read, and taking the target equipment in the update list as equipment to be updated.
For convenience of description, the above system is described with the functions divided into various modules, which are described separately. Of course, the functionality of the various modules may be implemented in the same one or more software and/or hardware implementations of the invention.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, the system or system embodiments are substantially similar to the method embodiments and therefore are described in a relatively simple manner, and reference may be made to some of the descriptions of the method embodiments for related points. The above-described system and system embodiments are only illustrative, wherein the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A firmware data update method, comprising:
acquiring an updating configuration parameter, and acquiring the device model of the target device supported by the updating configuration parameter;
scanning the target equipment, and determining the target equipment with the model matched with the equipment model supported by the updating configuration parameters as equipment to be updated;
and starting a concurrent thread, and updating data of the firmware in the equipment to be updated based on the update configuration parameters.
2. The firmware data updating method according to claim 1, wherein before scanning the target device, the method further comprises:
judging whether the firmware corresponding to the firmware directory configured in the update configuration parameters can be accessed, if the firmware directory does not exist or is not accessed, not responding to the acquired update configuration parameters;
and when the firmware directory can be accessed, reading the firmware information in the firmware directory, authenticating the firmware information, and when the authentication of the firmware information in the firmware directory fails, not responding to the acquired update configuration parameters.
3. The firmware data updating method according to claim 1, wherein before scanning the target device, further comprising:
acquiring a detection method corresponding to the device type of each target device, detecting the target devices based on the acquired detection method to detect whether the target devices can be accessed and whether the target ports of the target devices are opened, and taking the target devices which can be accessed and have the target ports opened as target devices which can be subjected to subsequent processing.
4. The firmware data updating method according to claim 3, wherein scanning the target device to determine the target device with a model matching the device model supported by the update configuration parameter as the device to be updated comprises:
starting threads with target quantity based on preset concurrency parameters, concurrently reading FRU information of target equipment with an accessible target port, writing the read address information of the target equipment with the same equipment model as that supported by the update configuration parameters into an update list if the FRU information of the target equipment with the accessible target port is successfully read, and taking the target equipment in the update list as equipment to be updated.
5. The firmware data updating method according to claim 1, wherein the data updating the firmware in the device to be updated based on the update configuration parameters comprises:
judging whether the version number of the firmware to be upgraded on the equipment to be upgraded is consistent with the version number of the firmware in the updating configuration parameters, if not, upgrading the firmware to be upgraded on the equipment to be upgraded, writing the relevant information of the successfully upgraded equipment to be upgraded and the upgraded firmware into a first list, and writing the relevant information of the unsuccessfully upgraded equipment to be upgraded and the upgraded firmware into a second list.
6. The firmware data updating method according to claim 5, wherein after the firmware is upgraded, it is determined whether the firmware that is successfully upgraded needs to be restarted based on the update configuration parameter, when the firmware needs to be restarted, the target device that is successfully upgraded is restarted, and it is determined whether the firmware that is successfully upgraded is restarted by a preset method, and after the firmware that is successfully restarted is determined, and it is determined whether the firmware is successfully upgraded again based on version information of the firmware that is successfully restarted and the version number of the firmware in the update configuration parameter.
7. A firmware data update apparatus, comprising:
the updating data acquisition unit is used for acquiring updating configuration parameters and acquiring the equipment model of the target equipment supported by the updating configuration parameters;
the device to be updated determining unit is used for scanning the target device and determining the target device with the model matched with the device model supported by the update configuration parameter as the device to be updated;
and the upgrading unit is used for starting a concurrent thread and updating data of the firmware in the equipment to be updated based on the updating configuration parameters.
8. The firmware data updating apparatus according to claim 7, wherein the device to be updated determining unit, before scanning the target device, is further configured to:
judging whether the firmware corresponding to the firmware directory configured in the update configuration parameters can be accessed, if the firmware directory does not exist or is not accessed, not responding to the acquired update configuration parameters;
and when the firmware directory can be accessed, reading the firmware information in the firmware directory, authenticating the firmware information, and when the authentication of the firmware information in the firmware directory fails, not responding to the acquired update configuration parameters.
9. The firmware data updating apparatus according to claim 7, wherein before the unit for determining the device to be updated scans the target device, the apparatus for determining the device to be updated is further configured to:
acquiring a detection method corresponding to the device type of each target device, detecting the target devices based on the acquired detection method to detect whether the target devices can be accessed and whether the target ports of the target devices are opened, and taking the target devices which can be accessed and have the target ports opened as target devices which can be subjected to subsequent processing.
10. The firmware data updating apparatus according to claim 9, wherein the to-be-updated device determining unit is configured to, when scanning the target device and determining that the target device whose model matches the device model supported by the update configuration parameter is used as the to-be-updated device, specifically:
starting threads with target quantity based on preset concurrency parameters, concurrently reading FRU information of target equipment with an accessible target port, writing the read address information of the target equipment with the same equipment model as that supported by the update configuration parameters into an update list if the FRU information of the target equipment with the accessible target port is successfully read, and taking the target equipment in the update list as equipment to be updated.
CN202110901114.3A 2021-08-06 2021-08-06 Firmware data updating method and device Active CN113504932B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110901114.3A CN113504932B (en) 2021-08-06 2021-08-06 Firmware data updating method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110901114.3A CN113504932B (en) 2021-08-06 2021-08-06 Firmware data updating method and device

Publications (2)

Publication Number Publication Date
CN113504932A true CN113504932A (en) 2021-10-15
CN113504932B CN113504932B (en) 2022-05-20

Family

ID=78015710

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110901114.3A Active CN113504932B (en) 2021-08-06 2021-08-06 Firmware data updating method and device

Country Status (1)

Country Link
CN (1) CN113504932B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114880001A (en) * 2022-07-11 2022-08-09 苏州景昱医疗器械有限公司 Firmware updating method and related device
CN115085973A (en) * 2022-05-17 2022-09-20 度小满科技(北京)有限公司 White list processing method and device, storage medium and computer terminal
CN117615367A (en) * 2024-01-18 2024-02-27 深圳飞思通科技有限公司 Firmware program updating method, device and system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040210800A1 (en) * 2003-04-17 2004-10-21 Ghislain Gabriel Vecoven Frederic Louis Error management
CN101778376A (en) * 2009-12-31 2010-07-14 中兴通讯股份有限公司 Method and device for realizing wireless firmware update
CN110134417A (en) * 2019-04-16 2019-08-16 深圳市国鑫恒宇科技有限公司 A method of BMC batch upgrade is realized based on Python
CN110764798A (en) * 2019-09-06 2020-02-07 深圳平安通信科技有限公司 Microcode upgrading method, device, computer equipment and storage medium
CN110943860A (en) * 2019-11-22 2020-03-31 苏州浪潮智能科技有限公司 BMC (baseboard management controller) firmware updating method and system, electronic equipment and storage medium
CN111625263A (en) * 2020-05-22 2020-09-04 苏州浪潮智能科技有限公司 Server component firmware updating method
US20200301696A1 (en) * 2017-11-30 2020-09-24 Nanjing Chervon Industry Co., Ltd. Electrical device and program update method thereof
CN111756574A (en) * 2020-06-19 2020-10-09 浪潮电子信息产业股份有限公司 Method and device for remotely updating firmware in batch mode and computer readable storage medium
CN111800946A (en) * 2020-07-15 2020-10-20 恒为科技(上海)股份有限公司 Method and device for setting Artwork Film in Allegro
US20210216637A1 (en) * 2020-01-10 2021-07-15 Beijing Xiaomi Mobile Software Co., Ltd. Firmware upgrade method and device, and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040210800A1 (en) * 2003-04-17 2004-10-21 Ghislain Gabriel Vecoven Frederic Louis Error management
CN101778376A (en) * 2009-12-31 2010-07-14 中兴通讯股份有限公司 Method and device for realizing wireless firmware update
US20200301696A1 (en) * 2017-11-30 2020-09-24 Nanjing Chervon Industry Co., Ltd. Electrical device and program update method thereof
CN110134417A (en) * 2019-04-16 2019-08-16 深圳市国鑫恒宇科技有限公司 A method of BMC batch upgrade is realized based on Python
CN110764798A (en) * 2019-09-06 2020-02-07 深圳平安通信科技有限公司 Microcode upgrading method, device, computer equipment and storage medium
CN110943860A (en) * 2019-11-22 2020-03-31 苏州浪潮智能科技有限公司 BMC (baseboard management controller) firmware updating method and system, electronic equipment and storage medium
US20210216637A1 (en) * 2020-01-10 2021-07-15 Beijing Xiaomi Mobile Software Co., Ltd. Firmware upgrade method and device, and storage medium
CN111625263A (en) * 2020-05-22 2020-09-04 苏州浪潮智能科技有限公司 Server component firmware updating method
CN111756574A (en) * 2020-06-19 2020-10-09 浪潮电子信息产业股份有限公司 Method and device for remotely updating firmware in batch mode and computer readable storage medium
CN111800946A (en) * 2020-07-15 2020-10-20 恒为科技(上海)股份有限公司 Method and device for setting Artwork Film in Allegro

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"ATCA携手"多核"成为下一代通信技术新宠", 《通讯世界》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115085973A (en) * 2022-05-17 2022-09-20 度小满科技(北京)有限公司 White list processing method and device, storage medium and computer terminal
CN115085973B (en) * 2022-05-17 2024-03-12 度小满科技(北京)有限公司 White list processing method, white list processing device, storage medium and computer terminal
CN114880001A (en) * 2022-07-11 2022-08-09 苏州景昱医疗器械有限公司 Firmware updating method and related device
WO2024012134A1 (en) * 2022-07-11 2024-01-18 景昱医疗科技(苏州)股份有限公司 Firmware update method, apparatus, device and system, and medium
CN117615367A (en) * 2024-01-18 2024-02-27 深圳飞思通科技有限公司 Firmware program updating method, device and system
CN117615367B (en) * 2024-01-18 2024-04-09 深圳飞思通科技有限公司 Firmware program updating method, device and system

Also Published As

Publication number Publication date
CN113504932B (en) 2022-05-20

Similar Documents

Publication Publication Date Title
CN113504932B (en) Firmware data updating method and device
CN107451040B (en) Method and device for positioning fault reason and computer readable storage medium
CN110943860B (en) BMC (baseboard management controller) firmware updating method and system, electronic equipment and storage medium
CN110750396B (en) Server operating system compatibility testing method and device and storage medium
CN104536875A (en) Automatic server restart testing method based on IPMI
US20090132999A1 (en) Secure and fault-tolerant system and method for testing a software patch
CN112256505A (en) Server stability testing method and device and related components
CN115061885A (en) Complete machine aging automatic test method and device, electronic equipment and storage medium
CN112099825A (en) Method, device and equipment for upgrading component and storage medium
CN112948190A (en) Hardware testing method, system and related device of server
CN112100048B (en) Self-adaptive inspection method and device for server
CN110134558B (en) Method and device for detecting server
CN111723374A (en) Vulnerability scanning method and device
WO2019056545A1 (en) Test machine automation management method and apparatus, device, and storage medium
CN111666200A (en) Testing method and terminal for time consumption of cold start of PC software
CN114528350A (en) Cluster split brain processing method, device and equipment and readable storage medium
CN114153503A (en) BIOS control method, device and medium
CN114448788A (en) Installation method, system, equipment and medium of switch system
CN113657702A (en) Automatic operation and maintenance method and device for internet data center and readable storage medium
CN112395619A (en) Vulnerability scanning method and device
CN111400113A (en) Complete machine self-checking method, device and system of computer system
CN114860549B (en) Buried data verification method, buried data verification device, buried data verification equipment and storage medium
CN115291957B (en) Initialization method and device of multiprocessor mainboard
CN110908725A (en) Application program starting method and device, electronic equipment and readable medium
CN114791832B (en) IOS system repairing method and device when equipment space is insufficient and related components

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221230

Address after: 200090 Building 1, 488 Gongqing Road, Yangpu District, Shanghai

Patentee after: SHANGHAI LINGHENG INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 6 / F, building 8, 2388 Chenhang Road, Minhang District, Shanghai, 201114

Patentee before: EMBEDWAY TECHNOLOGIES (SHANGHAI) Corp.