CN114003296A - BMC (baseboard management controller) firmware batch refreshing method, system, terminal and storage medium - Google Patents

BMC (baseboard management controller) firmware batch refreshing method, system, terminal and storage medium Download PDF

Info

Publication number
CN114003296A
CN114003296A CN202111234555.9A CN202111234555A CN114003296A CN 114003296 A CN114003296 A CN 114003296A CN 202111234555 A CN202111234555 A CN 202111234555A CN 114003296 A CN114003296 A CN 114003296A
Authority
CN
China
Prior art keywords
firmware
bmc
file
refreshing
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202111234555.9A
Other languages
Chinese (zh)
Inventor
王友富
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202111234555.9A priority Critical patent/CN114003296A/en
Publication of CN114003296A publication Critical patent/CN114003296A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Stored Programmes (AREA)

Abstract

The invention provides a BMC firmware batch refreshing method, a system, a terminal and a storage medium, comprising the following steps: acquiring all firmware needing to be refreshed of the BMC, and generating a firmware refreshing sequence; calling firmware files according to the firmware refreshing sequence; encrypting and packaging the called firmware file, and modifying the file name of the file package into a corresponding firmware name and a corresponding execution sequence; and sending the modified file packet to the BMC, and sending a refreshing instruction to the BMC. The invention can orderly refresh the BMC firmware in batches, completely avoids the risk of conflict of different firmware versions, realizes the real one-key refresh of all the firmware, improves the operation and maintenance efficiency, has strong reproducibility and expansibility, completely avoids the risk brought by the fact that a customer does not pay attention to the version collocation relationship when refreshing the firmware, enhances the safety, improves the operation and maintenance efficiency, and is suitable for various servers.

Description

BMC (baseboard management controller) firmware batch refreshing method, system, terminal and storage medium
Technical Field
The invention relates to the technical field of servers, in particular to a method, a system, a terminal and a storage medium for batch refreshing of BMC (baseboard management controller) firmware.
Background
With the update iteration of the technology, how to efficiently monitor the operating state of the server and record the operating log of the server becomes the key point for selecting the server by the client. As is known, the BMC is the most important firmware in the server capable of efficiently monitoring and recording the operating status thereof. Whether the BMC can operate stably is also one of the most important options for customers. One of the important functions of the BMC is to refresh the FWs of the respective firmware. Such as fw of BIOS/PSU/CPLD/VR, etc. The traditional refreshing mode is that the firmware is refreshed one by the BMC, and the efficiency is low. Moreover, the firmware has the problem of version collocation, if the version collocation relationship is not noticed, the problems of server operation after refreshing, downtime in severe cases and the like are possibly caused.
Disclosure of Invention
In view of the above disadvantages in the prior art, the present invention provides a method, a system, a terminal and a storage medium for batch refreshing BMC firmware, so as to solve the above technical problems.
In a first aspect, the present invention provides a BMC firmware batch refreshing method, including:
acquiring all firmware needing to be refreshed of the BMC, and generating a firmware refreshing sequence;
calling firmware files according to the firmware refreshing sequence;
encrypting and packaging the called firmware file, and modifying the file name of the file package into a corresponding firmware name and a corresponding execution sequence;
and sending the modified file packet to the BMC, and sending a refreshing instruction to the BMC.
Further, acquiring all firmware of the BMC that needs to be refreshed, and generating a firmware refresh sequence, including:
dividing the firmware according to whether the firmware needs to be restarted after being refreshed, and dividing the firmware which does not need to be restarted into priority;
and generating the refreshing sequence of different firmware with the same grade according to the incidence relation among the firmware, and summarizing the refreshing sequence of all the firmware to a refreshing sequence list.
Further, fetching the firmware file according to the firmware refreshing sequence includes:
sequentially downloading corresponding firmware files of the latest version from a firmware release platform through a network interface according to a firmware refreshing sequence;
and checking whether the collocation of the downloaded firmware files related to the firmware is in conflict or not according to the preset firmware association relation.
Further, encrypting and packaging the called firmware file, and modifying the file name header of the file package into a corresponding firmware name and a corresponding execution sequence, including:
and packaging the downloaded firmware file in an hpm encryption mode to obtain a file package in an hpm format, and adding fixed headers before and after the file package.
Further, the modified file packet is sent to the BMC, and a refresh instruction is sent to the BMC, including:
and after receiving the refreshing instruction, the BMC decompresses the file packets in sequence according to the sequence in the file names of the received file packets, and refreshes corresponding firmware by using the firmware files obtained after decompression.
In a second aspect, the present invention provides a BMC firmware batch refresh system, including:
the sequence generation unit is used for acquiring all firmware needing to be refreshed of the BMC and generating a firmware refreshing sequence;
the file calling unit is used for calling the firmware files according to the firmware refreshing sequence;
the file processing unit is used for encrypting and packaging the called firmware files and modifying the file names of the file packages into corresponding firmware names and corresponding execution sequences;
and the instruction sending unit is used for sending the modified file packet to the BMC and sending a refreshing instruction to the BMC.
Further, the order generation unit is configured to:
dividing the firmware according to whether the firmware needs to be restarted after being refreshed, and dividing the firmware which does not need to be restarted into priority;
and generating the refreshing sequence of different firmware with the same grade according to the incidence relation among the firmware, and summarizing the refreshing sequence of all the firmware to a refreshing sequence list.
Further, the file retrieving unit is configured to:
sequentially downloading corresponding firmware files of the latest version from a firmware release platform through a network interface according to a firmware refreshing sequence;
and checking whether the collocation of the downloaded firmware files related to the firmware is in conflict or not according to the preset firmware association relation.
Further, the file processing unit is configured to:
and packaging the downloaded firmware file in an hpm encryption mode to obtain a file package in an hpm format, and adding fixed headers before and after the file package.
Further, the instruction sending unit is configured to:
and after receiving the refreshing instruction, the BMC decompresses the file packets in sequence according to the sequence in the file names of the received file packets, and refreshes corresponding firmware by using the firmware files obtained after decompression.
In a third aspect, a terminal is provided, including:
a processor, a memory, wherein,
the memory is used for storing a computer program which,
the processor is used for calling and running the computer program from the memory so as to make the terminal execute the method of the terminal.
In a fourth aspect, a computer storage medium is provided having stored therein instructions that, when executed on a computer, cause the computer to perform the method of the above aspects.
The BMC firmware batch refreshing method, the system, the terminal and the storage medium have the advantages that the firmware batch refreshing can be executed by the BMC in sequence by customizing the firmware refreshing sequence and sending the firmware file to the BMC according to the refreshing sequence, and the conflict-free matching requirement among a plurality of firmware can be met. The invention can orderly refresh the BMC firmware in batches, completely avoids the risk of conflict of different firmware versions, realizes the real one-key refresh of all the firmware, improves the operation and maintenance efficiency, has strong reproducibility and expansibility, completely avoids the risk brought by the fact that a customer does not pay attention to the version collocation relationship when refreshing the firmware, enhances the safety, improves the operation and maintenance efficiency, and is suitable for various servers.
In addition, the invention has reliable design principle, simple structure and very wide application prospect.
Drawings
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present invention, the drawings used in the description of the embodiments or prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
FIG. 1 is a schematic flow diagram of a method of one embodiment of the invention.
FIG. 2 is a schematic block diagram of a system of one embodiment of the present invention.
Fig. 3 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a part of the embodiment of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The following explains key terms appearing in the present invention.
The BMC executes a server remote Management controller, which is called Basebard Management controller in English. The method can perform operations such as firmware upgrading, machine equipment checking and the like on the machine in a state that the machine is not started. Fully implementing IPMI functionality in a BMC requires a powerful 16-bit or 32-bit microcontroller as well as RAM for data storage, flash memory and firmware for non-volatile data storage, providing basic remote manageability in terms of secure remote restart, secure re-power-up, LAN alerts and system health monitoring. In addition to the basic IPMI function and system operation monitoring function, the mBMC enables selection and protection of BIOS flash devices by storing the previous BIOS using one of 2 flash memories. For example, when the system cannot be started after the remote BIOS is upgraded, the remote administrator can switch back to the BIOS image that worked before to start the system. Once BIOS is upgraded, BIOS image can be locked to prevent virus from invading it.
The I2C bus is a simple, bi-directional two-wire synchronous serial bus developed by Philips. It requires only two wires to transfer information between devices connected to the bus. The master device is used to initiate the bus to transfer data and to generate a clock to open up the devices that are transferring, when any addressed device is considered a slave device. If the host wants to send data to the slave device, the host addresses the slave device first, then actively sends the data to the slave device, and finally the host terminates the data transmission; the master device addresses the slave device first if the master device is to receive data from the slave device. The host is responsible for generating the timing clock and terminating the data transfer.
BIOS is an abbreviation of English "Basic Input Output System", and the name of Chinese after translation is "Basic Input Output System". It is a standard firmware interface in the industry for IBM PC compatible systems. It is a set of programs solidified on a ROM chip on the internal mainboard of computer, it stores the most important basic input and output program of computer, self-checking program after starting up and system self-starting program, it can read and write the specific information set by system from CMOS. Its primary function is to provide the lowest level, most direct hardware setup and control for the computer. In addition, the BIOS provides some system parameters to the operating system. The change of system hardware is hidden by BIOS, and programs use BIOS functions rather than directly control the hardware. Modern operating systems ignore the abstraction layer provided by the BIOS and directly control the hardware components.
A Central Processing Unit (CPU) is a final execution unit for information processing and program operation, and serves as an operation and control core of a computer system.
FIG. 1 is a schematic flow diagram of a method of one embodiment of the invention. The execution subject in fig. 1 may be a BMC firmware batch refresh system.
As shown in fig. 1, the method includes:
step 110, acquiring all firmware needing to be refreshed of the BMC, and generating a firmware refreshing sequence;
step 120, calling firmware files according to the firmware refreshing sequence;
step 130, encrypting and packaging the called firmware file, and modifying the file name of the file package into a corresponding firmware name and a corresponding execution sequence;
and step 140, sending the modified file package to the BMC, and sending a refreshing instruction to the BMC.
In order to facilitate understanding of the present invention, the following describes the BMC firmware batch refresh method provided by the present invention in further detail by using the principle of the BMC firmware batch refresh method of the present invention and combining the process of batch refreshing the BMC firmware in the embodiment.
Specifically, the BMC firmware batch refreshing method includes:
s1, acquiring all firmware needing to be refreshed of the BMC, and generating a firmware refreshing sequence.
Dividing the firmware according to whether the firmware needs to be restarted after being refreshed, and dividing the firmware which does not need to be restarted into priority; and generating the refreshing sequence of different firmware with the same grade according to the incidence relation among the firmware, and summarizing the refreshing sequence of all the firmware to a refreshing sequence list.
And S2, calling the firmware files according to the firmware refreshing sequence.
Sequentially downloading corresponding firmware files of the latest version from a firmware release platform through a network interface according to a firmware refreshing sequence; and checking whether the collocation of the downloaded firmware files related to the firmware is in conflict or not according to the preset firmware association relation.
And S3, encrypting and packaging the called firmware file, and modifying the file name of the file package into a corresponding firmware name and a corresponding execution sequence.
And packaging the downloaded firmware file in an hpm encryption mode to obtain a file package in an hpm format, and adding fixed headers before and after the file package.
And S4, sending the modified file package to the BMC, and sending a refreshing instruction to the BMC.
After the BMC receives the refreshing instruction, the file packets are decompressed in sequence according to the sequence in the file names of the received file packets, and corresponding firmware is refreshed by using the firmware files obtained after decompression.
In the method, the file transmission process and the BMC firmware refreshing process can be synchronously carried out, namely, the files are downloaded, packaged and transmitted one by one, and the BMC synchronously updates the firmware after receiving the file package, so that the firmware refreshing time is saved.
Specifically, the execution process of the method of the embodiment is as follows:
1) custom refresh sequence
Typedef struct{
uint8_t BMC
uint8_t BIOS
uint8_t MAIN_CPLD
uint8_t BP_F_CPLD
uint8_t BP_R_CPLD
uint8_t VR
uint8_t Reserved
uint8_t Reserved
}PACKED Inspur_flash_order
2) And packaging the firmware in an hpm encryption mode according to a custom sequence, and adding a fixed header to the front and the back of each firmware.
3) The packed total hpm image is uploaded to bmc under var directory.
4) A refresh command is executed. After the BMC receives the refreshing instruction, decompressing the hpm mirror image according to the previously added header under the var directory. And taking the single firmware fw, reading the version number from the firmware fw, comparing the version number with the currently running firmware version, and executing a refreshing action if the versions are not consistent. If so, skipping refresh.
In the traditional firmware refreshing mode, a single firmware is independently refreshed, and when a customer uses the firmware online, the firmware needing refreshing needs to be refreshed independently. Time and labor are wasted, and the maintenance is not good. Furthermore, there is a clear version matching relationship between the firmware, for example, a certain version of BIOS must match a certain version of BMC. If the client does not pay attention to the matching relationship of the versions in the upgrading process, great risk is brought to the operation of the server. The method for refreshing all the firmware by one key of the user-defined BMC, which is provided by the patent, can completely avoid the risk, really refresh all the firmware by one key and improve the operation and maintenance efficiency.
As shown in fig. 2, the system 200 includes:
a sequence generating unit 210, configured to acquire all firmware that needs to be refreshed of the BMC, and generate a firmware refresh sequence;
a file retrieving unit 220, configured to retrieve the firmware files according to the firmware refreshing sequence;
a file processing unit 230, configured to encrypt and package the called firmware file, and modify the file name of the file package into a corresponding firmware name and a corresponding execution order;
and the instruction sending unit 240 is configured to send the modified file package to the BMC, and send a refresh instruction to the BMC.
Optionally, as an embodiment of the present invention, the order generating unit is configured to:
dividing the firmware according to whether the firmware needs to be restarted after being refreshed, and dividing the firmware which does not need to be restarted into priority;
and generating the refreshing sequence of different firmware with the same grade according to the incidence relation among the firmware, and summarizing the refreshing sequence of all the firmware to a refreshing sequence list.
Optionally, as an embodiment of the present invention, the file retrieving unit is configured to:
sequentially downloading corresponding firmware files of the latest version from a firmware release platform through a network interface according to a firmware refreshing sequence;
and checking whether the collocation of the downloaded firmware files related to the firmware is in conflict or not according to the preset firmware association relation.
Optionally, as an embodiment of the present invention, the file processing unit is configured to:
and packaging the downloaded firmware file in an hpm encryption mode to obtain a file package in an hpm format, and adding fixed headers before and after the file package.
Optionally, as an embodiment of the present invention, the instruction sending unit is configured to:
and after receiving the refreshing instruction, the BMC decompresses the file packets in sequence according to the sequence in the file names of the received file packets, and refreshes corresponding firmware by using the firmware files obtained after decompression.
Fig. 3 is a schematic structural diagram of a terminal 300 according to an embodiment of the present invention, where the terminal 300 may be used to execute the BMC firmware batch refresh method according to the embodiment of the present invention.
Among them, the terminal 300 may include: a processor 310, a memory 320, and a communication unit 330. The components communicate via one or more buses, and those skilled in the art will appreciate that the architecture of the servers shown in the figures is not intended to be limiting, and may be a bus architecture, a star architecture, a combination of more or less components than those shown, or a different arrangement of components.
The memory 320 may be used for storing instructions executed by the processor 310, and the memory 320 may be implemented by any type of volatile or non-volatile storage terminal or combination thereof, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic disk or optical disk. The executable instructions in memory 320, when executed by processor 310, enable terminal 300 to perform some or all of the steps in the method embodiments described below.
The processor 310 is a control center of the storage terminal, connects various parts of the entire electronic terminal using various interfaces and lines, and performs various functions of the electronic terminal and/or processes data by operating or executing software programs and/or modules stored in the memory 320 and calling data stored in the memory. The processor may be composed of an Integrated Circuit (IC), for example, a single packaged IC, or a plurality of packaged ICs connected with the same or different functions. For example, the processor 310 may include only a Central Processing Unit (CPU). In the embodiment of the present invention, the CPU may be a single operation core, or may include multiple operation cores.
A communication unit 330, configured to establish a communication channel so that the storage terminal can communicate with other terminals. And receiving user data sent by other terminals or sending the user data to other terminals.
The present invention also provides a computer storage medium, wherein the computer storage medium may store a program, and the program may include some or all of the steps in the embodiments provided by the present invention when executed. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM) or a Random Access Memory (RAM).
Therefore, the invention can meet the conflict-free requirement of collocation among a plurality of firmware by customizing the firmware refreshing sequence and sending the firmware file to the BMC according to the refreshing sequence to enable the BMC to execute the firmware batch refreshing in sequence. The invention can orderly refresh the BMC firmware in batches, completely avoids the risk of conflict of different firmware versions, realizes the real one-key refresh of all the firmware and improves the operation and maintenance efficiency. The technical effects achieved by the present embodiment can be referred to the above description, and are not described herein again.
Those skilled in the art will readily appreciate that the techniques of the embodiments of the present invention may be implemented as software plus a required general purpose hardware platform. Based on such understanding, the technical solutions in the embodiments of the present invention may be embodied in the form of a software product, where the computer software product is stored in a storage medium, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and the like, and the storage medium can store program codes, and includes instructions for enabling a computer terminal (which may be a personal computer, a server, or a second terminal, a network terminal, and the like) to perform all or part of the steps of the method in the embodiments of the present invention.
The same and similar parts in the various embodiments in this specification may be referred to each other. Especially, for the terminal embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant points can be referred to the description in the method embodiment.
In the embodiments provided in the present invention, it should be understood that the disclosed system and method can be implemented in other ways. For example, the above-described system embodiments are merely illustrative, and for example, the division of the units is only one logical functional division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, systems or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
Although the present invention has been described in detail by referring to the drawings in connection with the preferred embodiments, the present invention is not limited thereto. Various equivalent modifications or substitutions can be made on the embodiments of the present invention by those skilled in the art without departing from the spirit and scope of the present invention, and these modifications or substitutions are within the scope of the present invention/any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A BMC firmware batch refreshing method is characterized by comprising the following steps:
acquiring all firmware needing to be refreshed of the BMC, and generating a firmware refreshing sequence;
calling firmware files according to the firmware refreshing sequence;
encrypting and packaging the called firmware file, and modifying the file name of the file package into a corresponding firmware name and a corresponding execution sequence;
and sending the modified file packet to the BMC, and sending a refreshing instruction to the BMC.
2. The method of claim 1, wherein obtaining all firmware of the BMC that needs to be refreshed and generating a firmware refresh sequence comprises:
dividing the firmware according to whether the firmware needs to be restarted after being refreshed, and dividing the firmware which does not need to be restarted into priority;
and generating the refreshing sequence of different firmware with the same grade according to the incidence relation among the firmware, and summarizing the refreshing sequence of all the firmware to a refreshing sequence list.
3. The method of claim 1, wherein retrieving firmware files according to the firmware refresh order comprises:
sequentially downloading corresponding firmware files of the latest version from a firmware release platform through a network interface according to a firmware refreshing sequence;
and checking whether the collocation of the downloaded firmware files related to the firmware is in conflict or not according to the preset firmware association relation.
4. The method of claim 3, wherein the step of cryptographically packaging the called firmware file and modifying the file name header of the file package to a corresponding firmware name and a corresponding execution order comprises:
and packaging the downloaded firmware file in an hpm encryption mode to obtain a file package in an hpm format, and adding fixed headers before and after the file package.
5. The method of claim 1, wherein sending the modified bundle to the BMC and sending a refresh command to the BMC comprises:
and after receiving the refreshing instruction, the BMC decompresses the file packets in sequence according to the sequence in the file names of the received file packets, and refreshes corresponding firmware by using the firmware files obtained after decompression.
6. A BMC firmware batch refresh system, comprising:
the sequence generation unit is used for acquiring all firmware needing to be refreshed of the BMC and generating a firmware refreshing sequence;
the file calling unit is used for calling the firmware files according to the firmware refreshing sequence;
the file processing unit is used for encrypting and packaging the called firmware files and modifying the file names of the file packages into corresponding firmware names and corresponding execution sequences;
and the instruction sending unit is used for sending the modified file packet to the BMC and sending a refreshing instruction to the BMC.
7. The system of claim 6, wherein the order generation unit is configured to:
dividing the firmware according to whether the firmware needs to be restarted after being refreshed, and dividing the firmware which does not need to be restarted into priority;
and generating the refreshing sequence of different firmware with the same grade according to the incidence relation among the firmware, and summarizing the refreshing sequence of all the firmware to a refreshing sequence list.
8. The system of claim 6, wherein the file retrieval unit is configured to:
sequentially downloading corresponding firmware files of the latest version from a firmware release platform through a network interface according to a firmware refreshing sequence;
and checking whether the collocation of the downloaded firmware files related to the firmware is in conflict or not according to the preset firmware association relation.
9. A terminal, comprising:
a processor;
a memory for storing instructions for execution by the processor;
wherein the processor is configured to perform the method of any one of claims 1-5.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-5.
CN202111234555.9A 2021-10-22 2021-10-22 BMC (baseboard management controller) firmware batch refreshing method, system, terminal and storage medium Withdrawn CN114003296A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111234555.9A CN114003296A (en) 2021-10-22 2021-10-22 BMC (baseboard management controller) firmware batch refreshing method, system, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111234555.9A CN114003296A (en) 2021-10-22 2021-10-22 BMC (baseboard management controller) firmware batch refreshing method, system, terminal and storage medium

Publications (1)

Publication Number Publication Date
CN114003296A true CN114003296A (en) 2022-02-01

Family

ID=79923776

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111234555.9A Withdrawn CN114003296A (en) 2021-10-22 2021-10-22 BMC (baseboard management controller) firmware batch refreshing method, system, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN114003296A (en)

Similar Documents

Publication Publication Date Title
CN107528718B (en) Method, device and system for acquiring resources
CN109683968B (en) Switch quick start method, switch and storage medium
CN112235136B (en) Network file system backup method, system, terminal and storage medium
CN111669284B (en) OpenStack automatic deployment method, electronic device, storage medium and system
WO2017185954A1 (en) Method, host, and system for implementing usb device management
CN112463239A (en) BIOS and BMC interaction option default value modification method, system, terminal and storage medium
CN114257551A (en) Distributed current limiting method and system and storage medium
CN112527397A (en) Method and device for modifying basic input output system options and computer equipment
CN114003445B (en) BMC I2C monitoring function test method, system, terminal and storage medium
CN114385251A (en) Operating system booting method, system, terminal and storage medium based on memory
CN114020340A (en) Server system and data processing method thereof
CN114003296A (en) BMC (baseboard management controller) firmware batch refreshing method, system, terminal and storage medium
CN113238778B (en) Method, system, equipment and medium for upgrading BIOS firmware
CN109656674B (en) Computer equipment, virtualization chip and data transmission method
CN114968386A (en) Equipment information management method, device and equipment of electronic equipment
CN114253573A (en) PCIe device firmware batch upgrading method, system, terminal and storage medium
CN114443150B (en) Method, system, terminal and storage medium for synchronizing factory information of switch
CN114564237B (en) Method, system, terminal and storage medium for expanding disk array card connection link
CN111338624A (en) Data processing method and related equipment
CN113835762B (en) Method and system for updating default configuration of hard disk backboard
CN114115977B (en) BMC mirror image construction method, system, terminal and storage medium
CN114115955B (en) Method, system, terminal and storage medium for upgrading FPGA firmware of server resource box
CN117519836B (en) Method and device for controlling starting of server and server
US11789821B1 (en) Out-of-band method to change boot firmware configuration
CN114281799A (en) PCIe equipment asset information dynamic management method, system, terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20220201