CN115016822A - BMC (baseboard management controller) firmware updating method, device, equipment and computer readable storage medium - Google Patents
BMC (baseboard management controller) firmware updating method, device, equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN115016822A CN115016822A CN202210868272.8A CN202210868272A CN115016822A CN 115016822 A CN115016822 A CN 115016822A CN 202210868272 A CN202210868272 A CN 202210868272A CN 115016822 A CN115016822 A CN 115016822A
- Authority
- CN
- China
- Prior art keywords
- bmc
- original
- monitoring
- flashing
- test
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 62
- 238000012544 monitoring process Methods 0.000 claims abstract description 63
- 238000012360 testing method Methods 0.000 claims abstract description 59
- 238000004590 computer program Methods 0.000 claims description 11
- 238000011010 flushing procedure Methods 0.000 claims 1
- 238000012423 maintenance Methods 0.000 abstract description 8
- 238000007726 management method Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 6
- 239000000306 component Substances 0.000 description 5
- 238000011161 development Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 238000011022 operating instruction Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000001680 brushing effect Effects 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000008358 core component Substances 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
Abstract
The invention discloses a BMC firmware updating method, which is applied to the field of server maintenance and comprises the following steps: monitoring the original BMC; judging whether the original BMC has a fault according to a monitoring result; when the original BMC fails, the information stored in the test BMC is flashed into the original BMC. According to the method, the original BMC is monitored, the running state of the original BMC is determined, when the original BMC fails, information stored in the tested BMC is written into the original BMC in time, and compared with the prior art that a system OS needs to be logged in to be updated through system software, or Flash is detached to be placed in a specific burner through a burner to be burned, the BMC firmware updating method provided by the application can directly recover the BMC firmware without manual intervention and is completely independent of the damage condition of the BMC firmware, so that the method for updating the BMC firmware is more convenient and flexible. The invention also provides a BMC firmware updating system, equipment and a computer readable storage medium.
Description
Technical Field
The present invention relates to the field of server maintenance, and in particular, to a method, an apparatus, a device, and a computer-readable storage medium for updating a BMC firmware.
Background
The bmc (baseboard Management controller), which is a core component in a server Management system defined by an IPMI (intelligent Platform Management interface) protocol, is Management software independent of the system, is based on an IPMI specification of an industry standard, and is used for performing operations such as remote Management, firmware upgrade, system monitoring, and the like on a server.
With the rapid development of computer technology, the monitoring and management service role of BMC (baseboard management controller) in the server is also getting bigger and higher, and the status in the server industry is getting higher, and the attack layer for BMC firmware is endless, and various attacks can cause BMC firmware to malfunction. Therefore, during the use of the server, no matter in the operation maintenance or development process, the situation that the BMC cannot be started cannot be avoided. In recent years, due to the influence of epidemic situations, remote office is also normalized, and at the moment, when the BMC firmware is crashed and cannot be recovered, the traditional recovery method is to log in a system operating system and update the operating system through system software, or to disassemble a Flash (memory chip) through a burner and put the Flash into a specific burner for burning. The two traditional methods have strong limitations, depend on an operating system, and the operating system has login authority and read-write authority, in an operation and maintenance time period, due to the consideration of system and data safety, a client usually does not allow the operation and maintenance to enter the operating system, and is more impossible to load burning software in the operating system, while a machine in a development stage usually does not have the operating system, even if the operating system is installed, the operating system may be in a shutdown state when the BMC is crashed, and cannot be started remotely, Flash is detached to be burned, and the burning is difficult to conform to the main basic tone of remote office, and the method is very dependent on human intervention. Or the backup mirror image is stored in the BMC or the machine in advance, and the backup mirror image is not flexible enough.
Therefore, in order to make up for the deficiency that the prior art cannot remotely upgrade and quickly recover the BMC firmware, it is important to provide a method for quickly, simply and flexibly recovering the BMC firmware.
Disclosure of Invention
In view of this, the present invention provides a BMC firmware updating method, apparatus, device and computer readable storage medium, which solve the problems of inflexible, not simple and not fast BMC firmware updating in the prior art.
In order to solve the above technical problem, the present invention provides a BMC firmware updating method, including:
monitoring the original BMC;
judging whether the original BMC has a fault according to a monitoring result;
when the original BMC fails, the information stored in the test BMC is flashed into the original BMC.
Optionally, when the original BMC fails, the method further includes:
and reading and storing the storage information of the original BMC.
Optionally, after the information stored in the test BMC is flashed to the original BMC, the method further includes:
obtaining the duration time after the flash is finished;
when the duration time exceeds a preset time threshold value, and the original BMC after the flashing cannot normally run;
and performing the step of flashing the information stored in the test BMC into the original BMC again.
Optionally, the BMC firmware updating method further includes:
counting the number of times of flashing the information stored in the test BMC into the original BMC;
and when the number of times exceeds the preset number of times of flashing, pausing the step of flashing the information stored in the test BMC into the original BMC, and outputting prompt information which cannot be flashed normally.
Optionally, the monitoring the original BMC includes:
monitoring the original BMC through an indicator light;
when the indicator light flashes, the original BMC does not fail;
when the indicator light is normally on, the original BMC fails.
Optionally, before monitoring the original BMC, the method further includes:
when a reading instruction is received, reading the original BMC;
and flashing the content in the original BMC into the test BMC.
Optionally, the monitoring the original BMC includes:
and monitoring the original BMC according to a preset period.
The present invention also provides a BMC firmware update apparatus, including:
the monitoring module is used for monitoring the original BMC;
the judging module is used for judging whether the original BMC has a fault according to a monitoring result;
and the updating module is used for flashing the information stored in the test BMC into the original BMC when the original BMC fails.
The present invention also provides a BMC firmware update device, including:
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of the BMC firmware update method of any of the above.
The invention further provides a computer readable storage medium, wherein a computer program is stored on the computer readable storage medium, and when being executed by a processor, the computer program realizes the steps of any BMC firmware updating method.
Therefore, the original BMC is monitored through the method; judging whether the original BMC has a fault according to a monitoring result; when the original BMC fails, the information stored in the test BMC is flashed into the original BMC. Compared with the prior art that the OS is required to be logged in to the system to be updated through system software, or Flash is detached to be placed in a specific burner to be burned through the burner, the prior art depends on an operating system too much, in an operation and maintenance time period, due to the consideration of system and data safety, a customer usually does not allow the operation and maintenance to enter the operating system, and is more unlikely to install burning software in the operating system, while a machine in a development stage is usually not provided with the operating system, even if the operating system is installed, the operating system may be in a shutdown state when the BMC crashes, and cannot be remotely started, the Flash is detached to be burned, and the Flash is difficult to conform to the main debug of remote office, and the intervention of a person is too dependent. The BMC firmware updating method provided by the application can directly recover without manual intervention, does not depend on the damage condition of the BMC firmware at all, only monitors the original BMC, and directly writes the information stored in the test BMC into the original BMC when the original BMC is found to have a fault. Therefore, the method for updating the BMC firmware is more convenient and flexible.
In addition, the invention also provides a BMC firmware updating device, equipment and a computer readable storage medium, and the BMC firmware updating device, the equipment and the computer readable storage medium also have the beneficial effects.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a BMC firmware updating method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a BMC firmware updating apparatus according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a BMC firmware update device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart illustrating a BMC firmware updating method according to an embodiment of the present invention. The method can comprise the following steps:
s100, monitoring an original BMC;
the embodiment does not limit the specific method for monitoring the original BMC, as long as the operating state of the original BMC can be monitored. For example, monitoring the original BMC by monitoring the BMC operation status fed back by a Host-CPU (Host central processing unit) in the Host; or monitoring the running state of the original BMC by monitoring the heartbeat of the original BMC, namely monitoring the original BMC by an indicator light, wherein when the indicator light flashes, the original BMC indicates that the heartbeat exists, no fault occurs in the original BMC at the moment, and when the indicator light is normally on, the heartbeat is not detected, and the original BMC fails at the moment.
S101, judging whether the original BMC has a fault according to a monitoring result;
in this embodiment, a specific means for determining whether the original BMC fails according to the monitoring result is not limited, and it is only required to determine whether the original BMC fails according to the monitoring result. For example, if a feedback message sent by the original BMC is not received after the dog feeding message is sent, the Host-CPU (Host central processing unit) determines that the original BMC has a fault, and then determines whether the original BMC has a fault by monitoring a result determined by the Host-CPU (Host central processing unit). Or monitoring the original BMC by monitoring the state of the indicator light, determining that the original BMC has no fault when the indicator light is monitored to be in a flashing state, and determining that the original BMC has a fault when the indicator light is monitored to be in a normally-on state; for example, when the status of the indicator light is monitored to be green light flashing, it is determined that the original BMC is not in fault, when the status of the indicator light is monitored to be green light, it is determined that the original BMC is in fault, and when the status of the indicator light is monitored to be red light, it is determined that the original BMC is in flashing.
S102, when the original BMC has a fault, the information stored in the test BMC is written into the original BMC in a flashing mode.
This embodiment does not limit the type of information stored in the test BMC as long as it can be flashed into the original BMC. For example, the information stored in the test BMC may be information before the original BMC fails; or the test BMC does not store any information, and the blank information is written into the original BMC in a flashing mode at the moment, namely the information stored in the original BMC is erased through the blank test BMC; or the information stored in the test BMC is information required for running the monitoring management service corresponding to the original BMC and is further written into the blank original BMC, namely the test BMC can write in the blank original BMC. The embodiment also does not limit the time for flashing the information stored in the test BMC to the original BMC, for example, when the original BMC fails, the state of flashing the information stored in the test BMC to the original BMC is automatically switched to, for example, when a flash instruction is received, the information stored in the test BMC is flashed to the original BMC. This embodiment does not define what should be done when the original BMC does not fail. For example, when the original BMC does not fail, performing flashing of information stored in the test BMC to the original BMC is prohibited; or when the original BMC is not in fault, executing some operations of remote management, firmware upgrade, system monitoring and the like of the original BMC on the server. In the implementation, after the information stored in the test BMC is flashed to the original BMC, the automatic reset of the original BMC can be realized, namely, the running state of the original BMC is automatically switched.
Based on the above embodiment, the embodiment of the present invention monitors the original BMC; judging whether the original BMC has a fault according to a monitoring result; when the original BMC fails, the information stored in the test BMC is flashed into the original BMC. Compared with the technical scheme that the Flash needs to be detached and placed in the specific burner for burning through the burner in the prior art, the Flash testing method and the Flash testing device only monitor the original BMC, when the original BMC is found to be in fault, the storage information in the tested BMC is written into the original BMC in a flashing mode, and therefore the original BMC can be recovered to a normal state as soon as possible. Therefore, the technical scheme provided by the embodiment of the invention can quickly restore the damaged original BMC firmware in time without manual intervention.
Based on the above embodiment, further to facilitate subsequent analysis of the reason that the original BMC firmware fails, when the original BMC fails, the method may further include:
and reading and storing the storage information of the original BMC.
The embodiment does not limit the location where the storage information of the original BMC is read and stored, as long as the storage information of the original BMC can be read and stored. The embodiment reads and stores the storage information of the original BMC when the original BMC fails, so that the reason for the failure of the original BMC is conveniently analyzed, the embodiment can facilitate problem analysis and positioning and development, operation and maintenance, and further avoid the failure of the original BMC again.
Based on the above embodiment, further in order to improve the success rate of the flashing, after the information stored in the test BMC is flashed to the original BMC, the method may further include:
obtaining the duration time after the flash is finished;
when the duration time exceeds a preset time threshold value, and the original BMC after the flashing cannot normally run;
and performing the step of flashing the information stored in the test BMC into the original BMC again.
The duration after the flashing is completed in this embodiment refers to the duration after the stored information is completely flashed to the original BMC by the test BMC. The embodiment does not limit the specific value of the preset time threshold, and the time required by the restart of the original BMC may be limited. For example, it may be 4 minutes, 5 minutes, 6 minutes, 7 minutes, or the like. In this embodiment, the specific time for determining the running state of the original BMC after the flash is not limited to the specific time after the preset time threshold. For example, if the original BMC after the flash is found to be incapable of operating normally after 5 minutes, the step of flashing the information stored in the test BMC to the original BMC needs to be continuously executed; or after the flash is finished for 4 minutes, if the original BMC after the flash cannot normally run, the step of writing the information stored in the test BMC into the original BMC needs to be continuously executed; or when a reset signal is received after the flashing is finished, detecting whether the original BMC after the flashing can normally operate or not after a preset time threshold value, and if the original BMC after the flashing can not normally operate and the flashing is not successful, executing the step of flashing the information stored in the test BMC into the original BMC again; or after the flash is finished, automatically resetting, and further detecting whether the original BMC after the flash can normally operate within a preset time threshold, wherein if the original BMC after the flash cannot normally operate, the flash is not successful, and the step of flashing the information stored in the test BMC into the original BMC needs to be executed again. This embodiment does not limit the operations that the original BMC after the flush may need to perform after the normal operation after the preset time threshold is exceeded. For example, when the original BMC after flashing exceeds the preset time threshold can normally operate, the prompt message is sent to prompt the user that the original BMC after flashing can be normally used, or no message is sent, and the corresponding operation executed when the original BMC does not fail is directly executed.
Based on the foregoing embodiment, further to prevent the problem that the original BMC cannot be restored by the flush, which results in the flush being always performed and affects the efficiency of restoring the original BMC firmware, the BMC firmware updating method may further include:
counting the number of times of flashing the information stored in the test BMC into the original BMC;
and when the number of times exceeds the preset flashing number of times, suspending the step of flashing the information stored in the tested BMC into the original BMC, and outputting prompt information which cannot be flashed normally.
In this embodiment, specific values of the preset number of times of flashing are not limited, for example, the preset number of times of flashing is 5 times, the preset number of times of flashing is 3 times, the preset number of times of flashing is 4 times, and the like. The embodiment also does not limit the specific type of the prompt message which cannot be normally swiped and output, and for example, the prompt message which cannot be normally swiped may be prompted in a text form, or the prompt message which cannot be normally swiped may be prompted in a vibration form, or the prompt message which cannot be normally swiped may be prompted in a voice form.
Based on the above embodiment, further to facilitate monitoring the operating state of the original BMC and to discover a fault in time, the monitoring the original BMC may include:
monitoring the original BMC through an indicator light;
when the indicator light flashes, the original BMC does not fail;
when the indicator light is normally on, the original BMC fails.
This embodiment does not limit the specific type of indicator light, for example, when the green light flashes, it represents that the original BMC is not malfunctioning, and when the green light is constantly on, it represents that the original BMC is malfunctioning. Or when the red light flashes, the original BMC is not in fault, and when the red light is normally on, the original BMC is in fault.
Based on the above embodiment, further to accelerate the rate of updating the original BMC by the logging test BMC, before monitoring the original BMC, the method may further include:
when a reading instruction is received, reading the original BMC;
and flashing the content in the original BMC into the test BMC.
In this embodiment, the specific content that is flashed to the test BMC is not limited, and the user may flash the content in the original BMC to the test BMC according to the user's needs.
Based on the above embodiment, further to timely and quickly find that the original BMC firmware has a problem, the monitoring the original BMC may include:
and monitoring the original BMC according to a preset period.
The embodiment does not limit the specific time of the preset period. Such as 1 second, 2 seconds, 3 seconds, etc.
In summary, based on the above embodiments, the BMC firmware updating method provided in the embodiments of the present invention can quickly and flexibly update the BMC firmware without manual intervention. In addition, according to the BMC firmware updating method provided by the embodiment, when the original BMC firmware fails, the storage information of the original BMC can be read and stored, so that the reason why the original BMC firmware fails is further conveniently and accurately analyzed; and when the time exceeds a preset time threshold, the original BMC after the flashing cannot normally run; and performing the step of flashing the information stored in the test BMC into the original BMC again. The situation that one-time flash writing can not be successfully performed is further prevented, and the success rate of flash writing is improved through multiple times of flash writing. Further, in this embodiment, the number of times of flashing the information stored in the test BMC to the original BMC is counted, and when the number of times exceeds the preset number of times of flashing, the step of flashing the information stored in the test BMC to the original BMC is suspended, and a prompt message that the flashing cannot be performed normally is output. The method prevents the fault of the original BMC from being solved by the brushing of the information stored in the tested BMC, so that endless brushing is caused, and the prompt information which cannot be brushed normally is output; and further this embodiment monitors the original BMC through indicator lights; when the indicator light flashes, the original BMC does not fail; when the indicator light is normally on, the original BMC goes wrong. By the method, the fault of the original BMC can be quickly and simply found; further, this embodiment reads the original BMC when receiving a read instruction; and flashing the content in the original BMC into the test BMC. Before the original BMC is updated by using the test BMC, the content in the original BMC is written into the test BMC in a flashing mode, so that the subsequent use of the test BMC for recovering the original BMC is more accurate and faster. Therefore, the BMC firmware updating method provided by the embodiment of the invention can be fast, simple and flexible, and can restore the original BMC without manual intervention.
In the following, the BMC firmware updating apparatus provided by the embodiment of the present invention is introduced, and the BMC firmware updating apparatus described below and the BMC firmware updating method described above may be referred to correspondingly.
Specifically, referring to fig. 2, fig. 2 is a schematic structural diagram of a BMC firmware updating apparatus according to an embodiment of the present invention, which may include:
a monitoring module 100 for monitoring the original BMC;
a judging module 200, configured to judge whether the original BMC fails according to a monitoring result;
an update module 300, configured to flush information stored in the test BMC to the original BMC when the original BMC fails.
Based on the above embodiment, the BMC firmware updating apparatus may further include:
and the storage module is used for reading and storing the storage information of the original BMC.
Based on the above embodiment, after the updating module 300, the method may further include:
the duration acquisition module is used for acquiring the duration after the flash is finished;
the first judgment module is used for judging whether the duration time exceeds a preset time threshold value or not, and if so, the original BMC after the flashing cannot normally run;
and the continuous flashing module is used for executing the step of flashing the information stored in the test BMC to the original BMC again.
Based on the above embodiment, the BMC firmware updating apparatus may further include:
the flash frequency counting module is used for counting the frequency of flashing the information stored in the tested BMC into the original BMC;
and the prompt module is used for suspending the step of flashing the information stored in the test BMC into the original BMC when the number of times exceeds the preset flashing number, and outputting prompt information which cannot be flashed normally.
Based on the above embodiments, the monitoring module 100 may include:
the indicator light detection unit is used for monitoring the original BMC through the indicator light;
the indicator light flashing unit is used for indicating that the original BMC has no fault when the indicator light flashes;
and the indicating lamp normally-on unit is used for enabling the original BMC to have a fault when the indicating lamp is normally on.
Based on the above embodiment, before the monitoring module 100, the method may further include:
the reading module is used for reading the original BMC when receiving a reading instruction;
and the test BMC flashing module is used for flashing the content in the original BMC into the test BMC.
Based on the above embodiments, the monitoring module 100 may include:
and the period monitoring unit is used for monitoring the original BMC according to a preset period.
The embodiment of the invention provides a BMC firmware updating device, which comprises: a monitoring module 100 for monitoring the original BMC; a judging module 200, configured to judge whether the original BMC fails according to a monitoring result; an update module 300, configured to flush information stored in the test BMC to the original BMC when the original BMC fails. The device detects the state of the original BMC through the monitoring module 100, and when the judgment module 200 finds that the BMC firmware has a fault according to the detection result, the updating module 300 can use the test BMC to write the original BMC in a flashing manner in time. Therefore, the BMC firmware updating device provided in the embodiment of the present invention can utilize the monitoring module 100, the determining module 200, and the updating module 300 to timely, conveniently, and flexibly implement the update without manual intervention on the original BMC firmware, thereby solving the technical problem that the prior art needs human intervention or the update is not flexible enough.
In the following, the BMC firmware update device provided by the embodiment of the present invention is introduced, and the BMC firmware update device described below and the BMC firmware update method described above may be referred to correspondingly.
Referring to fig. 3, fig. 3 is a schematic structural diagram of a BMC firmware update device according to an embodiment of the present invention, which may include:
a memory 10 for storing a computer program;
the processor 20 is configured to execute a computer program to implement the BMC firmware updating method.
As shown in fig. 3, a schematic structural diagram of the BMC firmware update apparatus may include: memory 10, processor 20, communication interface 31 and communication bus 32. The memory 10, the processor 20 and the communication interface 31 all communicate with each other via a communication bus 32.
In the embodiment of the present invention, the memory 10 is used for storing one or more programs, the program may include program codes, the program codes include computer operation instructions, and in the embodiment of the present application, the memory 10 may store a program for implementing the following functions:
monitoring the original BMC;
judging whether the original BMC has a fault according to a monitoring result;
when the original BMC fails, the information stored in the test BMC is flashed into the original BMC.
In one possible implementation, the memory 10 may include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created during use.
In addition, memory 10 may include both read-only memory and random access memory, and provides instructions and data to the processor. The portion of memory may also include NVRAM. The memory stores an operating system and operating instructions, executable modules or data structures, or subsets thereof, or expanded sets thereof, wherein the operating instructions may include various operating instructions for performing various operations. The operating system may include various system programs for performing various basic tasks and for handling hardware-based tasks.
The processor 20 may be a Central Processing Unit (CPU), an application specific integrated circuit, a digital signal processor, a field programmable gate array, or other programmable logic device, and the processor 20 may be a microprocessor or any conventional processor. Processor 20 may call a program stored in memory 10. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The processor described above may be a general purpose processor, a DSP, an ASIC, an FPGA or other programmable logic device, discrete gate or transistor logic device, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The communication interface 31 may be an interface of a communication module for connecting with other devices or systems.
Of course, it should be noted that the structure shown in fig. 3 does not constitute a limitation of the BMC firmware update device in the embodiment of the present application, and in practical applications, the BMC firmware update device may include more or less components than those shown in fig. 3, or some components in combination.
In the following, the computer-readable storage medium provided by the embodiment of the present invention is introduced, and the computer-readable storage medium described below and the BMC firmware updating method described above may be referred to correspondingly.
The invention further provides a computer-readable storage medium, wherein a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the BMC firmware updating method are implemented.
The computer-readable storage medium may include: various media capable of storing program codes, such as a usb disk, a portable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the components and steps of the various examples have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
Finally, it should also be noted that, herein, relationships such as first and second, etc., are intended only to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
The BMC firmware updating method, apparatus, device and computer-readable storage medium provided by the present invention are described in detail above, and a specific example is applied in the description to explain the principle and the implementation of the present invention, and the description of the above embodiment is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.
Claims (10)
1. A BMC firmware update method, comprising:
monitoring the original BMC;
judging whether the original BMC has a fault or not according to a monitoring result;
when the original BMC fails, the information stored in the test BMC is flashed into the original BMC.
2. The BMC firmware update method of claim 1, further comprising, when the original BMC fails:
and reading and storing the storage information of the original BMC.
3. The BMC firmware update method of claim 1, wherein after flushing the information stored in the test BMC to the original BMC, further comprising:
obtaining the duration time after the flash is finished;
when the duration time exceeds a preset time threshold value and the original BMC after the flash writing cannot normally run;
and performing the step of flashing the information stored in the test BMC into the original BMC again.
4. The BMC firmware update method of claim 3, further comprising:
counting the number of times of flashing the information stored in the test BMC into the original BMC;
and when the number of times exceeds the preset number of times of flashing, pausing the step of flashing the information stored in the test BMC into the original BMC, and outputting prompt information which cannot be flashed normally.
5. The BMC firmware update method of any of claims 1 to 5, wherein the monitoring the original BMC comprises:
monitoring the original BMC through an indicator light;
when the indicator light flashes, the original BMC does not fail;
when the indicator light is normally on, the original BMC fails.
6. The BMC firmware update method of claim 1, wherein prior to monitoring the original BMC, further comprising:
when a reading instruction is received, reading the original BMC;
and flashing the content in the original BMC into the test BMC.
7. The BMC firmware update method of claim 1, wherein the monitoring the original BMC includes:
and monitoring the original BMC according to a preset period.
8. A BMC firmware update apparatus, comprising:
the monitoring module is used for monitoring the original BMC;
the judging module is used for judging whether the original BMC has a fault according to a monitoring result;
and the updating module is used for flashing the information stored in the test BMC into the original BMC when the original BMC fails.
9. A BMC firmware update device, comprising:
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of the BMC firmware update method of any of claims 1 to 7.
10. A computer-readable storage medium, having stored thereon a computer program which, when executed by a processor, carries out the steps of the BMC firmware update method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210868272.8A CN115016822A (en) | 2022-07-22 | 2022-07-22 | BMC (baseboard management controller) firmware updating method, device, equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210868272.8A CN115016822A (en) | 2022-07-22 | 2022-07-22 | BMC (baseboard management controller) firmware updating method, device, equipment and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115016822A true CN115016822A (en) | 2022-09-06 |
Family
ID=83080616
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210868272.8A Pending CN115016822A (en) | 2022-07-22 | 2022-07-22 | BMC (baseboard management controller) firmware updating method, device, equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115016822A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105589712A (en) * | 2015-08-24 | 2016-05-18 | 杭州昆海信息技术有限公司 | BMC module updating method and apparatus |
CN109976949A (en) * | 2019-03-28 | 2019-07-05 | 苏州浪潮智能科技有限公司 | A kind of BMC failure mirror image rollback method for refreshing, device, terminal and storage medium |
CN112433769A (en) * | 2020-11-05 | 2021-03-02 | 苏州浪潮智能科技有限公司 | BMC starting method and device, computer equipment and storage medium |
CN113778756A (en) * | 2021-09-16 | 2021-12-10 | 浪潮商用机器有限公司 | Fault recovery method, device, equipment and medium for BMC (baseboard management controller) firmware |
-
2022
- 2022-07-22 CN CN202210868272.8A patent/CN115016822A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105589712A (en) * | 2015-08-24 | 2016-05-18 | 杭州昆海信息技术有限公司 | BMC module updating method and apparatus |
CN109976949A (en) * | 2019-03-28 | 2019-07-05 | 苏州浪潮智能科技有限公司 | A kind of BMC failure mirror image rollback method for refreshing, device, terminal and storage medium |
CN112433769A (en) * | 2020-11-05 | 2021-03-02 | 苏州浪潮智能科技有限公司 | BMC starting method and device, computer equipment and storage medium |
CN113778756A (en) * | 2021-09-16 | 2021-12-10 | 浪潮商用机器有限公司 | Fault recovery method, device, equipment and medium for BMC (baseboard management controller) firmware |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11360842B2 (en) | Fault processing method, related apparatus, and computer | |
JP6291248B2 (en) | Firmware upgrade error detection and automatic rollback | |
CN111324192A (en) | System board power supply detection method, device, equipment and storage medium | |
CN106789306B (en) | Method and system for detecting, collecting and recovering software fault of communication equipment | |
CN117251333A (en) | Method, device, equipment and storage medium for acquiring hard disk information | |
CN111048139A (en) | Storage medium detection method, device, equipment and readable storage medium | |
CN113672306B (en) | Server component self-checking abnormity recovery method, device, system and medium | |
CN114640709A (en) | Edge node processing method, device and medium | |
WO2024119787A1 (en) | Method and apparatus for amd server system installation power-off processing, device and medium | |
CN113742120A (en) | Method, system, device and medium for kdump triggering | |
CN106406963B (en) | Initialization method and device of Linux system | |
CN111124785B (en) | Method, device, equipment and storage medium for hard disk fault detection | |
CN116719657A (en) | Firmware fault log generation method, device, server and readable medium | |
CN115098294B (en) | Abnormal event processing method, electronic equipment and management terminal | |
CN115016822A (en) | BMC (baseboard management controller) firmware updating method, device, equipment and computer readable storage medium | |
CN114153503A (en) | BIOS control method, device and medium | |
CN114003426A (en) | Fault processing method and system and electronic equipment | |
CN111400094A (en) | Method, device, equipment and medium for restoring factory settings of server system | |
CN111539044A (en) | Server power firmware write protection control method, device, equipment and storage medium | |
CN113849432B (en) | Server firmware data storage method, starting method, device, equipment and medium | |
CN115858224A (en) | Method, apparatus, device, medium and product for triggering watchdog reset | |
CN118838539A (en) | Slow disk processing method and device, storage medium and electronic equipment | |
CN113836035A (en) | Battery management system testing method and device and electronic equipment | |
CN114840409A (en) | Vehicle machine exception handling method, storage medium, electronic device and handling system | |
CN118467225A (en) | Log dump method and device based on trusted system, electronic equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |