CN116578316A - Firmware updating method, device, server and storage medium of equipment - Google Patents

Firmware updating method, device, server and storage medium of equipment Download PDF

Info

Publication number
CN116578316A
CN116578316A CN202310426205.5A CN202310426205A CN116578316A CN 116578316 A CN116578316 A CN 116578316A CN 202310426205 A CN202310426205 A CN 202310426205A CN 116578316 A CN116578316 A CN 116578316A
Authority
CN
China
Prior art keywords
firmware update
mctp
firmware
bmc
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310426205.5A
Other languages
Chinese (zh)
Inventor
张添程
张苗苗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hexin Technology Co ltd
Original Assignee
Hexin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hexin Technology Co ltd filed Critical Hexin Technology Co ltd
Priority to CN202310426205.5A priority Critical patent/CN116578316A/en
Publication of CN116578316A publication Critical patent/CN116578316A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/082Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The application relates to a firmware updating method, a device, a server and a storage medium of equipment, in particular to the technical field of servers. The method comprises the following steps: establishing an MCTP communication connection with a target device; receiving a firmware update request sent by a remote control terminal logging in the BMC; and responding to the firmware update request, and indicating the target equipment to perform firmware update based on the MCTP communication connection. Based on the technical scheme provided by the application, the firmware of the equipment can be remotely updated in a unified and stable mode, so that the limitation of manufacturers and architecture platform systems is eliminated, unnecessary environment-dependent support is saved, and the design flexibility of the whole system is improved.

Description

Firmware updating method, device, server and storage medium of equipment
Technical Field
The present application relates to the field of server technologies, and in particular, to a method and an apparatus for updating firmware of a device, a server, and a storage medium.
Background
Conventionally, when firmware of a device is updated, there are often differences in updating tools and updating modes based on different vendors and different architecture platform systems.
Therefore, a technical solution is needed to improve the flexibility of firmware update of the device, which can be released from the limitations of the tools and the operating system.
Disclosure of Invention
The application provides a firmware updating method, a device, a server and a storage medium of equipment.
In one aspect, a method of firmware update for a device is provided, the method being applied to a baseboard management controller (Baseboard Manager Controller, BMC), the method comprising:
establishing a management component transport protocol (Management Component Transport Protocol, MCTP) communication connection with the target device;
receiving a firmware update request sent by a remote control terminal logging in the BMC;
and responding to the firmware update request, and indicating the target equipment to perform firmware update based on the MCTP communication connection.
The technical scheme provided by the application can comprise the following beneficial effects: the MCTP communication connection between the target device and the BMC is established, the BMC receives a firmware update request sent by a remote control terminal logged in the BMC, and the BMC instructs the target device to update the firmware based on the MCTP communication connection in response to the firmware update request, so that the firmware of the device can be remotely updated in a unified and stable mode, the limitation of manufacturers and a framework platform system is eliminated, unnecessary dependence on environment support is saved, and the design flexibility of the whole system is improved.
In one possible implementation, in response to the firmware update request, instructing the target device to perform a firmware update based on the MCTP communication connection includes:
combining binary files in the firmware update request into a platform level data model (Platform Level Data Model, PLDM) message, and encapsulating the PLDM message into a first MCTP message;
sending the first MCTP message to the target equipment;
the first MCTP message is used for the target device to disassemble into the PLDM message, and further writes the binary file in the PLDM message into a register storing firmware.
The technical scheme provided by the implementation mode can comprise the following beneficial effects: the BMC combines binary files in the firmware update request into a PLDM message format, and makes MCTP data encapsulation, the complete MCTP message is sent to the target device, the target device receives the MCTP message and then disassembles the MCTP message to obtain PLDM messages, the data in the PLDM messages are written into a register for storing firmware, and the binary files required by firmware update are stored into the register of the firmware through the steps of data encapsulation, disassembly, writing and the like, so that the reliable update of the firmware is realized.
In one possible implementation, the method further includes:
and receiving a second MCTP message sent by the target equipment, wherein the second MCTP message is packaged with a firmware update progress.
The technical scheme provided by the implementation mode can comprise the following beneficial effects: in the firmware updating process, the target device replies the BMC firmware updating progress in the form of MCTP message, so that the BMC can effectively know the current firmware updating condition.
In a possible implementation manner, the firmware update request carries identification information of the target device; before sending the first MCTP message to the target device, the method further includes:
and determining that the sender of the first MCTP message is the target device based on the identification information in the firmware update request.
The technical scheme provided by the implementation mode can comprise the following beneficial effects: the BMC reads the identification information of the target device carried in the firmware update request, and identifies the device needing firmware update through the identification information, so that the accurate specification of the object for executing the firmware update is realized.
In one possible implementation, when the number of target devices is multiple and the types are the same, a one-key update of firmware of all target devices is implemented by dynamically managing addresses using a unified firmware package upload interface.
The technical scheme provided by the implementation mode can comprise the following beneficial effects: for the same kind of device, the device of the kind can be uniformly updated with firmware through the indication of the firmware update request, so that the efficiency of the firmware update is improved.
In one possible implementation, the establishing an MCTP communication connection with the target device includes:
receiving a device discovery notification request sent by the target device;
responding to the device discovery notification request, and sending a discovery notification request reply to the target device;
responding to the discovery notification request reply, and receiving a discovery completion request replied by the target equipment;
and responding to the discovery completion request, and sending an allocated management address to the target equipment so as to enable the MCTP handshake to be realized between the target equipment and the BMC to establish communication connection.
The technical scheme provided by the implementation mode can comprise the following beneficial effects: the target device and the BMC can perform a device discovery process, then the BMC allocates a management address for the target device, and the subsequent BMC can communicate with the corresponding target device through the management address, so that MCTP communication connection between the target device and the BMC is effectively established.
In yet another aspect, there is provided a firmware updating apparatus of a device, the apparatus comprising:
the hardware connection module is used for connecting the plurality of externally inserted network card devices to the BMC on the main board;
the communication connection module is used for establishing MCTP communication connection between the network card devices and the BMC;
the request receiving module is used for receiving a firmware update request sent by a remote control terminal logging in the BMC by the BMC;
and the firmware updating module is used for responding to the firmware updating request, and the BMC instructs at least one appointed network card device to update the firmware based on the MCTP communication connection.
In yet another aspect, a firmware update management system is provided, the system comprising: BMC, target device and login remote control terminal of BMC:
the BMC is used for establishing MCTP communication connection with the target equipment;
the remote control terminal is used for sending a firmware update request to the BMC;
the BMC is used for responding to the firmware update request and indicating the target equipment to perform firmware update based on the MCTP communication connection;
the target device is configured to perform firmware update.
In yet another aspect, a server is provided, where the server includes a processor and a memory, where the memory stores at least one instruction, at least one program, a code set, or an instruction set, and where the at least one instruction, at least one program, code set, or instruction set is loaded and executed by the processor to implement the firmware update method of the device described above.
In yet another aspect, a computer readable storage medium having stored therein at least one instruction, at least one program, code set, or instruction set loaded and executed by a processor to implement the firmware update method of the above device is provided.
In yet another aspect, a computer program product or computer program is provided, the computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions so that the computer device performs the firmware update method of the device described above.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are needed in the description of the embodiments or the prior art will be briefly described, and it is obvious that the drawings in the description below are some embodiments of the present application, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
Fig. 1 is a method flow diagram illustrating a firmware update method of a device according to an example embodiment.
Fig. 2 is a schematic diagram illustrating a BMC establishing a communication connection with a network card device according to an example embodiment.
Fig. 3 is a schematic diagram illustrating hardware connection of a BMC to a network card device according to an exemplary embodiment.
FIG. 4 is a schematic diagram of a firmware update management system, according to an example embodiment.
Fig. 5 is a schematic diagram illustrating remote management of a BMC by a remote control terminal according to an exemplary embodiment.
Fig. 6 is a block diagram showing a structure of a firmware updating apparatus of a network card device according to an exemplary embodiment.
Fig. 7 is a schematic diagram of a server provided according to an exemplary embodiment.
Detailed Description
The following description of the embodiments of the present application will be made apparent and fully in view of the accompanying drawings, in which some, but not all embodiments of the application are shown. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It should be understood that the "indication" mentioned in the embodiments of the present application may be a direct indication, an indirect indication, or an indication having an association relationship. For example, a indicates B, which may mean that a indicates B directly, e.g., B may be obtained by a; it may also indicate that a indicates B indirectly, e.g. a indicates C, B may be obtained by C; it may also be indicated that there is an association between a and B.
In the description of the embodiments of the present application, the term "corresponding" may indicate that there is a direct correspondence or an indirect correspondence between the two, or may indicate that there is an association between the two, or may indicate a relationship between the two and the indicated, configured, etc.
In the embodiment of the present application, the "predefining" may be implemented by pre-storing corresponding codes, tables or other manners that may be used to indicate relevant information in devices (including, for example, terminal devices and network devices), and the present application is not limited to the specific implementation manner thereof.
Based on different manufacturers and different architecture platform systems, the firmware updating tools and updating modes of the equipment often have differences.
Such as: in the field of server technology, in particular network storage, network card devices are being used in general. The firmware updating mode of the traditional network card equipment is based on different manufacturers and different architecture platform systems, often has difference in updating tools and modes, and needs the manufacturers to provide updating tools and binary files for combined updating, and the updating tools usually run in a host operating system.
The application provides a firmware updating method of equipment, which can update the firmware of the equipment in the same stable mode under the condition that manufacturer platforms are not uniform.
It will be appreciated that the devices in embodiments of the present application include, but are not limited to, the following types of devices: network card equipment, smart phones (such as Android mobile phones, iOS mobile phones, windows Phone mobile phones and the like), tablet computers, palm computers, automobile data recorders, routers, network cards, switches, network equipment, servers, notebook computers, mobile internet equipment (Mobile Internet Devices, MID) and wearable equipment (such as smart watches and bluetooth headsets), the type of the equipment is not limited.
The technical scheme provided by the application is further described below.
Fig. 1 is a method flow diagram illustrating a firmware update method of a device according to an example embodiment. The method is applied to BMCs in the server. As shown in fig. 1, the firmware update method of the device may include the steps of:
step 110: an MCTP communication connection is established with the target device.
The BMC is a core component in a server management system defined by the intelligent platform management interface and is used for providing a server detection management function independent of software and hardware such as a server processor, firmware, an operating system and the like, and the BMC does not need support of the server operating system or occupy the resources of the server operating system. The BMC can communicate with other software and hardware in the server through interfaces such as a system management BUS (System Management BUS, SMBUS) and the like, can provide inquiry and control functions for a local or remote control terminal through interfaces such as a network, a serial, a high-speed serial computer expansion BUS (Peripheral Component Interconnect Express, PCIE) and the like, and can carry out firmware upgrading, external equipment state checking and the like on the external equipment of the server under the normal state of machine communication.
MCTP, among other things, is a protocol proposed by the distributed management task organisation (Desktop Management Task Force, DMTF) to support hardware component communication between different smart devices. The underlying buses of MCTP include SMBUS, two-wire serial bus (Inter-Integrated Circuit, I2C), PCIE, and universal serial bus (Universal Serial Bus, USB). The protocol is independent of the underlying physical bus and the data link layer messages on the bus and defines only the transport layer messages.
In the embodiment of the application, the BMC is arranged on the main board of the server, and MCTP communication connection between the target device and the BMC is established.
In one possible implementation, step 110 includes: receiving a device discovery notification request sent by target device; responding to the device discovery notification request, and sending a discovery notification request reply to the target device; responding to the discovery notification request reply, and receiving a discovery completion request replied by the target equipment; and in response to the discovery completion request, sending the allocated management address to the target device so as to enable the MCTP handshake between the target device and the BMC to establish communication connection.
In this implementation manner, the target device may perform a device discovery procedure with the BMC, and then the BMC allocates a management address to the target device, and the subsequent BMC may communicate with the corresponding target device through the management address, thereby effectively establishing an MCTP communication connection between the target device and the BMC.
For example, referring to fig. 2, when the external network card device is initialized, a device discovery notification request is sent, the BMC sends a discovery notification request reply, after receiving information, the BMC replies to the BMC discovery completion request, after interaction is completed, the BMC allocates a dynamic management address to the network card device, the network card device accepts address allocation, and the two parties realize MCTP handshake to communicate through the management address.
In one possible implementation, before step 110, the method further includes the following steps: and connecting the target device to the BMC on the main board through the SMBUS.
The SMBUS is a control bus, and a system using the SMBUS is used, so that messages are sent and received between devices through the SMBUS.
In the implementation manner, the target device is connected to the BMC through the SMBUS, so that the effective connection between the network card device and the BMC is realized. Through the SMBUS, the BMC may be provided with the device model, part number, etc. of the extrapolated device, save its state for the hang event, report different types of errors, receive control parameters, and return to state, etc.
For example, referring to fig. 3 in combination, in the process of designing the hardware of the motherboard, the SMBUS reservation of the BMC is connected to the SMBUS port of the external network card device through a cable so as to provide a communication hardware physical layer foundation.
Step 120: and receiving a firmware update request sent by a remote control terminal logged in the BMC.
The remote control terminal is a terminal of the remote login BMC, and an account of the remote control terminal logged in the BMC has a firmware update authority. It will be appreciated that the present application does not limit the specific implementation process of logging in the BMC by the remote control terminal.
In the embodiment of the application, the BMC is managed by the remote control terminal, receives a firmware update request sent by the remote control terminal, and the firmware update request is used for requesting to update the firmware of the target device.
Step 130: in response to the firmware update request, the target device is instructed to perform a firmware update based on the MCTP communication connection.
In the embodiment of the application, after receiving the firmware update request, the BMC interacts with the target device based on the MCTP communication connection to instruct the target device to perform firmware update.
In one possible implementation, step 130 includes: combining binary files in the firmware update request into PLDM messages, and packaging the PLDM messages into a first MCTP message; sending the first MCTP message to target equipment; the first MCTP message is used for the target device to disassemble into a PLDM message, and further writes a binary file in the PLDM message into a register storing firmware.
In this implementation manner, the BMC combines the binary files in the firmware update request into the PLDM message format, and encapsulates the PLDM message, the complete MCTP message is sent to the target device through the physical layer SMBUS link, the target device disassembles the MCTP message after receiving the MCTP message through the physical layer, and obtains the PLDM message, writes the data in the PLDM message into the register storing the firmware, and stores the binary files required for firmware update into the register storing the firmware through the steps of data encapsulation, disassembly, writing and the like, so that reliable firmware update can be realized.
The BMC and the designated network card device can communicate based on the management address allocated to the target device.
In one possible implementation, when executed in step 130, the following steps are also executed: and receiving a second MCTP message sent by the target equipment, wherein the second MCTP message is packaged with the firmware update progress.
In the implementation manner, the target device replies the firmware update progress of the BMC in the form of an MCTP message in the firmware update process, so that the BMC can effectively know the current firmware update condition.
It will be appreciated that after the firmware update is completed, the target device may perform a firmware restart and check the validation of the firmware update.
In one possible implementation manner, the firmware update request carries identification information of the target device; prior to step 130, further comprising: and determining the sender of the first MCTP message as a target device based on the identification information in the firmware update request.
In the implementation manner, the BMC reads the identification information of the target device carried in the firmware update request, and identifies the device needing firmware update through the identification information, so that the accurate specification of the object for executing the firmware update is realized.
The identification information of the device may be a serial number (serial number) of a card end register or a key.
In one possible implementation, when the number of target devices is multiple and the types are the same, a one-key update of firmware of all target devices is implemented by dynamically managing addresses using a unified firmware package upload interface.
Exemplary, the firmware update request carries identification information of a preset type of device, and the target device belongs to the preset type of device, and further includes the following steps: determining that a sender of the first MCTP message is a preset type of equipment including target equipment based on the identification information in the firmware update request; respectively sending the first MCTP messages to preset types of equipment; the first MCTP message is used for disassembling a device of a preset type into a PLDM message, and further writing a binary file in the PLDM message into a register storing firmware.
The preset type network card device can be network card devices based on the same manufacturer and the same architecture platform system.
In the implementation manner, for the same type of device, the device of the same type can be uniformly updated with firmware through the indication of the firmware update request, so that the efficiency of firmware update is improved.
In summary, in the firmware updating method of the device provided by the embodiment, the MCTP communication connection between the target device and the BMC is established, the BMC receives the firmware updating request sent by the remote control terminal logged in the BMC, and instructs the target device to update the firmware based on the MCTP communication connection in response to the firmware updating request, so that the firmware of the device can be remotely updated in a unified and stable manner, the limitation of manufacturers and architecture platform systems is removed, unnecessary environment-dependent support is saved, and the design flexibility of the overall system is improved.
In addition, for the same type of equipment, the unified firmware update of the network card equipment of the type can be indicated by the firmware update request, so that the firmware update efficiency is improved.
The method embodiments may be implemented by single embodiments or may be implemented by combination, which is not limited by the present application.
When the target device is a network card, the method can update the network card firmware in a remote out-of-band mode through the BMC, and specifically, the externally inserted network card device is connected to the BMC controller through the SMBUS. The network card equipment supporting the MCTP transmits a notification request in the power-on initialization process, the BMC receives the notification and replies, the network card equipment receives the discovery request and replies, the BMC requests to allocate the management address, the network card receives the request and replies, and the process realizes MCTP handshake and can start data communication.
Uploading binary network card firmware to be updated to the BMC through a network, initiating a specific network card firmware updating request, combining the request into a PLDM message format by the BMC, packaging MCTP data, and sending a complete MCTP message to network card equipment through a physical layer SMBUS link. The network card device disassembles after receiving the MCTP message through the physical layer, obtains PLDM message data, and writes the data into a register storing firmware. And in the updating process of the network card equipment, the firmware updating progress of the BMC network card equipment is replied in the form of MCTP messages, the message network card equipment stops sending to restart the firmware after the firmware updating is finished, and the firmware updating effect is checked. The specific implementation process is as follows:
in the design process of the main board hardware, the SMBUS reservation of the BMC chip is connected with the SMBUS port of the external network card equipment in a traveling line manner, so that a communication hardware physical layer foundation is provided.
And when the external network card equipment is initialized, the equipment discovery notification request is sent through the physical layer SMBUS, the BMC replies the discovery notification request, the BMC replies the discovery completion request after receiving information, the BMC distributes a dynamic management address to the network card after interaction is completed, the network card receives address distribution, and the two parties realize MCTP handshake to communicate through the management address.
The BMC can carry out remote control terminal management through the Ethernet, uploads the binary firmware file of the network card to the BMC through the network, the BMC utilizes the dynamically allocated network card management address to package the binary firmware file into an MCTP message form through a PLDM message format to be transmitted to the network card, the network card disassembles the message, writes the binary firmware file into a register for storing the firmware, and returns the update progress to the BMC in real time.
The method can update the network card firmware in the same stable mode under the condition that the manufacturer platforms are not uniform. And the requirements of special tools and operating systems are removed, and unnecessary dependence environment support is saved. The management speed and reliability of the system components are improved, and the performance and design flexibility of the whole system are improved. The application has good effect when synchronously updating the firmware of a plurality of network card devices of a plurality of manufacturers in batches.
The network card firmware is updated remotely by the baseboard management controller in a dynamic address allocation management mode, and the same type of network card can be updated by one key through different dynamic management addresses by using a unified binary firmware package uploading interface.
FIG. 4 is a schematic diagram of a firmware update management system, according to an example embodiment. As shown in fig. 4, the system includes: BMC, target device and remote control terminal of login BMC:
the BMC is used for establishing MCTP communication connection with the target equipment;
the remote control terminal is used for sending a firmware update request to the BMC;
the BMC is used for responding to the firmware update request and indicating the target equipment to update the firmware based on the MCTP communication connection;
a target device for performing a firmware update.
It can be understood that the firmware update management system and the method embodiment described above belong to the same concept, and the specific implementation process is detailed in the method embodiment, and will not be described herein.
By way of example, referring to fig. 5, the BMC may perform remote control terminal management through the ethernet, the remote control terminal uploads the binary file of the firmware of the network card device to the BMC through the network, the BMC encapsulates the binary file into an MCTP message form by using the management address of the dynamically allocated network card device through a PLDM message format, and transmits the MCTP message to the network card device, and the network card device disassembles the MCTP message into the binary file, writes the binary file into a register storing the firmware, and returns the firmware update progress to the BMC in real time.
Fig. 6 is a block diagram showing a structure of firmware updating means of a device according to an exemplary embodiment. The device comprises:
a communication connection module 601, configured to establish an MCTP communication connection with a target device;
a request receiving module 602, configured to receive a firmware update request sent by a remote control terminal logged in the BMC;
and the firmware updating module 603 is configured to instruct the target device to perform firmware updating based on the MCTP communication connection in response to the firmware updating request.
In one possible implementation, the firmware update module 603 is configured to:
combining binary files in the firmware update request into PLDM messages, and packaging the PLDM messages into a first MCTP message;
sending the first MCTP message to the target equipment;
the first MCTP message is used for the target device to disassemble into the PLDM message, and further writes the binary file in the PLDM message into a register storing firmware.
In one possible implementation, the firmware update module 603 is configured to:
and receiving a second MCTP message sent by the target equipment, wherein the second MCTP message is packaged with a firmware update progress.
In a possible implementation manner, the firmware update request carries identification information of the target device; the firmware update module 603 is configured to:
before the first MCTP packet is sent to the target device, determining that a sender of the first MCTP packet is the target device based on the identification information in the firmware update request.
In one possible implementation, when the number of target devices is multiple and the types are the same, a one-key update of firmware of all target devices is implemented by dynamically managing addresses using a unified firmware package upload interface.
In a possible implementation manner, the communication connection module 601 is configured to:
receiving a device discovery notification request sent by the target device;
responding to the device discovery notification request, and sending a discovery notification request reply to the target device;
responding to the discovery notification request reply, and receiving a discovery completion request replied by the target equipment;
and responding to the discovery completion request, and sending an allocated management address to the target equipment so as to enable the MCTP handshake to be realized between the target equipment and the BMC to establish communication connection.
It should be noted that: the firmware updating apparatus of the device provided in the above embodiment is only exemplified by the division of the above functional modules, and in practical application, the above functional allocation may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules, so as to complete all or part of the functions described above. In addition, the apparatus and the method embodiments provided in the foregoing embodiments belong to the same concept, and specific implementation processes of the apparatus and the method embodiments are detailed in the method embodiments and are not repeated herein.
Referring to fig. 7, a schematic diagram of a server according to an exemplary embodiment of the present application is provided, where the server includes a memory and a processor, and the memory is configured to store a computer program, and the computer program is executed by the processor to implement the firmware updating method of the device.
The processor may be a central processing unit (Central Processing Unit, CPU). The processor may also be any other general purpose processor, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof.
The memory, as a non-transitory computer readable storage medium, may be used to store non-transitory software programs, non-transitory computer-executable programs, and modules, such as program instructions/modules, corresponding to the methods in embodiments of the present application. The processor executes various functional applications of the processor and data processing, i.e., implements the methods of the method embodiments described above, by running non-transitory software programs, instructions, and modules stored in memory.
The memory may include a memory program area and a memory data area, wherein the memory program area may store an operating system, at least one application program required for a function; the storage data area may store data created by the processor, etc. In addition, the memory may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some implementations, the memory optionally includes memory remotely located relative to the processor, the remote memory being connectable to the processor through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
In an exemplary embodiment, a computer readable storage medium is also provided for storing at least one computer program that is loaded and executed by a processor to implement all or part of the steps of the above method. For example, the computer readable storage medium may be Read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), compact disc Read-Only Memory (CD-ROM), magnetic tape, floppy disk, optical data storage device, and the like.
Other embodiments of the application will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (10)

1. A method of updating firmware of a device, the method being applied to a BMC, the method comprising:
establishing an MCTP communication connection with a target device;
receiving a firmware update request sent by a remote control terminal logging in the BMC;
and responding to the firmware update request, and indicating the target equipment to perform firmware update based on the MCTP communication connection.
2. The method of claim 1, wherein instructing the target device to perform a firmware update based on the MCTP communication connection in response to the firmware update request comprises:
combining binary files in the firmware update request into PLDM messages, and packaging the PLDM messages into a first MCTP message;
sending the first MCTP message to the target equipment;
the first MCTP message is used for the target device to disassemble into the PLDM message, and further writes the binary file in the PLDM message into a register storing firmware.
3. The method according to claim 2, wherein the method further comprises:
and receiving a second MCTP message sent by the target equipment, wherein the second MCTP message is packaged with a firmware update progress.
4. The method according to claim 2, wherein the firmware update request carries identification information of the target device; before sending the first MCTP message to the target device, the method further includes:
and determining that the sender of the first MCTP message is the target device based on the identification information in the firmware update request.
5. The method according to claim 1, wherein the method further comprises:
when the number of the target devices is a plurality of and the types are the same, the unified firmware package uploading interface is used for realizing the one-key updating of the firmware of all the target devices through the dynamic management address.
6. The method of claim 1 wherein the establishing an MCTP communication connection with the target device comprises:
receiving a device discovery notification request sent by the target device;
responding to the device discovery notification request, and sending a discovery notification request reply to the target device;
responding to the discovery notification request reply, and receiving a discovery completion request replied by the target equipment;
and responding to the discovery completion request, and sending an allocated management address to the target equipment so as to enable the MCTP handshake to be realized between the target equipment and the BMC to establish communication connection.
7. A firmware update apparatus for a device, the apparatus comprising:
the communication connection module is used for establishing MCTP communication connection with the target equipment;
the request receiving module is used for receiving a firmware update request sent by a remote control terminal logged in the BMC;
and the firmware update indication module is used for responding to the firmware update request and indicating the target equipment to perform firmware update based on the MCTP communication connection.
8. A firmware update management system, said system comprising: BMC, target device and login remote control terminal of BMC:
the BMC is used for establishing MCTP communication connection with the target equipment;
the remote control terminal is used for sending a firmware update request to the BMC;
the BMC is used for responding to the firmware update request and indicating the target equipment to perform firmware update based on the MCTP communication connection;
the target device is configured to perform firmware update.
9. A server comprising a processor and a memory, wherein the memory stores at least one instruction, at least one program, code set, or instruction set, and wherein the at least one instruction, at least one program, code set, or instruction set is loaded and executed by the processor to implement the firmware update method of the device of any one of claims 1 to 6.
10. A computer readable storage medium having stored therein at least one instruction, at least one program, code set, or instruction set, the at least one instruction, at least one program, code set, or instruction set being loaded and executed by a processor to implement a firmware update method of an apparatus as claimed in any one of claims 1 to 6.
CN202310426205.5A 2023-04-19 2023-04-19 Firmware updating method, device, server and storage medium of equipment Pending CN116578316A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310426205.5A CN116578316A (en) 2023-04-19 2023-04-19 Firmware updating method, device, server and storage medium of equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310426205.5A CN116578316A (en) 2023-04-19 2023-04-19 Firmware updating method, device, server and storage medium of equipment

Publications (1)

Publication Number Publication Date
CN116578316A true CN116578316A (en) 2023-08-11

Family

ID=87538673

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310426205.5A Pending CN116578316A (en) 2023-04-19 2023-04-19 Firmware updating method, device, server and storage medium of equipment

Country Status (1)

Country Link
CN (1) CN116578316A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160328229A1 (en) * 2015-05-04 2016-11-10 American Megatrends, Inc. System and method of online firmware update for baseboard management controller (bmc) devices
CN111756574A (en) * 2020-06-19 2020-10-09 浪潮电子信息产业股份有限公司 Method and device for remotely updating firmware in batch mode and computer readable storage medium
CN114116375A (en) * 2021-10-28 2022-03-01 苏州浪潮智能科技有限公司 Data transmission method and device based on PLDM protocol
CN115589361A (en) * 2022-09-28 2023-01-10 苏州浪潮智能科技有限公司 Management equipment firmware updating method and device, electronic equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160328229A1 (en) * 2015-05-04 2016-11-10 American Megatrends, Inc. System and method of online firmware update for baseboard management controller (bmc) devices
CN111756574A (en) * 2020-06-19 2020-10-09 浪潮电子信息产业股份有限公司 Method and device for remotely updating firmware in batch mode and computer readable storage medium
CN114116375A (en) * 2021-10-28 2022-03-01 苏州浪潮智能科技有限公司 Data transmission method and device based on PLDM protocol
CN115589361A (en) * 2022-09-28 2023-01-10 苏州浪潮智能科技有限公司 Management equipment firmware updating method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US20080140811A1 (en) Method and apparatus for a host controller operations over a network
CN112130748B (en) Data access method, network card and server
CN111324363A (en) Equipment upgrading method, upgrading terminal, equipment and storage medium
US20100205600A1 (en) Simulation method for realizing large batches and different kinds of baseboard management controllers using a single server
US9804980B2 (en) System management through direct communication between system management controllers
CN116719700B (en) Method and device for monitoring hardware partition of server host system
CN112637371A (en) Node address determination method and device, electronic equipment and storage medium
CN114401250A (en) Address allocation method and device
CN111064786B (en) Account identifier management method and device
CN110958132A (en) Method for monitoring network card equipment, substrate management controller and network card equipment
CN115335803A (en) Equipment upgrading method, intelligent equipment and computer readable storage medium
CN113766041A (en) Method and device for acquiring Media Access Control (MAC) address of first server
CN115632900B (en) Computing equipment
CN115454896A (en) SMBUS-based SSD MCTP control message verification method and device, computer equipment and storage medium
CN116578316A (en) Firmware updating method, device, server and storage medium of equipment
CN115333933B (en) Automatic management method, medium and equipment for servers on machine room
CN116192626A (en) Device access method and device, computer readable storage medium and electronic device
CN115827543A (en) Method, system, device and medium for realizing eSIP communication based on FPGA
CN115766682A (en) Data transmission method and device
CN103490913A (en) Pre-boot execution environment testing device, method and system
CN114168210A (en) Embedded equipment deployment method and system
CN112131146B (en) Method and device for acquiring equipment information, storage medium and electronic equipment
CN111124445B (en) Home gateway upgrading method and home gateway
CN115550313A (en) Communication method and device of external equipment, electronic equipment and storage medium
CN112579507A (en) Host machine and BMC communication method, BIOS, operating system, BMC and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination