WO2017124799A1 - 固件管理方法和装置 - Google Patents

固件管理方法和装置 Download PDF

Info

Publication number
WO2017124799A1
WO2017124799A1 PCT/CN2016/103506 CN2016103506W WO2017124799A1 WO 2017124799 A1 WO2017124799 A1 WO 2017124799A1 CN 2016103506 W CN2016103506 W CN 2016103506W WO 2017124799 A1 WO2017124799 A1 WO 2017124799A1
Authority
WO
WIPO (PCT)
Prior art keywords
firmware
management
host
image file
server
Prior art date
Application number
PCT/CN2016/103506
Other languages
English (en)
French (fr)
Inventor
徐东
熊先奎
郑旭锋
张景涛
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017124799A1 publication Critical patent/WO2017124799A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4411Configuring for operating with peripheral devices; Loading of device drivers

Definitions

  • the present invention relates to the field of firmware management technologies, and in particular, to a firmware management method and apparatus.
  • a server is a device that provides computing services, and is mainly composed of hardware devices such as a central processing unit (CPU), a storage device, a memory, and an I/O (Input/Output) device.
  • the firmware serves as the most basic and lowest-level software for a system.
  • the CPU is the computing core and control core of a computer, and the memory is used to store program operation data. CPU and memory do not need to rely on specific firmware for normal use.
  • Input and output devices such as storage devices, network cards, and graphics cards generally need to be sintered with specific firmware, such as graphics card firmware, network card firmware, and SAS (Serial Attached SCSI) controller firmware.
  • firmware management there are mainly firmware sintering, firmware update, backup of firmware configuration data, and recovery of accessory configuration data.
  • server firmware management is mainly through two methods, one is software sintering based on OS (Operation System), and the other is special cable sintering.
  • OS-based software sintering is to install an operating system and sintering software on the server, and to sinter or update the firmware by uploading firmware files, inputting firmware configuration data, and using sintering software.
  • OS-based software sintering is to install an operating system and sintering software on the server, and to sinter or update the firmware by uploading firmware files, inputting firmware configuration data, and using sintering software.
  • Special cable sintering upload the firmware file to the debugger, connect the debugger and the sintered device and debugger with a special cable, after powering on the sintered server, run the firmware sintering software on the debugger, and input the firmware configuration data. Sinter or update the firmware on the board. When multiple firmwares need to be sintered or updated, the above process needs to be repeated for each firmware.
  • the backup firmware configuration data backup and recovery needs to be implemented through the in-band or out-of-band interface of the server, and since most devices do not support the acquisition of the out-of-band interface. And rewriting, resulting in complex hardware and software design, can only achieve firmware configuration data management of some devices.
  • the main object of the present invention is to provide a firmware management method and apparatus, which aim to solve the technical problem that the firmware management function is imperfect and the maintainability is poor.
  • the present invention provides a firmware management method, the firmware management method comprising the following steps:
  • the baseboard management controller virtualizes the pre-configured firmware management image file into a virtual boot system and connects to the host;
  • the step of modifying the startup mode configuration of the host, and the step of configuring the modified host startup mode to be associated with the virtual startup system includes:
  • the controlling the host is configured according to the modified startup mode, starting from the virtual booting system, and loading the firmware management image file for firmware management comprises:
  • the firmware management image file includes a firmware configuration data collection image file
  • the step of guiding the host to perform firmware management includes:
  • the firmware configuration data is stored and set to the firmware state recovery.
  • the firmware management image file includes a firmware configuration data recovery image file
  • the step of guiding the host to perform firmware management further includes:
  • the firmware configuration data recovery result is recorded and stored.
  • the baseboard management controller virtualizes the pre-configured firmware management image file into a virtual boot system, and before the step of attaching to the host, the method further includes:
  • the baseboard management controller configures the firmware management image file in a baseboard management controller local or remote debugger, and the baseboard management controller communicates with the remote debugger to retrieve a firmware management image on the remote debugger file.
  • the step of modifying the startup mode configuration of the host further includes:
  • the method further includes:
  • the present invention further provides a firmware management apparatus, where the firmware management apparatus includes:
  • a virtual module configured to virtualize the pre-configured firmware management image file into a virtual boot system and connect to the host;
  • Modifying a module configured to modify a startup mode configuration of the host, where the modified host startup mode configuration is associated with the virtual startup system;
  • the management module is configured to control the host to be configured according to the modified startup mode, start from the virtual boot system, and load the firmware management image file for firmware management.
  • the modifying module is further configured to:
  • the management module includes:
  • a restarting unit configured to control the host to restart, and acquiring a startup mode from the baseboard management controller according to the modified startup mode configuration
  • a configuration unit configured to control the host to start from the virtual boot system according to the acquired boot mode, and load the firmware management image file;
  • a management unit configured to boot the host for firmware management.
  • the modifying module is further configured to:
  • the firmware management device further includes:
  • the reset module is configured to control the host to reset according to the original boot configuration data.
  • a firmware management method and apparatus virtualizing a pre-configured firmware management image file into a virtual boot system by a baseboard management controller, attaching to a host; modifying a startup mode configuration of the host, The modified host startup mode configuration is associated with the virtual boot system; controlling the host to be configured according to the modified boot mode, starting from the virtual boot system, loading the firmware management image file for firmware management.
  • the embodiment of the invention improves the function of the server firmware management, simplifies the management process, realizes the automatic management of the server firmware, and improves the maintainability of the server firmware.
  • FIG. 1 is a schematic flow chart of a first embodiment of a firmware management method according to the present invention
  • FIG. 2 is a schematic flowchart of a second embodiment of a firmware management method according to the present invention.
  • FIG. 3 is a schematic flowchart of a third embodiment of a firmware management method according to the present invention.
  • FIG. 4 is a schematic flowchart of a fourth embodiment of a firmware management method according to the present invention.
  • FIG. 5 is a schematic flowchart diagram of a fifth embodiment of a firmware management method according to the present invention.
  • FIG. 6 is a schematic flowchart of a sixth embodiment of a firmware management method according to the present invention.
  • FIG. 7 is a schematic diagram of firmware management according to an embodiment of a firmware management method according to the present invention.
  • FIG. 8 is a schematic diagram of firmware management according to an embodiment of a firmware management method according to the present invention.
  • FIG. 9 is a schematic flowchart diagram of a seventh embodiment of a firmware management method according to the present invention.
  • FIG. 10 is a schematic diagram of functional modules of a first embodiment and a second embodiment of a firmware management apparatus according to the present invention.
  • FIG. 11 is a schematic diagram of functional modules of a third embodiment of a firmware management apparatus according to the present invention.
  • FIG. 12 is a schematic diagram of functional modules of a fourth embodiment of a firmware management apparatus according to the present invention.
  • FIG. 13 is a schematic diagram of functional modules of a fifth embodiment of a firmware management apparatus according to the present invention.
  • FIG. 14 is a schematic diagram of functional modules of a sixth embodiment of a firmware management apparatus according to the present invention.
  • FIG. 15 is a schematic diagram of functional modules of a seventh embodiment of a firmware management apparatus according to the present invention.
  • the main solution of the embodiment of the present invention is that the baseboard management controller virtualizes the pre-configured firmware management image file into a virtual boot system and attaches it to the host; modifies the startup mode configuration of the host, and the modified host starts.
  • the mode configuration is associated with the virtual boot system; controlling the host to be configured according to the modified boot mode, starting from the virtual boot system, loading the firmware management image file for firmware management.
  • the invention provides a solution for simplifying the sintering and updating process of the firmware, reducing the manual participation, realizing the backup and management of all firmware configuration data, and perfecting the firmware management function.
  • a first embodiment of a firmware management method of the present invention provides a firmware management method, where the firmware management method includes:
  • Step S10 The baseboard management controller virtualizes the pre-configured firmware management image file into a virtual boot system and attaches to the host.
  • the embodiment of the present invention is mainly applied to firmware management of a server board, but is not limited to firmware management of a server board, and can also be applied to firmware management of other devices.
  • the server board uses the PCIE bus and the interface standard, and the server CPU connects the server components through the PCIE bus, such as a PCIE bridge, a PCH (Platform Controller Hub, a south bridge), a network card, and an FC (Fibre Controller). ), SAS (Serial Attached SCSI) controllers and graphics cards.
  • firmware such as a PCIE bridge, a PCH, a network card, an FC, a SAS controller, and a graphics card can be managed.
  • the firmware managed by the server board can be divided into two categories.
  • the first type is the firmware related to the server host hardware device.
  • the firmware is only related to the type of hardware device, usually fixed, such as network card, SAS controller, and graphics card.
  • Firmware such firmware is referred to as firmware in embodiments of the present invention.
  • Another type of firmware is not bundled with the server host hardware device and can be changed, such as the MAC address of the network card (Media Access Control, physical address), the WWN (World Wide Name) address of the FC and SAS controller, etc.
  • the firmware is referred to as firmware configuration data in the embodiment of the present invention.
  • the firmware management referred to in the embodiments of the present invention includes, but is not limited to, firmware sintering, updating, and backup and recovery of firmware configuration data.
  • the present embodiment uses a Baseboard Management Controller (BMC) to manage server firmware sintering.
  • BMC Baseboard Management Controller
  • the baseboard management controller is installed on the server board and uses IPMI (Intelligent Platform Management Interface) to support local and remote diagnosis, console support, configuration management, hardware management, and troubleshooting.
  • IPMI Intelligent Platform Management Interface
  • the baseboard management controller is connected to the server host through a USB interface as a USB device such as a USB optical drive or a USB block device.
  • the server can issue IPMI commands to the baseboard management controller through the SMI (System Management Interface) bus to transmit and interact messages and commands.
  • SMI System Management Interface
  • the pre-configured firmware management image file is an integrated OS (Operation System), such as DOS (Disk Operating System), which satisfies the server host loading and running and implements firmware management.
  • OS Operating System
  • DOS Disk Operating System
  • the firmware management image files include: operating system, firmware management control software, firmware tool software, and server firmware.
  • the operating system is the operating environment of all software and tools in the firmware management image file; the firmware management control software is used to control the firmware sintering process, the firmware configuration data collection process, and the substrate management controller.
  • Communication; firmware tool software for accessing specific firmware devices, including firmware sintering tool software, firmware configuration data collection tool software, and firmware configuration data recovery tool software; server firmware, including firmware software that needs to be sintered to a specific device, may include a server All the firmware of the board can also be configured according to actual needs.
  • the firmware management image file can also include firmware configuration data files for recovery of firmware configuration data, which can be flexibly set according to actual needs.
  • the firmware management image file can be flexibly configured according to the actual needs of firmware management.
  • the firmware management image file may include firmware, firmware sintering tool software, firmware management control software, and operating system that need to be sintered or updated; firmware management image file when performing firmware configuration data backup.
  • the firmware configuration data collection tool software, firmware management control software, and operating system may be included; when performing firmware configuration data recovery, the firmware management image file may include firmware configuration data recovery tool software, firmware configuration data file, firmware management control software, and an operating system.
  • the baseboard management controller virtualizes the pre-configured firmware management image file into a virtual booting system, and attaches it to the server host, and also attaches the firmware management image file as a virtual booting system to the server host. on.
  • the server host can access the virtual boot system.
  • Step S20 Modify a startup mode configuration of the host, where the modified host startup mode configuration is associated with the virtual startup system.
  • the baseboard management controller attaches the firmware management image file to the server host as the virtual boot system, specifically, as an implementation manner, the baseboard management controller modifies the server host startup mode configuration, and the original startup mode of the server host Change the startup mode from the baseboard management control.
  • the baseboard management controller configures the server host to acquire the boot mode from the virtual boot system to enable the server host to boot from the mounted virtual boot system for firmware management.
  • Step S30 Control the host to be configured according to the modified startup mode, start from the virtual boot system, and load the firmware management image file for firmware management.
  • the baseboard management controller modifies the startup mode configuration of the server host, specifically, as an implementation manner, first, the baseboard management controller controls the server host to restart.
  • the startup mode is obtained from the baseboard management controller according to the startup mode modified by the baseboard management controller.
  • the server host accesses the virtual boot system, boots from the virtual boot system, and loads the firmware management image file.
  • the firmware management image file After the server host loads the firmware management image file, the firmware management image file automatically runs the firmware management control software and the firmware tool software in the operating system environment through script or batch processing, and performs firmware sintering according to the actual needs of the current firmware management. , update, or backup and restore of firmware configuration data.
  • the baseboard management controller is connected to the host by virtualizing the pre-configured firmware management image file into a virtual boot system; then, modifying the boot mode configuration of the host, and modifying the host boot mode configuration and virtual booting.
  • the system is associated; the control host is configured according to the modified startup mode, starts from the virtual boot system, and loads the firmware management image file for firmware management.
  • a second embodiment of the firmware management method of the present invention provides a firmware management method.
  • the step S20 includes:
  • Step S21 Modify the startup mode configuration of the host to obtain a startup mode from the baseboard management controller, and start according to the acquired startup mode, where the acquired startup mode is started from the virtual startup system.
  • the baseboard management controller attaches the firmware management image file to the server host as the virtual boot system, specifically, as an implementation manner, first, the baseboard management controller modifies the server host startup mode configuration, and the server host original The startup mode is changed to the startup mode from the baseboard management controller.
  • the baseboard management controller configures the server host to start from the virtual boot system, and returns the configured startup mode to the server host, so that the server host accesses the virtual boot system.
  • the pre-configured firmware management image file may be located locally on the baseboard control manager or in the remote debugger, and may be flexibly set according to actual needs.
  • the baseboard control manager can communicate with the remote debugger via Ethernet to read the firmware management image file configured on the remote debugger.
  • the baseboard management controller controls the server host to locally load the firmware management image file to enable the server host to boot from the virtual boot system.
  • the baseboard management controller parses the server host's access protocol into a firmware management image file to read the message and transmits it to the remote debugging through the Ethernet. machine. After receiving the message, the remote debugger returns the data of the firmware management image file to the baseboard management controller. Then, the baseboard management controller sends the data of the obtained firmware management image file to the server host through the access protocol, and the control server host loads the firmware management image file to enable the server host to boot from the virtual boot system.
  • the baseboard management controller modifies the startup mode configuration of the host to obtain the startup mode from the baseboard management controller, and the host startup mode configured by the baseboard management controller is started from the virtual startup system, and the pre-configured firmware is implemented.
  • the server host can be booted from the virtual boot system for firmware management.
  • a third embodiment of the firmware management method of the present invention provides a firmware management method.
  • the step S30 includes:
  • Step S31 Control the host to restart, and obtain a startup mode from the baseboard management controller according to the modified startup mode configuration.
  • the baseboard management controller modifies the startup mode configuration of the server host, specifically, as an implementation manner, first, the baseboard management controller controls the server host to restart.
  • the server BIOS can issue an IPMI command to the baseboard management controller through the SMI bus to obtain the startup mode.
  • the baseboard management controller returns the configured server host startup mode to the server host, so that the server host accesses the virtual boot system.
  • Step S32 Control the host to start from the virtual boot system according to the acquired startup manner, and load the firmware management image file.
  • the server BIOS accesses the virtual boot system and starts.
  • the baseboard management controller returns the firmware management image file to the server host according to the request of the access protocol to respond to the server host, so that the server host obtains the firmware management image file.
  • the server host acquires and loads the pre-configured firmware management image file through the baseboard management controller.
  • Step S33 guiding the host to perform firmware management.
  • the baseboard management controller controls the firmware management image file to boot the server host for firmware management.
  • the firmware management control software and firmware tool software are automatically run in the operating system environment through script or batch processing, and the firmware sintering, updating, or firmware configuration data backup and recovery are performed according to the actual needs of the current firmware management.
  • the application scenario of the present invention is exemplified by sintering or updating the server firmware.
  • firmware sintering and firmware update can be achieved by firmware sintering.
  • the firmware management image file may include an operating system, firmware management control software, firmware sintering tool software, and server firmware when performing server firmware sintering.
  • the server firmware is the server firmware that needs to be sintered or updated. It can be the entire firmware of the current server host, or it can be part of the firmware of the current server host.
  • the firmware management control software and the firmware sintering tool software are automatically run by script or batch processing.
  • the firmware management control software sends an IPMI command to the baseboard management controller through the SMI bus, and obtains the configuration file of the firmware sintering, including the specific firmware for the sintering, and the number of firmware configurations of the sintering. according to.
  • the firmware sintering tool software accesses the specific firmware for sintering according to the acquired profile of the firmware sintering.
  • the firmware configuration data of this sintering can be pre-configured locally in the baseboard management controller or in the remote debugging machine, and can be flexibly set according to actual needs.
  • the firmware configuration data for this sinter such as the MAC address, needs to be sintered together with the NIC firmware.
  • the firmware management control software sends an IPMI command to the baseboard management controller via the SMI bus, and feeds back to the baseboard management controller the progress and results of the firmware sintering or updating.
  • the substrate management controller In order to ensure the security of firmware sintering or updating, if the substrate management controller does not receive any message fed back by the firmware management control software within a preset timeout period, it determines that the current firmware has failed to be sintered.
  • the substrate management controller records the successfully sintered firmware and the failed firmware. If the firmware fails to burn, the firmware for the failed sintering and the cause of the sintering failure are recorded.
  • the substrate management controller obtains the result of the current firmware sintering, and stores the result in the substrate management controller local or remote debugging machine to complete the firmware management.
  • the baseboard management controller controls the server host to restart, and acquires the startup mode from the baseboard management controller according to the modified startup mode configuration; then, the control host starts from the virtual startup system according to the acquired startup mode, and loads the preset.
  • the firmware manages the image file and boots the host for firmware management. This implementation carries out batching and automatic processing of server firmware management, improves the function of server firmware management, simplifies the management process, realizes automatic management of server firmware, and improves the maintainability of server firmware.
  • a fourth embodiment of the firmware management method of the present invention provides a firmware management method.
  • the firmware management image file includes a firmware configuration data collection image file, and the steps are performed.
  • S33 includes:
  • Step S331 scanning firmware of the host by using the firmware configuration data collection image file, and collecting configuration data of the firmware.
  • the firmware management image file may include: an operating system, firmware management control software, firmware configuration data collection tool software.
  • the firmware management control software and the firmware configuration data collection tool software are automatically run through a script or a batch process, and the server host is booted. Perform firmware management.
  • the firmware configuration data collection tool software scans the hardware device information of the server host and obtains configuration data of the firmware.
  • the firmware management control software then sends the acquired data file to the baseboard management controller via the SMI bus, USB or other channel.
  • Step S332 Store the firmware configuration data, and set the firmware state to be restored.
  • the baseboard management controller acquires the data file sent by the firmware management control software to obtain configuration data of the server firmware.
  • the baseboard management controller stores the obtained server firmware configuration data and sets it as the recovery of the subsequent server firmware state.
  • the server firmware configuration data can be stored locally to the baseboard management controller or stored in the remote debugger, and can be flexibly set according to actual needs.
  • the background manager can obtain the server firmware configuration data through the Ethernet and save it to the database, setting the state recovery of the server firmware.
  • the baseboard management controller scans the firmware of the host through the firmware configuration data acquisition image file, collects the configuration data of the firmware, and stores the firmware configuration data for the firmware state recovery.
  • the server firmware configuration data is collected in batches and automatically, and the management of the server solid configuration data collection is realized, the management process is simplified, the automatic management of the server firmware is realized, and the maintenance of the server firmware is improved.
  • a fifth embodiment of the firmware management method of the present invention provides a firmware management method.
  • the firmware management image file includes a firmware configuration data recovery image file, and the steps are performed.
  • S33 also includes:
  • Step S333 recovering the image file by using the firmware configuration data, and controlling the corresponding firmware to restore the configuration data.
  • the firmware management image file may include: an operating system, firmware management control software, firmware configuration data recovery tool software, and firmware configuration data files.
  • the firmware management control software and the firmware configuration data recovery tool software are automatically run by using a script or a batch process, and the server host is booted. Perform firmware management.
  • the firmware configuration data recovery tool software accesses the firmware that needs to perform firmware configuration data recovery, and restores the firmware configuration data to the specific hardware device information.
  • the firmware management control software sends the result of the firmware configuration data recovery to the baseboard management controller via the SMI bus, USB or other channel.
  • Step S334 recording and storing the firmware configuration data recovery result.
  • the baseboard management controller obtains the result of the firmware configuration data recovery sent by the firmware management control software, and records and stores the result of the current server firmware configuration data recovery.
  • the result of the server firmware configuration data recovery may be stored locally to the baseboard management controller, or may be stored in the remote debugger, and may be flexibly set according to actual needs.
  • the baseboard management controller restores the image file through the firmware configuration data, and controls the corresponding solid. Restore configuration data; record and store firmware configuration data recovery results.
  • the firmware configuration data is restored, the management of the server solid configuration data recovery is realized, the management process is simplified, the automatic management of the server firmware is realized, and the maintenance of the server firmware is improved.
  • a sixth embodiment of the firmware management method of the present invention provides a firmware management method, which is based on the embodiment shown in any one of the foregoing FIGS. 1-5 (this embodiment takes FIG. 2 as an example).
  • the method further includes:
  • Step S40 The baseboard management controller configures the firmware management image file on a baseboard management controller local or remote debugger, and the baseboard management controller communicates with the remote debugger to retrieve the remote debugger.
  • Firmware management image file
  • the pre-configured firmware management image file may be located locally on the baseboard control manager or in the remote debugger, and may be flexibly set according to actual needs.
  • the baseboard control manager can communicate with the remote debugger via Ethernet to read the firmware management image file configured on the remote debugger.
  • the pre-configured firmware management image file is located locally in the baseboard control manager, first, through a background remote debugger, that is, a background PC (personal computer), or a substrate control manager WEB network, The firmware management image file is uploaded to the baseboard control manager locally.
  • the Baseboard Control Manager virtualizes the firmware management image file as the boot system.
  • the baseboard control manager modifies the startup mode configuration of the server host, restarts the server host, and controls the server host to boot from the virtual boot system.
  • the server BIOS sends an IPMI command to the baseboard control manager to obtain a startup mode through the SMI.
  • the baseboard control manager configures the server host to boot from the virtual boot system, and the server host accesses the virtual boot system.
  • the baseboard control manager responds to the request of the server host according to the access protocol, and the server host acquires the firmware management image file and boots the server host with the OS integrated with the file.
  • the server CPU automatically executes the program specified in the firmware management image file, accesses the device under the server host through the program specified in the firmware management image file, and realizes the sintering, updating, configuration data collection and recovery of the server firmware, and passes the SMI.
  • the execution result is fed back to the substrate control manager.
  • the remote debugger that is, the background PC, and the baseboard control manager communicate via Ethernet, and the baseboard control manager virtualizes the firmware management image file to start. system.
  • the baseboard control manager modifies the startup mode configuration of the server host, restarts the server host, and controls the server host to boot from the virtual boot system.
  • the server BIOS sends an IPMI command to the baseboard control manager to obtain a startup mode through the SMI.
  • the baseboard control manager configures the server host to access the virtual boot system from the virtual boot system, and the server host accesses the virtual boot system.
  • the baseboard control manager parses the server host's access protocol into a firmware management image file read message and transmits it to the remote debugger via Ethernet. After the remote debugger receives the message, it will manage the image file of the firmware. The data is returned to the baseboard management controller.
  • the baseboard management controller sends the data of the obtained firmware management image file to the server host through the access protocol, and the control server host starts from the virtual boot system and loads the firmware management image file.
  • the server integrated with the file is used to boot the server host.
  • the server CPU automatically executes the program specified in the firmware management image file, and accesses the device on the server host through the program specified in the firmware management image file. Sintering, updating, configuration data collection and recovery of each firmware of the server are implemented, and the execution result is fed back to the substrate control manager through the SMI.
  • the Baseboard Control Manager returns the feedback results to the backend PC via Ethernet.
  • the baseboard management controller configures the firmware management image file on the baseboard management controller local or remote debugger, and the baseboard management controller communicates with the remote debugger to retrieve the firmware management image file on the remote debugger for Management of server firmware.
  • the server host can be booted from the virtual booting system to perform firmware management, which simplifies the server firmware management process.
  • the seventh embodiment of the firmware management method of the present invention provides a firmware management method.
  • the step S20 further includes:
  • Step S22 Modify the startup mode configuration of the host, and back up the original startup configuration data of the host.
  • the baseboard management controller attaches the firmware management image file to the server host as the virtual boot system, specifically, as an implementation manner, the baseboard management controller modifies the server host startup mode configuration, and the original startup mode of the server host Change the boot mode from the baseboard management controller to enable the server host to boot from the mounted virtual boot system for firmware management.
  • the baseboard management controller records the original startup mode of the server host, and stores the original startup configuration data of the server host.
  • the original startup configuration data of the server host may be stored locally in the baseboard management controller.
  • the method further includes:
  • Step S50 Control the host to be reset according to the original startup configuration data.
  • the baseboard management controller controls the server host to be configured according to the modified startup mode, and starts from the virtual boot system and performs firmware management, the baseboard management controller controls the server host to reset according to the original startup configuration data of the server host.
  • the baseboard management controller modifies the startup mode configuration of the server host according to the original startup configuration data of the server host, and restores the original startup mode of the server host.
  • the baseboard management controller removes the virtual boot system attached to the server host, and controls the server host reset to restore the state before the server firmware management.
  • the baseboard management controller backs up the original startup configuration data of the server host; after controlling the server host for firmware management, according to the original startup configuration data of the server host, the control server host is reset and restored to the firmware management. status.
  • the server host is reset, and the automatic management of the server firmware and the maintenance of the improved server firmware are realized.
  • a first embodiment of the firmware management apparatus of the present invention provides a firmware management apparatus, where the firmware management apparatus includes:
  • the virtual module 100 is configured to virtualize the pre-configured firmware management image file into a virtual boot system and attach to the host.
  • the embodiment of the present invention is mainly applied to firmware management of a server board, but is not limited to firmware management of a server board, and can also be applied to firmware management of other devices.
  • the server board uses the PCIE bus and the interface standard, and the server CPU connects the server components through the PCIE bus, such as a PCIE bridge, a PCH (Platform Controller Hub, a south bridge), a network card, and an FC (Fibre Controller). ), SAS (Serial Attached SCSI) controllers and graphics cards.
  • firmware such as a PCIE bridge, a PCH, a network card, an FC, a SAS controller, and a graphics card can be managed.
  • the firmware managed by the server board can be divided into two categories.
  • the first type is the firmware related to the server host hardware device.
  • the firmware is only related to the type of hardware device, usually fixed, such as network card, SAS controller, and graphics card.
  • Firmware such firmware is referred to as firmware in embodiments of the present invention.
  • Another type of firmware is not bundled with the server host hardware device and can be changed, such as the MAC address of the network card (Media Access Control, physical address), the WWN (World Wide Name) address of the FC and SAS controller, etc.
  • the firmware is referred to as firmware configuration data in the embodiment of the present invention.
  • the firmware management referred to in the embodiments of the present invention includes, but is not limited to, firmware sintering, updating, and backup and recovery of firmware configuration data.
  • the present embodiment uses the firmware management apparatus to perform management of server firmware sintering.
  • the firmware management device is located in the Baseboard Management Controller (BMC).
  • BMC Baseboard Management Controller
  • the baseboard management controller is installed on the server board and uses IPMI (Intelligent Platform Management Interface) to support local and remote diagnosis, console support, configuration management, hardware management, and troubleshooting.
  • IPMI Intelligent Platform Management Interface
  • the baseboard management controller is connected to the server host through a USB interface as a USB device such as a USB optical drive or a USB block device.
  • the server can issue IPMI commands to the baseboard management controller through the SMI (System Management Interface) bus to transmit and interact messages and commands.
  • SMI System Management Interface
  • the pre-configured firmware management image file is an integrated OS (Operation System, OS), such as DOS. (Disk Operating System, disk operating system), to meet the server host loading and running, to achieve firmware management.
  • OS Operating System
  • DOS Disk Operating System, disk operating system
  • the firmware management image files include: operating system, firmware management control software, firmware tool software, and server firmware.
  • the operating system is the operating environment of all software and tools in the firmware management image file;
  • the firmware management control software is used to control the firmware sintering process, the firmware configuration data collection process, and the communication with the firmware management device;
  • the firmware tool software is used to access the specific Firmware devices, including firmware sintering tool software, firmware configuration data collection tool software, and firmware configuration data recovery tool software;
  • server firmware including firmware software that needs to be sintered to a specific device, may include all firmware of the server board, or may be based on actual Some firmware needs to be configured.
  • the firmware management image file can also include firmware configuration data files for recovery of firmware configuration data, which can be flexibly set according to actual needs.
  • the firmware management image file can be flexibly configured according to the actual needs of firmware management.
  • the firmware management image file may include firmware, firmware sintering tool software, firmware management control software, and operating system that need to be sintered or updated; firmware management image file when performing firmware configuration data backup.
  • the firmware configuration data collection tool software, firmware management control software, and operating system may be included; when performing firmware configuration data recovery, the firmware management image file may include firmware configuration data recovery tool software, firmware configuration data file, firmware management control software, and an operating system.
  • the virtual module 100 virtualizes the pre-configured firmware management image file into a virtual boot system and attaches it to the server host, that is, the firmware management image file is attached to the server host as a virtual boot system.
  • the server host can access the virtual boot system.
  • the modification module 200 is configured to modify a startup mode configuration of the host, where the modified host startup mode configuration is associated with the virtual startup system.
  • the modification module 200 modifies the server host startup mode configuration, and changes the original startup mode of the server host. Get the boot mode from the baseboard management control.
  • the modification module 200 configures the startup mode acquired by the server host to start from the virtual boot system, so that the server host starts from the mounted virtual boot system and performs firmware management.
  • the management module 300 is configured to control the host to be configured according to the modified startup mode, start from the virtual boot system, and load the firmware management image file for firmware management.
  • the modification module 200 modifies the startup mode configuration of the server host, specifically, as an implementation manner, first, the management module 300 controls the server host to restart.
  • the startup mode is obtained from the firmware management device according to the startup mode modified by the modified module 200.
  • the server host accesses the virtual boot system, boots from the virtual boot system, and loads the firmware management image file.
  • the firmware management image file After the server host loads the firmware management image file, the firmware management image file automatically runs the firmware management control software and the firmware tool software in the operating system environment through script or batch processing, and performs firmware sintering according to the actual needs of the current firmware management. , update, or backup and restore of firmware configuration data.
  • the virtual module 100 virtualizes the pre-configured firmware management image file into a virtual boot system and attaches it to the host; then, the modification module 200 modifies the startup mode configuration of the host, and the modified host startup mode configuration and virtual The booting system is associated; the management module 300 controls the host to be configured according to the modified booting mode, starts from the virtual booting system, and loads the firmware management image file for firmware management.
  • This embodiment improves the function of server firmware management, simplifies the management process, realizes the automatic management of the server firmware, and improves the maintainability of the server firmware.
  • a second embodiment of the firmware management apparatus of the present invention provides a firmware management apparatus.
  • the modification module 200 is further configured to:
  • the modifying module 200 modifies the server host startup mode configuration, and the original startup mode of the server host. Instead, obtain the boot mode from the firmware management device on the baseboard management controller.
  • the modification module 200 configures the startup mode of the server host to start from the virtual startup system, returns the configured startup mode to the server host, and enables the server host to access the virtual startup system.
  • the pre-configured firmware management image file may be located locally on the baseboard control manager or in the remote debugger, and may be flexibly set according to actual needs.
  • the baseboard control manager can communicate with the remote debugger via Ethernet to read the firmware management image file configured on the remote debugger.
  • the management module 300 controls the server host to locally load the firmware management image file from the baseboard management controller to enable the server host to boot from the virtual boot system. start up.
  • the management module 300 parses the access protocol of the server host into a firmware management image file to read the message, and transmits the packet to the remote debugging machine through the Ethernet. . After receiving the message, the remote debugger returns the data of the firmware management image file to the firmware management device. Then, the management module 300 sends the data of the obtained firmware management image file to the server host through the access protocol, and the control server host loads the firmware management image file to enable the server host to boot from the virtual boot system.
  • the modification module 200 modifies the startup mode configuration of the host to the host slave substrate management control.
  • the device obtains the startup mode, and the host startup mode configured by the modification module 200 is started from the virtual startup system, and when the pre-configured firmware management image file is located on the baseboard management controller local or remote debugging machine, the server host can be implemented from the virtual startup system. Start up and perform firmware management.
  • a third embodiment of the firmware management apparatus of the present invention provides a firmware management apparatus.
  • the management module 300 includes:
  • the restarting unit 310 is configured to control the host to restart, and acquire a startup mode from the baseboard management controller according to the modified startup mode configuration.
  • the restart unit 310 controls the server host to restart.
  • the server BIOS can issue an IPMI command to the restart unit 310 through the SMI bus to obtain the startup mode.
  • the restarting unit 310 returns the server host startup mode configured by the modification module 200 to the server host, so that the server host accesses the virtual booting system.
  • the configuration unit 320 is configured to control the host to start from the virtual boot system according to the acquired startup mode, and load the firmware management image file.
  • the restart unit 310 After the restart unit 310 returns the startup mode to the server host, the server BIOS accesses the virtual boot system and starts.
  • the configuration unit 320 returns the firmware management image file to the server host according to the request of the access protocol to respond to the server host, so that the server host obtains the firmware management image file.
  • the server host acquires and loads the pre-configured firmware management image file through the firmware management device.
  • the management unit 330 is configured to boot the host for firmware management.
  • the management unit 330 controls the firmware management image file to boot the server host for firmware management.
  • the firmware management control software and firmware tool software are automatically run in the operating system environment through script or batch processing, and the firmware sintering, updating, or firmware configuration data backup and recovery are performed according to the actual needs of the current firmware management.
  • the application scenario of the present invention is exemplified by sintering or updating the server firmware.
  • firmware sintering and firmware update can be achieved by firmware sintering.
  • the firmware management image file may include an operating system, firmware management control software, firmware sintering tool software, and server firmware when performing server firmware sintering.
  • Server firmware is currently required to be sintered or updated
  • the server firmware which can be the entire firmware of the current server host, or it can be part of the firmware of the current server host.
  • the management unit 330 After the configuration unit 320 controls the server BIOS to load the firmware management image file and starts it, the management unit 330 automatically runs the firmware management control software and the firmware sintering tool software by script or batch processing.
  • the firmware management control software sends an IPMI command to the management unit 330 through the SMI bus to obtain the configuration file of the current firmware sintering, including the specific firmware for the sintering and the firmware configuration data of the current sintering.
  • the firmware sintering tool software accesses the specific firmware for sintering according to the acquired profile of the firmware sintering.
  • the firmware configuration data of this sintering can be pre-configured locally in the baseboard management controller or in the remote debugging machine, and can be flexibly set according to actual needs.
  • the firmware configuration data for this sinter such as the MAC address, needs to be sintered together with the NIC firmware.
  • the firmware management control software sends an IPMI command to the management unit 330 via the SMI bus, and feeds back to the management unit 330 the progress and results of the firmware sintering.
  • the management unit 330 determines that the current firmware has failed to be sintered.
  • the management unit 330 records the successfully sintered firmware and the sintered failure firmware, and if the firmware fails to be sintered, records the firmware failure and the cause of the sintering failure.
  • the base management unit 330 obtains the result of the current firmware sintering, and stores the result in the baseboard management controller local or remote debugger to complete the firmware management.
  • the restarting unit 310 controls the server host to restart, and acquires the startup mode from the baseboard management controller according to the modified startup mode configuration. Then, the configuration unit 320 controls the host to start from the virtual startup system according to the acquired startup mode, and loads.
  • the preset firmware management image file, the management unit 330 guides the host for firmware management. This implementation carries out batching and automatic processing of server firmware management, improves the function of server firmware management, simplifies the management process, realizes automatic management of server firmware, and improves the maintainability of server firmware.
  • a fourth embodiment of the firmware management apparatus of the present invention provides a firmware management apparatus.
  • the firmware management image file includes a firmware configuration data collection image file
  • the management Unit 330 includes:
  • the collecting subunit 331 is configured to scan the firmware of the host by using the firmware configuration data collection image file, and collect configuration data of the firmware.
  • the firmware management image file may include: an operating system, firmware management control software, firmware configuration data collection tool software.
  • the collection subunit 331 enables the firmware management control software and firmware by using a script or a batch process.
  • the configuration data collection tool software runs automatically, and the server host is booted for firmware management.
  • the firmware configuration data collection tool software scans the hardware device information of the server host and obtains configuration data of the firmware.
  • the firmware management control software then sends the acquired data file to the first storage sub-unit 332 via the SMI bus, USB or other channel.
  • the first storage subunit 332 is configured to store the firmware configuration data for the firmware state recovery.
  • the first storage subunit 332 acquires the data file sent by the firmware management control software to obtain configuration data of the server firmware.
  • the first storage sub-unit 332 stores the obtained server firmware configuration data, and sets it as the recovery of the subsequent server firmware state.
  • the server firmware configuration data can be stored locally to the baseboard management controller or stored in the remote debugger, and can be flexibly set according to actual needs.
  • the background manager can obtain the server firmware configuration data through the Ethernet and save it to the database for the state recovery of the server firmware.
  • the collection subunit 331 scans the firmware of the host through the firmware configuration data collection image file to collect the configuration data of the firmware; the first storage subunit 332 stores the firmware configuration data for firmware state recovery.
  • the server firmware configuration data is collected in batches and automatically, and the management of the server solid configuration data collection is realized, the management process is simplified, the automatic management of the server firmware is realized, and the maintenance of the server firmware is improved.
  • a fifth embodiment of the firmware management apparatus of the present invention provides a firmware management apparatus.
  • the firmware management image file includes a firmware configuration data recovery image file
  • the management Unit 330 also includes:
  • the recovery subunit 333 is configured to restore the image file through the firmware configuration data, and control the corresponding firmware to restore the configuration data.
  • the firmware management image file may include: an operating system, firmware management control software, firmware configuration data recovery tool software, and firmware configuration data files.
  • the recovery subunit 333 automatically runs the firmware management control software and the firmware configuration data recovery tool software by using a script or a batch process. Boot the server host for firmware management.
  • the firmware configuration data recovery tool software accesses the firmware that needs to perform firmware configuration data recovery, and restores the firmware configuration data to the specific hardware device information.
  • the firmware management control software transmits the result of firmware configuration data recovery to the second storage sub-unit 334 via the SMI bus, USB or other channel.
  • the second storage subunit 334 is configured to record and store the firmware configuration data recovery result.
  • the second storage sub-unit 334 obtains the result of the firmware configuration data recovery sent by the firmware management control software, and records and stores the result of the current server firmware configuration data recovery.
  • the result of the server firmware configuration data recovery may be stored locally to the baseboard management controller, or may be stored in the remote debugger, and may be flexibly set according to actual needs.
  • the recovery subunit 333 restores the image file by the firmware configuration data, and controls the corresponding firmware to restore the configuration data; the second storage subunit 334 records and stores the firmware configuration data recovery result.
  • the firmware configuration data is restored, the management of the server solid configuration data recovery is realized, the management process is simplified, the automatic management of the server firmware is realized, and the maintenance of the server firmware is improved.
  • a sixth embodiment of the firmware management apparatus of the present invention provides a firmware management apparatus based on the embodiment shown in any one of the above FIGS. 10-13 (this embodiment uses the firmware of the present invention shown in FIG.
  • the second embodiment of the management device is an example), the firmware management device further includes:
  • the configuration module 400 is configured to configure, by the baseboard management controller, the firmware management image file to be locally or remotely debugged by the baseboard management controller, and the baseboard management controller communicates with the remote debugger to retrieve the remote Debug the firmware management image file on the machine.
  • the firmware management image file pre-configured by the configuration module 400 may be located locally on the baseboard control manager or may be located in the remote debugger, and may be flexibly set according to actual needs.
  • the baseboard control manager can communicate with the remote debugger via Ethernet to read the firmware management image file configured on the remote debugger.
  • the firmware management image file pre-configured by the configuration module 400 is located locally on the substrate control manager, first, through the remote debugger in the background, that is, the background PC (personal computer), or the WEB of the substrate control manager.
  • the network uploads the firmware management image file to the baseboard control manager.
  • the virtual module 100 virtualizes the firmware management image file as a boot system.
  • the modification module 200 modifies the startup mode configuration of the server host, the management module 300 restarts the server host, and controls the server host to boot from the virtual boot system.
  • the server BIOS sends an IPMI command to the baseboard control manager to obtain a startup mode.
  • the modification module 200 configures the server host to boot from the virtual boot system, and the server host accesses the virtual boot system.
  • the management module 300 responds to the request of the server host according to the access protocol, and the server host acquires the firmware management image file and boots the server host with the file integrated OS.
  • the server CPU automatically executes the program specified in the firmware management image file, accesses the device under the server host through the program specified in the firmware management image file, and realizes the sintering, updating, configuration data collection and recovery of the server firmware, and passes the SMI.
  • the execution result is fed back to the substrate control manager.
  • the firmware management image file pre-configured by the configuration module 400 is located in the remote debugging machine, first, The remote debugger, that is, the background PC, and the baseboard control manager communicate via Ethernet, and the virtual module 100 virtualizes the firmware management image file as the boot system.
  • the modification module 200 modifies the startup mode configuration of the server host, the management module 300 restarts the server host, and controls the server host to boot from the virtual boot system.
  • the server BIOS sends an IPMI command to the baseboard control manager to obtain a startup mode.
  • the modification module 200 configures the server host to boot from the virtual boot system, and the server host accesses the virtual boot system.
  • the management module 300 parses the access protocol of the server host into a firmware management image file to read the message, and transmits it to the remote debugger through the Ethernet. After receiving the message, the remote debugger returns the data of the firmware management image file to the management module 300.
  • the management module 300 sends the data of the obtained firmware management image file to the server host through the access protocol, and the control server host starts from the virtual boot system and loads the firmware management image file.
  • the server integrated with the file is used to boot the server host.
  • the server CPU automatically executes the program specified in the firmware management image file, and accesses the device on the server host through the program specified in the firmware management image file. Sintering, updating, configuration data collection and recovery of each firmware of the server are implemented, and the execution result is fed back to the management module 300 through the SMI.
  • the management module 300 returns the feedback result to the background PC via the Ethernet.
  • the configuration module 400 configures the firmware management image file on the baseboard management controller local or remote debugger, and the virtual module 100 and the management module 300 can communicate with the remote debugger to retrieve the firmware management image file on the remote debugger.
  • the server host can be booted from the virtual booting system to perform firmware management, which simplifies the server firmware management process.
  • a seventh embodiment of the firmware management apparatus of the present invention provides a firmware management apparatus.
  • the modification module 200 is further configured to:
  • the modification module 200 modifies the server host startup mode configuration, and changes the original startup mode of the server host.
  • the server host is booted from the mounted virtual boot system for firmware management.
  • the modification module 200 records the original startup mode of the server host, and stores the original startup configuration data of the server host.
  • the original startup configuration data of the server host may be stored locally in the baseboard management controller.
  • the firmware management device further includes:
  • the reset module 500 is configured to control the host reset according to the original boot configuration data.
  • the reset module 500 controls the server host to reset according to the original startup configuration data of the server host.
  • the reset module 500 modifies the startup mode configuration of the server host according to the original startup configuration data of the server host, and restores the original startup mode of the server host.
  • the reset module 500 removes the virtual boot system attached to the server host and controls the server host reset to restore the state before the server firmware management.
  • the modification module 200 backs up the original startup configuration data of the server host; after the management module 300 controls the server host to perform firmware management, the reset module 500 controls the server host to reset according to the original startup configuration data of the server host, and restores to The status before firmware management.
  • the server host is reset, and the automatic management of the server firmware and the maintenance of the improved server firmware are realized.
  • the modules of the above virtual modules, modification modules, management modules, and the units thereof may include software loaded onto a server or related device and/or combined or interacted with related hardware, for example, the virtual modules may include corresponding logic circuits, or include servers The corresponding program in the system.
  • Each of the above modules may be each functional module in the same software system, or may belong to different software/operating systems.
  • the invention relates to the technical field of firmware management, which is used to improve the function of server firmware management, simplify the management process, realize automatic management of server firmware, and improve the maintenance of server firmware.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Stored Programmes (AREA)

Abstract

一种固件管理方法和一种固件管理装置,该方法包括:基板管理控制器将预先配置的固件管理镜像文件虚拟成虚拟启动系统,挂接到主机上(S10);修改所述主机的启动方式配置,所述修改后的主机启动方式配置与所述虚拟启动系统相关联(S20);控制所述主机根据所述修改后的启动方式配置,从所述虚拟启动系统启动,加载所述固件管理镜像文件进行固件管理(S30)。上述方法完善了服务器固件管理的功能,简化了管理流程,实现了对服务器固件的自动化管理,提升的服务器固件的维护性。

Description

固件管理方法和装置 技术领域
本发明涉及固件管理技术领域,尤其涉及一种固件管理方法和装置。
背景技术
服务器是提供计算服务的设备,主要由中央处理器(CPU,Central Processing Unit)、存储设备、内存、I/O(Input/Output,输入/输出)设备等硬件设备组成。在硬件设备中,固件担任着一个系统最基础最底层工作的软件。CPU是一台计算机的运算核心和控制核心,内存用于存放程序运算数据。CPU和内存要正常使用不需要依赖特定的固件。而存储设备、网卡和显卡等输入输出设备一般需要烧结特定的固件,例如显卡固件、网卡固件、SAS(Serial Attached SCSI,串行SCSI技术)控制器固件,才能正常运行。
对于固件的管理,主要有固件烧结、固件更新、固件配置数据的备份和附件配置数据的恢复等。目前,服务器固件管理主要通过两种方式,一种是基于OS(Operation System,操作系统)的软件烧结,一种是特殊电缆烧结。
其中,基于OS的软件烧结,是在服务器上安装操作系统和烧结软件,通过上传固件文件、输入固件的配置数据,使用烧结软件对固件进行烧结或更新。当有多个固件需要烧结或更新时,需要针对每个固件重复进行上述流程。
特殊电缆烧结,是将固件文件上传到调试机,使用特殊电缆连接调试机和被烧结的器件和调试机,给被烧结服务器加电后,在调试机上运行固件烧结软件,输入固件的配置数据,对单板上的固件进行烧结或更新。当有多个固件需要烧结或更新时,需要针对每个固件重复进行上述流程。
由于基于OS的软件烧结和特殊电缆烧结流程复杂,人工操作部分较多,不能保证固件烧结或更新的正确率,不利于服务器单板的批量化生产。尤其当服务器固件进行更新时,现场操作可行性不高,若返厂进行维护则成本增加,导致维护难度大、维护性差。
另外,当服务器更换,但被替换设备的固件配置数据不变时,需要通过服务器的带内或带外接口实现备份固件配置数据的备份和恢复,且由于当前多数设备不支持带外接口的获取和改写,导致软硬件设计的复杂,只能实现部分设备的固件配置数据管理。
由此可见,现有的服务器固件管理流程复杂,功能不完善,人工参与程度高,维护性差。
发明内容
本发明的主要目的在于提供一种固件管理方法和装置,旨在解决固件管理功能不完善、维护性差的技术问题。
为实现上述目的,本发明提供一种固件管理方法,所述固件管理方法包括以下步骤:
基板管理控制器将预先配置的固件管理镜像文件虚拟成虚拟启动系统,挂接到主机上;
修改所述主机的启动方式配置,所述修改后的主机启动方式配置与所述虚拟启动系统相关联;
控制所述主机根据所述修改后的启动方式配置,从所述虚拟启动系统启动,加载所述固件管理镜像文件进行固件管理。
优选的,所述修改所述主机的启动方式配置,所述修改后的主机启动方式配置与所述虚拟启动系统相关联的步骤包括:
将所述主机的启动方式配置修改为从所述基板管理控制器获取启动方式并根据获取的启动方式启动,所述获取的启动方式为从所述虚拟启动系统启动。
优选的,所述控制所述主机根据所述修改后的启动方式配置,从所述虚拟启动系统启动,加载所述固件管理镜像文件进行固件管理的步骤包括:
控制所述主机重启,根据所述修改后的启动方式配置从所述基板管理控制器获取启动方式;
控制所述主机根据所述获取的启动方式,从所述虚拟启动系统启动,加载所述固件管理镜像文件;
引导所述主机进行固件管理。
优选的,所述固件管理镜像文件包括固件配置数据采集镜像文件,所述引导所述主机进行固件管理的步骤包括:
通过所述固件配置数据采集镜像文件扫描所述主机各固件,采集所述固件的配置数据;
存储所述固件配置数据,设置为所述固件状态恢复。
优选的,所述固件管理镜像文件包括固件配置数据恢复镜像文件,所述引导所述主机进行固件管理的步骤还包括:
通过所述固件配置数据恢复镜像文件,控制相应的固件恢复配置数据;
记录并存储所述固件配置数据恢复结果。
优选的,所述基板管理控制器将预先配置的固件管理镜像文件虚拟成虚拟启动系统,挂接到主机上的步骤之前,还包括:
所述基板管理控制器将所述固件管理镜像文件配置在基板管理控制器本地或远程调试机,所述基板管理控制器与所述远程调试机通信,调取所述远程调试机上的固件管理镜像文件。
优选的,所述修改所述主机的启动方式配置的步骤还包括:
修改所述主机的启动方式配置,备份所述主机的原有启动配置数据;
所述控制所述主机从所述虚拟启动系统启动,进行固件管理的步骤之后,还包括:
根据所述原有启动配置数据,控制所述主机复位。
此外,为实现上述目的,本发明还提供一种固件管理装置,所述固件管理装置包括:
虚拟模块,设置为将预先配置的固件管理镜像文件虚拟成虚拟启动系统,挂接到主机上;
修改模块,设置为修改所述主机的启动方式配置,所述修改后的主机启动方式配置与所述虚拟启动系统相关联;
管理模块,设置为控制所述主机根据所述修改后的启动方式配置,从所述虚拟启动系统启动,加载所述固件管理镜像文件进行固件管理。
优选的,所述修改模块还设置为,
将所述主机的启动方式配置修改为从所述基板管理控制器获取启动方式并根据获取的启动方式启动,所述获取的启动方式为从所述虚拟启动系统启动;
所述管理模块包括:
重启单元,设置为控制所述主机重启,根据所述修改后的启动方式配置从所述基板管理控制器获取启动方式;
配置单元,设置为控制所述主机根据所述获取的启动方式,从所述虚拟启动系统启动,加载所述固件管理镜像文件;
管理单元,设置为引导所述主机进行固件管理。
优选的,所述修改模块还设置为,
修改所述主机的启动方式配置,备份所述主机的原有启动配置数据;
所述固件管理装置还包括:
复位模块,设置为根据所述原有启动配置数据,控制所述主机复位。
本发明实施例提出的一种固件管理方法和装置,通过基板管理控制器将预先配置的固件管理镜像文件虚拟成虚拟启动系统,挂接到主机上;修改所述主机的启动方式配置,所述修改后的主机启动方式配置与所述虚拟启动系统相关联;控制所述主机根据所述修改后的启动方式配置,从所述虚拟启动系统启动,加载所述固件管理镜像文件进行固件管理。本发明实施例完善了服务器固件管理的功能,简化了管理流程,实现了对服务器固件的自动化管理,提升了服务器固件的维护性。
附图说明
图1为本发明固件管理方法第一实施例的流程示意图;
图2为本发明固件管理方法第二实施例的流程示意图;
图3为本发明固件管理方法第三实施例的流程示意图;
图4为本发明固件管理方法第四实施例的流程示意图;
图5为本发明固件管理方法第五实施例的流程示意图;
图6为本发明固件管理方法第六实施例的流程示意图;
图7为本发明固件管理方法实施例一种固件管理示意图;
图8为本发明固件管理方法实施例一种固件管理示意图;
图9为本发明固件管理方法第七实施例的流程示意图;
图10为本发明固件管理装置第一实施例、第二实施例的功能模块示意图;
图11为本发明固件管理装置第三实施例的功能模块示意图;
图12为本发明固件管理装置第四实施例的功能模块示意图;
图13为本发明固件管理装置第五实施例的功能模块示意图;
图14为本发明固件管理装置第六实施例的功能模块示意图;
图15为本发明固件管理装置第七实施例的功能模块示意图。
本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
具体实施方式
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
本发明实施例的主要解决方案是:基板管理控制器将预先配置的固件管理镜像文件虚拟成虚拟启动系统,挂接到主机上;修改所述主机的启动方式配置,所述修改后的主机启动方式配置与所述虚拟启动系统相关联;控制所述主机根据所述修改后的启动方式配置,从所述虚拟启动系统启动,加载所述固件管理镜像文件进行固件管理。
由于现有技术进行固件管理时,固件烧结和更新流程复杂,人工参与程度高、自动化程度低,维护性差,且不能实现全部固件配置数据的备份和管理,管理功能不完善。
本发明提供一种解决方案,简化固件的烧结和更新流程,降低人工参与度,实现了全部固件配置数据的备份和管理,完善了固件管理功能。
参照图1,本发明固件管理方法第一实施例提供一种固件管理方法,所述固件管理方法包括:
步骤S10、基板管理控制器将预先配置的固件管理镜像文件虚拟成虚拟启动系统,挂接到主机上。
本发明实施例主要应用于服务器单板的固件管理,但不限定于服务器单板的固件管理,也可应用于其他设备的固件管理。
在本实施例中,服务器单板使用PCIE总线和接口标准,服务器CPU通过PCIE总线连接服务器各部件,如PCIE桥、PCH(Platform Controller Hub,南桥)、网卡、FC(Fibre Controller,光纤控制器)、SAS(Serial Attached SCSI,串行SCSI技术)控制器和显卡等。本实施例可以对PCIE桥、PCH、网卡、FC、SAS控制器和显卡等固件进行管理。
服务器单板管理的固件可以分为两类,一类是与服务器主机硬件设备相关的固件,此类固件只与硬件设备的类型相关,通常是固定的,例如网卡、SAS控制器和显卡等设备的固件,此类固件在本发明实施例中称为固件。另一类固件不与服务器主机硬件设备捆绑,可以发生变化,例如网卡的MAC地址(Media Access Control,物理地址)、FC和SAS控制器的WWN(World Wide Name,全球唯一名字)地址,此类固件在本发明实施例中称为固件配置数据。
本发明实施例所称固件管理包括但不限定于固件的烧结、更新、固件配置数据的备份和恢复。
具体的,作为一种实施方式,本实施例使用基板管理控制器(Baseboard Management Controller,BMC)进行服务器固件烧结的管理。
基板管理控制器安装在服务器主板上,使用IPMI(Intelligent Platform Management Interface,智能平台管理接口),支持本地和远程诊断、控制台支持、配置管理、硬件管理和故障排除等功能。
基板管理控制器通过USB接口,作为USB设备如USB光驱或USB块设备,连接在服务器主机上。服务器可以通过SMI(System Management Interface,系统管理接口)总线,向基板管理控制器发出IPMI命令,进行消息、指令的传输与交互。
预先配置的固件管理镜像文件为集成OS(Operation System,操作系统),如DOS(Disk Operating System,磁盘操作系统),满足服务器主机加载运行,实现固件管理。
固件管理镜像文件包括:操作系统、固件管理控制软件、固件工具软件和服务器固件等。其中,操作系统是固件管理镜像文件中所有软件、工具的运行环境;固件管理控制软件用于控制固件烧结流程、固件配置数据采集流程以及与基板管理控制器的 通信;固件工具软件用于访问具体的固件设备,包括固件烧结工具软件、固件配置数据采集工具软件和固件配置数据恢复工具软件等;服务器固件,包括需要烧结到具体设备的固件软件,可以包括服务器单板的所有固件,也可以根据实际需要配置部分固件。固件管理镜像文件还可以包括固件配置数据文件,用于固件配置数据的恢复,可根据实际需要灵活设定。
可以根据固件管理的实际需要,灵活配置固件管理镜像文件。例如,进行固件烧结管理或固件更新管理时,固件管理镜像文件可以包括需要进行烧结或更新的固件、固件烧结工具软件、固件管理控制软件和操作系统;进行固件配置数据备份时,固件管理镜像文件可以包括固件配置数据采集工具软件、固件管理控制软件和操作系统;进行固件配置数据恢复时,固件管理镜像文件可以包括固件配置数据恢复工具软件、固件配置数据文件、固件管理控制软件和操作系统。
在基板管理控制器启动后,基板管理控制器将预先配置的固件管理镜像文件虚拟为虚拟的启动系统,挂接到服务器主机上,也即将固件管理镜像文件作为虚拟的启动系统挂接在服务器主机上。服务器主机可以访问虚拟启动系统。
步骤S20、修改所述主机的启动方式配置,所述修改后的主机启动方式配置与所述虚拟启动系统相关联。
在基板管理控制器将固件管理镜像文件作为虚拟启动系统挂接到服务器主机上后,具体的,作为一种实施方式,基板管理控制器修改服务器主机启动方式配置,将服务器主机原有的启动方式,改为从基板管理控制获取启动方式。
基板管理控制器配置服务器主机获取的启动方式为从虚拟启动系统启动,以使服务器主机从挂接的虚拟启动系统启动,进行固件管理。
步骤S30、控制所述主机根据所述修改后的启动方式配置,从所述虚拟启动系统启动,加载所述固件管理镜像文件进行固件管理。
在基板管理控制器修改服务器主机的启动方式配置后,具体的,作为一种实施方式,首先,基板管理控制器控制服务器主机重新启动。
服务器主机重启后,根据已被基板管理控制器修改的启动方式向基板管理控制器获取启动方式。
然后,服务器主机访问虚拟启动系统,从虚拟启动系统启动,加载固件管理镜像文件。
在服务器主机加载固件管理镜像文件后,固件管理镜像文件通过脚本或批处理的方式,使固件管理控制软件、固件工具软件在操作系统环境下自动运行,根据当前固件管理的实际需要,进行固件烧结、更新,或固件配置数据的备份、恢复。
在本实施例中,基板管理控制器通过将预先配置的固件管理镜像文件虚拟成虚拟启动系统,挂接到主机上;然后,修改主机的启动方式配置,修改后的主机启动方式配置与虚拟启动系统相关联;控制主机根据修改后的启动方式配置,从虚拟启动系统启动,加载固件管理镜像文件进行固件管理。本实施例完善了服务器固件管理的功能,简化了管理流程,实现了对服务器固件的自动化管理,提升的服务器固件的维护性。
进一步的,参照图2,本发明固件管理方法第二实施例提供一种固件管理方法,基于上述图1所示的实施例,所述步骤S20包括:
步骤S21、将所述主机的启动方式配置修改为从所述基板管理控制器获取启动方式并根据获取的启动方式启动,所述获取的启动方式为从所述虚拟启动系统启动。
在基板管理控制器将固件管理镜像文件作为虚拟启动系统挂接到服务器主机上后,具体的,作为一种实施方式,首先,基板管理控制器修改服务器主机启动方式配置,将服务器主机原有的启动方式,改为从基板管理控制器获取启动方式。
然后,基板管理控制器配置服务器主机的启动方式为从虚拟启动系统启动,将配置的启动方式返回服务器主机,使服务器主机访问虚拟启动系统。
本实施例中,预先配置的固件管理镜像文件可以位于基板控制管理器本地,也可以位于远程调试机,可根据实际需要灵活设定。基板控制管理器可以通过以太网与远程调试机通信,读取远程调试机上配置的固件管理镜像文件。
若预先配置的固件管理镜像文件位于基板管理控制器本地,服务器主机访问虚拟启动系统时,则基板管理控制器控制服务器主机从本地加载固件管理镜像文件,以使服务器主机从虚拟启动系统启动。
若预先配置的固件管理镜像文件位于远程调试机,服务器主机访问虚拟启动系统时,则基板管理控制器将服务器主机的访问协议解析为固件管理镜像文件读取报文,通过以太网传输给远程调试机。远程调试机收到报文后,将固件管理镜像文件的数据返回基板管理控制器。然后,基板管理控制器将得到的固件管理镜像文件的数据通过访问协议发给服务器主机,控制服务器主机加载固件管理镜像文件,以使服务器主机从虚拟启动系统启动。
在本实施例中,基板管理控制器将主机的启动方式配置修改为主机从基板管理控制器获取启动方式,基板管理控制器配置的主机启动方式为从虚拟启动系统启动,实现了预先配置的固件管理镜像文件位于基板管理控制器本地或远程调试机时,均可以实现服务器主机从虚拟启动系统启动,进行固件管理。
进一步的,参照图3,本发明固件管理方法第三实施例提供一种固件管理方法,基于上述图2所示的实施例,所述步骤S30包括:
步骤S31、控制所述主机重启,根据所述修改后的启动方式配置从所述基板管理控制器获取启动方式。
在基板管理控制器修改服务器主机的启动方式配置后,具体的,作为一种实施方式,首先,基板管理控制器控制服务器主机重新启动。
当服务器主机重启时,在BIOS(Basic Input Output System,基本输入输出系统)加载阶段,服务器BIOS可以通过SMI总线,向基板管理控制器发出IPMI命令,获取启动方式。
然后,基板管理控制器将配置的服务器主机启动方式返回服务器主机,使服务器主机访问虚拟启动系统。
步骤S32、控制所述主机根据所述获取的启动方式,从所述虚拟启动系统启动,加载所述固件管理镜像文件。
在基板管理控制器将启动方式返回给服务器主机后,服务器BIOS访问虚拟启动系统,进行启动。
基板管理控制器按照访问协议应答服务器主机的请求,将固件管理镜像文件返回服务器主机,使服务器主机获取固件管理镜像文件。
然后,服务器主机通过基板管理控制器获取预先配置的固件管理镜像文件,并进行加载。
步骤S33、引导所述主机进行固件管理。
在服务器主机加载固件管理镜像文件后,基板管理控制器控制固件管理镜像文件引导服务器主机进行固件管理。
通过脚本或批处理的方式,使固件管理控制软件、固件工具软件在操作系统环境下自动运行,根据当前固件管理的实际需要,进行固件烧结、更新,或固件配置数据的备份、恢复。
以本发明应用场景为服务器固件烧结或更新,进行举例说明。在本实施例中,固件烧结和固件更新均可以通过固件烧结实现。
在进行服务器固件的烧结时,固件管理镜像文件可以包括:操作系统、固件管理控制软件、固件烧结工具软件和服务器固件等。服务器固件为当前需要烧结或更新的服务器固件,可以是当前服务器主机的全部固件,也可以是当前服务器主机的部分固件。
基板管理控制器控制服务器BIOS加载固件管理镜像文件并启动后,通过脚本或批处理的方式使固件管理控制软件、固件烧结工具软件自动运行。
其中,固件管理控制软件通过SMI总线向基板管理控制器发送IPMI命令,获取本次固件烧结的配置文件,包括本次烧结所针对的具体固件、本次烧结的固件配置数 据。固件烧结工具软件根据获取的本次固件烧结的配置文件,访问具体的固件进行烧结。
本次烧结的固件配置数据,可以预先配置在基板管理控制器本地,也可以配置在远程调试机,可根据实际需要灵活设定。本次烧结的固件配置数据,例如MAC地址,需要和网卡固件一起进行烧结。
在进行固件烧结的同时,固件管理控制软件通过SMI总线向基板管理控制器发送IPMI命令,向基板管理控制器反馈当固件烧结或更新的进度和结果。
为保障固件烧结或更新的安全,若基板管理控制器在预设的超时时间内未收到固件管理控制软件反馈的任何消息,则判定当前固件烧结失败。
基板管理控制器记录烧结成功的固件和烧结失败的固件,若固件烧结失败,则记录烧结失败的固件和烧结失败的原因。
由此,基板管理控制器得到当前固件烧结的结果,并将结果存储在基板管理控制器本地或远程调试机,完成本次固件管理。
在本实施例中,基板管理控制器控制服务器主机重启,根据修改后的启动方式配置从基板管理控制器获取启动方式;然后,控制主机根据获取的启动方式,从虚拟启动系统启动,加载预置的固件管理镜像文件,引导主机进行固件管理。本实施进行了服务器固件管理的批量化、自动化处理,完善了服务器固件管理的功能,简化了管理流程,实现了对服务器固件的自动化管理,提升的服务器固件的维护性。
进一步的,参照图4,本发明固件管理方法第四实施例提供一种固件管理方法,基于上述图3所示的实施例,所述固件管理镜像文件包括固件配置数据采集镜像文件,所述步骤S33包括:
步骤S331、通过所述固件配置数据采集镜像文件扫描所述主机各固件,采集所述固件的配置数据。
若当前固件管理为服务器固件配置数据的采集,则固件管理镜像文件可以包括:操作系统、固件管理控制软件、固件配置数据采集工具软件。
具体的,作为一种实施方式,基板管理控制器控制服务器BIOS加载固件管理镜像文件并启动后,通过脚本或批处理的方式使固件管理控制软件、固件配置数据采集工具软件自动运行,引导服务器主机进行固件管理。
其中,固件配置数据采集工具软件扫描服务器主机的硬件设备信息,并且获取固件的配置数据。
然后,固件管理控制软件通过SMI总线、USB或其他通道,将获取的数据文件发送给基板管理控制器。
步骤S332、存储所述固件配置数据,设置为所述固件状态恢复。
基板管理控制器获取固件管理控制软件发送的数据文件,得到服务器固件的配置数据。
然后,基板管理控制器将得到的服务器固件配置数据进行存储,设置为后续服务器固件状态的恢复。
其中,服务器固件配置数据可以存储到基板管理控制器本地,也可以存储在远程调试机,可根据实际需要灵活设定。后台管理者可以通过以太网获取服务器固件配置数据,并保存到数据库中,设置为服务器固件的状态恢复。
在本实施例中,基板管理控制器通过固件配置数据采集镜像文件扫描主机各固件,采集固件的配置数据;存储固件配置数据,用于固件状态恢复。本实施例批量化、自动化的进行了服务器固件配置数据的采集,实现了服务器固配置数据采集的管理,简化了管理流程,实现了对服务器固件的自动化管理,提升的服务器固件的维护性。
进一步的,参照图5,本发明固件管理方法第五实施例提供一种固件管理方法,基于上述图3所示的实施例,所述固件管理镜像文件包括固件配置数据恢复镜像文件,所述步骤S33还包括:
步骤S333、通过所述固件配置数据恢复镜像文件,控制相应的固件恢复配置数据。
若当前固件管理为服务器固件配置数据的采集,则固件管理镜像文件可以包括:操作系统、固件管理控制软件、固件配置数据恢复工具软件和固件配置数据文件。
具体的,作为一种实施方式,基板管理控制器控制服务器BIOS加载固件管理镜像文件并启动后,通过脚本或批处理的方式使固件管理控制软件、固件配置数据恢复工具软件自动运行,引导服务器主机进行固件管理。
其中,固件配置数据恢复工具软件访问需要进行固件配置数据恢复的固件,将固件配置数据恢复到具体的硬件设备信息中。
固件管理控制软件通过SMI总线、USB或其他通道,将固件配置数据恢复的结果发送给基板管理控制器。
步骤S334、记录并存储所述固件配置数据恢复结果。
基板管理控制器获取固件管理控制软件发送的固件配置数据恢复的结果,记录并存储本次服务器固件配置数据恢复的结果。
其中,本次服务器固件配置数据恢复的结果可以存储到基板管理控制器本地,也可以存储在远程调试机,可根据实际需要灵活设定。
在本实施例中,基板管理控制器通过固件配置数据恢复镜像文件,控制相应的固 件恢复配置数据;记录并存储固件配置数据恢复结果。本实施例进行了固件配置数据的恢复,实现了服务器固配置数据恢复的管理,简化了管理流程,实现了对服务器固件的自动化管理,提升的服务器固件的维护性。
进一步的,参照图6,本发明固件管理方法第六实施例提供一种固件管理方法,基于上述图1-5任一项所示的实施例(本实施例以图2为例),所述步骤S10之前,还包括:
步骤S40、所述基板管理控制器将所述固件管理镜像文件配置在基板管理控制器本地或远程调试机,所述基板管理控制器与所述远程调试机通信,调取所述远程调试机上的固件管理镜像文件。
本实施例中,预先配置的固件管理镜像文件可以位于基板控制管理器本地,也可以位于远程调试机,可根据实际需要灵活设定。基板控制管理器可以通过以太网与远程调试机通信,读取远程调试机上配置的固件管理镜像文件。
参照图7,若预先配置的固件管理镜像文件位于基板控制管理器本地,首先,通过后台的远程调试机,也即后台PC(personal computer,个人计算机),或基板控制管理器的WEB网,将固件管理镜像文件上传到基板控制管理器本地。基板控制管理器将固件管理镜像文件虚拟为启动系统。
然后,基板控制管理器修改服务器主机的启动方式配置,重启服务器主机,并控制服务器主机从虚拟启动系统启动。
服务器BIOS通过SMI向基板控制管理器发送IPMI命令获取启动方式,基板控制管理器配置服务器主机从虚拟启动系统启动,服务器主机访问虚拟启动系统。
基板控制管理器按照访问协议应答服务器主机的请求,服务器主机获取固件管理镜像文件并以此文件集成的OS来引导服务器主机启动。
然后,服务器CPU自动执行固件管理镜像文件中指定的程序,通过固件管理镜像文件中指定的程序访问服务器主机下的设备,实现服务器各固件的烧结、更新、配置数据的采集和恢复,并通过SMI向基板控制管理器反馈执行结果。
参照图8,若预先配置的固件管理镜像文件位于远程调试机,首先,远程调试机,也即后台PC,和基板控制管理器通过以太网通信,基板控制管理器将固件管理镜像文件虚拟为启动系统。
然后,基板控制管理器修改服务器主机的启动方式配置,重启服务器主机,并控制服务器主机从虚拟启动系统启动。
服务器BIOS通过SMI向基板控制管理器发送IPMI命令获取启动方式,基板控制管理器配置服务器主机从虚拟启动系统,服务器主机访问虚拟启动系统。
然后,基板控制管理器将服务器主机的访问协议解析为固件管理镜像文件读取报文,通过以太网传输给远程调试机。远程调试机收到报文后,将固件管理镜像文件的 数据返回基板管理控制器。
然后,基板管理控制器将得到的固件管理镜像文件的数据通过访问协议发给服务器主机,控制服务器主机从虚拟启动系统启动,加载固件管理镜像文件。
服务器主机获取固件管理镜像文件后,以此文件集成的OS来引导服务器主机启动,服务器CPU自动执行固件管理镜像文件中指定的程序,通过固件管理镜像文件中指定的程序访问服务器主机上的设备,实现服务器各固件的烧结、更新、配置数据的采集和恢复,并通过SMI向基板控制管理器反馈执行结果。基板控制管理器将反馈结果通过以太网返回给后台PC。
在本实施例中,基板管理控制器将固件管理镜像文件配置在基板管理控制器本地或远程调试机,基板管理控制器与远程调试机通信,调取远程调试机上的固件管理镜像文件,用于服务器固件的管理。本实施例实现了预先配置的固件管理镜像文件位于基板管理控制器本地或远程调试机时,均可以实现服务器主机从虚拟启动系统启动,进行固件管理,简化了服务器固件管理流程。
进一步的,参照图9,本发明固件管理方法第七实施例提供一种固件管理方法,基于上述图6所示的实施例,所述步骤S20还包括:
步骤S22、修改所述主机的启动方式配置,备份所述主机的原有启动配置数据。
在基板管理控制器将固件管理镜像文件作为虚拟启动系统挂接到服务器主机上后,具体的,作为一种实施方式,基板管理控制器修改服务器主机启动方式配置,将服务器主机原有的启动方式,改为从基板管理控制器获取启动方式,以使服务器主机从挂接的虚拟启动系统启动,进行固件管理。
同时,基板管理控制器记录服务器主机原有的启动方式,存储服务器主机原有的启动配置数据。其中,服务器主机原有的启动配置数据可以存储在基板管理控制器本地。
所述步骤S30之后,还包括:
步骤S50、根据所述原有启动配置数据,控制所述主机复位。
在基板管理控制器控制服务器主机根据所述修改后的启动方式配置,从虚拟启动系统启动,进行固件管理后,基板管理控制器根据服务器主机原有的启动配置数据,控制服务器主机复位。
具体的,作为一种实施方式,基板管理控制器根据服务器主机原有的启动配置数据,修改服务器主机的启动方式配置,恢复服务器主机原有的启动方式。
然后,基板管理控制器去除服务器主机上挂接的虚拟启动系统,并控制服务器主机复位,恢复到进行服务器固件管理之前的状态。
在本实施例中,基板管理控制器备份服务器主机的原有启动配置数据;在控制服务器主机进行固件管理后,根据服务器主机原有启动配置数据,控制服务器主机复位,恢复到进行固件管理之前的状态。本实施例实现了在完成对服务器主机的固件管理后,服务器主机的复位,实现了对服务器固件的自动化管理,提升的服务器固件的维护性。
参照图10,本发明固件管理装置第一实施例提供一种固件管理装置,所述固件管理装置包括:
虚拟模块100,设置为将预先配置的固件管理镜像文件虚拟成虚拟启动系统,挂接到主机上。
本发明实施例主要应用于服务器单板的固件管理,但不限定于服务器单板的固件管理,也可应用于其他设备的固件管理。
在本实施例中,服务器单板使用PCIE总线和接口标准,服务器CPU通过PCIE总线连接服务器各部件,如PCIE桥、PCH(Platform Controller Hub,南桥)、网卡、FC(Fibre Controller,光纤控制器)、SAS(Serial Attached SCSI,串行SCSI技术)控制器和显卡等。本实施例可以对PCIE桥、PCH、网卡、FC、SAS控制器和显卡等固件进行管理。
服务器单板管理的固件可以分为两类,一类是与服务器主机硬件设备相关的固件,此类固件只与硬件设备的类型相关,通常是固定的,例如网卡、SAS控制器和显卡等设备的固件,此类固件在本发明实施例中称为固件。另一类固件不与服务器主机硬件设备捆绑,可以发生变化,例如网卡的MAC地址(Media Access Control,物理地址)、FC和SAS控制器的WWN(World Wide Name,全球唯一名字)地址,此类固件在本发明实施例中称为固件配置数据。
本发明实施例所称固件管理包括但不限定于固件的烧结、更新、固件配置数据的备份和恢复。
具体的,作为一种实施方式,本实施例使用固件管理装置进行服务器固件烧结的管理。固件管理装置位于基板管理控制器(Baseboard Management Controller,BMC)。
基板管理控制器安装在服务器主板上,使用IPMI(Intelligent Platform Management Interface,智能平台管理接口),支持本地和远程诊断、控制台支持、配置管理、硬件管理和故障排除等功能。
基板管理控制器通过USB接口,作为USB设备如USB光驱或USB块设备,连接在服务器主机上。服务器可以通过SMI(System Management Interface,系统管理接口)总线,向基板管理控制器发出IPMI命令,进行消息、指令的传输与交互。
预先配置的固件管理镜像文件为集成OS(Operation System,操作系统),如DOS (Disk Operating System,磁盘操作系统),满足服务器主机加载运行,实现固件管理。
固件管理镜像文件包括:操作系统、固件管理控制软件、固件工具软件和服务器固件等。其中,操作系统是固件管理镜像文件中所有软件、工具的运行环境;固件管理控制软件用于控制固件烧结流程、固件配置数据采集流程以及与固件管理装置的通信;固件工具软件用于访问具体的固件设备,包括固件烧结工具软件、固件配置数据采集工具软件和固件配置数据恢复工具软件等;服务器固件,包括需要烧结到具体设备的固件软件,可以包括服务器单板的所有固件,也可以根据实际需要配置部分固件。固件管理镜像文件还可以包括固件配置数据文件,用于固件配置数据的恢复,可根据实际需要灵活设定。
可以根据固件管理的实际需要,灵活配置固件管理镜像文件。例如,进行固件烧结管理或固件更新管理时,固件管理镜像文件可以包括需要进行烧结或更新的固件、固件烧结工具软件、固件管理控制软件和操作系统;进行固件配置数据备份时,固件管理镜像文件可以包括固件配置数据采集工具软件、固件管理控制软件和操作系统;进行固件配置数据恢复时,固件管理镜像文件可以包括固件配置数据恢复工具软件、固件配置数据文件、固件管理控制软件和操作系统。
在进行服务器固件管理时,虚拟模块100将预先配置的固件管理镜像文件虚拟为虚拟的启动系统,挂接到服务器主机上,也即将固件管理镜像文件作为虚拟的启动系统挂接在服务器主机上。服务器主机可以访问虚拟启动系统。
修改模块200,设置为修改所述主机的启动方式配置,所述修改后的主机启动方式配置与所述虚拟启动系统相关联。
在虚拟模块100将固件管理镜像文件作为虚拟启动系统挂接到服务器主机上后,具体的,作为一种实施方式,修改模块200修改服务器主机启动方式配置,将服务器主机原有的启动方式,改为从基板管理控制获取启动方式。
修改模块200配置服务器主机获取的启动方式为从虚拟启动系统启动,以使服务器主机从挂接的虚拟启动系统启动,进行固件管理。
管理模块300,设置为控制所述主机根据所述修改后的启动方式配置,从所述虚拟启动系统启动,加载所述固件管理镜像文件进行固件管理。
在修改模块200修改服务器主机的启动方式配置后,具体的,作为一种实施方式,首先,管理模块300控制服务器主机重新启动。
服务器主机重启后,根据已被修改模块200修改的启动方式,向固件管理装置获取启动方式。
然后,服务器主机访问虚拟启动系统,从虚拟启动系统启动,加载固件管理镜像文件。
在服务器主机加载固件管理镜像文件后,固件管理镜像文件通过脚本或批处理的方式,使固件管理控制软件、固件工具软件在操作系统环境下自动运行,根据当前固件管理的实际需要,进行固件烧结、更新,或固件配置数据的备份、恢复。
在本实施例中,虚拟模块100将预先配置的固件管理镜像文件虚拟成虚拟启动系统,挂接到主机上;然后,修改模块200修改主机的启动方式配置,修改后的主机启动方式配置与虚拟启动系统相关联;管理模块300控制主机根据修改后的启动方式配置,从虚拟启动系统启动,加载固件管理镜像文件进行固件管理。本实施例完善了服务器固件管理的功能,简化了管理流程,实现了对服务器固件的自动化管理,提升的服务器固件的维护性。
进一步的,参照图10,本发明固件管理装置第二实施例提供一种固件管理装置,基于上述图10所示的本发明固件管理装置第一实施例,所述修改模块200还设置为:
将所述主机的启动方式配置修改为从所述基板管理控制器获取启动方式并根据获取的启动方式启动,所述获取的启动方式为从所述虚拟启动系统启动。
在虚拟模块100将固件管理镜像文件作为虚拟启动系统挂接到服务器主机上后,具体的,作为一种实施方式,首先,修改模块200修改服务器主机启动方式配置,将服务器主机原有的启动方式,改为从基板管理控制器上的固件管理装置获取启动方式。
然后,修改模块200配置服务器主机的启动方式为从虚拟启动系统启动,将配置的启动方式返回服务器主机,使服务器主机访问虚拟启动系统。
本实施例中,预先配置的固件管理镜像文件可以位于基板控制管理器本地,也可以位于远程调试机,可根据实际需要灵活设定。基板控制管理器可以通过以太网与远程调试机通信,读取远程调试机上配置的固件管理镜像文件。
若预先配置的固件管理镜像文件位于基板管理控制器本地,服务器主机访问虚拟启动系统时,则管理模块300控制服务器主机从基板管理控制器本地加载固件管理镜像文件,以使服务器主机从虚拟启动系统启动。
若预先配置的固件管理镜像文件位于远程调试机,服务器主机访问虚拟启动系统时,则管理模块300将服务器主机的访问协议解析为固件管理镜像文件读取报文,通过以太网传输给远程调试机。远程调试机收到报文后,将固件管理镜像文件的数据返回固件管理装置。然后,管理模块300将得到的固件管理镜像文件的数据通过访问协议发给服务器主机,控制服务器主机加载固件管理镜像文件,以使服务器主机从虚拟启动系统启动。
在本实施例中,修改模块200将主机的启动方式配置修改为主机从基板管理控制 器获取启动方式,修改模块200配置的主机启动方式为从虚拟启动系统启动,实现了预先配置的固件管理镜像文件位于基板管理控制器本地或远程调试机时,均可以实现服务器主机从虚拟启动系统启动,进行固件管理。
进一步的,参照图11,本发明固件管理装置第三实施例提供一种固件管理装置,基于上述图10所示的本发明固件管理装置第二实施例,所述管理模块300包括:
重启单元310,设置为控制所述主机重启,根据所述修改后的启动方式配置从所述基板管理控制器获取启动方式。
在修改模块200修改服务器主机的启动方式配置后,具体的,作为一种实施方式,首先,重启单元310控制服务器主机重新启动。
当服务器主机重启时,在BIOS(Basic Input Output System,基本输入输出系统)加载阶段,服务器BIOS可以通过SMI总线,向重启单元310发出IPMI命令,获取启动方式。
然后,重启单元310将修改模块200配置的服务器主机启动方式返回服务器主机,使服务器主机访问虚拟启动系统。
配置单元320,设置为控制所述主机根据所述获取的启动方式,从所述虚拟启动系统启动,加载所述固件管理镜像文件。
在重启单元310将启动方式返回给服务器主机后,服务器BIOS访问虚拟启动系统,进行启动。
配置单元320按照访问协议应答服务器主机的请求,将固件管理镜像文件返回服务器主机,使服务器主机获取固件管理镜像文件。
然后,服务器主机通过固件管理装置获取预先配置的固件管理镜像文件,并进行加载。
管理单元330,设置为引导所述主机进行固件管理。
在服务器主机加载固件管理镜像文件后,管理单元330控制固件管理镜像文件引导服务器主机进行固件管理。
通过脚本或批处理的方式,使固件管理控制软件、固件工具软件在操作系统环境下自动运行,根据当前固件管理的实际需要,进行固件烧结、更新,或固件配置数据的备份、恢复。
以本发明应用场景为服务器固件烧结或更新,进行举例说明。在本实施例中,固件烧结和固件更新均可以通过固件烧结实现。
在进行服务器固件的烧结时,固件管理镜像文件可以包括:操作系统、固件管理控制软件、固件烧结工具软件和服务器固件等。服务器固件为当前需要烧结或更新的 服务器固件,可以是当前服务器主机的全部固件,也可以是当前服务器主机的部分固件。
配置单元320控制服务器BIOS加载固件管理镜像文件并启动后,管理单元330通过脚本或批处理的方式使固件管理控制软件、固件烧结工具软件自动运行。
其中,固件管理控制软件通过SMI总线向管理单元330发送IPMI命令,获取本次固件烧结的配置文件,包括本次烧结所针对的具体固件、本次烧结的固件配置数据。固件烧结工具软件根据获取的本次固件烧结的配置文件,访问具体的固件进行烧结。
本次烧结的固件配置数据,可以预先配置在基板管理控制器本地,也可以配置在远程调试机,可根据实际需要灵活设定。本次烧结的固件配置数据,例如MAC地址,需要和网卡固件一起进行烧结。
在进行固件烧结的同时,固件管理控制软件通过SMI总线向管理单元330发送IPMI命令,向管理单元330反馈当固件烧结的进度和结果。
为保障固件烧结的安全,若管理单元330在预设的超时时间内未收到固件管理控制软件反馈的任何消息,则判定当前固件烧结失败。
管理单元330记录烧结成功的固件和烧结失败的固件,若固件烧结失败,则记录烧结失败的固件和烧结失败的原因。
由此,基管理单元330得到当前固件烧结的结果,并将结果存储在基板管理控制器本地或远程调试机,完成本次固件管理。
在本实施例中,重启单元310控制服务器主机重启,根据修改后的启动方式配置从基板管理控制器获取启动方式;然后,配置单元320控制主机根据获取的启动方式,从虚拟启动系统启动,加载预置的固件管理镜像文件,管理单元330引导主机进行固件管理。本实施进行了服务器固件管理的批量化、自动化处理,完善了服务器固件管理的功能,简化了管理流程,实现了对服务器固件的自动化管理,提升的服务器固件的维护性。
进一步的,参照图12,本发明固件管理装置第四实施例提供一种固件管理装置,基于上述图11所示的实施例,所述固件管理镜像文件包括固件配置数据采集镜像文件,所述管理单元330包括:
采集子单元331,设置为通过所述固件配置数据采集镜像文件扫描所述主机各固件,采集所述固件的配置数据。
若当前固件管理为服务器固件配置数据的采集,则固件管理镜像文件可以包括:操作系统、固件管理控制软件、固件配置数据采集工具软件。
具体的,作为一种实施方式,配置单元320控制服务器BIOS加载固件管理镜像文件并启动后,采集子单元331通过脚本或批处理的方式使固件管理控制软件、固件 配置数据采集工具软件自动运行,引导服务器主机进行固件管理。
其中,固件配置数据采集工具软件扫描服务器主机的硬件设备信息,并且获取固件的配置数据。
然后,固件管理控制软件通过SMI总线、USB或其他通道,将获取的数据文件发送给第一存储子单元332。
第一存储子单元332,设置为存储所述固件配置数据,用于所述固件状态恢复。
第一存储子单元332获取固件管理控制软件发送的数据文件,得到服务器固件的配置数据。
然后,第一存储子单元332将得到的服务器固件配置数据进行存储,设置为后续服务器固件状态的恢复。
其中,服务器固件配置数据可以存储到基板管理控制器本地,也可以存储在远程调试机,可根据实际需要灵活设定。后台管理者可以通过以太网获取服务器固件配置数据,并保存到数据库中,用于服务器固件的状态恢复。
在本实施例中,采集子单元331通过固件配置数据采集镜像文件扫描主机各固件,采集固件的配置数据;第一存储子单元332存储固件配置数据,用于固件状态恢复。本实施例批量化、自动化的进行了服务器固件配置数据的采集,实现了服务器固配置数据采集的管理,简化了管理流程,实现了对服务器固件的自动化管理,提升的服务器固件的维护性。
进一步的,参照图13,本发明固件管理装置第五实施例提供一种固件管理装置,基于上述图11所示的实施例,所述固件管理镜像文件包括固件配置数据恢复镜像文件,所述管理单元330还包括:
恢复子单元333,设置为通过所述固件配置数据恢复镜像文件,控制相应的固件恢复配置数据。
若当前固件管理为服务器固件配置数据的采集,则固件管理镜像文件可以包括:操作系统、固件管理控制软件、固件配置数据恢复工具软件和固件配置数据文件。
具体的,作为一种实施方式,配置单元320控制服务器BIOS加载固件管理镜像文件并启动后,恢复子单元333通过脚本或批处理的方式使固件管理控制软件、固件配置数据恢复工具软件自动运行,引导服务器主机进行固件管理。
其中,固件配置数据恢复工具软件访问需要进行固件配置数据恢复的固件,将固件配置数据恢复到具体的硬件设备信息中。
固件管理控制软件通过SMI总线、USB或其他通道,将固件配置数据恢复的结果发送给第二存储子单元334。
第二存储子单元334,设置为记录并存储所述固件配置数据恢复结果。
第二存储子单元334获取固件管理控制软件发送的固件配置数据恢复的结果,记录并存储本次服务器固件配置数据恢复的结果。
其中,本次服务器固件配置数据恢复的结果可以存储到基板管理控制器本地,也可以存储在远程调试机,可根据实际需要灵活设定。
在本实施例中,恢复子单元333通过固件配置数据恢复镜像文件,控制相应的固件恢复配置数据;第二存储子单元334记录并存储固件配置数据恢复结果。本实施例进行了固件配置数据的恢复,实现了服务器固配置数据恢复的管理,简化了管理流程,实现了对服务器固件的自动化管理,提升的服务器固件的维护性。
进一步的,参照图14,本发明固件管理装置第六实施例提供一种固件管理装置,基于上述图10-13任一项所示的实施例(本实施例以图10所示的本发明固件管理装置第二实施例为例),所述固件管理装置还包括:
配置模块400,设置为所述基板管理控制器将所述固件管理镜像文件配置在基板管理控制器本地或远程调试机,所述基板管理控制器与所述远程调试机通信,调取所述远程调试机上的固件管理镜像文件。
本实施例中,配置模块400预先配置的固件管理镜像文件可以位于基板控制管理器本地,也可以位于远程调试机,可根据实际需要灵活设定。基板控制管理器可以通过以太网与远程调试机通信,读取远程调试机上配置的固件管理镜像文件。
参照图7,若配置模块400预先配置的固件管理镜像文件位于基板控制管理器本地,首先,通过后台的远程调试机,也即后台PC(personal computer,个人计算机),或基板控制管理器的WEB网,将固件管理镜像文件上传到基板控制管理器本地。虚拟模块100将固件管理镜像文件虚拟为启动系统。
然后,修改模块200修改服务器主机的启动方式配置,管理模块300重启服务器主机,并控制服务器主机从虚拟启动系统启动。
服务器BIOS通过SMI向基板控制管理器发送IPMI命令获取启动方式,修改模块200配置服务器主机从虚拟启动系统启动,服务器主机访问虚拟启动系统。
管理模块300按照访问协议应答服务器主机的请求,服务器主机获取固件管理镜像文件并以此文件集成的OS来引导服务器主机启动。
然后,服务器CPU自动执行固件管理镜像文件中指定的程序,通过固件管理镜像文件中指定的程序访问服务器主机下的设备,实现服务器各固件的烧结、更新、配置数据的采集和恢复,并通过SMI向基板控制管理器反馈执行结果。
参照图8,若配置模块400预先配置的固件管理镜像文件位于远程调试机,首先, 远程调试机,也即后台PC,和基板控制管理器通过以太网通信,虚拟模块100将固件管理镜像文件虚拟为启动系统。
然后修改模块200修改服务器主机的启动方式配置,管理模块300重启服务器主机,并控制服务器主机从虚拟启动系统启动。
服务器BIOS通过SMI向基板控制管理器发送IPMI命令获取启动方式,修改模块200配置服务器主机从虚拟启动系统启动,服务器主机访问虚拟启动系统。
然后,管理模块300将服务器主机的访问协议解析为固件管理镜像文件读取报文,通过以太网传输给远程调试机。远程调试机收到报文后,将固件管理镜像文件的数据返回管理模块300。
然后,管理模块300将得到的固件管理镜像文件的数据通过访问协议发给服务器主机,控制服务器主机从虚拟启动系统启动,加载固件管理镜像文件。
服务器主机获取固件管理镜像文件后,以此文件集成的OS来引导服务器主机启动,服务器CPU自动执行固件管理镜像文件中指定的程序,通过固件管理镜像文件中指定的程序访问服务器主机上的设备,实现服务器各固件的烧结、更新、配置数据的采集和恢复,并通过SMI向管理模块300反馈执行结果。管理模块300将反馈结果通过以太网返回给后台PC。
在本实施例中,配置模块400将固件管理镜像文件配置在基板管理控制器本地或远程调试机,虚拟模块100和管理模块300可与远程调试机通信,调取远程调试机上的固件管理镜像文件,用于服务器固件的管理。本实施例实现了预先配置的固件管理镜像文件位于基板管理控制器本地或远程调试机时,均可以实现服务器主机从虚拟启动系统启动,进行固件管理,简化了服务器固件管理流程。
进一步的,参照图15,本发明固件管理装置第七实施例提供一种固件管理装置,基于上述图14所示的实施例,所述修改模块200还设置为,
修改所述主机的启动方式配置,备份所述主机的原有启动配置数据。
在虚拟模块100将固件管理镜像文件作为虚拟启动系统挂接到服务器主机上后,具体的,作为一种实施方式,修改模块200修改服务器主机启动方式配置,将服务器主机原有的启动方式,改为从基板管理控制器上的固件管理装置获取启动方式,以使服务器主机从挂接的虚拟启动系统启动,进行固件管理。
同时,修改模块200记录服务器主机原有的启动方式,存储服务器主机原有的启动配置数据。其中,服务器主机原有的启动配置数据可以存储在基板管理控制器本地。
所述固件管理装置还包括:
复位模块500,设置为根据所述原有启动配置数据,控制所述主机复位。
在管理模块300控制服务器主机根据所述修改后的启动方式配置,从虚拟启动系统启动,进行固件管理后,复位模块500根据服务器主机原有的启动配置数据,控制服务器主机复位。
具体的,作为一种实施方式,复位模块500根据服务器主机原有的启动配置数据,修改服务器主机的启动方式配置,恢复服务器主机原有的启动方式。
然后,复位模块500去除服务器主机上挂接的虚拟启动系统,并控制服务器主机复位,恢复到进行服务器固件管理之前的状态。
在本实施例中,修改模块200备份服务器主机的原有启动配置数据;在管理模块300控制服务器主机进行固件管理后,复位模块500根据服务器主机原有启动配置数据,控制服务器主机复位,恢复到进行固件管理之前的状态。本实施例实现了在完成对服务器主机的固件管理后,服务器主机的复位,实现了对服务器固件的自动化管理,提升的服务器固件的维护性。
上述虚拟模块、修改模块、管理模块等模块及其单元可包括加载到服务器或相关设备上的软件及/或与相关硬件的结合或交互,例如,虚拟模块可包括对应的逻辑电路,或包括服务器系统中相应的程序。上述各模块可以是同一软件系统中的各功能模块,也可能分属不同的软件/操作系统。
以上仅为本发明的优选实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。
工业实用性
本发明涉及固件管理技术领域,用以完善服务器固件管理的功能,简化管理流程,实现对服务器固件的自动化管理,提升服务器固件的维护性。

Claims (10)

  1. 一种固件管理方法,包括以下步骤:
    基板管理控制器将预先配置的固件管理镜像文件虚拟成虚拟启动系统,挂接到主机上;
    修改所述主机的启动方式配置,所述修改后的主机启动方式配置与所述虚拟启动系统相关联;
    控制所述主机根据所述修改后的启动方式配置,从所述虚拟启动系统启动,加载所述固件管理镜像文件进行固件管理。
  2. 如权利要求1所述的固件管理方法,其中,所述修改所述主机的启动方式配置,所述修改后的主机启动方式配置与所述虚拟启动系统相关联的步骤包括:
    将所述主机的启动方式配置修改为从所述基板管理控制器获取启动方式并根据获取的启动方式启动,所述获取的启动方式为从所述虚拟启动系统启动。
  3. 如权利要求2所述的固件管理方法,其中,所述控制所述主机根据所述修改后的启动方式配置,从所述虚拟启动系统启动,加载所述固件管理镜像文件进行固件管理的步骤包括:
    控制所述主机重启,根据所述修改后的启动方式配置从所述基板管理控制器获取启动方式;
    控制所述主机根据所述获取的启动方式,从所述虚拟启动系统启动,加载所述固件管理镜像文件;
    引导所述主机进行固件管理。
  4. 如权利要求3所述的固件管理方法,其中,所述固件管理镜像文件包括固件配置数据采集镜像文件,所述引导所述主机进行固件管理的步骤包括:
    通过所述固件配置数据采集镜像文件扫描所述主机各固件,采集所述固件的配置数据;
    存储所述固件配置数据,用于所述固件状态恢复。
  5. 如权利要求3所述的固件管理方法,其中,所述固件管理镜像文件包括固件配置数据恢复镜像文件,所述引导所述主机进行固件管理的步骤还包括:
    通过所述固件配置数据恢复镜像文件,控制相应的固件恢复配置数据;
    记录并存储所述固件配置数据恢复结果。
  6. 如权利要求1-5任一项所述的固件管理方法,其中,所述基板管理控制器将 预先配置的固件管理镜像文件虚拟成虚拟启动系统,挂接到主机上的步骤之前,还包括:
    所述基板管理控制器将所述固件管理镜像文件配置在基板管理控制器本地或远程调试机,所述基板管理控制器与所述远程调试机通信,调取所述远程调试机上的固件管理镜像文件。
  7. 如权利要求6所述的固件管理方法,其中,所述修改所述主机的启动方式配置的步骤还包括:
    修改所述主机的启动方式配置,备份所述主机的原有启动配置数据;
    所述控制所述主机从所述虚拟启动系统启动,进行固件管理的步骤之后,还包括:
    根据所述原有启动配置数据,控制所述主机复位。
  8. 一种固件管理装置,包括:
    虚拟模块,设置为将预先配置的固件管理镜像文件虚拟成虚拟启动系统,挂接到主机上;
    修改模块,设置为修改所述主机的启动方式配置,所述修改后的主机启动方式配置与所述虚拟启动系统相关联;
    管理模块,设置为控制所述主机根据所述修改后的启动方式配置,从所述虚拟启动系统启动,加载所述固件管理镜像文件进行固件管理。
  9. 如权利要求8所述的固件管理装置,其中,所述修改模块还设置为,
    将所述主机的启动方式配置修改为从所述基板管理控制器获取启动方式并根据获取的启动方式启动,所述获取的启动方式为从所述虚拟启动系统启动;
    所述管理模块包括:
    重启单元,设置为控制所述主机重启,根据所述修改后的启动方式配置从所述基板管理控制器获取启动方式;
    配置单元,设置为控制所述主机根据所述获取的启动方式,从所述虚拟启动系统启动,加载所述固件管理镜像文件;
    管理单元,设置为引导所述主机进行固件管理。
  10. 如权利要求8或9所述的固件管理装置,其中,所述修改模块还设置为,
    修改所述主机的启动方式配置,备份所述主机的原有启动配置数据;
    所述固件管理装置还包括:
    复位模块,设置为根据所述原有启动配置数据,控制所述主机复位。
PCT/CN2016/103506 2016-01-18 2016-10-27 固件管理方法和装置 WO2017124799A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610031467.1A CN106980493B (zh) 2016-01-18 2016-01-18 固件管理方法和装置
CN201610031467.1 2016-01-18

Publications (1)

Publication Number Publication Date
WO2017124799A1 true WO2017124799A1 (zh) 2017-07-27

Family

ID=59339916

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/103506 WO2017124799A1 (zh) 2016-01-18 2016-10-27 固件管理方法和装置

Country Status (2)

Country Link
CN (1) CN106980493B (zh)
WO (1) WO2017124799A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110134546A (zh) * 2019-04-11 2019-08-16 平安科技(深圳)有限公司 批量重启windows系统方法、电子装置及存储介质

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109714205A (zh) * 2018-12-28 2019-05-03 郑州云海信息技术有限公司 一种用于白盒交换机的bios双冗余保护方法、装置及计算机
CN110633131B (zh) * 2019-09-16 2022-05-31 东软集团股份有限公司 一种对固件进行虚拟化的方法、装置、设备及系统
CN111130856A (zh) * 2019-12-06 2020-05-08 山东英信计算机技术有限公司 一种服务器配置方法、系统、设备及计算机可读存储介质
CN111459867B (zh) * 2020-02-28 2022-04-15 广州广哈通信股份有限公司 一种usb转smi方法、装置、转换器及存储介质
CN113031999A (zh) * 2021-03-25 2021-06-25 山东英信计算机技术有限公司 服务器部件固件升级的控制方法、装置、设备及存储介质

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101075194A (zh) * 2006-05-15 2007-11-21 明基电通股份有限公司 程序代码执行方法及系统及固件更新方法
CN102447732A (zh) * 2011-10-11 2012-05-09 浪潮电子信息产业股份有限公司 一种在bmc开发中智能配置宿主机嵌入式环境的方法
CN103186393A (zh) * 2011-12-30 2013-07-03 鸿富锦精密工业(深圳)有限公司 具有基板管理控制器固件的电子装置及固件加载方法
CN103365667A (zh) * 2012-03-26 2013-10-23 国际商业机器公司 一种在主机系统中安装操作系统的方法和装置
US20140122852A1 (en) * 2012-10-31 2014-05-01 International Business Machines Corporation Transferring files to a baseboard management controller ('bmc') in a computing system
CN103793238A (zh) * 2012-10-31 2014-05-14 英业达科技有限公司 机柜与其同时更新多个基本输入输出系统的方法
CN104850442A (zh) * 2015-05-27 2015-08-19 杭州昆海信息技术有限公司 一种操作系统安装方法及装置

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101075194A (zh) * 2006-05-15 2007-11-21 明基电通股份有限公司 程序代码执行方法及系统及固件更新方法
CN102447732A (zh) * 2011-10-11 2012-05-09 浪潮电子信息产业股份有限公司 一种在bmc开发中智能配置宿主机嵌入式环境的方法
CN103186393A (zh) * 2011-12-30 2013-07-03 鸿富锦精密工业(深圳)有限公司 具有基板管理控制器固件的电子装置及固件加载方法
CN103365667A (zh) * 2012-03-26 2013-10-23 国际商业机器公司 一种在主机系统中安装操作系统的方法和装置
US20140122852A1 (en) * 2012-10-31 2014-05-01 International Business Machines Corporation Transferring files to a baseboard management controller ('bmc') in a computing system
CN103793238A (zh) * 2012-10-31 2014-05-14 英业达科技有限公司 机柜与其同时更新多个基本输入输出系统的方法
CN104850442A (zh) * 2015-05-27 2015-08-19 杭州昆海信息技术有限公司 一种操作系统安装方法及装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110134546A (zh) * 2019-04-11 2019-08-16 平安科技(深圳)有限公司 批量重启windows系统方法、电子装置及存储介质
CN110134546B (zh) * 2019-04-11 2023-10-20 平安科技(深圳)有限公司 批量重启windows系统方法、电子装置及存储介质

Also Published As

Publication number Publication date
CN106980493B (zh) 2021-06-18
CN106980493A (zh) 2017-07-25

Similar Documents

Publication Publication Date Title
WO2017124799A1 (zh) 固件管理方法和装置
CN103677858B (zh) 一种云环境中虚拟机软件管理的方法、系统及设备
TWI492064B (zh) 雲端系統及其開機部署方法
US20130198504A1 (en) Methods of configuring a bios in a computer system and computer program products
CN109587005B (zh) 连接检测方法、装置、计算机设备以及可读存储介质
JP2010152704A (ja) 計算機システムの運用管理システム及び管理方法
US10430082B2 (en) Server management method and server for backup of a baseband management controller
US20180088932A1 (en) Multi-platform installer
WO2017185954A1 (zh) 一种实现usb设备管理的方法、主机和系统
US10042688B2 (en) Self-diagnosis of device drive-detected errors and automatic diagnostic data collection
US11861357B2 (en) Selecting and sending subset of components to computing device prior to operating system install
CN105183520A (zh) 计算机软件远程自动化装调方法及系统
CN111782283A (zh) 一种裸金属服务器的自动化管理方法、装置及介质
US20190205109A1 (en) Computer system, baseboard management controller, and os installation method
US20060080399A1 (en) Remote configuration management for data processing units
CN112948008A (zh) 一种基于Ironic管理物理裸机的方法
CN117289963A (zh) 在线更新服务器平台服务固件的目标区域的方法及设备
WO2023109107A1 (zh) 一种集中管理服务器启动盘的方法及服务器
CN106484442A (zh) 服务器系统及更新开机映像档的方法
CN113485720A (zh) 一种微服务系统的离线升级方法
JP6051798B2 (ja) ファームウェア検証システム、ファームウェア検証方法およびファームウェア検証プログラム
CN102810067A (zh) 虚拟机模板更新系统及方法
CN111752736A (zh) 一种Linux系统宕机信息的远程收集方法及系统
CN112486661A (zh) 一种计算机集群错峰开机的自动控制方法及系统
US10210004B2 (en) Method of providing at least one data carrier for a computer system and computer system including service processor independently operable from a main processor of the computer system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16886059

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16886059

Country of ref document: EP

Kind code of ref document: A1