================================================================================ Intel(R) Server Platform BIOS Release Notes ================================================================================ INTEL(R) Server Boards and Systems Intel Corporation 2111 N.E. 25th Avenue, Hillsboro, OR 97124 USA ================================================================================ DATE : Mar 19 2015 TO : Multi-Core Intel(R) Xeon(R) Processor-Based Server Platform customers SUBJECT : BIOS Release notes for version R01.01.1008 ================================================================================ LEGAL INFORMATION ================================================================================ INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. A "Mission Critical Application" is any application in which failure of the Intel Product could result, directly or indirectly, in personal injury or death. SHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION, YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES, AND THE DIRECTORS, OFFICERS, AND EMPLOYEES OF EACH, HARMLESS AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE ATTORNEYS' FEES ARISING OUT OF, DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR DEATH ARISING IN ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION, WHETHER OR NOT INTEL OR ITS SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS PARTS. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined". Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling 1-800-548-4725, or go to: http://www.intel.com/design/literature.htm Intel is a registered trademark of Intel Corporation. *Other names and brands are the property of their respective owners. Copyright (C) 2013~2015 Intel Corporation. ================================================================================ ABOUT THIS RELEASE ================================================================================ Build Stamp : SE5C610.86B.01.01.1008 Build Date : Mar 19 2015 ================================================================================ Supported Platforms ================================================================================ S2600WT Family S2600KP Family S2600TP Family S2600CW Family ================================================================================ BIOS COMPONENTS/CONTENTS ================================================================================ Processors supported: Intel(R) Xeon(R) processor E5-2600 v3 series Microcode update versions: Intel(R) Xeon(R) processor E5-2600 V3 series C0/C1 stepping: 0x0000002D CPUID = 0x306f2 On-Board Component Option ROM Versions: all_gigabit_pxe_v1.5.53.LOM - 1G PXE OpROM v1.5.53 all_10g_pxe_v2.3.24.1.LOM - 10G PXE OpROM v2.3.24.1 all_iscsi_v3.0.34.LOM - iSCSI Boot OpROM v3.0.34 all_10g_fcoe_v1.8.17.LOM - 10G FCoE OpROM v1.8.17 X540_Fcoe.LOM - 10G FCoE OpROM v1.8.17 E4431X4.EFI - 1G PCIe gigabit controller UEFI driver E6327X3.EFI - 10G controller UEFI driver sSataOrom.bin - sSata RAID OpROM V4.1.0.1020 SataOrom.bin - Sata RAID OpROM V4.1.0.1020 SataDriver.efi - Sata UEFI RAID OpROM V4.1.0.1020 sSataDriver.efi - sSata UEFI RAID OpROM V4.1.0.1020 ESRT2.ROM - ESRT II legacy OpROM A.14.10171446I ACM : v2.00 PW Intel(R) QPI Reference Code Version : v1.11 Memory Reference Code Version : v1.11 Management Engine Firmware Version : 03.00.07.154 ================================================================================ INSTALLATION NOTES ================================================================================ WARNING: It is very important to follow these instructions as they are written. Failure to update using the proper procedure may cause damage to your system. 1.User can update BIOS flash image via either of the follow methods... 1.) Copy the entire contents of the Package file to the HDD or USB flash drive. (All of the files must reside in the same directory.) 2.) Boot to UEFI Shell, then change the Shell to the mapped device file system Example: Shell> fs0: (or fs1:) 3.) Run updAll.nsh for BIOS, ME and FD region upgrade together. updBios.nsh, updME.nsh and updFD.nsh for each region upgrade respectively. 4.) Reboot system after the update is completed. 5.) Do *NOT* interrupt the BIOS POST during the first boot. 2.BIOS update under recovery mode as below methods The USB media is necessary for primary BIOS upgrade and must contain the following files under the root directory, you can capture all the ingredients from BIOS release package: 1.) UEFI iFlash32 (including IFlash32.efi and ipmi.efi ) 2.) *.CAP( the released BIOS capsule which version you expect to update) 3.) Startup.nsh (update accordingly to use proper *.CAP file) A: Install USB media after recovery boot to shell, you need to follow below steps 1.) Under Shell, type "map -r" to map all disc 2.) Change the Shell to mapped device file system Example: Shell> fs0: (or fs1:) 3.) Execute the startup.nsh scripts for BIOS update, wait for BIOS update complete 4.) Power OFF the system, and revert the recovery jumper position to "normal operation". 5.) Power ON the system. 6.) Do *NOT* interrupt the BIOS POST during the first boot. B: Installed USB media prior to recovery boot It will boot automatically into EFI Shell to invoke the Startup.nsh script and start the flash update application (IFlash32.efi). IFlash32.efi requires the supporting BIOS Capsule image file (*.CAP). After the update is complete, there will be a message displayed stating that the "BIOS has been updated successfully" indicating the recovery process is finished. The User should then switch the recovery jumper back to normal operation and restart the system by performing a power cycle. Notes: If to update backup BIOS region, you need to customize the iflash32 update scripts and add "UpdateBackupBios" parameter ================================================================================ BIOS RECOVERY INSTRUCTIONS ================================================================================ The Recovery process can be initiated by setting the recovery jumper (called BIOS Recovery Boot Jumper) A BIOS recovery can be accomplished from backup BIOS region. BIOS starts the recovery process by first loading and booting to the recovery image from backup BIOS region. This process takes place before any video or console is available. Once the system boots to recovery image. The following steps demonstrate this recovery process: 1. Power OFF the system. 2. Switch the recovery jumper. Details regarding the jumper ID and location can be obtained from the Server Board TPS for that Platform. 3. Power ON the system. 4. The BIOS POST screen will appear displaying the progress and system automatically boots to the EFI SHELL. ================================================================================ IMPORTANT NOTICE ================================================================================ 1. The BIOS R01.01.0002 auto scripts will force to update both normal and backup BIOS region since security revision was updated, Once user upgrade BIOS to R01.01.0002, it will prevent BIOS downgrade to previous version that with low security revision, user can use BIOS recovery mode for BIOS downgrade 2. The BIOS R01.01.0003 included security fix and security revision upgrade, refer to item #1. 3. If doing online BIOS update to R01.01.0003, user must use the auto scripts enabled in the release package which will force update BIOS NVRAM and backup region. 4. BIOS R01.01.0004 requires update of NVRAM and backup region. ================================================================================ FEATURES ADDED/REMOVED ================================================================================ ================================================================================ ================================================================================ R01.01.0003 (Production Release) ================================================================================ ================================================================================ R01.01.0004 (D633) ================================================================================ EPSD100026893 i350(Powerville) IOM OpROM doesn't load during post EPSD100244275 Cannot enable TXT and receive BIOS POST Code 0xA100 EPSD100244186 Power Restore Delay Value minimum not long enough for BMC boot time EPSD100244174 Security vulnerability on SMI GetVariable interface was captured by SeCOE ================================================================================ R01.01.0004 ================================================================================ EPSD100026935 The Default Value Of SOL And Console Redirection EPSD100244254 Pre-Release 40G IOmodule fails the link margin test with concurrent traffic on slot2 IOM riser+carrier. EPSD100244186 Power Restore Delay Value minimum not long enough for BMC boot time EPSD100026931 Show error message when disabled boot devices EPSD100244439 [X] Customized riser card on riser slot 2 can't detect InfiniBand* card EPSD100244388 "Resume AC power loss" status in the file which is save by cmd "syscfg /s A.ini /f /b" won’t be changed once change its status with syscfg. EPSD100243547 Pre-release 40G IOmodule fails the link margin test with concurrent traffic on slot2 IOM riser+carrier. EPSD100244367 Add 19.3 NIC package EFI driver and FCOE ROM EPSD100244376 Syscfg /bldfs does not work same as BIOS F9 function to load default BIOS setting "Resume AC power loss" and "Shutdown Policy" EPSD100244377 Syscfg /bldfs does not work same as BIOS F9 function to load default BIOS setting "Resume AC power loss" EPSD100244374 Syscfg /bldfs does not work same as BIOS F9 function to load default BIOS setting "Resume AC power loss" and "Shutdown Policy" EPSD100244379 Syscfg /bldfs does not work same as BIOS F9 function to load default BIOS setting "Resume AC power loss" EPSD100244371 "Shutdown policy" and "Resume AC power loss" status in the file which is save by cmd "syscfg /s A.ini /f /b" won’t be changed once change their status with syscfg. EPSD100244380 "Shutdown policy" and "Resume AC power loss" status in the file which is save by cmd "syscfg /s A.ini /f /b" won’t be changed once change their status with syscfg. EPSD100244387 "Shutdown policy" and "Resume AC power loss" status in the file which is save by cmd "syscfg /s A.ini /f /b" won’t be changed once change its status with syscfg. EPSD100244394 uEFI iSCSI Boot attempts can be saved without filling in the target name ================================================================================ R01.01.0005 ================================================================================ EPSD100244208 SEL intermittently reports therm trip ================================================================================ R01.01.0006 ================================================================================ EPSD100245152 SMBIOS problem cause the latest IDA7.17.RC6 boot failure with the 12G SAS RS3LC bridge EPSD100243827 The boot devices will increase if system reboot from RHEL7 aware UEFI and then the system will hang at high proportion EPSD100026915 The Hdds couldn't be found on the RHEL7.0 when storage card 81605Z inserted in the test riser4_slot4_PCIex16. EPSD100244480 The boot devices will increase if system reboot from RHEL7 aware UEFI and then the system will hang at high proportion EPSD100243758 Display L2/L3 cache error detected on the RAID controller during post . EPSD100026786 SUT can't boot to RHEL 6.5 x64 when enable "VT for Directed I/O" in BIOS setting. ================================================================================ R01.01.0007 ================================================================================ EPSD100245440 LAN1 link down when doing DC cycle test with ITAS ================================================================================ R01.01.0008 (D691, D683, D670, D660) ================================================================================ EPSD100244480 The boot devices will increase if system reboot from RHEL7 aware UEFI and then the system will hang at high proportion EPSD100243827 The boot devices will increase if system reboot from RHEL7 aware UEFI and then the system will hang at high proportion EPSD100026786 SUT can't boot to RHEL 6.5 x64 when enable "VT for Directed I/O" in BIOS setting. EPSD100026173 Driver Health Protocol (DHP) not working correctly on Wildcat Pass EPSD100244587 Incorrect ACPI table causes NUMA issues in Linux EPSD100244594 System booted with only 1 QPI link trained, no errors reported EPSD100026973 Dual port IB IOM G52882-351 is showed as "single-port" description in BIOS setup menu. EPSD100243758 Display L2/L3 cache error detected on the RAID controller during post EPSD100244393 uEFI iSCSI boot configuration is lost after reboot EPSD100244993 New ESRT2 OpROM and uEFI Driver for Grantley EPSD100245152 SMBIOS problem cause the latest IDA7.17.RC6 boot failure with the 12G SAS RS3LC bridge EPSD100244738 If Unplug USB scanner and then re-plug scanner back in ,USB scanner is inactive EPSD100240251 Secondary SATA info loading before Primary SATA info EPSD100244362 CCB# 273 : QRE: Reset after CATERR leaves system in a hung state" is open for annotation EPSD100245307 Pressing multiple F6 from SOL skips through boot manager. EPSD100244490 BIOS isn't reporting QPI link errors. EPSD100027078 Help text "Intel(R) ESRT2 (LSI*)" RAID mode not match with BIOS. EPSD100027079 Help text "Intel(R) ESRT2 (LSI*)" RAID mode not match with BIOS. EPSD100027080 Help text "Intel(R) ESRT2 (LSI*)" RAID mode not match with BIOS. EPSD100245480 TPM2.0 module can't work EPSD100245498 TPM2.0 module can't work EPSD100027076 [SMBIOS] Type 8 no information for NGFF (M.2) device EPSD100245810 Syscfg_v13.1.4:a lot of invalid BIOS items displayed in syscfg.ini by command:syscfg /s syscfg.ini /f /b EPSD100245811 Sysinfo_v13.1.5:a lot of invalid BIOS items displayed at 'BIOS Settings' part in sysinfo_log.txt by command:sysinfo -ni EPSD100245884 New ESRT2 1.43 OpROM for inclusion into Grantley Production BIOS EPSD100246585 USB Scanner can't work stably in EFI shell with Bios 691 BIOS Workaround for CWP 10G NIC OpROM issue Roll back PXE OpROM V2.3.30 and UEFI V4.5.19 update Remove 1.43 UEFI ESRT2 OpRom Security Fix: Smm range check for signed update ================================================================================ R01.01.1008 ================================================================================ EPSD100247226 BSOD under Windows 2012 R2 when hot plugging NVMe SSD drives BIOS R01.01.1008 adds PCIe* SFF (NVMe) SSD hot plug / hot swap support for Intel Accessory Kits: A1U44X25NVMEDK and A2U44X25NVMEDK