================================================================================ Intel(R) Server Board S2600CW Product Family Firmware Update Package for Intel(R) Deployment Assistant, Intel(R) One Boot Flash Update Utility, The embedded EFI Shell, Windows* Preboot Execution Environment ================================================================================ INTEL(R) Server Boards and Systems Intel Corporation 2111 N.E. 25th Avenue, Hillsboro, OR 97124 USA ================================================================================ DATE : March 26, 2015 TO : Intel(R) Server Board S2600CW Product Family Customers SUBJECT : Release Notes for System Firmware Update Package ================================================================================ ABOUT THIS RELEASE ================================================================================ BIOS: 01.01.1008 ME: 03.00.07.154 BMC: 01.18.7601 FRUSDR: 1.07 ================================================================================ Support Platforms and Dependency ================================================================================ Processors supported: Intel(R) Xeon processor E5-2600 v3 series Microcode update versions: Intel(R) Xeon processor E5-2600 V3 series C1 stepping: 0x00000023 CPUID = 0x306f2 Production boards: Product Fab Version S2600CW Fab3 (PBA# -30x) or above The following update process must be followed to ensure a trouble free update. 1. BMC firmware 2. BIOS 3. Manageability Engine (ME) firmware 4. FRUSDR ================================================================================ System Firmware Update Package Usage instructions ================================================================================ This package can be updated using one of the following methods: - Intel(R) Deployment Assistant - Windows* or Linux* operating system using Intel(R) One-boot Flash Update (OFU) V11.0 Build 14 or later) - Windows* Preboot Execution Environment (WinPE) To Update from Intel(R) Deployment Assistant (IDA) The Intel(R) Deployment Assistant software is easy to use and is present on the "Intel(R) Server Deployment & Management" DVD shipped with the system. User can download the latest version IDA CD ISO image from http://downloadcenter.intel.com/ To use the IDA CD to update the system firmware: - Boot server with IDA CD - Select "Get System Updates" - Choose one of the three options . From http://www.intel.com/support/ Automatically downloads the latest Firmware Update Package from Intel Requires Internet connection Enter your local IP address and proxy configuration Click "Next" to start the download and update process . From my network Download the latest Firmware Update Package from http://downloadcenter.intel.com/ and copy it to a Windows* shared folder Enter your local IP address, the Windows* file server name, and a Windows user name and password Select the firmware package in pop-up window Click "Next" to start the update process . From USB flash drive or Hard Disk Download the latest Firmware Update Package from http://downloadcenter.intel.com/ and copy it to a USB flash drive, then insert the USB flash drive into the server USB port Click "Browse" Select the firmware package in pop-up window Click "Next" to start the update process Note: 1) The Firmware Update Package is in the ZIP file format. Do not unzip before copying to a Windows* shared folder or USB flash drive. 2) The IDA will always update backup bios with this FSUP package even if the IDA backup bios check box is not selected. To update from Windows* and Linux* or operating systems using the Intel(R) One Boot Flash Update Utility (OFU) Intel(R) One boot Flash Update utility can be downloaded from http://downloadcenter.intel.com/ and it is part of the "BIOS, Firmware Update & Configuration Utilities" for Windows* and Linux*. Please refer to Intel OFU user guide about the details of installation and usage of OFU. Use OFU to update system firmware by the following steps: - Install OFU on Windows* or Linux* system - Download the latest firmware update package from http://downloadcenter.intel.com/ - Unzip package to a folder - Run the following command in Windows* command line/Linux* terminal window: :\flashupdt -u \flashupdt.cfg To update from Windows* Preboot Execution Environment (WinPE) The System Firmware Update Package can be inserted to Windows* PE customized image for creating a bootable Windows* PE CD. User is able to update system firmware from customized WinPE CD by the following steps: - Boot server with customized WinPE CD - Run script "WinPE21_x64_Update.bat" or "WinPE20_x86_Update.bat" (name may be varied depends on your own customization) Note: 1. The Intel(R) OFU utility is case sensitive. Therefore, when you transfer the Firmware Update Package using USB flash drive from a Microsoft Windows* system to a Linux environment, you must first extract under the Linux* environment. Otherwise, you will need to mount the USB flash drive manually with 'vfat' option under Linux to avoid conversion from upper case to lower case and vice versa. 2. To make Intel(R) OFU utility run properly under x86 or x64 OS, you have to read OFU release notes on known issues for OFU installation. 3. In this SFUP package, Intel only provide batch file "WinPE_x86_Update.bat" for WinPE2.0 32 bit solution "WinPE_x64_Update.bat" for WinPE2.1/3.0 64 bit solution as an example. Please refer to white paper "White Paper-Intel Server Utilities Procedure for WinPE.pdf" for details on building your own customized WinPE CD. 4. Windows PE 2.0 - built from Windows Vista SP1 32bit or EM64T 5. Windows PE 2.1 - built from Windows Vista SP1 or Windows Server 2008, EM64T 6. Windows PE 3.1 - built from Windows Server 2008R2, EM64T 7. Microsoft IPMI driver is loaded by default from WinPE CD, if you want to use Intel IPMI driver instead of MS IPMI driver for firmware update, you can un-install Microsoft IPMI driver by: Devicesetup.exe ¨Cv remove *IPI0001 Note: IPI0001 is the device ID for Microsoft IPMI driver. 8. If to update backup BIOS region or NVRAM, you need to customize the OFU update scripts (eg.flashupdt.cfg) and add "UpdateBackupBios" or "UpdateNvram" parameter. ================================================================================ BIOS 01.01.1008 ================================================================================ - BSOD under Windows 2012 R2 when hot plugging NVMe SSD drives ================================================================================ BIOS 01.01.0008 ================================================================================ - The boot devices will increase if system reboot from RHEL7 aware UEFI and then the system will hang at high proportion - SUT can't boot to RHEL 6.5 x64 when enable "VT for Directed I/O" in BIOS setting. - Driver Health Protocol (DHP) not working correctly on Wildcat Pass - Incorrect ACPI table causes NUMA issues in Linux - System booted with only 1 QPI link trained, no errors reported - Dual port IB IOM G52882-351 is showed as "single-port" description in BIOS setup menu. - Display L2/L3 cache error detected on the RAID controller during post - uEFI iSCSI boot configuration is lost after reboot - New ESRT2 OpROM and uEFI Driver for Grantley - SMBIOS problem cause the latest IDA7.17.RC6 boot failure with the 12G SAS RS3LC bridge - If Unplug USB scanner and then re-plug scanner back in ,USB scanner is inactive - Secondary SATA info loading before Primary SATA info - Reset after CATERR leaves system in a hung state" is open for annotation - Pressing multiple F6 from SOL skips through boot manager. - BIOS isn't reporting QPI link errors. - Help text "Intel(R) ESRT2 (LSI*)" RAID mode not match with BIOS. - TPM2.0 module can't work - [SMBIOS] Type 8 no information for NGFF (M.2) device - Sysinfo_v13.1.5:a lot of invalid BIOS items displayed at 'BIOS Settings' part in sysinfo_log.txt by command:sysinfo -ni - New ESRT2 1.43 OpROM for inclusion into Grantley Production BIOS - BIOS Workaround for CWP 10G NIC OpROM issue - Roll back PXE OpROM V2.3.30 and UEFI V4.5.19 update - Remove 1.43 UEFI ESRT2 OpRom - Security Fix: Smm range check for signed update ================================================================================ ME 03.00.07.154 ================================================================================ - NM Capabilities not available per MESDC Node Manager State Check. - Fast NM Limiting sometimes does not take effect after CLST immediately. - Throttling statistics are equal to 100 after execute EnableFastCLST IPMI command in scenario when FastCLST is disabled in xml. - Permanent 'Node busy' completion code for non-NM IPMI commands - Maximum throttling after ramp ends when NM policy is limiting =============================================================================== BMC 01.18.7601 =============================================================================== - System still can be power on when front panel temperature is higher than 60 =============================================================================== BMC 01.17.7464 =============================================================================== - SEL show " Warning event: BMC FW Health reports SSB Temp has failed and may not be providing a valid reading." during warm cycle - Error message misleading customer. - Cannot set "User Lockout Time (min)" to 0 in ews-Configuration-Security Settings page. - BMC sporadically stops responding to network IPMI requests. - The "voltage fault" warning cause the LED status "on" as "blink" when run the CWP AC cycle by ITAS3.11.5. - Update Default.SDR and FCT.sdr of KNP&TLP to version 1.04. - Update S2600CW FCT/Shipping SDR to version 1.07. - Update open SSL from 1.0.1j to 1.0.1k. ================================================================================ FRUSDR 1.07 ================================================================================ - Update Shipping SDR(Test Plate FSC) and OTHER SDR: Stepwise sub-record (lower & upper clipping curve). Remove Clamp sub-record 5, 11, 14. - Update PWM of Stepwise Curve ID #1B (Global Stepwise Curve Records). - Follow CWP_FSC Auto-SDR Config Sheet Rev1.8.xlsm. ============================================================================= LEGAL INFORMATION ============================================================================= Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel's Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the presented subject matter. The furnishing of documents and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any such patents, trademarks, copyrights, or other intellectual property rights. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Intel is a registered trademark of Intel Corporation. *Other names and brands are the property of their respective owners. Copyright (c) 2015 Intel Corporation. A portion of this firmware is open source code, which falls under the GPL 2.0 license. [END OF RELEASE NOTES]