================================================================================ Intel(R) Server Board S2600CW Family Firmware Update Package for Intel(R) One Boot Flash Update Utility and Windows* Preboot Execution Environment ================================================================================ Intel(R) Server Boards and Systems Intel Corporation 2111 N.E. 25th Avenue, Hillsboro, OR 97124 USA ================================================================================ DATE : January, 12 2016 TO : Intel(R) Server Board S2600CW Family SUBJECT : Release Notes for System Firmware Update Package ================================================================================ ABOUT THIS RELEASE ================================================================================ BIOS : 01.01.0014 ME : 03.01.03.005 BMC : 01.33.8932 FRUSDR : 1.11 ================================================================================ Support Platforms and Dependency ================================================================================ Processors supported: Intel(R) Xeon(R) processor E5-2600 v3 series Microcode update versions: Intel(R) Xeon(R) processor E5-2600 v3 series C0/C1 stepping: 0x0000002E CPUID = 0x306f2 Production boards: Product Fab Version S2600CW Fab2 or above The following update process must be followed to ensure a trouble free update. 1. BMC firmware 2. BIOS 3. Manageability Engine (ME) firmware 4. FRUSDR ================================================================================ System Firmware Update Package Usage instructions ================================================================================ This package can be updated using one of the following methods: - Windows* or Linux* operating system using Intel(R) One-boot Flash Update (OFU) V11.0 Build 14 or later) - Windows* Preboot Execution Environment (WinPE) To update from Windows* and Linux* or operating systems using the Intel(R) One Boot Flash Update Utility (OFU) Intel(R) One boot Flash Update utility can be downloaded from http://downloadcenter.intel.com/ and it is part of the "BIOS, Firmware Update & Configuration Utilities" for Windows* and Linux*. Please refer to Intel OFU user guide about the details of installation and usage of OFU. Use OFU to update system firmware by the following steps: - Install OFU on Windows* or Linux* system - Download the latest firmware update package from http://downloadcenter.intel.com/ - Unzip package to a folder - Run the following command in Windows* command line/Linux* terminal window: :\flashupdt -u \flashupdt.cfg To update from Windows* Preboot Execution Environment (WinPE) The System Firmware Update Package can be inserted to Windows* PE customized image for creating a bootable Windows* PE CD. User is able to update system firmware from customized WinPE CD by the following steps: - Boot server with customized WinPE CD - Run script "WinPE21_x64_Update.bat" or "WinPE20_x86_Update.bat" (name may be varied depends on your own customization) Note: 1. The Intel(R) OFU utility is case sensitive. Therefore, when you transfer the Firmware Update Package using USB flash drive from a Microsoft Windows* system to a Linux environment, you must first extract under the Linux* environment. Otherwise, you will need to mount the USB flash drive manually with 'vfat' option under Linux to avoid conversion from upper case to lower case and vice versa. 2. To make Intel(R) OFU utility run properly under x86 or x64 OS, you have to read OFU release notes on known issues for OFU installation. 3. In this SFUP package, Intel only provide batch file "WinPE_x86_Update.bat" for WinPE2.0 32 bit solution "WinPE_x64_Update.bat" for WinPE2.1/3.0 64 bit solution as an example. Please refer to white paper "White Paper-Intel Server Utilities Procedure for WinPE.pdf" for details on building your own customized WinPE CD. 4. Windows PE 2.0 - built from Windows Vista SP1 32bit or EM64T 5. Windows PE 2.1 - built from Windows Vista SP1 or Windows Server 2008, EM64T 6. Windows PE 3.1 - built from Windows Server 2008R2, EM64T 7. Microsoft IPMI driver is loaded by default from WinPE CD, if you want to use Intel IPMI driver instead of MS IPMI driver for firmware update, you can un-install Microsoft IPMI driver by: Devicesetup.exe ¨Cv remove *IPI0001 Note: IPI0001 is the device ID for Microsoft IPMI driver. ================================================================================ R01.01.0014 ================================================================================ EPSD100251243:10% failure was found with wrong system time setting during WCP BDW refresh build. EPSD100030146: [Broadwell Refresh] WCP with LRDIMM Rank Sparing mode Total Memory size not correct. Updating PCSD_Grantley_Refresh BIOS IDs: 20151021_CP_PCSD_GRANTLEY_REFRESH_11_01_D0065 EPSD100030015: [R1011] SUT will halt after change Syetem Date / Time to maximum value. EPSD100249435: [HSX] (X) Intel System BIOS DHP issue with Intel Hardware RAID controllers that have pinned cache. Updating PCSD_Grantley_Refresh BIOS IDs: 20151026_CP_PCSD_GRANTLEY_REFRESH_11_01_D0066 EPSD100250328/EPSD100250426: [BDW] TXT MeasuredLaunchEnvironment Function test fail on D0058 BIOS./Tboot result is "FALSE" with TPM2 on BDW. Remove 'UpdateNvram' support for iflash32 tool for security reason of SRA bios. EPSD100110737 (X) PCR1 not constistent on TPMTXT Enabled Kennedy Pass System. Updating PCSD_Grantley_Refresh BIOS IDs: 20151027_CP_PCSD_GRANTLEY_REFRESH_11_01_D0067. Update TXT ACM binary to v3.0.1(PW) Remove Extended ATR and Pfloor tuning setup menu for DCA IERR issue (TOR timeout symptoms). Update ME to 03.01.03.013 Updating PCSD_Grantley_Refresh BIOS IDs: 20151030_CP_PCSD_GRANTLEY_REFRESH_11_01_D0068 Rollback ME to 03.01.03.05 Updating PCSD_Grantley_Refresh BIOS IDs: 20151102_CP_PCSD_GRANTLEY_REFRESH_11_01_D0069 Update BIOSID to D0070 Update ucode to 0b00000e for BDW B stepping ================================================================================ KNOWN ISSUES in ME 03.00.07.168 release ================================================================================ If host main power delayed relatively to the standby power for 720-770ms ME stop responding. Unable to set Alert Threshold Limit to 0 degrees (minimum from capabilities) for Inlet Temperature Trigger Type Policy. [MESDC] ME FW Status in S3 State is failed. During Host Warm Reset flow, unexpected Intel® SPS 3.0 E5 Firmware exception may be promoted to Platform Global Reset. When auto configuration is performed and efficiency readings are provided from BMC, ME keeps requesting PSUs for readings. Alert Immediate Messages (Host Comm Error) on SandStorm. NMPTU Get NM Capabilities updated to invalid values. Permanent Node Busy completion code received when trying to ColdReset ME after setting new value of SlopeComp and Offset coefficients. After increasing scanning period of DC Power sensor, min correction time for policies in secondary power domain (DC power) will not be updated. SpsInfox86 crashes when executed with 64-bit addressing enabled. Node Manager cannot maintain power limit after PSU power loss in Redundant PSU Configuration. When "PIA Platform PSU Efficiency" sensor is disabled in xml Node Manager uses incorrect power reading for power limiting. The sensor 0x18 SEL for HW protection policy correction time exceeded. Get NM Parameter cmd (FAh) responds with incorrect readings when the sensor scanning is disabled. Potential race condition in NM component handling SMART/CLST functionality. ================================================================================ 01.33.8932:(Release version) =============================================================================== -N/A: Update FCT/Shipping SDR of S2600WT to 1.09. -N/A: Update FCT/Shipping SDR of S2600CW to 1.11. -N/A: Update FCT/Shipping SDR of S2600KP/TP to 1.12. -N/A: Update open SSL lib from 1.0.2a to 1.0.2d. -N/A: VLAN refresh has problem during met lan status drop and regain. -N/A: Added support for the new 2200W power supplies. -N/A: Thunderbolt fans did not boost when a member read 0 RPM. -EPSD100248689: [Thunderbolt] Sometimes there are some abnormal logs in SEL when run DC cycle or Hard Reset. -EPSD100248782: The Help text in the BMC web console for Modify User does not match the actual interface. -EPSD100029037/EPSD100029042/EPSD100029046: The "Bad user PWD" event log will occur when send several commands from remote client during update BMC FW. -EPSD100029025/EPSD100029043/EPSD100029044: "Bad User PWD" event will occur when log in EWS via LDAP account with correct USERID and PASSWORD. -N/A: Disable CPLD Update Function by default and add a command for user. - EPSD100028587: BMC and SDR version become "Unknown" when used DCM tool to limit SUT power consuming - EPSD100028724: No HDD presence and check HDD status in EWS, HDD2,3 status shows like "Drive Presence". - EPSD100028950: IOM FRU update fail ================================================================================ FRUSDR Changes in release 1.11 ================================================================================ Issue Fixed: - None. Features added: - Update FRUSDR utility to version 11 build 20. ============================================================================= LEGAL INFORMATION ============================================================================= Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel's Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the presented subject matter. The furnishing of documents and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any such patents, trademarks, copyrights, or other intellectual property rights. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Intel is a registered trademark of Intel Corporation. *Other names and brands are the property of their respective owners. Copyright (c) 2016 Intel Corporation. A portion of this firmware is open source code, which falls under the GPL 2.0 license. [END OF RELEASE NOTES]