=========================================================================================================== Intel(R) Server Board S7200AP Product Family System Firmware Update Package for Intel(R) One Boot Flash Update Utility FOR Linux =========================================================================================================== Intel Enterprise Platform & Services Division - Marketing Intel Corporation 2111 N.E. 25th Avenue, Hillsboro, OR 97124 USA =========================================================================================================== DATE : January 23, 2017 TO : Intel(R) Server Board S7200AP Product Family customers SUBJECT : Release Notes for System Firmware Update Package (OFU) =========================================================================================================== ABOUT THIS RELEASE =========================================================================================================== System BIOS - R01.02.0001 ME Firmware - 03.01.03.020.0 BMC Firmware - 01.00.10304 FRUSDR - 1.24 =========================================================================================================== Support and Dependencies =========================================================================================================== Processors supported: Xeon Phi Knights Landing Processor -B0 stepping tQS -Production Microcode update versions: CPUID Version Status 0x850670 ffff0030 Debug (Xeon Phi Knights Landing A0) 0x850671 000001a3 Debug (Xeon Phi Knights Landing B0) On-Board Component Option ROM Versions: all_gigabit_pxe_vxx.LOM - all_iscsi_vxx.LOM - MATROXVIDEOOPROM.BIN - Onboard VGA legacy Oprom v3.8SQ Memory Reference Code Version : v01.10.01 Management Engine Firmware Version : 03.01.03.020.0 all_gigabit_pxe_v1.5.78.LOM - 1G PXE OpROM v1.5.78 (for all EPSD gigabit controllers, including LOMs and I/O modules) all_10g_pxe_v2.3.24.1.LOM - 10G PXE OpROM v2.3.24.1 (for all EPSD 10G controllers, including LOMs and I/O modules) all_iscsi_v3.0.34.LOM - iSCSI Boot OpROM v3.0.34(for all EPSD gigabit and 10G EPSD controllers, including LOMs and I/O modules) all_10g_fcoe_v1.8.17.LOM - 10G FCoE OpROM v1.8.17(for EPSD 10G Niantic I/O module) X540_Fcoe.LOM - 10G FCoE OpROM v1.8.17(for EPSD 10G X540 controllers, including LOMs and I/O module) ESRT2.ROM - ESRT II legacy OpROM (A.14.09091336) EfiSasDriver.efi - ESRT II UEFI RAID OpROM (A.14.08121029I) E4702X4.EFI - 1G PCIe gigabit controller UEFI driver E7006X3.EFI - 10G controller UEFI driver HfiPcieGen3.efi - Host Fabric Interface UEFI Driver(v1.3.1.0.0) The following update process must be followed to ensure a trouble free update. The OFU script automatically updates in this order. 1. FRUSDR 2. BIOS 3. ME 4. FD 5. BMC =========================================================================================================== IMPORTANT NOTE!!! =========================================================================================================== - This Update package must be installed using Intel(R) One-boot Flash Update (OFU) V14.0 Build14 THIS IS THE FIRST FULL PRODUCTION RELEASE OF THE SYSTEM FIRMWARE UPDATE PACKAGE FOR THE S7200AP SERVER BOARD FAMILY WITH THE PRODUCTION BIOS SIGNATURE. BE ADVISED THAT WHEN PERFORMING THIS UPDATE FROM A DEVELOPMENT LABEL (D-LABEL) BIOS, THE ONLY DOWNGRADE PATH IS VIA THE HARDWARE RECOVERY JUMPER. PLEASE ENSURE THAT YOU HAVE PREVIOUSLY PERFORMED ANY RECOMMENDED CPU RELATED SCREENS, PRIOR TO UPDATING TO THIS PRODUCTION RELEASE. CONTACT YOUR INTEL SUPPORT REPRESENTATIVE FOR DETAILS. WHEN ATTEMPTING TO FLASH SAME-VERSION TO SAME-VERSION (BIOS 01.02.0001 TO BIOS 01.02.0001) OR WHEN USING INTEL(R) TOOL KIT (ITK) WITH PRODUCTION BIOS PACKAGE BIOS01020001, IT IS IMPORTANT TO READ AND FOLLOW THE INSTRUCTIONS IN THE ENHANCED BIOS PACKAGE. =========================================================================================================== SYSTEM HARDWARE & SOFTWARE REQUIREMENTS/REVISIONS =========================================================================================================== - S7200AP baseboard PBA ending in -30x higher. - Intel Xeon Phi (tQS) B0 stepping and production CPUs. - BMC Firmware - Version 00.25.10067 or later - System BIOS- D-Label BIOS version D231 or later - Front Panel, Hot-swap backplane, and Baseboard FRU data must be available for chassis auto-detection to succeed. =========================================================================================================== =========================================================================================================== System Firmware Update Package Usage instructions =========================================================================================================== This package is intended for use with the Linux* operating system using Intel(R) One-boot Flash Update (OFU) V14 Build 14. It does not include instructions for Windows* based firmware updates. Windows* is not currently supported on this platform. The OFU User Guide contains instructions for both Linux and Windows based operating systems. Linux users, please refer to the instructions in the OFU Linux Quick Installation and Firmware Update Instructions. =========================================================================================================== BIOS UEFI SECURE BOOT IMPACT AND MITIGATION METHOD =========================================================================================================== 1. Customer Setting Loss Issue and Mitigation Method When user upgrades BIOS with secure boot feature, the NVRAM will be automatically formatted as authenticated variable physical storage. However, all previous customer settings storage in NVRAM will be lost even if user does not enable UEFI secure boot feature. Users can take the follow recipe to save and restore their settings based on the actual NVRAM usage if they wish to upgrade or downgrade between BIOS with or without secure boot feature. Supposing customer requires to save & restore their specific NVRAM named 'var': Steps: 1. Prepare FAT partition USB key (or HDD). 2. Boot to EFI shell. 3. Check the file system mapping (e.g. fs0:) of the USB key with 'map -r' command. 4. Use 'dmpstore var -s fs0:\var.bin' to save the variable to the physical file. 5. Perform BIOS update and reboot system. 6. Boot to EFI shell. 7. Use 'dmpstore var -l fs0:\var.bin' to restore the variable. 8. Reboot the system if the customer setting requires reboot to take effect. Notes: 1. Immediate reboot after BIOS update is mandatory. Or the restore operation will not take effect. 2. Customers can repeat step 4 and step 7 for several times if they need to save & restore multiple NVRAM variables. 3. Most of BIOS customer settings by SysCfg can also be restored in this way. Customers can follow previous step1~8 by substituting 'Setup' for 'var' in the sample. 4. For BIOS downgrade case, step7 cannot be used to restore authenticate variables (e.g. PK, KEK, DB, DBX) to non-authenticated NVRAM storage 2. Recovery Mode Failure There is known bug that it cannot POST successfully with authenticated NVRAM storage. This will cause platform recovery failure and permanent deny of service (PDOS) if the primary BIOS region gets corrupted for some reason. It is required to update backup BIOS region when upgrade BIOS capsule with secure boot feature. Notes: For downgrade case, user is not required to update backup BIOS region as new BIOS with secure boot feature can handle NVRAM with old storage format: it will format it to new authenticated variable storage automatically. However, care must be taken when downgrading BIOS in recovery mode: After flashing BIOS without secure boot feature, user should restore recovery HW jumper immediately before platform reset. If platforms reset occurs before restoring recovery HW jumper, the backup BIOS will once again format NVRAM to new storage format, which will cause newly flashed BIOS (without secure boot feature) POST failure after user restores recovery HW jumper. =========================================================================================================== Fixes =========================================================================================================== =========================================================================================================== 01.02.0001 (Initial reversion for R release) =========================================================================================================== 1. Update BIOS version to 01.02.0001 for Production release candidate. 2. Fixed klockwork issue with the updated klockwork policy. 3. [EPSD100035543] Fixed [KNL-F] "SMBus firmware authorization failed" and " get_platform_config" logged in dmesg and messages in RHEL7.2U7xppsl1.4.2 with OPA driver10.2. =========================================================================================================== ME 03.01.03.020.0 =========================================================================================================== =========================================================================================================== BMC 01.00.10304 =========================================================================================================== 1. Power supply firmware for hardware rev 01A is no longer supported. The PSU should continue to function but will not receive update. This change took place in BMC 22 but the release note failed to register such change. 2. EPSD100035629 - SBP FW reading by command is inconsistent with BMC release note. 3. EPSD100035667 - The Config file version display inconsistent with SDR file in EWS. 4. Update HSBP PSoC firmware to 1p25.8 =========================================================================================================== FRUSDR 1.24 =========================================================================================================== - Modify per Fan Speed Control spreadsheet 0.85 minus LAAC settings - frusdr.efi and ipmi.efi are updated to v14.0 Build 8. - EPSD100256163 FRUSDR version show as S7200AP_122 that not match with FRUSDR release version =========================================================================================================== LEGAL INFORMATION =========================================================================================================== Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel's Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the presented subject matter. The furnishing of documents and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any such patents, trademarks, copyrights, or other intellectual property rights. Intel products are not intended for use in medical, lifesaving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Intel is a registered trademark of Intel Corporation. *Other names and brands are the property of their respective owners. Copyright (c) 2017 Intel Corporation. A portion of this firmware is open source code, which falls under the GPL 2.0 license. [END OF RELEASE NOTES]