================================================================================ Multi-Core Intel(R) Xeon(R) Processor-Based Server BIOS Development ================================================================================ INTEL Enterprise Products and Services Division Intel Corporation ================================================================================ DATE : June 16, 2017 TO : Multi-Core Intel(R) Xeon(R) Processor-Based Server Platform customers SUBJECT : BIOS Release notes for version R01.02.0072 ================================================================================ LEGAL INFORMATION ================================================================================ Information in this document is provided in connection with Intel Products and for the purpose of supporting Intel developed server boards and systems. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel's Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the presented subject matter. The furnishing of documents and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any such patents, trademarks, copyrights, or other intellectual property rights. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Intel is a registered trademark of Intel Corporation. *Other names and brands are the property of their respective owners. Copyright (C) 2017 Intel Corporation. ================================================================================ ABOUT THIS RELEASE ================================================================================ Build Stamp : S72C610.86B.01.02.0072.041620172102 Build Date : Apr. 16, 2017 ================================================================================ IMPORTANT NOTES!!! =============================================================================== - USERS MUST UPDATE TO THE INITIAL PRODUCTION FIRMWARE PACKAGE R01.02.0001 (or greater version) PRIOR TO UPDATING TO PACKAGE R01.02.0072. THIS STEP IS REQUIRED IN ORDER TO INCORPORATE THE FIRST PRODUCTION SIGNED BIOS SECURITY CAP FILES IN R01.02.0001. UPDATING TO R01.02.0072 FROM A D-LABEL (NON-PRODUCTION) BIOS IS UNSUPPORTED AND WILL RESULT IN FAILURES. If the currently installed production BIOS is greater than R01.02.0001, disregard this message. - System Recovery- When performing a recovery with this package, it is necessary to use the enhanced cap files located in the R01.02.0001 release package ================================================================================ KNOWN ISSUES ================================================================================ 1. ESRT-2 RAID does not work in UEFI with this release. Customers using ESRT-2 RAID in UEFI mode should not install this package! Legacy mode ESRT-2 is not impacted. See the platform Monthly Specification Update for details. 2. Active Optical Cables used with the Fabric CPUs Intel® Xeon Phi™ Processor 7230F and Intel® Xeon Phi™ Processor 7250F are not operational with this release. Copper cables are not impacted by this release. See the platform Monthly Specification Update for details. ================================================================================ SUPPORT PLATFORMS and CRC32 VALUE ================================================================================ Adams Pass: R0072_AdamsPassPc.bin CRC32: 0xC0BC03B1 ================================================================================ BIOS COMPONENTS/CONTENTS ================================================================================ Processors supported: Xeon Phi Knights Landing Processor Microcode update versions: CPUID Version Status 0x850671 000001ac Debug (Xeon Phi Knights Landing B0) On-Board Component Option ROM Versions: all_gigabit_pxe_vxx.LOM - all_iscsi_vxx.LOM - MATROXVIDEOOPROM.BIN - Onbaord VGA legacy Oprom v3.8SQ Memory Reference Code Version : v01.57.01.00 Management Engine Firmware Version : 03.01.03.022.0 all_gigabit_pxe_v1.5.78.LOM - 1G PXE OpROM v1.5.78 (for all EPSD gigabit controllers, including LOMs and I/O modules) all_10g_pxe_v2.3.24.1.LOM - 10G PXE OpROM v2.3.24.1 (for all EPSD 10G controllers, including LOMs and I/O modules) all_iscsi_v3.0.34.LOM - iSCSI Boot OpROM v3.0.34(for all EPSD gigabit and 10G EPSD controllers, including LOMs and I/O modules) all_10g_fcoe_v1.8.17.LOM - 10G FCoE OpROM v1.8.17(for EPSD 10G Niantic I/O module) X540_Fcoe.LOM - 10G FCoE OpROM v1.8.17(for EPSD 10G X540 controllers, including LOMs and I/O module) ESRT2.ROM - ESRT II legacy OpROM (A.14.09091336) EfiSasDriver.efi - ESRT II UEFI RAID OpROM (A.14.08121029I) E7006X3.EFI - 1G PCIe gigabit controller UEFI driver (v7.0.06) E4702X4.EFI - 10G controller UEFI driver (v4.7.02) HfiPcieGen3.efi - Host Fabric Interface UEFI Driver(v1.3.4.0.0) ================================================================================ SYSTEM FIRMWARE REQUIREMENTS ================================================================================ BIOS Update Utility: UEFI iFlash32 V14.0 build11 Beta/Silver/Gold boards: Product Fab Version BMC FRUSDR EEPROM HSC IMPORTANT NOTICE: ================================================================================ INTRODUCTION ================================================================================ ================================================================================ INSTALLATION NOTES ================================================================================ ================================================================================ BIOS Capsule INSTALLATION NOTES ================================================================================ WARNING: It is very important to follow these instructions as they are written. Failure to update using the proper procedure may cause damage to your system. User can update BIOS flash image via either of the follow methods... A. UEFI iFlash32 1. Boot the system to EFI Shell 2. Copy IFlash32.efi and BIOS .CAP file to a HD or USB Flash Drive ( Do not use the *Rec.CAP file as it will clear NVRAM and should only be used for Recovery - See Recovery Instructions below ) 3. Map the respective storage device in system with the command Shell> map -r 4. Change the Shell to mapped device file system Example: Shell> fs0: (or fs1:) 5. Run the IFlash32 utility on the prompt fs0:\> IFlash32 [File Name] /u /ni 6. Reboot system after the update is completed. B. Use flash programmer to burn the new BIOS ROM image (16MB) into the flash chip. c. Backup BIOS update instructions 1. Boot the system to EFI Shell 2. Copy IFlash32.efi and BIOS .CAP file to a HD or USB Flash Drive ( Do not use the *Rec.CAP file as it will clear NVRAM and should only be used for Recovery - See Recovery Instructions below ) 3. Map the respective storage device in system with the command Shell> map -r 4. Change the Shell to mapped device file system Example: Shell> fs0: (or fs1:) 5. Run the IFlash32 utility on the prompt fs0:\> IFlash32 [File Name] /u /ni UpdateBackupBios 6. It will update primary BIOS with processed capsule and the backup BIOS update will be completed in next normal boot. 7. Restart unit, Backup flash update done. ================================================================================ BIOS RECOVERY INSTRUCTIONS ================================================================================ The Recovery process can be initiated by setting the recovery jumper (called BIOS Recovery Boot Jumper) A BIOS recovery can be accomplished from backup BIOS region. BIOS starts the recovery process by first loading and booting to the recovery image from backup BIOS region. This process takes place before any video or console is available. Once the system boots to the recovery image use the following steps to perform the BIOS recovery: 1. Power OFF the system. 2. Switch the recovery jumper. Details regarding the jumper ID and location can be obtained from the Board EPS for that Platform. 3. Power ON the system. 4. The BIOS POST screen will appear displaying the progress and system automatically boots to the EFI SHELL. 5. Follow the BIOS recovery update manual for BIOS recovery. ================================================================================ ME FW Capsule INSTALLATION NOTES ================================================================================ WARNING: It is very important to follow these instructions as they are written. Failure to update using the proper procedure may cause damage to your system. !!!!! Please make sure AC plug in during update !!!!! !!!!! AC failure during update may cause damage to your system and unrecoverable !!!!! User can update ME image via either of the follow methods: A. UEFI iFlash32 1. Boot the system to EFI Shell 2. Copy IFlash32.efi and ME.CAP and FD.CAP file to a HD or USB Flash Drive 3. Map the respective storage device in system with the command Shell> map -r 4. Change the Shell to mapped device file system Example: Shell> fs0: (or fs1:) 5. Run the IFlash32 utility on the prompt fs0:\> IFlash32 ME.CAP /u /ni fs0:\> IFlash32 FD.CAP /u /ni 6. AC cycle the system after the update is completed. B. Use flash programmer to burn the new BIOS ROM image (16MB-From BIOS release package ) into the flash chip. ================================================================================ Issues Fixed ================================================================================ ================================================================================ 01.02.0072 ================================================================================ 1. Resolved the Intel(R) Xeon Phi (TM) Processor 7200 Series DDR Memory controller and MCDRAM memory controller issue reported in the Xeon Phi (TM) technical issues update in April. 2. [1209729113] Fixed Get "get_platform_config: Config bitmap corrupted/uninitialized messages" in dmesg for both hfi1 ports with integrated fabric. ================================================================================ ================================================================================ 01.02.0049 ================================================================================ 1. [2103615096] Fixed SRAT and SLIT table will lost when memory mode set to “SNC4” and “SNC2” after reset SUT first time. 2. [2103615105] Fixed The Localities value in SLIT & SRAT table will different test case defined when memory mode set to “SNC2” and “SNC4” after reset SUT several times. ================================================================================ ================================================================================ 01.02.0041 ================================================================================ 1. [1209235282] Fixed SUT will hang at 0x30 during AC cycle test with install full load 64G DIMMs. 2. [1209235282] Fixed SUT will hang at 0x31 during AC cycle test with install full load 64G DIMMs. 3. [1209356453] Fixed There is not "SSB Therm Trip" event be generated when shut down. 4. [1209275593] Fixed The BMC event occurred "Surprise Link Down Error" during running AC Cycle. 5. [1209234818] Fixed The SEL event "SmaRT & CLST" occurred during executing Reboot Cycle testing under RHEL7.2 OS. (with QKT9) ================================================================================ ================================================================================ 01.02.0001 (Initial Production Release) ================================================================================ 1. Update BIOS version to 01.02.0001 for Production release candidate. 2. Fixed klockwork issue with the updated klockwork policy. 3. [EPSD100035543] Fixed [KNL-F] "SBus firmware authorization failed" and " get_platform_config" logged in dmesg and messages in RHEL7.2U7xppsl1.4.2 with OPA driver10.2. ================================================================================ ================================================================================ ================================================================================ FEATURES ADDED/REMOVED ================================================================================ ================================================================================ 01.02.0072 ================================================================================ 1. Add the stitch support for AdamPass 2. Update KNL Ref. Code revision to v01.57.01.00 3. Update ME firmware version to SPS_PHI_03.01.03.022.0 4. Add B0 CPU signed external ucode patch 0x0000_01ac. 5. Update KNL-F Host Fabric Interface UEFI Driver to reversion v1.3.4.0.0 ================================================================================ ================================================================================ 01.02.0049 ================================================================================ 1. Update KNL Ref. Code revision to v01.51.01.00 2. Remove A0 ucode patch m0850670_ffff0030 support ================================================================================ ================================================================================ 01.02.0041 ================================================================================ 1. Add B0 CPU signed external ucode patch 0x0000_01a6. 2. Removed release BIOS contains all debug and test interfaces to meet SDL395 review requirement 3. Update KNL Ref. Code revision to v01.50.01.00 4. Update PC platform SPS ME FW to revserion:v03.01.03.021.0 5. Update KNL-F Host Fabric Interface UEFI Driver to reversion v1.3.3.0.0 6. Update AdamsPass BIOS codebase to BP1341.431 to get multiple security fixes. ================================================================================ ================================================================================ 01.02.0001 (Initial Production Release) ================================================================================ 1. Update AdamsPass BIOS codebase to BP 1340.430 2. Add B0 CPU signed external ucode patch 0x0000_01a3. 3. Update PC platform SPS ME FW to revserion:v03.01.03.020.0 4. Update KNL-F Host Fabric Interface UEFI Driver to reversion v1.3.1.0.0 ================================================================================ ================================================================================