================================================================================ Intel(R) Server Board S1200SP Product Family Firmware Update Package for Intel(R) One Boot Flash Update Utility and Windows* Preboot Execution Environment ================================================================================ Intel Enterprise Platform & Services Division - Marketing Intel Corporation 2111 N.E. 25th Avenue, Hillsboro, OR 97124 USA ================================================================================ DATE : October 25, 2018 TO : Intel(R) Server Board S1200SP Product Family customers SUBJECT : Release Notes for System Firmware Update Package ================================================================================ ABOUT THIS RELEASE ================================================================================ BIOS: 03.01.2032 ME: 04.01.04.054 ================================================================================ IMPORTANT: PLEASE READ ================================================================================ Due to additional integrated BIOS features, the Intel(r) Server Board S1200SP BIOS binary regions have surpassed their original design sizes. Install bridge BIOS version 03.01.2032 to redefine the binary regions before attempting to update the BIOS firmware to version 03.01.0038 or later. After updating to bridge BIOS version 03.01.2032, immediately update to formal production BIOS version 03.01.0038 or later. We apologize for the inconvenience. ================================================================================ Support Platforms and Dependency ================================================================================ Processors supported: Intel(R) Xeon(R) processor E3-1200 v5 series Intel(R) Xeon(R) processor E3-1200 v6 series Microcode update versions: CPUID Version Status 0x506E3 000000C2 Debug(E3-1200v5 UP R0/S0) Debug(Intel(R) Xeon(R) processor E3-1200 v5 series B0) 0x906E9 00000084 Debug(E3-1200v6 B0) Debug(Intel(R) Xeon(R) processor E3-1200 v6 series B0) ================================================================================ IMPORTANT NOTICE ================================================================================ - This Update package must be installed using Intel(R) One-boot Flash Update (OFU) V14.0 Build 14 - This BIOS has included CCB108 implementation(Aperture size), suggesting to press F9 to load default if BIOS is updated via online method. - BIOS downgrade from this release only can be done by using the BIOS recovery mode - Please press F9 to make SGX enabled by default when BIOS is online upgraded from Intel(R) Xeon(R) processor E3-1200 v5 series based SGX BIOS(01.01.xxxx) to Intel(R) Xeon(R) processor E3-1200 v5 series based SGX BIOS(03.01.xxxx), due to limitation on Intel(R) Xeon(R) processor E3-1200 v5 series based SGX BIOS. - This BIOS has updated Security Revision to 2.0 following SPRD requirement, causing BIOS can't be downgraded to previous version with Security Revision 01.00 under normal mode. No impact under Recovery Mode. The same limitation when downgrade BIOS to non-SGX BIOS and downgrade BIOS to SGX BIOS with lower security revision. - This BIOS has SMM communication buffer fix with Security Revision updated to 01.01 following SPRD requirement. Two impacts should be noted: >> 1. Security Revision upgrade: causing BIOS can't be downgraded to previous version with Security Revision 01.00 under normal mode. No impact under Recovery Mode. >> 2. SMM communication buffer fix: causing older version of utilities are not functional, only version equal or newer than below ones can be used together with this new BIOS. Sysinfo V14.0 Build 18, Selviewer V14.0 Build 17, Syscfg V14.0 Build 15, iFlash32 v14.0 Build10, FWPIAUPD v14.0 Build 8, FRUSDR v14.0 Build 8, OFU v14.0 Build 13 ================================================================================ System Firmware Update Package Usage instructions ================================================================================ This package can be updated using one of the following methods: - Windows* or Linux* operating system using Intel(R) One-boot Flash Update (OFU) V14.0 Build 14 - Windows* Preboot Execution Environment (WinPE) To update from Windows* and Linux* or operating systems using the Intel(R) One Boot Flash Update Utility (OFU) Intel(R) One boot Flash Update utility can be downloaded from http://downloadcenter.intel.com/ and it is part of the "BIOS, Firmware Update & Configuration Utilities" for Windows* and Linux*. Please refer to Intel(R) OFU user guide about the details of installation and usage of OFU. Use OFU to update system firmware by the following steps: - Install OFU on Windows* or Linux* system - Download the latest firmware update package from http://downloadcenter.intel.com/ - Unzip package to a folder - Run the following command in Windows* command line/Linux* terminal window: :\flashupdt -u \flashupdt.cfg To update from Windows* Preboot Execution Environment (WinPE) The System Firmware Update Package can be inserted to Windows* PE customized image for creating a bootable Windows* PE CD. User is able to update system firmware from customized WinPE CD by the following steps: - Boot server with customized WinPE CD - Run script "WinPE21_x64_Update.bat" or "WinPE20_x86_Update.bat" (name may be varied depends on your own customization) Note: 1. The Intel(R) OFU utility is case sensitive. Therefore, when you transfer the Firmware Update Package using USB flash drive from a Microsoft Windows* system to a Linux environment, you must first extract under the Linux* environment. Otherwise, you will need to mount the USB flash drive manually with 'vfat' option under Linux to avoid conversion from upper case to lower case and vice versa. 2. To make Intel(R) OFU utility run properly under x86 or x64 OS, you have to read OFU release notes on known issues for OFU installation. 3. In this SFUP package, Intel only provide batch file "WinPE_x86_Update.bat" for WinPE2.0 32 bit solution "WinPE_x64_Update.bat" for WinPE2.1/3.0 64 bit solution as an example. Please refer to white paper "White Paper-Intel Server Utilities Procedure for WinPE.pdf" for details on building your own customized WinPE CD. 4. Windows PE 2.0 - built from Windows Vista SP1 32bit or EM64T 5. Windows PE 2.1 - built from Windows Vista SP1 or Windows Server 2008, EM64T 6. Windows PE 3.1 - built from Windows Server 2008R2, EM64T 7. Microsoft IPMI driver is loaded by default from WinPE CD, if you want to use Intel IPMI driver instead of MS IPMI driver for firmware update, you can un-install Microsoft IPMI driver by: Devicesetup.exe ¨Cv remove *IPI0001 Note: IPI0001 is the device ID for Microsoft IPMI driver. 8. If to update backup BIOS region or NVRAM, you need to customize the OFU update scripts (eg.flashupdt.cfg) and add "UpdateBackupBios" or "UpdateNvram" parameter. ================================================================================ INSTALLATION NOTES ================================================================================ WARNING: It is very important to follow these instructions as they are written. Failure to update using the proper procedure may cause damage to your system. User can update BIOS flash image via either of the follow methods... A. UEFI iFlash32 1. Boot the system to EFI Shell 2. Copy IFlash32.efi and BIOS .CAP file to a HD or USB Flash Drive 3. Map the respective storage device in system with the command Shell> map -r 4. Change the Shell to mapped device file system Example: Shell> fs0: (or fs1:) 5. Run the IFlash32 utility on the prompt fs0:\> IFlash32 [File Name] /u /ni 6. Reboot system after the update is completed. B. Use flash programmer to burn the new BIOS ROM image (16MB) into the flash chip. c. Backup BIOS update instructions 1. Boot the system to EFI Shell 2. Copy IFlash32.efi and BIOS .CAP file to a HD or USB Flash Drive 3. Map the respective storage device in system with the command Shell> map -r 4. Change the Shell to mapped device file system Example: Shell> fs0: (or fs1:) 5. Run the IFlash32 utility on the prompt fs0:\> IFlash32 [File Name] /u /ni UpdateBackupBios 6. It will update primary BIOS with processed capsule and the backup BIOS update will be completed in next normal boot. 7. Restart unit, Backup flash update done. ================================================================================ BIOS RECOVERY INSTRUCTIONS ================================================================================ The Recovery process can be initiated by setting the recovery jumper (called BIOS Recovery Boot Jumper) A BIOS recovery can be accomplished from backup BIOS region. The recovery media must contain the following files under the root directory: 1. UEFI iFlash32 (including IFlash32.efi and ipmi.efi ) 2. *Rec.CAP 3. Startup.nsh (update accordingly to use proper *Rec.CAP file) BIOS starts the recovery process by first loading and booting to the recovery image from backup BIOS region. This process takes place before any video or console is available. Once the system boots to recovery image, it will boot automatically into EFI Shell to invoke the Startup.nsh script and start the flash update application (IFlash32.efi). IFlash32.efi requires the supporting BIOS Capsule image file (*Rec.CAP). After the update is complete, there will be a message displayed stating that the "BIOS has been updated successfully" indicating the recovery process is finished. The User should then switch the recovery jumper back to normal operation and restart the system by performing a power cycle. The following steps demonstrate this recovery process: 1. Power OFF the system. 2. Switch the recovery jumper. Details regarding the jumper ID and location can be obtained from the Board EPS for that Platform. 3. Power ON the system. 4. The BIOS POST screen will appear displaying the progress and system automatically boots to the EFI SHELL. 5. Startup.nsh file executes, and initiates the flash update (IFlash32.efi) with new capsule file (*Rec.CAP). The regular IFlash message will be displayed at the end of the process, once the flash update succeeds. 6. Power OFF the system, and revert the recovery jumper position to "normal operation". 7. Power ON the system. 8. Do *NOT* interrupt the BIOS POST during the first boot. ================================================================================ 03.01.R2032(!!!Hightlight!!! Used for intermedia version to update to version equal or larger than 03.01.0033) ================================================================================ 1. Production key sign 2. Add warning message during BIOS POST to inform customer to update this bridge BIOS to production version. ================================================================================ 03.01.D1032 ================================================================================ 1. CCB#2227: Add Infineon FW update capability support in BIOS and UEFI application 2. Roll back the Microcode version for KBLto 0x84 3. [S1200SPSGXRefresh] Adjust the BIOS flash map to fix the code size issue during compiling ---- Part1--AutoDetectSecPeiFv 4. Fix the setup variable structure change issue ================================================================================ ME 04.01.04.054 ================================================================================ Please follow the below procedure to update ME using UEFI iFlash32 14.0 Build 11 1. Boot the system to EFI Shell 2. Download ME release package 3. Unzip the ME release package to HD or USB Flash Drive 3. Map the respective storage device in system with the command Shell> map -r 4. Change the Shell to mapped device file system Example: Shell> fs0: (or fs1:) 5. Run the IFlash32 utility on the prompt. Use ME_xx_xx_xx_xxx.cap file when ME operational Image update is required. Use MEComplete_xx_xx_xx_xxx.cap file when Only whole ME Image update is required. fs0:\> IFlash32 [File Name] /u /ni 6. Reboot system after the update is completed. ============================================================================= LEGAL INFORMATION ============================================================================= Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel's Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the presented subject matter. The furnishing of documents and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any such patents, trademarks, copyrights, or other intellectual property rights. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Intel is a registered trademark of Intel Corporation. *Other names and brands are the property of their respective owners. Copyright (c) 2018 Intel Corporation. A portion of this firmware is open source code, which falls under the GPL 2.0 license. [END OF RELEASE NOTES]