================================================================================ Intel(R) Server Board S2600WF, Intel(R) Server System R1000WF Product Family and Intel(R) Server System R2000WF Product Family Firmware Update Package for Intel(R) One Boot Flash Update Utility ================================================================================ Intel(R) Server Boards and Systems Intel Corporation 2111 N.E. 25th Avenue, Hillsboro, OR 97124 USA ================================================================================ DATE : April 05, 2022 TO : Intel(R) Server Board S2600WF Family ================================================================================ LEGAL INFORMATION ================================================================================ Information in this document is provided in connection with Intel Products and for the purpose of supporting Intel developed server boards and systems. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel's Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the presented subject matter. The furnishing of documents and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any such patents, trademarks, copyrights, or other intellectual property rights. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Intel is a registered trademark of Intel Corporation. *Other names and brands are the property of their respective owners. Copyright (C) 2022 Intel Corporation. SUBJECT : Release Notes for System Firmware Update Package ================================================================================ ABOUT THIS RELEASE ================================================================================ BIOS : 02.01.0015 ME : 04.01.04.601 BMC : 2.88.6999d21a FRUSDR : 2.03 PMEM : 01.02.00.5446 ================================================================================ Supported Platforms ================================================================================ Intel(R) Server Board S2600WF Family Intel(R) Server System R1000WF Family Intel(R) Server System R2000WF Family ================================================================================ BIOS COMPONENTS/CONTENTS ================================================================================ Processors supported: 1st and 2nd Generation Intel(R) Xeon(R) Processor Scalable families Microcode versions: CPUID Version Status 0x50654 0x02006c0a (1st Generation Intel(R) Xeon(R) Scalable H0,M0,U0) 0x50656 0x0400320a (2nd Generation Intel(R) Xeon(R) Scalable B0,L0,R0) 0x50657 0x0500320a (2nd Generation Intel(R) Xeon(R) Scalable B1,L1,R1) This update process must be followed to ensure a trouble free update. 1. Manageability Engine (ME) firmware 2. BIOS 3. FD 4. FRUSDR 5. BMC firmware 6. PMEM (if installed) ================================================================================ IMPORTANT NOTES!!! ================================================================================ - OFU utility with flashupdt tool does not support PMEM FW update, please refer to "PMEM_Update_Intructions.txt" part of this package for instructions to update PMEM. - This SFUP package includes the FW 01.02.00.5446 for Intel® Optane™ DC Persistent Memory (PMEM), if you received your PMEM DIMMs with a different FW, please install this one. - This Update package must be installed using Intel(R) One-boot Flash Update (OFU) V14.1 Build 28 - Starting from BMC v2.86, BMC does not allow upload .key files and only accepts .pem file for SSL certificate. If uploaded SSL Certificate or Key files fail to format checking, BMC will remove the invalid format file before starting BMC EWS and re-generate a self-signed certificate to ensure the BMC EWS can boot up successfully. Please consult TA-1176 for more details - Starting from BMC v2.88, Purley platfomrs only support SSL certificate which is equal to or longer than 2048 bit. - A security issue was fixed in Purley platforms. BMC credential is required to access files in internal virtual media from BMC v2.88. Issue:[Internal Virtual Media] Files in internal virtual media are accessible without BMC credential - Starting from BMC v2.88, EWS Active Directory should allow domain name and user name longer than 16 characters. The AD Setting will be cleared after downgrade to v2.86 or lower BMC versions if the Domain Name is equal to or longer than 32 characters. - Starting from BMC 2.22.59c3b83a, when KCS Policy Control Mode is configured as "Deny ALL" on BMC EWS, BMC and FRUSDR cannot be upgraded/downgraded as expected behavior. Updates can still be performed via Redfish or BMC EWS ================================================================================ PREREQUISITES ================================================================================ To update PMEM FW the following pre-requisites are requeried: BEFORE RUNNING WINDOWS AND LINUX UPDATE SCRIPTS -Install "ipmctl" tool in both LINUX* and WINDOWS* -Windows* : Download "ipmctl_windows_install_xx.xx.xx.xxxx.exe" which is avilable in the following github page (use latest) : https://github.com/intel/ipmctl/ -Linux* : RHEL8 1. Set proxy in your RHEL OS (if required) 2. ipmctl is available in epel-release, add the latest epel-release to your repolist 3. Install ipmctl using following commands : a. yum install epel-release or b. dnf install https://dl.fedoraproject.org/pub/epel/epel-release-latest-8.noarch.rpm c. yum install ipmctl SLES15 SPx 1. set proxy in your SLES15 OS (if required) 2. ipmctl is avilable in the following github page (use latest): https://github.com/intel/ipmctl/ a. Dependencies may include the following: i. libipmctl (available in the above github) 3. ipmctl may have dependencies, find dependencies in the following opensuse repositories: a. http://ftp.opensuse.org/update/leap/15.2/oss/x86_64/ b. Dependencies may include the following : i. libndctl ii. ndctl 4. For SLES15 SP2 a. wget http://ftp.opensuse.org/update/leap/15.2/oss/x86_64/ndctl-70.1-lp152.7.12.1.x86_64.rpm --no-check-certificate b. wget http://ftp.opensuse.org/update/leap/15.2/oss/x86_64/libndctl6-70.1-lp152.7.12.1.x86_64.rpm --no-check-certificate c. zypper install ndctl-70.1-lp152.7.12.1.x86_64.rpm d. zypper install libndctl6-70.1-lp152.7.12.1.x86_64.rpm e. zypper install libipmctl-02.00.00.3878-1.el8.x86_64.rpm f. zypper install ipmctl-02.00.00.3878-1.el8.x86_64.rpm ================================================================================ SYSTEM FIRMWARE UPDATE PACKAGE USAGE INSTRUCTIONS ================================================================================ This package can be updated using the following method: - Windows* or Linux* operating system using Intel(R) One-boot Flash Update (OFU) V14.1 Build 28 GENERAL INSTALLATION PROCEDURE a. Unzip the contents of the SFUP package to any directory b. Windows*: From SFUP directory open a command prompt or poweshell and execute startup.bat. i. When startup.bat is executed from SFUP, OFU drivers will be installed. The update order is ME, BIOS, FD, FRUSDR, BMC and PMEM (if any) followed by a system reset. c. Linux*: From SFUP directory open a terminal and execute "sh startup.sh". i. When "sh startup.sh" is executed from SFUP, it uninstalls existing OFU (if any) and installs latest OFU from SFUP. The update order is ME, BIOS, FD, FRUSDR, BMC and PMEM (if any) followed by a system reset. Note: The Intel(R) OFU utility is case sensitive. Therefore, when you transfer the Firmware Update Package using USB flash drive from a Microsoft Windows* system to a Linux environment, you must first extract under the Linux* environment. Otherwise, you will need to mount the USB flash drive manually with 'vfat' option under Linux to avoid conversion from upper case to lower case and vice versa. To make Intel(R) OFU utility run properly under x64 OS, you have to read OFU release notes on known issues for OFU installation. ================================================================================ SYSTEM HARDWARE & SOFTWARE REQUIREMENTS/REVISIONS ================================================================================ - S2600WFT, S2600WF0, S2600WFQ baseboards families only. To update the system firmware stack to the versions included in this update package, the currently loaded system firmware stack on the system must meet the following: System BIOS - R02010014 or later ME Firmware - 04.01.04.505 or later BMC Firmware - 2.86.2da97d3f or later FRUSDR - 2.02 or later PMEM - 01.02.00.5446 or later If the system doesn't currently meet the above system firmware requirements, you must download a previously-posted System Update Package (SUP) and update the system to the preceding described firmware revisions before updating the system to the firmware stack included in this package. ================================================================================ BIOS 02.01.0015 (This release) ================================================================================ [HSD-ES] :[2103648679]CpPcRestrictedPkg/SetupBmcCfg: SUT can't log in the EWS when a user with a 20 characters password created in the BIOS setup [HSD-ES] :[15010712364]ServerCommonPkg/LogoLib: Update ITK BIOS, reset system, and then System hang up at black screen [HSD-ES] :[2103648106]PurleyPcPkg/RasPkg: fix UCE SEL log error location will change to CPU1 A1 when enable 'Enhanced Error Containment Mode' and inject UCE on CPU2 DIMM [HSD-ES] :[1509291833]PurleyPcPkg/Restricted: Remove AMT complete without error SEL as request [HSD-ES] :[2103641926]PurleyPcPkg/Uba/UbaMain/Dxe/TypeWolfPass/SmbiosDataUpdateDxe: code update to get NIC card firmware version via Firmware Management Protocol as UEFI spec. [HSD-ES] :[2103648077]CpPcRestrictedPkg/MdeModulePkg: Fix OS boot option disappear after BIOS load default [HSD-ES] :[1509670376]CpPcRestrictedPkg/UefiOpromSetup: BCM NIC card Oprom is disappeared in UEFI Option ROM control after BIOS load default [HSD-ES] :[15010671257][CCB3618]PurleyPcPkg/Platform: [Purley][BIOS]Boot Options must not be removed in case of DIMM error [HSD-ES] :[N/A]Update the copyright year to 2022 for BIOS release [HSD-ES] :[1509878788][Purley_R]Remove “callback” for User Privilege at BIOS setup. Server Management->BMC LAN Configuration->User Configuration->Privilege->User/Operator/Administrator/No Access, No Access is default setting;(Remove "Callback") [HSD-ES] :[2103641401][Purley][S2600WFR]The sensor name about "OEM System Boot Event - Asserted"is wrong.The sensor name should be "BIOS Evt Sensor", BMC2.83 & Frusdr 2.02 sensor name is "OOB FM update". [HSD-ES] :[N/A]PurleyPcPkg/StitchingPkg:Integrate SPS FW to E5_04_01_04_601_0 to Trunk [HSD-ES] :[15010197917][Purley-R][S2600WFR][CCB 3457]BIOS administrator password will not be bypassed when forced_EFI_boot or silent_forced _EFI_boot is detected. [HSD-ES] :[15010325485][Purley-R][S2600WFR]After flashed 0404 BIOS and reboot, there is critical error log in EWS for SPS FW Health and STATUS_LED blinking with orange. [HSD-ES] :[14014516556]CpRcPkg/Library/BaseMemoryCoreLib: [IPU 2021.2] Bit flip within the EEPROM SPD cells [HSD-ES] :[CCB3388][N/A]PurleyPcPkg/RasDxe: CCB3388 Add AMT Completion SEL [HSD-ES] :[N/A]PurleyPcPkg/StitchingPkg:Sync the NvmDimmDriver and NvmDimmHii driver to v01.00.00.3531 [HSD-ES] :[N/A]PurleyPcPkg/StitchingPkg:Sync the BIOSACM version to Production v1_7_51_LBG and SINIT version to Production v1_7_51_LBG [HSD-ES] :[N/A]PurleyPcPkg/StitchingPkg:Integrate Microcode 0500320a for clx B1 and 0400320a for clx B0 [HSD-ES] :[1509006992]PurleySktPkg: [IPU 2021.2] Reorder BSP to the lowest APICID [HSD-ES] :[N/A]CryptoPkg/OpenSSL: [IPU 2021.2] update OpenSSL to 1.1.1j in submodule [HSD-ES] :[N/A]CryptoPkg/OpenSSL: [IPU 2021.2] Prepare for OpenSSL 1.1.1j upgrade [HSD-ES] :[1509254412][IPU2021.2Beta][Purley-R][Regression][FIXED_IPU2021.2Beta] Ghosted WBINVD breaks CRAM mode loading of ACM, causing SUT to reboot automatically when run getsec64.efi -l SENTER -i with TXT enabled [HSD-ES] :[22013243504]PurleySktPkg/Library/ProcMemInit/Chip: [IPU 2021.2] bad DIMM causes all AEP fail to be mapped to OS , also destroys AEP config [HSD-ES] :[14014175540]PurleySktPkg/Library/ProcMemInit: [IPU 2021.2]Min_ops value is always 0 on various DIMM configs with SKX CPU [HSD-ES] :[18016024150]PurleySktPkg/SouthClusterLbg: [IPU 2021.2][Purley Refresh PCH LBG BIOS] Fixed Eva Lock option [HSD-ES] :[1509092847][IPU2021.1][Purley-R][FIXED_IPU2021.2][LEGACY] "EVA Registers Lock” BIOS option requires "Unlock all PCH Registers"=Disabled (OK) but then has no effect due to BIOS hard-coded to locked. [HSD-ES] :[22012968660]PurleySktPkg/Library/ProcMemInit/Chip/Mem: [IPU 2021.2][Purley-R][IFWI 2021.16.2.28] When memory exceeds MMIOH Base, set 1LM: SUT can't boot normally; set 2LM: can't recognize installed AEP DIMM. [HSD-ES] :[22012950705]PurleyR : [IPU 2021.2] Grantley/Purley potential arbitrary code execution during the Pre-Efi Initialization (PEI) [HSD-ES] :[N/A]CryptoPkg/IntrinsicLib: [IPU 2021.2] Fix possible unresolved external symbol issue [HSD-ES] :[22012713087]Package/Module: [IPU 2021.2] Log EWL4 major = WARN_FPT_CORRECTABLE_ERROR and minorCode = WARN_FPT_PPR_ROW_REPAIR for PPR independent flow [HSD-ES] :[22011708444]CpRcPkg/Library: [IPU 2021.2] Update AdvMemTest EWL Type5 log message to reflect Bank info [HSD-ES] :[14013604560]CpRcPkg/Library/BaseMemoryCoreLib: [IPU 2021.2] Avoid PPR flow for an invalid DIMM entry due to DIMM topology changes [HSD-ES] :[1509006992]PurleySktPkg: [IPU 2021.2] Reorder BSP to the lowest APICID [HSD-ES] :[22012611104]PurleySktPkg/Library/ProcMemInit: [IPU 2021.2] Update MRC DRAM_MIN_OPS table for CLX [HSD-ES] :[14013065992]CpRcPkg/Library/AdvMemTestLib: [IPU 2021.2] System was not able to boot when AdvMemTestOptions are disabled [HSD-ES] :[22011803204]CpRcPkg/Library/AdvMemTestLib, CpRcPkg/Library/BaseMemoryCoreLib : [IPU 2021.2] Track faulty channels per socket [HSD-ES] :[18012660214]: [ME][SPS][IPU 2021.2] HmrfpoExt_GetStatus () 0x03 is not supported in bios [HSD-ES] :[22012325949]PurleySktPkg/Library/ProcMemInit: [IPU 2021.2] Update Advanced Memory Test Pattern for SK Hynix [HSD-ES] :[22011800884]PurleySktPkg/Dxe/CrystalRidge: [IPU 2021.2] CR MGMT Driver does not connect NvmDimmHii Driver [HSD-ES] :[22012225842]PurleySktPkg/Library/ProcMemInit/Chip/Mem: [IPU 2021.2] Memory Map code enters infinite loop if installed system memory exceeds MMIOH Base [HSD-ES] :[22012172123]CpRcPkg/Library/AdvMemTestLib: [IPU 2021.2] Update AMT Pattern for Micron [HSD-ES] :[18014267290][SPS][IPU 2021.2] Nonce bytes can be read from HECI buffer [HSD-ES] :[22012804657]PurleySktPkg/Library/ProcMemInit/Chip/Mem: [IPU 2021.2]PMEM introduction causing random system reboots [HSD-ES] :[15010166283][Purley]espi_smi failed in the log while run "chipsec_main -vv" in windows2022 with chipsec 1.7.1 [HSD-ES] :[15010119618][CCB3401][CCB3399][Purley]CCB 3401 Add support for MCTP feature for Purley products [HSD-ES] :[1509955185][Purley-R][CCB 3457][BIOS & BMC]Bypass BIOS admin password when FORCE_EFI_BOOT or SILENT_FORCE_EFI_BOOT is detected [HSD-ES] :[1509918561][Purley-R][CCB 3497][Purley]Update microcode for S2600BP as customer request [HSD-ES] :[1509377878]PurleyPlatPkg/Acpi: Change RMRR memory reserve type from AcpiNvs to EfiReservedMemoryType. [HSD-ES] :[1509880825][Purley][BIOS]there are lot of NVDIMM ACPI related logs displayed in Serial log even system without NVDIMM connected [HSD-ES] :[22013467511]Create Test BIOS for S2600BP with PCIe error detection disabled [HSD-ES] :[1509609474]S2600WF BIOS faied to update debug(developer) signed capsule when Active region was updated for debug BIOS from recovery jumper [HSD-ES] :[1509776978][Purley_R]SEL record wrong rank when inject SBE in second DIMM with ADDDC mode [HSD-ES] :[14014177411]PurleyPlatPkg/Acpi: Windows OS doesn't boot-up on S2600WF with RS3WC080 and VT-d enabled [HSD-ES] :[15010197917]CpPcRestrictedPkg: 3rd patch for bypass BIOS password issue. [HSD-ES] :[16015429421]PurleyPcPkg/Restricted: Hide MCTP options in BIOS Setup to avoid customer confuse as MCTP is not supported from BMC side, and it is not expected that customer to change the options. =============================================================================== BMC v2.88.6999d21a -(This release) =============================================================================== Upgrade kernel to 4.9.294 CCB3457:[BIOS & BMC]Bypass BIOS admin password when FORCE_EFI_BOOT or SILENT_FORCE_EFI_BOOT is detected CCB3458:[BMC]Active Directory should allow domain name and user name longer than 16 characters CCB3459:When updating BMC and BIOS, browser should limit search to .bin and .cap files respectively 1507285344 - Upgrade libxml2 from v2.9.8 to v2.9.9 2103650029 - Purley][S2600WF] the response is wrong for IPMI command Get DIMM Information (DIMM assert slot). 2103649750 - [S2600ST] After mounting a virtual media via iKVM and selecting the Device again, it will pop up a message "Exist an effective Connect from others ". 16015595685 -[Utilities] [SDPTool-4.0.0] [Purley] - Stress failure on IVM 2103648087 - [S2600ST] The device mount function on iKVM console menu Virtual Media > virtual storage can't be released. 15010737507 -[Purley][S2600BP] BMC doesn't check the ISO/IMG header when mount virtual media via WebISO 2103649160 - [Purley][ S2600WF / S9200WK ] The SEL has no description about "SPS FW Health" on EWS. 2103648972 - [Purley][S9200WK] the response is wrong for IPMI command Get DIMM Information (DIMM assert slot). 2103643376 - [S2600ST] [internal virtual media]After mount a internal VM in redfish and turn off iKVM,the mounted internal VM will be automatically unmounted in OS 15010705608 -[S2600ST] [Redfish]After mounting the ISO through redfish and then reset BMC, the EWS and redfish will hang up. 2103647672 - [Purley][S2600WF] Run DC/AC cycling with SP3RT040X16SPP Retimer card, port 1~3 connected nvme drives will be lost(drive LED is off). Fail rate 178/200 15010697059 -[Purley][S2600BP] Session will reach to the maximum if repeat login and then logout the BMC EWS Web 15010705258 -[S2600ST] [Redfish]When uploading a compressed file with Spaces or & in the file name via redfish, it only displays a file link in the OEM list. 15010704983 -[S2600ST] [Redfish]When a zip or gz file containing a folder is uploaded via redfish,the timestamp of some files are displayed as 1935. 2103648673 - [S2600ST] The policy suspend timers can't be disabled when change the Policy Suspend Timers from "Yes" to "No". 2103648677 - [S2600ST] The ISO/IMA file can't be mounted in the Virtual Media > virtual storage > Device 2/Device 3 after mounting a folder in Device 1. 2103648687 - [S2600ST] When select media type to ISO/IMG/IMA in virtual media over HTML5,all ISO/IMG/IMA files can't be displayed in the "ISO.IMG.IMA File" search mode. 2103648682 - [S2600ST] Chinese and English EWS help information does not match. 2103648097 - [S2600ST] After AC off SUT,the HTML5 KVM session doesn't give any prompts of disconnection. 2103647974 - [S2600ST] The LAN channel1/2 are missing in the EWS->IPv4 Network Settings when power off SUT. 15010550057 -[Purley]Unnecessary prompt pops up when upload 2048-bits certificate 16015511567 -[SDPTool][Purley][Internal Virtual Media] Files in internal virtual media are accessible without BMC credential 2103648046 - [Purley] [S9200WK] The EWS "NIC Information" and "Storage Information" can't detect any device with BMC 2.88. 2103647923 - [S2600ST] The client IPv6 address is not displayed on the EWS->Current Users page when login the EWS with a dynamic BMC IPv6 address. 1509875853 - [Purley][ Internal Virtual Media] Upload an encrypted file via Internal Virtual Media, the response is successful but no file can be accessed under OS 2103644460 - [S2600ST] The warning dialog box have some English words and missing a double quotation mark in Chinese EWS when upload a new SSL certificate 2103647768 - [Purley][S2600WF / S9200WK ] The BMC force update is failure with BMC 2.88. 2103647740 - [Purley][S2600WF] the FTF FSC function test fail with BMC 2.88. 22014214787 -MDR SendMsgBlock redundacy fail 14012941881 -[S2600BP] : PSU on 3 Compute Module system chassis is reporting 0% current out and PS status indicating "Power Supply AC lost" 15010173897 -[Purley][S2600BP] The complex password is abnormal with high level. (username: testuser2 / Password: 4rfv$RFVB) 15010183182 -[Purley][ Internal Virtual Media] Update BIOS via EWS/Redfish, the mounted image will be automatically unmounted to BMC 22014000969 -Incorrect BMC password logged in SEL; incorrect BMC user not logged in SEL 14014263553 -NVMe drive information on HSBP3/Drive2 appears duplicated with HSBP3/Drive1 on BMC Web console 2103644569 - Redfish: Use Postman tool to mount an "empty" txt file, it shows an extra string in the content of the mounted file 15010201274 -[Purley][Point release][CCB3478/3457] Cannot set Bypass BIOS password flag by ipmitool via LAN1/2 2103643169 - [Purley][S2600WF / S9200WK ]The Java Cert validity period is not match the release note for BMC v2.86 1509724299 - [Purley][S2600ST] Sometimes the web login event log is not logged in log file when login out EWS and login again. 1509724203 - [Purley][S2600ST] The client IP address displays the abnormal address "#011 "privilege": #011 "4"". 2103642881 - [S2600ST] The date and time is synchronized with the secondary NTP server when both the primary and secondary NTP server are configured 1509725178 - [Purley][S2600WF / S9200WK ]The SOL log view is no display after running "ls -lR" command. 2103643384 - [S2600ST][internal virtual media]The Oem list can only display 20 file links 2103643380 - [S2600ST][internal virtual media]Failed to download files from the internal VM to OS 2103643416 - Login to EWS with LDAP or AD users, there shows a new added "CPLD Update" option in the "Configuration" menu 2103643309 - [S2600ST] SUT will fail to connect to the SSH console after change default port number to other port 2103643393 - [S2600ST] it pops up an empty dialog box when replace a new certificate with 512 bits or 1024 bits in Chinese EWS 2103643315 - [S2600ST] The SSH console is still active when disable SOL SSH in EWS 2103642310 - [S2600ST] There is no link to channel 4 in redfish after enable HOST interface 2103642381 - [S2600ST] The boot order can't be changed via redfish 1508380544 - [SOW] BMC doesn't check the ISO image header when via HTML5 mount ISO image 1509357645 - [Purley][S2600BP] User can't use Redfish to replace/upload a new certificate instead of current one 1509357868 - [Purley][S2600BP]User can not use EWS to replace/upload a new certificate instead of current one 1509411390 - [Purley][S2600ST] KVM "mouse mode setting" screen in ews shows exceptions 1509439269 - [PURLEY] [BMC]lost dynamic IP after online update BMC 2.83 1509442200 - [BMC][purley]mixed up in get nvme information command 1509464162 - #CCB 3402: [Purley][S2600BP] The file of size larger than 33M cannot be uploaded to the newly image created via Redfish internal interface 1509486843 - #CCB 3402: [Purley][S2600BP] Unmount image is successful while the image is not mounted 2103641466 - [Purley][ S2600WF / S9200WK ]The UI for "anonymous" user is abnormal and can't be modified in EWS 2103641472 - [S2600ST] The Mount type is missing NFS in web ISO help page 2103641482 - [S2600ST] Alert events cannot all be selected when click "Check All" button in EWS->Configuration->Alerts page 2103641549 - [S2600ST] There is an extra character '<' in the Date&Time help page in the Chinese EWS 2103641607 - [S2600ST] There is a unknow item in EWS->Miscellaneous->Power Statistics 2103641618 - [S2600ST] there is missing size limitation definition for Virtual Media Over HTML5 help page in EWS 2103641755 - [Purley] [S9200WK] Open EWS -> Miscellaneous -> Power Statistics, it will pop-up a caution about NM initialization have problem. (BMC 2.83) 2103641774 - [S2600ST] KVM cannot open Via JRE due to JAVA certificate expired. 2103641816 - [S2600ST] The NTP server IP can't be set successfully when NTP server IP is xxx.xxx.xxx.1~9 in EWS 2103642274 - [S2600ST] Alert events cannot all be cleared when click "Clear All" button in EWS->Configuration->Alerts page page 2103642310 - [S2600ST] There is no link to channel 4 in redfish after enable HOST interface 2103642388 - [S2600ST] The EWS can't be opened when online update BMC from 2.48(upload new certificate) to 2.83 1509261003 - [S2600BP][L9][Showstopper]Exit Air Temp (#0x2E) CRITICAL event: Exit Air Temp reports the sensor is high, critical, and going higher state. 1509352602 - [Purley][S2600BP] ISO image mount via Redfish fail. 1509363546 - [Purley][S2600BP]User can not use Redfish to upload CA certificate success 1509118656 - [Purley][S2600ST] Get event log abnormal in EWS after updating BIOS 14012450677 -[S2600WF] system reboots by interacting with OS Watchdog 1507285344 - Upgrade libxml2 from v2.9.8 to v2.9.9 1509247112 - [PURLEY][BMC][IPS 00615607]redfish alerting has power on/off backwards 16013122517 -SDPTool [DEV] - SDR Upload issue 16012935938 -[Purley][S2600BP]When BMC is running factory image, try to update BMC, BMC backup image instead of primary image will be updated. 1509122866 - [Purley] [S2600WF] Can’t mount Virtual Media via Redfish. 2103639108 - [Purley][ S2600WF ]It reports PSU1 FAN fail in SEL after AC cycle with BMC 2.48.f831fbb5. 2103636406 - [Purley][ S2600WF ]The settings is no function for "BootSourceOverrideMode" in Redfish. 22012657916 -jQuery vulnerability affecting Wolf Pass 22012633532 -BMC EWS iKVM over HTML5 disconnects, when Date or Time is selected and keypad '+' [scan code 79] is press 2103635937 - Purley][ S2600WF ][900W DC] The PSU FW isn't match the BMC release note 2103636054 - [Purley][ S2600WF ][900W DC] The blackbox data shows “This feature is not supported by any power supplies in the system” in the BMC debug log file. 2103639150 - [Purley] S9200WK Some MemoryLocation info show "null" when check it by Redfish 1508892684 - [Purley][S2600BP] the warning message is incorrect while adding the same user name in EWS. 1508871269 - User can set the same username as the password when user sets username separately which mismatch Password Complexity rule ============================================================================= FRUSDR 2.03 ============================================================================= - HSD 15010443289 [Purley][BMC]wrong chassis information in frusdr - update BIOS sensor according to BIOS EPS v1.19 - add support for WCP HSBP G97166-XXX FXX8X25S3DPBP - Remove the redundant character '2' of sensor string. =============================================================================== KNOWN ISSUES/WORKAROUNDS/REQUIREMENTS =============================================================================== WARNING: This release has the BMC PCIe bridge disabled. This will cause the majority of operating systems to fail at boot as they stall during video driver initialization Steps to recover a failing operating system: Linux variants (one of the below): A. Ensure the "modprobe.blacklist=ast" parameter is set in your boot loader (grub) B. Ensure you are using a kernel version v4.10 or newer For Red Hat* Enterprise Linux* v7.3, please refer to the included "RHEL73_InstallationGuide_Rev1.1.pdf" For SUSE* Linux* Enterprise Server v12 SP1 or SP2, please refer to the included "SLES12_InstallationGuide_Rev1.00.pdf" Windows variants: Boot to safe mode, and load aspeed video driver v1.03 or greater and reboot For Windows* Server 2016, please refer to the included "WinSrv16_InstallationGuide_Rev1.00.pdf" IPMI usage: This release disables RMCP authentication by default. ipmitool uses RMCP by default, so it will fail to authenticate. Add the '-I lanplus' parameter to all ipmitool commands to use RMCP+ instead. Cipher Suite 3 is disabled by default since BMC firmware 1.90 and only keep Cipher Suite 17 opened by default. Due to this the extra parameter "-C 17" is required for ipmitool to work via LAN. The Cipher Suite 17 was first introduced in ipmitool 1.8.18 on Oct 8th 2016, you have to update ipmitool to this version or newer one, earlier versions of ipmitool don’t have Cipher 17 support ipmitool is not working well when running in high load network. We recommend to add extra timeout by using “-N 5”. Default is 1 second for RMCP+, which is not enough. –N 5 will set 5 second as timeout. So the command will look like: ipmitool –I lanplus –H ip –U user –P password –C 17 –N 5 command Please refer to the included "TA-1143_Extra_parameters_needed_for_ipmitool.pdf" When using IPMI to establish a SOL session using KONSOLE: A. The "Delete" input cannot be captured when pressing "Backspace" Workaround: Modify the "Backspace" key to "0x08" in the KONSOLE profile keyboard settings. B. Resizing a KONSOLE window with an active SOL session can cause the content to overlap Workaround: None. Recommend using the Java SOL Viewer instead of KONSOLE Redfish API: Redfish API POST requests using a browser extension or plugin will fail if the extension manipulates the HTTP(S) Origin header. This affects REST clients which are implemented as browser (chrome, Firefox) plugins or extensions such as the older versions of Postman. It is recommended to use Postman version 6.0 or later. For security purposes, the BMC Redfish API requires that if a HTTP Origin header is present, the host portion of the Origin header must match the HTTP Host header. Some browser based REST clients alter the Origin header preventing their use with the BMC. On Windows OS if the "system PMEM FW" and "PMEM FW in the SFUP" package are the same versions then ipmictl tool may error out with following message : If "system PMEM FW" has production stack and "PMEM FW in the SFUP" in debug stack or vise versa then ipmictl tool will error out with following message : "Error 308 - FW Update authentication failure" ============================================================================= A portion of this firmware is open source code, which falls under the GPL 2.0 license.