=============================================================================== Intel(R) Server Platform Integrated BMC Firmware Release Notes =============================================================================== INTEL(R) Server Boards and Systems Intel Corporation 2111 N.E. 25th Avenue, Hillsboro, OR 97124 USA =============================================================================== DATE: 22th Mar, 2021 TO: Intel(R) Server Board S1400xx, S1600xx, S2400xx, S2600xx, W2600xx, & S4600xx customers SUBJECT: Integrated BMC(R) firmware 01.61.12398 release notes =============================================================================== LEGAL INFORMATION =============================================================================== Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel's Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the presented subject matter. The furnishing of documents and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any such patents, trademarks, copyrights, or other intellectual property rights. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Intel is a registered trademark of Intel Corporation. *Other names and brands are the property of their respective owners. Copyright (c) 2022 Intel Corporation. A portion of this firmware is open source code. The OSS source code that the customer is entitled to per OSS license has been posted on the Intel support website at the following link: http://downloadcenter.intel.com/Detail_Desc.aspx?agr=Y&DwnldID=21081 This open source code falls under the GPL 2.0 license, please see the license at the following link: http://www.opensource.org/licenses/gpl-2.0.php =============================================================================== ABOUT THIS RELEASE PACKAGE =============================================================================== Source file: BMC_i_0161r12398.bin Update script: fwUpdateBMC.nsh REVISION INFORMATION RETURNED BY GET DEVICE ID COMMAND: Operational mode: 01.61.12398 UBoot mode: 01.07 Device ID: 0x21 Manufacturer ID: 0x000157 Other version/revision information: PSU Model H/W revision FW Version 1100ADU00201 S3 1.01.51 (HEX: 1.01.33) 1100ADU00201 02F 1.*.51 DPS 750XB A S4 5.**.100(HEX: 5.**.64) *(See Note 2) DPS 750AB-32A S0 3.**.27 (HEX: 3.**.1B) *(See Note 2) DPS 1200TB A 02 6.40.89 (HEX: 6.28.59) *(See Note 1) PSSF162202A 00A 0.09.75 PSSF162202A 01A 0.09.75 PSSF162202A 02A 0.09.75 PSSF162202A 03A 0.09.75 PSSF162202A 04A 0.09.75 PSSF162202A 05A 0.09.78 PSSF162202A 06A 0.09.78 PSSF162202A 07A 0.09.78 PSSF162202A 08A 0.09.78 PSSF162202A 09A 0.09.78 PSSF162202A 10A 0.09.78 PSSF162202A 11A 0.09.78 PSSF222201A S4 0.0.33 PSSF132202A 00A 0.5.23 PSSF132202A 01A 0.5.23 *NOTE 1: Supported but not POR. Will likely be removed in a future release. *NOTE 2: The middle version number is attached to a particular batch of power supplies and can be different for the same firmware revision. Therefore, it cannot be predicted ahead of time what it will be. Validation should ignore this value. *NOTE 3: PSSF132202A is 1300W PSU support only on Systems S2600WT and please verify together FRUSDR 1.18 or later version. HSBP FW: 01.41 Root: 01.50 WWW: 01.19 UBoot: 01.07 FWPIAUPD Utility: v14_1_Build18 MD5 checksum of BMC_i_0161r12398.bin: a0525cb68a06f002fe5b228751127877 KVM Jars file signed certificate valid time : 3/20/2019-6/17/2021 ------------------------------------------------------------------------------- A "Pong" version of the firmware image can be made available on request. =============================================================================== IMPORTANT INSTALLATION NOTES =============================================================================== The following update process must be followed to ensure a trouble free updating of your baseboard. The order is important to minimize any issues for status checking as different components are initialized. 1. Manageability Engine (ME) firmware 2. Flash Descriptor (FD) 3. BMC firmware 4. BIOS 5. FRU/SDR package specific to the baseboard =============================================================================== INSTALLATION PROCEDURE =============================================================================== - NOTE: if upgrading from BMC FW 0.19 or older, you first need to upgrade to 0.20 by using a device image file (.ima file) in a device programmer. Refer to the 0.20 firmware package for details and flash image files specific to each platform. After updating to 0.20, continue with the following steps. 1. Copy all files to the storage medium of your choice. This can be a hard disk, floppy disk or USB flash drive. All of the files must reside in the same directory. 2. Boot to EFI and then run the fwUpdateBMC.nsh script file to update the Integrated BMC. Modification of the update script or using fwpiaupd.efi with your own command line parameters is not supported and doing so is at your own risk! 3. Install latest available FRU/SDR package specific to the platform. =============================================================================== FIRMWARE RECOVERY PROCEDURE =============================================================================== The Recovery process can be initiated by setting the recovery jumper (called BMC Force Update Jumper) to the recovery position. The jumper is normally in the normal/de-asserted position. The system must be completely powered off (A/C power removed) before the jumper is moved. After power is re-applied and the firmware update is complete, the system must be powered off again and the jumper must be returned to the de-asserted position before normal operation can begin. A BMC recovery can be accomplished from a USB flash drive. 1. Copy all files to a storage USB flash drive. All of the files must reside in the same directory. 2. Remove A/C power from the system and wait 30 seconds. 3. Move the BMC Force Update Jumper to the recovery position. Details regarding the jumper ID and location can be obtained from the Board EPS for that Platform. 4. Insert the USB flash drive. 5. Reapply A/C power to the system and power on the system. 6. The BIOS POST screen will appear displaying the progress press F6 to select boot options. At the boot option menu select to boot to the EFI SHELL. 7. Switch to the directory where you stored the update files and then run the fwUpdateBMC.nsh script file to update the Integrated BMC. Modification of the update script with your own command line parameters is not supported and doing so is at your own risk! 8. Remove A/C power from the system and wait 30 seconds. 9. Move the BMC Force Update Jumper to the normal position. 10. Reapply A/C power to the system and power on the system. NOTE: Performing this recovery procedure resets all network and user settings to defaults. The FRUSDR will also need to be reloaded after a recovery (SDR update). =============================================================================== FIRMWARE UPGRADE/DOWNGRADE PROCEDURES =============================================================================== Reverting to a lower version of firmware may have unexpected side effects, including but not limited to user settings reset to defaults, and will always result in the loss of functionality which was present in the higher version but was not implemented in the lower version. We do not guarantee that any downgrade will operate without side-effects. Always observe caution when downgrading firmware. =============================================================================== KNOWN ISSUES/WORKAROUNDS/REQUIREMENTS =============================================================================== - This BMC FW update package is to be used only on Intel server baseboards and does NOT support customer reference boards (CRB) or silicon reference platforms (SRP). Contact your Intel Representatives to determine where to download the BMC FW for these products. - The BMC FW image file in this package is to be used only with the provided FWPIAUPD update utility. Using the FW image file with a SPI flash device programmer will result in a non-functional system. - Some open source ipmi utilities may automatically retry multiple times during access BMC using bad password and supporting IPMI specification 1.5 in Linux OS. CCB310 will log more bad password login SEL. - Start from BMC v1.60, KCS Policy feature added. When KCS control mode is put in restricted and deny all mode, BMC EWS CPU and DIMM page displays blank or last DC on configuration information. When KCS policy control mode is configured as "Restricted" and "Deny All", BMC and FRUSDR cannot be upgraded/downgraded as expected behavior. More information can be referred to document BMC KCS Policy Control Modes_v0.7. - Start from BMC v1.57, by default, only Cipher Suite 17 support for IPMI Over Lan feature added. Please use ipmitool 1.8.18 or later to access BMC IPMI Over Lan message interface with -C 17 option. - Start from BMC v1.57, KVM unsecure port disabled feature added. User only can configure secure port of KVM in the web console. - Start from BMC v1.59, RMCP disabled and RMCP+ Cipher Suite 3 disable feature added, also add options in web console. User can configure these options though web. - Start from BMC v1.57, If use KVM console to redirection iso file, sometimes iso file eject fail and in case redirection again will cause KVM session hang up. To recovery KVM session, force to close this KVM session and in BMC EWS, exchange USB emulation type between floppy mode and hard disk mode, then reopen console redirection in EWS. =============================================================================== ISSUES FIXED =============================================================================== 1.61.12398: -KVM java application signed key valid time extend to 6/17/2021 =============================================================================== FEATURES ADDED =============================================================================== None.