Release Notes for the Intel® Server Firmware Update Utility Version 16.0.9 March 13, 2023. Copyright © 2023 Intel Corporation. =========================================================== Contents -------- 1. Introduction 2. Supported Intel® Server Boards 3. Supported Operating Systems 4. Prerequisites 5. Getting Started 6. Usage 7. Known Issues 8. Unsupported Features 9. Change List 10. Instructions for the End-User 11. Legal Information 1. Introduction --------------- The Intel® Server Firmware Update Utility is a command-line tool used for updating the system BIOS, BMC, CPLD, ME, FD, FRU, and SDR. Also, it is used to restore BIOS and firmware settings. For filenames and paths related to this server utility, the abbreviation "sysfwupdt" is used. 2. Supported Intel® Server Boards ----------------------------------- Intel® Server Board S2600WT/S2600WTR Family* Intel® Server Board S2600KP/S2600KPR Family* Intel® Server Board S2600TP/S2600TPR Family* Intel® Server Board S2600CW/S2600CWR Family* Intel® Server Board S2600WF/S2600WFR Family Intel® Server Board S2600ST/S2600STR Family Intel® Server Board S2600BP/S2600BPR Family Intel® Server System S9200WK* Family Intel® Server System M70KLP Family Intel® Server System D50TNP Family Intel® Server System M50CYP Family Intel® Server System D40AMP* Family Intel® Server Board M20NTP2SB Intel® Server System M50FCP Family Intel® Server System D50DNP Family To know about support for other Intel server product families, check the product family documentation for the applicable version. * Note: These products have been discontinued, and any issues arising from using these tools on discontinued products requiring code changes to resolve will be unlikely to be addressed. Please see Intel’s new server-supporting tools and interfaces for the latest supported options to interact with Intel® Server products 3. Supported Operating Systems ------------------------------ UEFI shell Windows Server* 2019 and 2022 Windows* 10 Red Hat Enterprise Linux* (RHEL*) 8.x and 9.x-64 bit SUSE Linux Enterprise Server* (SLES*) 15, 12 service pack 3-64 bit Ubuntu* 20.04 and 22.04 Note : Users who want to use Utilities on Older versions of OS will have to use the previous versions of the Utility which has the OS Support. 4. Prerequisites ---------------- 1. For RHEL and SLES: Install all the development and optional packages during installation. 2. For the following operating systems: • Red Hat Enterprise Linux* (RHEL*) • SUSE Linux Enterprise Server* (SLES*) • UEFI aware Linux* • or other Linux* • Install the necessary libraries if the utility fails and displays one of the following error messages: - “Error while loading shared libraries: libncurses.so.5: cannot open shared object file: No such file or directory.” To fix this, run rpm -ivh xxxx.rpm to install libstdc++ and ncurses rpm packages for the corresponding operating system. - “Error: /lib/ld-linux.so.2: Bad ELF interpreter: No such file or directory.” This error indicates that development and optional packages are not installed. Install the necessary packages accordingly. - “Depends on libncurses5 (>= 6); however: Version of libncurses5:amd64 on system is 5.9+20140913-1+deb8u2.” This message indicates libncurses version must be >= 6. Install new libncurses. • If the Public Key is not imported, then the following error/warning is displayed: RHEL – warning: sysfwupdt*.rpm: Header V4 RSA/SHA256 Signature, key ID [KEY_ID]: NOKEY SLES – warning: sysfwupdt*.rpm: Header V4 RSA/SHA256 Signature, key ID [KEY_ID]: NOKEY To install the Public-Key manually, open the installation package, go to Linux_x64, and run the following command: #rpm --import pubKey.asc • There might be a driver conflict between internal driver and kernel. The user must start the OpenIPMI driver. If the utility fails with any error, such as: a. "FW interface failed" when updating the BMC. b. "Terminate called after throwing an instance of 'ResultStatus' Aborted (core dumped)" when updating SDR with the CFG file. Start the OpenIPMI driver and make sure that the /dev/ipmi0 device exists. Note: The BMC update cannot continue if the OpenIPMI driver is not started. For RHEL: • Run the following command and make sure that the /dev/ipmi0 device exists. o #modprobe ipmi_devintf or #modprobe ipmi_si For SLES: • Run the following command and make sure that the /dev/ipmi0 device exists. o #service ipmi start 3. After enabling the OpenIPMI device, if the server utility still reports errors during BMC, FRU, and SDR update, for example: a. "Failed to write SDR file", "SDR auto-update failed". b. "Error: Error while parsing the cfg file". There might be a BMC watchdog conflict with the OpenIPMI device driver. The user must disable the BMC watchdog, perform the update, and then re-enable the BMC watchdog once the update is finished. 4. The Intel® Server Configuration Utility only works if it is executed with administrator privilege on Windows* and with root privilege on Linux* operating systems. 5. Updating PFR BMC/BIOS/CPLD is not supported by this utility if the BMC firmware is in transfer mode. 6. It is recommended to do a direct FRU update in EFI/WinPE* before doing a FRU resize with a customized CFG file. 7. Reinstall the Windows driver before using the 16.x.x version (refer to the Getting Started section in these release notes). 5. Getting Started ------------------ I. Installation --------------- 1. For Windows and WinPE: 1. Open a command prompt as administrator. 2. Go to the sysfwupdtxx\Drivers\win\x64 folder and run install.cmd to install ipmi, smi, and memory map drivers. 3. Go to the sysfwupdtxx\Win_x64 folder . 4. Run sysfwupdt.exe. 2. For UEFI shell, use files from the UEFI_x64 directory and run sysfwupdt.efi. 3. For Linux: 1. Unzip the package Sysfwupdt_Vx.x.x_AllOS.zip in a directory. 2. Go to the Linux_x64 directory. 3. If there is another version already installed, remove that previous version before installing the new version. To remove the previous version, run uninstall.sh. 4. Install the Intel Server Firmware Update Utility by running install.sh. II. Removal ----------- 1. For Windows and WinPE: 1. Open command prompt as administrator. 2. Go to the folder sysfwupdtxx\Drivers\win\x64 and run uninstall.cmd to remove the previous version of ipmi, smi, and memory map drivers. 3. Remove the folder sysfwupdtxx. 2. For Linux: 1. Run uninstall.sh from the Linux_x64 directory. III. Execute the Utility without Installation ----------------------------------------- 1. For the Linux operating system version, unzip the package. 2. Go to the Linux_x64\XXX\XXX directory based on the selected linux distribution. For example, for RHEL8, go to Linux_x64/RHEL/RHEL8/. 3. Unzip sysfwupdt.zip. 4. Run the executable, ./sysfwupdt -h. 6. Usage -------- 1. Command-line interface sysfwupdt {Options} [File Name] {Update Option} {Options} --------- For Intel server boards based on the 3rd Gen Intel® Xeon® Scalable processor family: -u - Update BIOS, BMC, CPLD, Intel® Integrator Toolkit, and NVRAM. -d - Display FRU, SDR, SMBIOS areas. -i - Display system BIOS, BMC, and SDR information. -cfg - Update FRU/SDR by .cfg file. -set - Set FRU field area. -fru - Update FRU field using .fru file. -sdr - Update SDR field using .sdr file. For Intel Server Board M70KLP: -u - Update BIOS, BMC, CPLD, customized logo, and NVRAM. -d - Display FRU, SDR, SMBIOS areas. -i - Display system BIOS, BMC, CPLD, and SDR information. -set - Set FRU field area. -fru - Update FRU field using .fru file. -sdr - Update SDR field using .sdr file. For Intel server boards based on the 1st or 2nd Gen Intel Xeon Scalable processor family: -u - Update BIOS, BMC, Intel ME, FD, and NVRAM. -d - Display FRU, SDR, SMBIOS areas. -i - Display system BIOS, BMC, Intel ME, and SDR information. -cfg - Update FRU/SDR by .cfg file. -set - Sets FRU field area. -fru - Update FRU field using .fru file. -sdr - Update SDR field using .sdr file. For Intel Server Board M20NTP2SB: -u - Update BIOS, BMC, CPLD, customized logo, and NVRAM. -d - Display FRU, SDR, SMBIOS areas. -i - Display system BIOS, BMC, Intel ME, and SDR information. -set - Set FRU field area. -fru - Update FRU field using .fru file. -sdr - Update SDR field using .sdr file. {Update Option} --------------- -recovery - Update recovery BMC/BIOS/CPLD (valid only for Intel server boards based on the 3rd Gen Intel Xeon Scalable processors family). ImmReset - Restart server immediately after an update of BMC/BIOS/CPLD (valid only for Intel server boards based on the 3rd Gen Intel Xeon Scalable processors family). UpdateNvram - Force update NVRAM region. Add one more logo - Update customized BIOS logo (valid only for the Intel Server Board M20NTP2SB). a. To view the command-line help page: sysfwupdt -h b. To update the firmware: sysfwupdt -u [File Name] [File Name]: For Intel server boards based on the 3rd Gen Intel Xeon Scalable processor family: BIOS/BMC/CPLD File Name For Intel server boards based on the 1st or 2nd Gen Intel Xeon Scalable processor family: BIOS/BMC/ME/FD File Name For the Intel Server Board M20NTP2SB: BIOS/BMC File Name c. To update the firmware using the KCS interface: sysfwupdt -u [File Name] -kcs [File Name]: For Intel server boards based on the 3rd Gen Intel Xeon Scalable processor family: BMC/CPLD File Name For Intel server boards based on the 1st or 2nd Gen Intel Xeon Scalable processor family or for the Intel Server Board M20NTP2SB: BMC File Name d. To update the firmware with immediate reboot of server (platform-specific command): sysfwupdt -u [File Name] ImmReset [File Name]: For Intel server boards based on the 3rd Gen Intel Xeon Scalable processor family: BIOS/BMC/CPLD For Intel server boards based on the 1st or 2nd Gen Intel Xeon Scalable processor family or for the Intel Server Board M20NTP2SB: BIOS File Name e. To update the firmware with NVRAM (platform-specific command): sysfwupdt -u [File Name] UpdateNvram [File Name]: For Intel server boards based on the 3rd Gen Intel Xeon Scalable processor family: BIOS/BMC Note: If a BIOS administrator password is set, run the command syscfg /bsnvlock “admin_password” before updating BIOS. For Intel server boards based on the 1st or 2nd Gen Intel Xeon Scalable processor family: Not supported. f. To update the firmware with NVRAM and trigger an immediate reboot of the server (platform-specific command): sysfwupdt -u [File Name] UpdateNvram+ImmReset [File Name]: For Intel server boards based on the 3rd Gen Intel Xeon Scalable processors family: BIOS/BMC For Intel server boards based on the 1st or 2nd Gen Intel Xeon Scalable processors family: BIOS File Name. For the Intel Server Board M20NTP2SB: Not supported. g. To update the customized Integrated BMC Web Console image (platform-specific command): sysfwupdt -u [File Name] sysfwupdt -u [File Name] Password=xxx [File Name]: For Intel server boards based on the 3rd Gen Intel Xeon Scalable processors family: Intel Integrator Toolkit file. For the Intel Server Board M70KLP, Intel Server Board M20NTP2SB, and Intel server boards based on the 1st or 2nd Gen Intel Xeon Scalable processors family: Not supported. h. To update more than one image together: Refer to the release notes and/or readme files included with the System Update Package (SUP) for your specific system. i. To update the firmware recovery image (platform-specific command): sysfwupdt -u [File Name] -recovery For Intel server boards based on the 3rd Gen Intel Xeon Scalable processors family: BIOS/BMC/CPLD file For Intel server boards based on the 1st or 2nd Gen Intel Xeon Scalable processors family: BIOS/BMC file For Intel Server Board M20NTP2SB: BMC file j. To display the system BIOS, BMC, CPLD, and SDR version: sysfwupdt -i sysfwupdt -i -u cfgFileName Note: CPLD version display is only supported on Intel server boards based on the 3rd Gen Intel Xeon Scalable processor family. k. To update FRU and SDR: sysfwupdt -cfg cfgFileName Note: Not supported on the Intel Server Board M70KLP and Intel Server Board M20NTP2SB. l. To restore BIOS settings: sysfwupdt -rd adminpassword (run –rd with BIOS administrator password on the Intel Server Boards M70KLP and M20NTP2SB). sysfwupdt -rd "" Note: On the Intel Server Board M70KLP and Intel Server Board M20NTP2SB, before running this command, first set a BIOS administrator password from the setup page and then run syscfg /bsnvlock “admin_password”. m. To display FRU, SDR, SMBIOS area: sysfwupdt -d fru/sdr/smb n. To set FRU area: sysfwupdt -set FRUAREA/FRUFIELD o. To force update FRU area: sysfwupdt -fru p. To force update SDR area: sysfwupdt -sdr q. To clear customer settings (supported only on Intel server boards based on the 3rd Gen Intel Xeon Scalable processor family): sysfwupdt -ccs sysfwupdt /rd Note: Run /rd command after -ccs to clear customized settings. Note: This command is not supported on the Intel Server Board M70KLP and Intel Server Board M20NTP2SB. r. To restore Intel® ME configuration (valid only on Intel server boards based on the 1st or 2nd Gen Intel Xeon Scalable processors family): sysfwupdt -rmec s. To update customized BIOS logo (not valid for other platforms): sysfwupdt -u For the Intel Server Board M70KLP: sysfwupdt For the Intel Server Board M20NTP2SB: sysfwupdt logo 2. Reboot the system after the update/restore default BIOS settings operation is completed. Note: For more details, refer to the Intel® Server Configuration Utility User Guide. 7. Known Issues --------------- 1. When updating BIOS/BMC/CPLD, no auto-reset occurs. Once the user adds the "ImmReset" parameter, an immediate reset occurs after the update command. 2. I/O port access is not allowed in Linux when UEFI secure boot is enabled. Disable UEFI secure boot in BIOS setup before running the utility. 3. Debian* and SLES 15 operating systems do not allow I/O memory map by default. The user must add "iomem=relaxed" to grub boot option to enable I/O memory map. Otherwise, some features may not work. 4. Do not perform BIOS and BMC updates at the same time when using the ImmReset option. Intel® Server Boards based on the 1st or 2nd Gen Intel® Xeon Scalable® Processor Family, Specific Issues: ---------------------------------------------------------------------------------------------------------- 1. When updating BIOS, the UpdateNvram option does not work. Intel® Server Boards based on the 3rd Gen Intel® Xeon® Scalable Processor Family, Specific Issues: --------------------------------------------------------------------------------------------------- 1. When non-auto configuration is being used (sysfwupdt -cfg cfgFileName -nac), choose the SDR update option only. 2. SDR forced update (sysfwupdt -sdr SDRFileName) is not supported since SDR changes the updated mechanism that depends on a tag set from main cfg. 3. Since build 9, sysfwupdt /u .bin only supports updating BIOS versions SE5C6200.86B.0020.P15 and later. Intel® Server Board M70KLP, Specific Issues: -------------------------------------------- 1. Use BIOS versions SE5C620.86B.01.03.0016 (with sample key) and later. 2. It is recommended to do a BMC reboot or system reboot before/after any online update operation to make sure that the BMC is in normal mode, otherwise, there might be unexpected errors occurring during the next online update process. 3. Online update by KCS interface takes a long time (~80 minutes) and there is lower system performance during this time. Intel® Server Board D50TNP and Intel® Server Board M50CYP, Specific Issues: -------------------------------------------------------------------------- 1. To downgrade from BIOS R0008 update to R0007/R0006, use the older sysfwupdt utility. Intel® Server Board M20NTP2SB, Specific Issues: ----------------------------------------------- 1. BMC update with recovery is not working. 2. BMC update with -kcs is not working. 3. ImmReset with BIOS update is not working. Intel® Server Board M50FCP, Specific Issues: -------------------------------------------- 1. After recovery, the version is not getting reflected (sysfwupdt /u xxx.bin /recovery). 2. After BIOS update, the host is getting shutdown. The user needs to press the power button to bring up the system after the update completes. 8. Unsupported Features ------------------------ 1. Intel server boards based on the 1st or 2nd Gen Intel Xeon Scalable processors family: a. ImmReset and UpdateNvram are not supported for BMC update. 2. Intel Server Board M20NTP2SB: a. ImmReset is not supported for BMC update. b. Recovery is not supported for BIOS update due to hardware limitations. 3. Intel server boards based on 4th Gen Intel Xeon Scalable processor family: a. No SDR package is available. b. -kcs update option is not supported. c. If updating through USB interface fails, then it does not return to the KCS interface. 9. Change List -------------- Version 16.0.9 -------------- 1. Fix 16019904480 - [IB-Utilities] [16.0.8]Incorrect logic in driver install script 2. Fix 15012855613 - Request utility identify the uploaded image type before doing BIOS/BMC FW active region update. 3. Fix 16019844345 - [Utilities] [Sysfwupdt_16.0.8] [PTK0003520] System Firmware Update Utility (SysFwUpdt) for Intel(R) ... multiple dll planting vulnerabilities 4. Fix 16019729332 - [Utilities] [Sysfwupdt_V14_2_Build10] [Purley] [Linux/UEFI/Windows] ME update fails when BAP is set. 5. Fix 2103653368 - Some FRU fields length can be set over to 32 bytes via Sysfwupdt. 6. Fix 2103657824 - Failed to flash BIOS with admin password via v16.0.8 sysfwupdt in Linux if PSW contains particular character ! in specified place. Version 16.0.8 -------------- 1. Klocwork* static scan fixes. 2. Windows drivers are WHQL-certified for Windows Server 2022. 3. Fix 2103656673 - American pass CPLD version is shown wrong by v16.0.7 version of syscfg/sysinfo/sysfwupdt. Version 16.0.7 -------------- 1. Klocwork* static scan fixes. 2. Fix 16018480108 - [Utilities][PSIRT] Remote code execution through System Firmware Update Utility 3. Fix 16018402709 - [Utilities][PSIRT] LPE of FLASHUD.sys 4. Fix 16018373136 - [Utilities][PSIRT] IBSMUtil Windows Driver Kernel Privilege Escalation 5. Fix 16018346553 - [Utilities][PSIRT] imbdrv Windows Driver Kernel Privilege Escalation 6. Fix 16018278921 - [Utilities][PSIRT] LPE of IBSMUtil.sys 7. Fix 16018257641 - [Utilities][Agnostic][ubuntu]prompts/waits for user inputs while uninstalling gpg key 8. Fix 16016038260 - [Utilities] [Syscfg] [Build_16.0.2 RC1] [M50FCP] [Windows/UEFI/Linux] Observing more time for tar file generation in Windows and UEFI 9. Fix 2103655039 - [Q3 QSBR][SFUP]SFUP Package does not support RHEL 9.0 10.Fix 2103655033 - BMC use sysfwupdt 16.0.6 update fail in UEFI shell 11. Fix 15012336905 - Sysfwupdt v16.0.7 can't flash BIOS under Windows P1 OS 12. Fix 2103656306 - With full or partial full memory config is installed, SUT is fail to do online flash between 0028P03 and R0006 BIOS under windows by sysfwupdt v16.0.7 utility. Version 16.0.6 -------------- 1. Klocwork* static scan fixes. 2. Fix 16017065310 - [Sysfwupdt][M50CYP] sysfwupdt /i does not show CPLD version. 3. Fix 16017583376 - [Utilities] [sysfwupdt] [Build 16.0.6_RC1][Intel server boards based on the 3rd Gen Intel Xeon Scalable processors family] sysfwupdt /i gives incorrect Intel® ME version. 4. Fix 2103647128 - [Intel server boards based on 3rd Gen Intel Xeon Scalable processors family][M50CYP/D50TNP] It cannot start BMC force update with KCS restricted mode. Version 16.0.5 -------------- 1. Fix 2103652647 - Sysfwupdt / Syscfg -i command cannot be used. 2. Fix 15011074455 - [Utility][Agnostic] RPM issue in the Intel Server Firmware Update Utility version 16.0.2. 3. Fix 2103652539 - Cannot upgrade/downgrade firmware with BIOS 8021D05 using sysfwupdt 16.0.4. 4. Fix 16017106850 - Utilities [SYSFWUPDT_V16.0.5_RC1][M50FCP/D50DNP][Windows] FRU update is not working. 5. Fix 16016882440 - Utilities [SYSFWUPDT_V16.0.4_RC3][M50FCP/D50DNP][Windows/Linux] -/u ImmReset fails after 100% image transfer. 6. Klocwork static scan fixes. 7. Linux binaries rpms and debs are signed. 8. The permission mode of etc/profile.d/sysfwupdt_path.sh has been restricted. Version 16.0.4 -------------- 1. Fix 16016350592 - [Utilities] [Sysfwupdt] [Single_build_v16.0.3 RC1] [Intel server boards based on the 1st or 2nd Gen Intel Xeon Scalable processors families] [LINUX/WINDOWS/UEFI] BIOS, FD, and ME updates are going through/not blocked when system is in restricted mode. 2. Fix 16015286823 - [M50FCP][D50DNP][syscfg/sysfwupdt/sysinfo] IPMI command to get MEVERSION is failing (Raw IPMI: 2C 06 00 01). 3. Fix 15011022662 - [Utilities] [Sysfwupdt] [Single_build_v16.0.3 RC1] [Intel server boards based on the 1st or 2nd Gen Intel Xeon Scalable processors families] [Linux/Windows/UEFI] "/i BMC.bin" fails. 4. Fix 16014286794 - [Utilities] [Sysfwupdt] [Intel server boards based on the 1st, 2nd, or 3rd Gen Intel Xeon Scalable processors families] SDR Version is not getting updated. 5. Fix 16016115707 - [Utilities] [Sysfwupdt] [Single_build_v16.0.2 RC1] [M50FCP/D50DNP] [LINUX/WINDOWS/UEFI] Updates are going through/not blocked when system is in Provisioned Host Whitelist/Restricted mode. 6. Fix 16016534183 - [Utilities][M50FCP][D50DNP][sysfwupdt] [Build 16.0.4 RC2] [syscfg/sysinfo] [Build 16.0.4 RC1] [Windows/Linux/UEFI ][Intermittent] Display/Output message shows KCS mode as DENY ALL instead of "Provisioned Host Disabled". 7. Fix 16016533828 - [Utilities][M50FCP][D50DNP][sysfwupdt] [Build 16.0.4 RC2] [syscfg/sysinfo] [Build 16.0.4 RC1] [Windows/Linux/UEFI ] Name of the KCS mode does not match with the utility's displayed message. 8. Fix 16016291359 - [Utilities] [Sysfwupdt] [Single_build_v16.0.3 RC1] [D50DNP/M50FCP] [WINDOWS/LINUX /UEFI] [Intermittent] Updated scenario "/u " fails. 9. Fix 16016533556 - [Utilities][M50FCP][D50DNP][sysfwupdt 16.0.4 RC2] [Windows/Linux/UEFI] Command with "/i /u master.cfg" fails with an error. 10. Fix 15011074455 - [Utility][Agnostic][sysfwupdt V16.0.2] RPM issue. 11. Fix 15011085795 - [Utility]sysfwupdt] Improved sysfwupdt to report more on the message about error code 1029. 12. Fix 2103651816 - [Sysfwupdt] Intel ME version is incorrect when checking system information via sysfwupdt, syscfg, and sysinfo v16.0.4. 13. Klocwork static scan fixes. Version 16.0.3 -------------- Fix 16016111613 - [Utilities][M50FCP/D50DNP][sysfwupdt 16.0.2 RC1 ] [Windows/Linux/UEFI] – KCS fallback (after USB interface update fails) should be handled and sysfwupdt UG/RN needs update. Version 16.0.2 -------------- 1. Fix 2103648788 - Cannot be flash itk.cap in the provisioned host passlist mode. 2. Fix 16015753092 - [Utilities] [Single_build_v16.0.1 RC1] [Agnostic] [Linux] – Wrong error message displayed when installed on unsupported operating system (CentOS, SLES). Version 16.0.1 -------------- 1. Fix 2103644944 - Sysfwupdt.efi tool cannot show the correct BMC version. 2. Fix 2103647128 - [Intel server boards based on the 3rd Gen Intel Xeon Scalable processors family] [M50CYP/D50TNP] – It cannot start a BMC forced update with KCS restricted mode. 3. Fix 15010112751 - [M50FCP] [syscfg][Sysfwupdt] – Intel® Server Configuration Utility and Intel® Server Information Retrieval Utility cannot be used when Secure Boot is enabled. 4. Fix 16014850569 - [Utilities] [sysfwupdt] [Single_build_v15.0.3 RC2] [KLP] [Windows/UEFI] [Intermittent] – Command is getting stuck or observing error in the second cycle of a loop for updating . 5. Fix 2103644862 - [M50FCP] [sysfwupdt] – Error messages are incorrect when KCS is set to Provisioned Host Disabled. 6. Fix 2103644869 - FRU update using Intel Server Firmware Update is allowed when SUT is in KCS provisioned passlist mode. 7. Fix 16015761577 - [M50FCP/D50DNP][sysfwupdt 16.0.1 RC1 ] [Linux/UEFI/Windows] – /d sdr command fails with an error. 8. Fix 16015753092 - [Utilities] [Single_build_v16.0.1 RC1] [Agnostic] [Linux] – Wrong error message displayed when installed on unsupported operating system (CentOS). Version 16.0.0 -------------- Feature: 1. Added support for the Intel server boards M50FCP and D50DNP. Bug fixes: 1. 16015063421 - [M50FCP][SYSFWUPDT-16.0.0] [Windows/Linux/UEFI] – CPLD version is not displaying through sysfwupdt /i command. But it is available in BIOS configuration and the Integrated BMC Web Console. 2. 16014709513 - [Utilities] [sysfwupdt][sysinfo][NTP][Windows] – Intel ME version number is not correct in dumps. 3. 16013416107 - [PSIRT][PTK0001487][PTK0001492][Mitigation Planning] – Intel® One Boot Flash Update (Intel® OFU) utility escalation of privilege. Version 15.0.4 -------------- Feature: 1. Enabled UpdateNvram switch for BIOS update for the Intel Server Board M20NTP2SB. 2. Added feature 16015206904 - [Utilities] [sysinfo/syscfg/sysfwupdt] [Agnostic] – Setting the path for utilities to /usr/bin/. Version 15.0.3 -------------- Bug fixes: 1. Fix 16013236639 - [Utilities] [SYSFWUPDT_build_6, Sysfwupdt_V15.0.3 RC2 ] [KLP/NTP] [Windows/RHEL8.2/UEFI] – BIOS information is not displaying properly. 2. Fix 16014769929 - [Utilities] [Sysfwupdt_V15.0.3_RC2_ALLOS] [Intel server boards based on the 1st, 2nd, or 3rd Gen Intel Xeon Scalable processors family] [Windows/RHEL/UEFI] – Observing error with sysfwupdt /u UpdateNvram command. 3. Fix 16014771244 - [Utilities] [sysfwupdt] [Single_build_v15.0.3 RC2] [AMP/Intel server boards based on the 1st or 2nd Gen Intel Xeon Scalable processor family] [UEFI] – Auto update SDR through CFG is 100% completed but * (asterisk) symbol is appearing continuously. 4. Added support to update customized BIOS logo for Intel Server Boards M70KLP and M20NTP2SB. 5. 16013359175 - Fix [sysinfo, syscfg, sysfwupdt] [Build 15.0.3] [KLP] [UEFI] – For the IB utility, -? does not display the help menu in UEFI. 6. 16014228313 - Fix [sysinfo, syscfg, sysfwupdt] [Build15.0.3_AllOS] [NTP]UEFI] – Commands fail with an error with deny all KCS mode. 7. 16014303634 - Fix [sysinfo, syscfg, sysfwupdt] [Build15.0.3_AllOS] [Linux] – Install and uninstall scripts are not working. 8. 16014287269 - Fix [Sysfwupdt_Build15.0.3_AllOS] [NTP] [Windows/Linux] – Using /rd switch gives an error. 9. 22012963947 - Fix [Sysfwupdt_V14_2_Build11] [Intel server boards based on the 3rd Gen Intel Xeon Scalable processors family] [UEFI/RHEL] Utilities – Using the Intel Server Firmware Update Utility, success message is displayed after failure to update (Q3QSBR). 10. 2103640161 - Fixed the incorrect BIOS version being displayed through the command sysfwupdt -i xxx.bin (Q3QSBR). 11. Added support of the Intel Server Firmware Update Utility for the Intel Server Board M20NTP2SB. Version 15.0.2 -------------- 1. Added support of the Intel Server Firmware Update Utility for Intel server boards based on the 1st or 2nd Gen Intel Xeon Scalable processors family. 2. Bug fixes. 3. Klocwork static scan fixes of priority 1&2 issues. Version 15.0.1 -------------- 1. Made the server utility single executable for all platforms. 2. Introduced new versioning mechanism, now the utilities have versions as 15.X.X. Version 4.2 ----------- Build 11 1. Fix 16012973525 - Intel Server Firmware Update Utility displays incorrect copyright year. 2. Fix 2103639096 - [AMP] – Cannot perform an online update for BMC FW 2.74b. 3. Fix 2103638983 - Online flash A020P17 BIOS with 2.66.DAB52082 BMC show error message and cannot flash. 4. Fix random "File not found" issue during BMC online update. Build 10 1. Added new product ID for the Intel Server Board D40AMP. 2. Fix Klocwork issue. 3. Fix 16012748373 – Intel Server Firmware Update Utility displays incorrect copyright year. 4. Revised the display message for BIOS online update. Build 9 1. CCB3327 – sysfwupdt /u bios.bin via SW SMI. Build 8 1. Fix 16012271586 – BIOS/BMC update issue when force update jumper is set. Build 7 1. Fix 2103634616 - BIOS update issue when BMC force update jumper is set. 2. Fix 16011750687 - /rmec should show KCS message in restrict mode. 3. Fix 16011750285 - [RHEL8.2] – Observed segmentation fault (core dumped) during FRU update. 4. Fix 2103633941 - Percentage stops at 94% after customized PDB FRU update is complete. 5. Fix 1508485399 - Added new SMI trigger (0xEF30) per BIOS requirement. 6. Fix 2103634107 - Error message by sysfwupdt.efi should modify when PFR provision is disabled. 7. CCB3231 - Limit SVN single downgrade during online update. Build 6 1. Support KCS policy control feature. 2. Change naming *_temp.efi to *_core.efi. Build 5 1. Support for CPLD recovery update. 2. Set bit 1b by default to enable deferred reset. 3. Increased sleep time to avoid getting device ID before a BMC reset. Build 4 1. Support for SLES 15 and SP1. 2. Support for immediate restart (ImmReset). 3. Support for restore default setting (/rd). 4. Support for update Intel® Integrator Toolkit capsule with "Password=xxx" parameter when an administrator password is set. Build 3 1. Support for clearing customer settings. 2. Support for BMC and BIOS recovery update for PFR Intel server boards based on the 3rd Gen Intel Xeon Scalable processors family. 3. Support for NVRAM update for Intel server boards based on the 3rd Gen Intel Xeon Scalable processors family. Build 2 1. Support for PFR BMC/BIOS/CPLD active update. 2. Support for Intel Integrator Toolkit capsule update. Build 1 1. First release. Version 4.2_klp --------------- Build 6 1. Fix 16012996705 - [Utilities] [sysfwupdt_build_5] [KLP] [RHEL8.2] – BIOS is getting updated in restricted KCS mode. 2. Fix 16012706531 - BIOS update with KCS mode is not updating through KCS mode. 3. Fix random "File not found" error during BMC online update. Build 5 1. -u feature – The tool does not change to KCS interface in case of any failure, which is reported during virtual USB attachment. 2. Revised the display message for BIOS online update. 3. Added workaround to handle update status equal to 255% and the BMC not being able to recover during online update process. Build 4 1. Workaround for USB attachment issue under UEFI shell. Build 3 1. Fix 16012242950 - Using help(-? or -h) switch, information in help menu for -h switch is incomplete. 2. PFR BIOS update via smi EF27 and EF28. 3. Display CPLD version by /i. 4. Fix 16012515182 - [Windows] – Using /u switch with ImmReset, fails after 100% image transfer. Build 2 1. Fixed update failure caused by Intel Server Board M70KLP product ID change. 2. Removed the waiting time and message because no BMC auto reset is available. 3. Fix ImmReset and UpdateNvram parameters show defer reset. 4. Fix 16012240989 - Total command bytes are exceeding the limitation when using /u bios bmc cpld. Build 1 1. First release for Intel Server Board M70KLP. 2. Fix 16012139586 - Using /? switch, the Intel Firmware Update Utility is able to generate system information. 3. Disabled unsupported features (16012140020, 16012139747). 10. Instructions for End-User ----------------------------- 1. There will be a BIOS and BMC reset after PFR BMC/BIOS/CPLD online update. Do not disconnect AC power during the reset. This process lasts for about ten minutes. Then, the system will be in a DC-off state and the user must press the power-on button to start the system. 11. Legal Information --------------------- =============================================================================== LEGAL INFORMATION =============================================================================== Information in this document is provided in connection with Intel Products and for the purpose of supporting Intel developed server boards and systems. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel's Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright, or other intellectual property right. Intel Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the presented subject matter. The furnishing of documents and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any such patents, trademarks, copyrights, or other intellectual property rights. Intel products are not intended for use in medical, life-saving, or life-sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Intel is a registered trademark of Intel Corporation. *Other names and brands are the property of their respective owners. Copyright © 2022 Intel Corporation. (end)