IBM HMC on Power Firmware

Applies to: 7063-CR1

This document provides information about the installation of Licensed Machine or Licensed Internal Code, which is sometimes referred to generically as microcode or firmware.

 

Contents

1.0 Systems Affected

1.1 Minimum ipmitool Code Level

1.2 Minimum Browser levels for BMC Web GUI

1.3 Fix level Information on IBM Power HMC Components and Operating systems

2.0 Important Information

2.1 Possible hang during HMC reboot

2.2 Petitboot Device Discovery Completion Message

2.3 Recovering from an expired password

3.0 Firmware Information

3.1 Firmware Information and Description

4.0 Operating System Information

4.1 HMC on Power Operating System

4.2 How to Determine the Level of the HMC

5.0 How to Determine The Currently Installed Firmware Level

6.0 Downloading the Firmware Package

7.0 Installing the Firmware

7.1 IBM Power HMC Firmware maintenance

7.2 Updating the System Firmware with the pUpdate utility

7.3 Supporting Diagnostics

7.4 Updating the System Firmware using the BMC Web GUI

8.0 System Management and Virtualization

8.1 BMC Service Processor IPMI and Web GUI Access

8.2 Open Power Abstraction Layer (OPAL) Hypervisor

8.3 Intelligent Platform Management Interface (IPMI)

8.4 Petitboot bootloader

9.0 Quick Start Guide for Re- installing the HMC Image on the 7063-CR1 system

10.0 Change History

 

1.0 Systems Affected

This package provides firmware for IBM HMC on Power 7063-CR1 only with minimum HMC version level of  HMC V9 R1 M910 or later.

The firmware level in this package is:

 

There are the following images:

.pnor (Power firmware image)

.bin (BMC image)

pUpdate version 2.20 Utilities: pUpdate_220.zip

 

 

 

Details on the package binaries are included in section 3.1.

 

For all firmware updates where the starting level is less than OP825.41, there is a problem where the system date and time may be incorrect after the firmware update process has completed.  To correct this error, the user must manually reconfigure the BMC date/time under the Configuration menu option prior to starting the HMC.

 

Note 1:  Before proceeding with an update to this service pack level, update the HMC to version level HMC V9 R1 M910 or later as there is an important fix for the AST driver that, if not applied, could prevent the system from IPLing after the service pack is installed.  

 

Note 2:  

1.  When upgrading firmware from firmware version 1.xx to version 3.xx:, there are dependencies between the BMC and PNOR. For that reason, you must update BOTH BMC and PNOR while system power is off.

1.1  Power off the system

1.2  Update BMC version 3.xx using pUpdate 2.20 or using BMC Web GUI.

1.3  After the BMC firmware is updated, the BMC is automatically reset.  Wait for the BMC to come back on line.

1.3.1  You can ping the BMC to see if it is active on the network or you connect to the BMC Web GUI.

1.4 Check the BMC version to ensure the correct BMC version is updated.

1.4.1   Check Web GUI display for new BMC version, or      

1.4.2 Use the ipmitool to check the BMC version

1.5 Update PNOR version 3.xx using pUpdate 2.20 or using BMC Web GUI.

1.5.1 The new PNOR version is not yet available until a power on is completed.

1.6  Once the PNOR update is complete, power on the system to petitboot menu or OS.

1.6.1 When the system IPL reaches petitboot, SBE validation will be started automatically. This will take about 2 minutes. Please allow the system to complete the SBE validation before attempting to shutdown.  If SBE validation fails for any reason, the system power will be turned off by firmware.  Follow repair action given in the SEL to correct the problem.

1.6.2  Once the system reaches to OS, you can check the PNOR version to ensure it is correct.

1.7  The system is ready to be used.

  1.  

2.  Downgrade of firmware from version 3.xx or later to version 1.xx is NOT supported.

 

3.  Fast Reboot is not supported (fast reboot can be disabled with below command):

3.1 'nvram -p ibm,skiboot --update-config fast-reset=0'

3.2 Fast reboot is disabled by default.

 

4.  After updating the BMC firmware to version 3.15 or newer, the current BMC password for "ADMIN" user ID is still in effect until a factory reset is issued to the BMC.  Once the factory reset is issued to the BMC, the BMC will reset the password for the "ADMIN" user ID to the default password, "ADMIN", but it will be expired.  No remote command will work except the command to change the password.  The "ADMIN" user ID's password can be changed with the interfaces listed below.  New password strength rules (at least 8 characters with at least one lowercase letter, one uppercase letter and one number) must be followed.

4.1 Web GUI

4.2 SSH

4.3 In-band IPMI command (host user must have root privilege)

 

 

1.1 Minimum ipmitool Code Level

This section specifies the "Minimum ipmitool Code Level" required by the System Firmware to perform firmware installations and managing the system.  Open Power requires ipmitool level v1.8.15 to execute correctly on the V1.00 or later firmware.

 

Verify your ipmitool level on your linux workstation using the following commands:

 

bash-4.1$ ipmitool -V

ipmitool version 1.8.15

 

If you need to update or add impitool to your Linux workstation , you can compile ipmitool (current level 1.8.15) for Linux as follows from the Sourceforge:

 

1.1.1 Download impitool tar from http://sourceforge.net/projects/ipmitool/  to  your linux system

1.1.2 Extract tarball on linux system

1.1.3 cd to top-level directory

1.1.4./configure

1.1.5 make

1.1.6 ipmitool will be under src/ipmitool        

 

You may also get the ipmitool package directly from your workstation linux packages such as Ubuntu 14.04.3:

 

sudo apt-get install ipmitool

 

1.2 Minimum Browser levels for BMC Web GUI

The BMC Web GUI is a web-based application that works within a browser.   Supported browser levels are shown below with Chrome being the preferred browser:

  1.  

1.3 Fix level Information on IBM Power  HMC Components and Operating systems

For specific fix level information on key components of IBM HMC model 7063-CR1 and the HMC software, please refer to the documentation in the IBM Knowledge Center.

https://www.ibm.com/support/knowledgecenter/8247-21L/p8eav/p8eav_7063_kickoff.htm

https://www.ibm.com/support/knowledgecenter/POWER8/p8had/p8had_hmc7063cr1.htm

2.0 Important Information

TOD Requirement

If the starting level of the firmware is less than OP825.41 prior to the update to this level of firmware, then manually setting the TOD after installation is required.  A message will be presented to the user after the update as a reminder.  The TOD must be set prior to initiating the boot of the HMC.


Downgrading firmware from any given release level to an earlier release level is not recommended.

If you feel that it is necessary to downgrade the firmware on your system to an earlier release level, please contact your next level of support.

Concurrent Firmware Updates not available for the Power HMC.

Concurrent system firmware update is not supported on the Power HMC 7063-CR1.

2.1 Possible hang during HMC reboot

If the HMC hangs when doing a reboot from the HMC, a disable of NVRAM fast-reset may resolve this problem.  Run the following command on the BMC:

 

nvram -p ibm.skiboot -update-config fast-reset=0

2.2 Petitboot Device Discovery Completion Message

The Petitboot user interface is started early in the boot process. When you are presented with the Petiboot user interface, it will take up to an additional 30 seconds for the user interface to be populated with boot options as storage and network hardware are being initialized.  During this time, Petitboot will show the status message "Info: Waiting for device discovery".  When Petitboot device discovery is completed, the following status message will be shown "Info: Connected to pb-discover!".

 

2.3 Recovering from an expired password

 

These instructions are for recovering the ADMIN user ID that has expired for the default “ADMIN” password because the system is new or has been factory reset.  These instructions assume that the BMC is on the network.  The Web GUI, secured shell (SSH), or ipmitool from the host may be used to change the expired password as shown below:

1.  Web GUI:  

1.1 When a user is logging into the BMC Web GUI with "ADMIN" user ID after BMC factory reset, the user must use the default password (see above) regardless of what the previous "ADMIN" user ID's password was.

1.2. Once successfully logged in with the "ADMIN" user ID,  the BMC Web GUI will force the user to change the password for the "ADMIN" user ID.  The BMC Web GUI will log out after successfully changing the password.

1.3. Now the user can log in to the BMC using "ADMIN" user ID with the new password.

2.  SSH:

2.1. When a user is logging into a BMC using ssh with the "ADMIN" user ID after the BMC factory reset, the user must use the default password (see above) regardless of what the previous "ADMIN" user ID's password was.

2.2 Once successfully logged in with the "ADMIN" user ID,  the ssh will force the user to change the BMC password for the "ADMIN" user ID.  Follow the instructions carefully.  ssh will log out after successfully changing the password.

2.3. Now the user can log in to the BMC using the  "ADMIN" user ID with the new password.

3.  In-band IPMI command

3.1. Power on the HMC.

3.2. Log in to the HMC as root.

3.3. Change BMC "ADMIN" user ID's password:

3.3.1. Command:  ipmitool user set password 2 newPW

3.3.2. newPW is the desired new password.

 

3.0 Firmware Information

Use the following information to determine whether your installation will be concurrent or disruptive.

For the HMC 7063-CR1, the installation of system firmware is always disruptive.

3.1 Firmware Information and Description

The xxx.pnor  file updates the primary side of the PNOR.  The yyy.bin updates the primary side of the BMC only.  The golden sides are unchanged.

The pUpdate zip file contains the Linux powerpc, x86(32 bit), x86(64 bit), and pUpdate user’s guide.  The version of the tool selected needs to match the hardware where the tool is running.


Filename

Size

Checksum

P8DTU20200610_IBM_7063CR1_sign.pnor

33554560

e6f413004c476917be3ee73dfb920fc6

SMT_P8_320.bin

33554432

d091f6cce5addda9af783ddcb33ab33f

pUpdate_220.zip

91832

745f57ea76b2bc641dc8005bf960ecb3

 

Note: The Checksum can be found by running the Linux/Unix/AIX md5sum command against the file (all 32 characters of the checksum are listed), ie: md5sum xxx.pnor.  

 

After a successful update to the new firmware level, the PNOR components and BMC should be at the following levels.  The ipmitool "fru" command can be used to display FRU ID 47 and the ipmitool "mc info" command can be used to display the BMC level.

 

Note:  FRU information for the PNOR level does not show the updated levels via the fru command until the system has been booted once at the updated level.

 

PNOR firmware levels from FRU ID 47 inventory list for driver:  

 

FRU Device Description : System Firmware (ID 47)

$ ipmitool -I lanplus -H  xxx  -U yyy -P zzz  fru print 47

 

Product Name          : OpenPOWER Firmware

Product Version       : open-power-IBM-P8DTU-7063CR1-20200610

Product Extra         :        op-build-ecf067b

Product Extra         :        buildroot-2019.02.3-21-gb1a7f41

Product Extra         :        skiboot-v6.3.5

Product Extra         :        hostboot-p8-c893515-p0a26217

Product Extra         :        occ-p8-a2856b7

Product Extra         :        linux-5.1.15-openpower1-p639883c

Product Extra         :        petitboot-v1.10.4-p211f7ec

 

 

BMC Level:                        

   

Display BMC firmware level using the "ipmitool mc info | grep Firmware" command:

 

Firmware Revision:   3.20

 

OP825
For Impact, Severity and other Firmware definitions, Please refer to the below 'Glossary of firmware terms' url:
http://www14.software.ibm.com/webapp/set2/sas/f/power5cm/home.html#termdefs

V3.11 with SMC BMC V3.20

(OP825.42)

 

06/30/2020

Impact: Availability     Severity:  SPE

 

New features and functions

 

Support was added for the following grub2 enhancements for petitboot:

1) 'source' command is now supported.

2) UUID and label are now supported in the 'search' command.

 

System firmware changes that affect all systems

 

A problem was fixed for RHEL8 boot failures when using GPT Disklabels caused by dependencies on unsupported features in petitboot GRUB2.  Functionality in the GRUB2 parser was extended to allow RHEL8 to boot correctly.

 

A problem was fixed for an unresponsive system after an unscheduled reset of the BMC causes the FSI bus to become locked.  A restart of the system via BMC or power button is necessary to recover.

 

A problem with a slow transfer of data using iKVM Virtual Storage was fixed to improve the performance.  The slow down was caused by a change to use a secure tunnel for the data.  With the fix, the default secure channel is providing slightly better performance throughput. If further performance is needed, the secure channel can be temporarily disabled using the "Virtual Media->Secure Encryption" option.

A problem was fixed for security vulnerability CVE-2007-1858. With this vulnerability, the default SSL cipher configuration used certain insecure ciphers, including the anonymous cipher, which could allow remote attackers to obtain sensitive information or have other, unspecified impacts.

 

A problem was fixed for security vulnerability CVE-2016-2183. With this vulnerability, the DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain clear text data via a birthday attack against a long-duration encrypted session,

 

A problem was fixed for a BMC gui "Alerts Modify" to not drop the first character of the e-mail address when re-visiting the page.

 

A problem was fixed for a web security issue against Cross-Site Request Forgery with an enhanced fix over the previous delivery for OP825.41.

 

A problem was fixed for an unresponsive system after a reset of the BMC by dropping console write data if the BMC becomes unresponsive.  This prevents a deadlock condition.

 

A problem was fixed for intermittent ipmi aborts caused by the use of invalid pointers that had been freed.

 

A problem was fixed for truncation of multi-word strings in the petitboot user interface.  When this failure happens, the first word of the string is displayed only, stopping at the first "blank" of the string.   Plugin names and vendor variables have been affected by this.

 

V3.09 with SMC BMC V3.17

(OP825.41)

 

01/31/2020

Impact: Function     Severity:  SPE

 

System firmware changes that affect all systems

 

A problem was fixed for the system time moving ahead one day following a month or year change and a power off of the system.  Important:: This fix does not update the date and time to correct values if these are wrong in the RTC.  The user must manually reconfigure the BMC date/time under the Configuration menu option prior to starting the operating system.

 

The following web security problems were addresses for the BMC:

1) Authentication bypass vulnerability that could allow a network attacker to become an admin user.

2)  Persistent (or stored) XSS vulnerability that  can occur when the data provided by the attacker is saved by the server, and then permanently displayed on "normal" pages returned to other users in the course of regular browsing, without proper HTML escaping.

3) Cross-Site Request Forgery

4) HTML injection

5) Authenticated code injection as root via command injection

 

A problem was fixed for incorrect eSEL index in the error logs.

 

V3.09 with SMC BMC V3.16

(OP825.40)

 

12/02/2019

Impact: Security     Severity:  SPE

 

New features and functions

 

Improved BMC default password policy.  For the BMC, the ADMIN password must be set on first use for newly manufactured systems and after a factory reset of the system.   This policy change helps to enforce the BMC is not left in a state with a well known password.

The user can change from the default password to a new password using the interfaces below:
1.  Web GUI
2.  ssh (secured shell)
3. In-band IPMI from the host with a user ID that has root privilege.
Examples of using these interfaces for expired password recovery can be found in the section "Recovering from an expired password".

 

Support was added to the SMASH shell of ssh to allow changing  of the ADMIN user ID password using the SMASH CLP command of "set password" while in the /map1/account002 directory.

 

Support was added to BMC to have a minimum password strength configured for all interfaces such that it must be at least 8 characters long and must include at least one upper case letter, one lower case letter, and one numeric digit.

 

System firmware changes that affect all systems

 

A problem was fixed for a Qualys security scan on the BMC reporting security threat QID 11827 “HTTP Security Header Not Detected” on port 443. The following HTTP security header was not detected in the HTTP response:  

Strict-Transport-Security (HSTS): This response header is a security feature that lets a web site tell browsers that it should only be communicated with using HTTPS instead of HTTP protocol.

 

A problem was fixed for SMCIPMITool being unable to mount virtual media (problem was introduced in BMC V2.08 with a security fix for media vulnerabilities).   This problem affected customers that use SMCIPMITool to reimage nodes, as one example of problem impact.  Along with the BMC V3.16 level, the SMCIPMITool version 2.22.1 build 109023 or later is needed to fix the issue.  The new versions of the SMCIPMITool are backward compatible with the previous versions of the tool.

 

A problem was fixed for an intermittent disable of the field for the IPv6 address in the BMC web gui.

 

A problem was fixed for fast-reboot inadvertently always being enabled when it should have been disabled for the Power8 systems.  This caused intermittent host reboot failures. A re-IPL of the system can be done to fix the reboot error if it happens.  With the fix, the fast-reboot setting is disabled, and the reboots of the host OS no longer have the intermittent failures.

 

 

 

V3.08 with SMC BMC V3.13

(OP825.31)

 

09/25/2019

 

Impact: Security     Severity:  SPE

 

New features and functions

 

In response to recently reported security vulnerabilities, this firmware update is being released to address Common Vulnerabilities and Exposures issue numbers CVE-2017-5715, CVE-2017-5753 and CVE-2017-5754.  Operating System updates are required in conjunction with this FW level for CVE-2017-5753 and CVE-2017-5754.  This replaces an earlier firmware update for the same problem which was found to not be effective.

 

The BMC web gui was enhanced so that the LDAP port can be set regardless of the SSL settings.

 

The BMC web gui  for the Event Log page was enhanced to show event severity and acknowledgement status.

 

System firmware changes that affect all systems

 

A problem was fixed for an incorrect interpretation for an OEM SEL.

 

A problem was fixed in the BMC web gui for an incorrect VLAN ID ranges in the network configuration.

 

A problem was fixed for SSH security vulnerabilities that were found running the Qualys tool.

 

A problem was fixed for a failure that can occur when setting time with hwclock.  This failure is triggered by a small  time drift that can occur if NTP is active.

 

A problem was fixed in the BMC web gui for incorrect wording on the AD and LDAP pages.

 

A problem was fixed for not being able to access the BMC web gui using HTTPS and IPv6.  The fix requires an user step to enable it.  After putting on the fix, reset the Lighttpd configuration on the BMC.  This reset can be done using ipmitool with the following two commands:

1)  ipmitool ... raw 0x30 0x70 0xB7

2)  ipmitool ... mc reset cold

 

A security problem was fixed for a password being stored in clear text on the BMC.

 

A security problem was fixed for the NTP service running on the BMC allowing queries of the internal NTP variables. This problem was reported with Qualsys QID#38293.

 

A security problem was fixed for multiple Virtual Media vulnerabilities reported by Eclypsium.

 

A problem was fixed for cleaning up cache memory when a GPU is in reset to make more cache available for the reset of the system.

 

A problem was fixed for opal-prd messages being truncated and causing the following error message:  "opal-prd: FW: error reading from firmware: alloc 32 rc -1: Invalid argument".  This intermittent problem is caused by the allocated buffer for the opal-prd message being too small.

 

A problem was fixed for possible OPAL partition cosmetic damage when using the "opal-gard clear" command.  With the problem, the guarded FRUs are cleared correctly but the adjoining partition will also have some bytes cleared at the beginning of the partition.  The inadvertently cleared bytes in the partition have not caused an issue for the system.

 

V3.07 with SMC BMC V3.08

(OP825.30)

 

06/13/2019

 

Impact:  Security     Severity:  SPE

 

New features and functions

 

Support was added for a Self-Boot Engine (SBE) validation during the IPL to verify that the firmware images are the shipped versions.

 

Added BMC support to be able to detect Self Boot Engine (SBE) SEEPROM corruption

 

Added BMC support for new PNOR version partition that has a 4k signed header.

 

Security was enhanced for stunnel by allowing SSL Medium Strength and Anonymous Cipher Suites to be disabled.  A reset of the stunnel configuration is required to do the disable using the following ipmitool commands one time:

1)  ipmitool ... raw 0x30 0x70 0xB9

2)  ipmitool ... mc reset cold

 

Added support in the SNMP client to allow connections to V2 and V3  servers to be running at the same.

 

Support was added for the BMC web gui to be able to enable and disable IPMI over LAN.

 

Added support for Active Directory to allow the BMC to make connections to LDAP\AD servers.

 

The BMC web gui was enhanced to display the IP address of the BMC.

 

For the IPMI DCMI configuration, the DCMI Discovery Configuratiuon (Option 12) is now enabled by default.

 

Sensor polling was enhanced to continue to work even after On-Chip Controller (OCC) goes into an error state.

 

Support for VUART/MBOX/FSI was enabled.

 

The BMC web gui was enhanced to be able to change the community string for the SNMP PET trap.

 

Support was added for a new BMC gui page to control the power capping of the system.

 

The BMC web gui was enhanced to show the PNOR version and build date.  If the PNOR version is not found, only the PNOR build date is shown.

 

Support for tftp was added for BMC brick recovery (the old method of recovery has been deprecated).

 

Support has been removed from XIVE interrupt controller for the store EOI operation.  Hardware has limitations which would require a sync after each store EOI to make sure the MMIO operations that change the ESB state are ordered. This would be performance prohibitive and the PCI Host Bridges (PHBs) do not support the synchronization.

 

Support was added to recognize a port parameter in the URL path for the Preboot eXecution Environment (PXE) in the ethernet adapters.  Without the fix, there could be PXE discovery failures if a port was specified in the URL for the PXE.  

 

System firmware changes that affect all systems

 

A security problem was fixed to prevent host programs from being able to corrupt the BMC using the internal software bridges between the host and BMC.  The Common Vulnerabilities and Exposures issue number is CVE-2019-6260.

 

A security problem was fixed to detect and prevent Self Boot Engine (SBE) SEEPROM corruption.   The Common Vulnerabilities and Exposures issue number is CVE-2018-8931.

 

A security problem was fixed to prevent a firmware update causing an unsigned image to be activated.  The Common Vulnerabilities and Exposures issue number is CVE-2018-13787.

 

A security problem was fixed for the BMC ethernet Network Interface Card (NIC) device driver.   The ethernet packet frames were not being padded with null bytes, which can allow remote attackers to obtain information from previous packets or kernel memory by using malformed packets,  This fix protects against  the Common Vulnerabilities and Exposures issue number CVE-2003-0001.

 

A problem was fixed for system hangs for early fails that occur in Hostboot.  With the fix, the early fails are handled and recovery attempted to allow the IPL to succeed.

 

A problem was fixed for CGI aborts when uploading configurations using HTTP.

 

A problem was fixed for SSL certificate checks that were incorrectly failing on the check of the private key.

 

A problem was fixed for BMC remote console not conforming to security standards by not being digitally signed.   The function has been updated to be cryptographically signed.

 

A problem was fixed for the host console losing data.

 

A problem was fixed for slow SOL console response for long-running commands.

 

A problem was fixed for an intermittent failure to IPL.

 

A problem was fixed for an intermittent system hang during IPL with "Power Status Error" in the SEL.

 

A problem was fixed for the BMC not showing all the sensor readings (except for OCC Active sensors which are always present) after an IPL.

 

A problem was fixed for an incorrect power cap setting when BMC sometimes incorrectly did not use the power cap setting from the host On-Chip Controller (OCC).

 

A problem was fixed for a failed SBE side not triggering a retry boot from the other SBE side.

 

A problem was fixed for an overrun of serial data from the host side to the BMC that caused loss of output character on the IPMI SOL console.

 

A problem was fixed for a "mc reset cold" being allowed during a IPL, causing a reboot of the BMC and an IPL failure.  With the fix, the BMC cold reset is not allowed during the system IPL.

 

A problem was fixed for the BMC gui not being able to show all the System Event Log entries . "BMC gui -> Maintenance -> System Event Log " failed to display entire log with no scroll bar present to see new log entries.

 

A problem was fixed for pUpdate having troubles recovering from retry attempts and not be able to complete the firmware updates in a timely manner.

 

A problem was fixed for a IPv4 address change not persisting after a BMC reboot .  This error can occur if the last octet of the IP address is reduced in characters by the IP address change.  For the case where this was observed, the IP address was changed fro 50.6.36.100 to 50.6.36.1.  But after the BMC reboot, the IP address again had two trailing zeros on IP as the IP address had reverted to 50.6.36.100.

 

A problem was fixed for an abnormal Java SOL display in Petitboot.

 

A problem was fixed for a missing failed operation description in the Session Audit SEL.

 

A problem was fixed in the BMC weg gui for logical volume color status.

 

A problem was fixed in the BMC web gui for not being able to mount an iso volume.

 

A problem was fixed for a BMC web  gui freeze condition when an error event occurs on the backplane.

 

A problem was fixed for a "LanDrvinit fails to initial" message that was logging during the boot.  There was no error in the boot as a wrong status value was returned to cause the message.

 

A problem was fixed for the power capping range allowed for the user.  OCC provides two limits for minimum powercap. One being hard powercap minimum which is guaranteed by OCC and the other one is a soft powercap minimum which is lesser than hard-min and may or may not be asserted due to various power-thermal reasons. So to allow the users to access the entire powercap range, this fix exports soft powercap minimum as the “powercap-min” DT property. And it also adds a new DT property called “powercap-hard-min” to export the hard-min powercap limit.

 

A problem was fixed for lost output on the console when the OS is stopping or rebooting.  With the fix, the console output is always flushed before stopping the system.

 

A problem was fixed for the AST VGA device which could sometimes fail to initialize when the vendor ID for the device was parsed incorrectly.  

 

A problem was fixed for a system hang that could occur while printing with system debug options and having a active user on the console.

 

A problem was fixed for an intermittent opal-prd crash that can happen on the host OS.  This is the fault signature:  " opal-prd[2864]: unhandled signal 11 at 0000000000029320 nip 00000 00102012830 lr 0000000102016890 code 1"

 

A problem was fixed for diagnostic code trying to read sensor values for PCI Host Bridge (PHB) entries that are unused, which causes debug output to have incorrect values for the unused entries.  With the fix, only the used entries are processed by the diagnostic code.

 

A problem was fixed for Petitboot exiting to the shell with xCAT genesis in the menu when trying to do a network boot.  Petitboot was timing out when trying to access the ftpserver but it was not doing the network re-queries necessary for a proper retry.  If this error happens on a system, it can be made to boot with the following two steps:

1) Type the word "exit" and press enter key.  This brings it back to petitboot menu.

2) Press the enter key again to start the boot of the xCAT image.

 

A problem has been fixed for a slow start up of a process that can occur when the system had been previously in an idle state.

 

A problem has been fixed for a TOD error that can cause a soft lockup of the kernel.  A 'soft lockup' is defined as a bug that causes the kernel to loop in kernel mode for more than 20 seconds, without giving other tasks a chance to run. The current stack trace is displayed upon detection and, by default, the system will stay locked up.

 

A problem has been fixed to add part and serial numbers to the processors when accessed through the device tree.

 

A problem has been fixed to make the OS aware of the DARN random number generator at 0x00200000 PPC_FEATURE2_DARN) and the SCV syscall at 0x00100000 (PPC_FEATURE2_SCV).  Without this fix, these service constants are not defined in the OS userspace.

 

A problem was fixed for Coherent Accelerator Processor Proxy (CAPP) mode for the PCI Host Bridge (PHB) to improve DMA write performance by enabling channel tag streaming for the PHB.  With this enabled, the DMA write does not have to wait for a response before sending a new write command on the bus.

 

A problem was fixed for the Open-Power Flash tool "pflash" failing with a blocklevel_smart_erase error during a pflash.  This problem is infrequent and is triggered if pflash detects a smart erase fits entirely within one erase block.

 

A problem was fixed in the Petitboot user interface to handle cursor mode arrow keys for the VT100 'application' cursor to prevent mis-interpreting an arrow key as an escape key in some situations.  For more information on the VT100 cursor keys, see http://www.tldp.org/HOWTO/Keyboard-and-Console-HOWTO-21.html.

 

A problem was fixed in the Petitboot user interface to cancel the autoboot if the user has exited the Petitboot user interface.  This prevents the user dropping to the shell and then having the machine boot on them instead of waiting until the user is ready for the boot.

 

A problem was fixed in the Petitboot parsing of manually-specified configuration files that caused the parser to create file paths relative to the downloaded file's path, not the original remote path.

 

A problem was fixed for a flood of OPAL error messages that can occur for a processor fault.  The message "CPU ATTEMPT TO RE-ENTER FIRMWARE" appears as a large group of messages and precede the relevant error messages for the processor fault.  A reboot of the system is needed to recover from this error.

 

A problem was fixed for a skiboot hang that could occur rarely for a i2C request if the i2c  bus is in error or locked by the On-Chip Controller (OCC).

 

A problem was fixed for an OS reboot after a shutdown that intermittently fails after the shutdown.  This can happen if the BMC is not ready to receive commands.  With the fix, the messages to the BMC are validated and retried as needed.  To recover from this error, the system can be rebooted from the BMC interface.

 

A problem was fixed for a kernel hard lock up that could occur if IPMI synchronous messages were sent from the OS to BMC while the BMC was rebooting.  For these type of messages, a processor thread remains waiting in OPAL until a response is returned from the BMC.

V2.30

(OP825.21)

 

03/12/2018

 

Impact:  Security     Severity:  SPE

 

Response for Recent Security Vulnerabilities

 

In response to recently reported security vulnerabilities, this firmware update is being released to address Common Vulnerabilities and Exposures issue numbers CVE-2017-5715, CVE-2017-5753 and CVE-2017-5754.  

 

New features and functions

 

Support was added for the user to be able to create a BMC group name via LDAP.  This provides a BMC login privilege by group name.

 

Support was added for a new alert message that occurs on the BMC web gui when a disk, power supply, or a fan is unplugged.   When an event is logged against one of the associated sensors, the alert message is sent.

 

Support for a 2 MB IPMI SOL console data capture and download.

 

Support for "Product Extra Information" for FRU reading on the BMC GUI web.

 

 

System firmware changes that affect all systems

 

A problem was fixed for RHEL7.3 GUI mode having a large square cursor via the BMC iKVM console.  This oversized cursor can interfere with normal operations on the screen by blocking the view of task options on pull-down menus.

 

A problem was fixed for a duplicate sensor id for occ_active and boot_count which shared a device id of "0x09".  This caused one of the sensors to be absent from the sensor device tree and also caused an OPAL error log:  "[   84.176082494,3] DT: dt_attach_root failed, duplicate sensor@9".  There was no other adverse impact for this problem other than the missing sensor information.  With the fix, the boot count sensor has a new device code of "0x0A".

 

A problem was fixed for an IPMI SOL Console drop during a PNOR firmware update.  There is a log  message "SOL session closed by BMC", but there is no impact on the system.

 

A problem was fixed for an IPMI DCMI "Get Power Reading" command  average reading being inaccurate.

 

A problem was fixed for the FRU information for MfgDatetime which was not displayed correctly.

 

A problem was fixed for "SENSOR_ID" not being consistent with the sensor name in email alerts.

 

A problem was fixed for opening the Java iKVM program on a Mac OS X client system.

 

A problem was fixed in the BMC NTP support to protect against a possible denial-of-service attack in the NTP processing of a query.  This is for protection against the Common Vulnerabilities and Exposures (CVE) number CVE-2016-7434.

 

A problem was fixed for an erroneous voltage reading at an empty CPU socket.

 

A problem was fixed for iKVM not showing the Hostboot and OPAL boot progress.

 

A problem was fixed for the BMC not requesting an OCC reset if the OCC is in Safe mode but the "OCC Active" sensor is still enabled.  With the fix, after sixty seconds of the OCC being in Safe mode, the OCC reset will be requested regardless of the state of the "OCC Active" sensor.

 

A problem was fixed for  the On-Chip Controller (OCC) dropping to Safe mode during BMC communication failures when an OCC reset was requested.

 

A problem was fixed for the OpenPOWER logo being pixelated  (a very low-resolution image) in the Java iKVM viewer.

 

A problem was fixed for a SMASH console hang from the BMC SSH login:  Start the SMASH console by typing "start /system1/sol1".  Note that the command is unresponsive, and does not show a login prompt.  With the fix,  this sequence is responsive and shows the same console as the IPMI SOL console.

 

V2.20

 

10/13/2017

Impact: New     Severity: New

System firmware changes that affect all systems

 

A problem was fixed for an unattended boot hang that can occur during an HMC upgrade. This problem may be circumvented by the user intervening and selecting ‘Rescan Device’, then both menu entries will be shown correctly and the boot can continue.

A problem was fixed for intermittent warm reboot failures because of invalid memory references. The problem may be circumvented by attempting the reboot again or power cycling and booting again.

 

V2.10

09/18/2017

Impact: New     Severity: New

New features and functions for 7063-CR1:

GA Level

Support for IBM 7063 Model CR1 HMC appliance that has a HMC minimum release requirement of V8R870.0.

 

Support the HMC appliance with 4x8GB memory configuration by allowing system to IPL with partial failure of memory DIMMs.

 

Support for resonant clocking was enabled to reduce power consumption of the processors for an approximate 10W per processor socket savings.

 

The Preboot Execution Environment (PXE) installation process was enhanced to provide more status log information and to show percentage-based download progress information.

 

Support was added for an On-Chip Controller (OCC) Soft  User Power Cap.   Previously,  if the User Power Cap was being exceeded and could not be maintained, the OCC placed the system into Safe mode (a power mode with reduced processor frequencies)..  With the Soft User Power Cap feature,  the Safe mode is not used when the User Power Cap is exceeded.   Instead, the OCC will log an error and continue to try to maintain the User Power Cap.

 

System firmware changes that affect all systems

 

A problem was fixed for a missing device discovery message and overly verbose output messages during the boot.  It is now less verbose during the boot-only error-level messages are printed during Petitboot bootloader initialization.  This means that there will be fewer messages printed as the system boots. Additionally, the Petitboot user interface is started earlier in the boot process. This means that the user will be presented with the user interface sooner, but it may still take time, potentially up to 30 seconds, for the user interface to be populated with boot options as storage and network hardware is being initialized.  During this time, Petitboot will show the status message "Info: Waiting for device discovery".  When Petitboot device discovery is completed, the following status message will be shown "Info: Connected to pb-discover!".

 

System firmware changes that affect certain systems

 

On systems with maximum memory configurations (where every DIMM slot is populated; size of DIMM does not matter), a problem has been fixed for systems losing performance and going into Safe mode (a power mode with reduced processor frequencies intended to protect the system from over-heating and excessive power consumption).  This happened  because of On-Chip Controller (OCC) time out errors when collecting Analog Power Subsystem Sweep (APSS) data, used by the OCC to tune the processor frequency.  This problem occurs more frequently on systems that are running heavy workloads.  Recovery from Safe mode back to normal performance can be done with a reboot of the system.

 

 

 

4.0 Operating System Information

OS levels supported by the 7063-CR1 servers:

- HMC V9 R1 M910 or later

 

4.1 HMC on Power Operating System

The HMC stack runs on an embedded Linux distribution. The HMC on Power version V9 R1 M910 or later is supported on the 7063-CR1.

 

Notice:  Only Enhanced HMC GUI is supported (no classic GUI) on HMC V8R870.0 and later.

 

The below link is to a guide on how to use the HMC to perform management and partition tasks for IBM Power servers:

https://www.ibm.com/support/knowledgecenter/POWER8/p8hdx/p8_workingwithconsoles_op.htm

 

4.2 How to Determine the Level of the HMC

 

Use the following steps in the below link to navigate the HMC GUI to determine the HMC level:

https://www.ibm.com/support/knowledgecenter/8247-21L/p8hai/p8hai_viewcodelevel_enh.htm

 

5.0 How to Determine The Currently Installed Firmware Level

 

Use the ipmtool "fru" command or the BMC Web GUI FRU option to look at product details of FRU 47.

 

ipmitool -I lanplus -H <bmc host IP address> -P admin -U ADMIN fru print 47

 

6.0 Downloading the Firmware Package

Follow the instructions on Fix Central. You must read and agree to the license agreement to obtain the firmware packages.

 

7.0 Installing the Firmware

For all firmware updates where the starting level is less than OP825.41, there is a problem where the system date and time may be incorrect after the firmware update process has completed.  To correct this error, the user must manually reconfigure the BMC date/time under the Configuration menu option prior to starting the HMC.

Note 1:  Before proceeding  with an update to this service pack level, update the OS to the latest fix level for its release as there is an important fix for the AST driver that, if not applied, could prevent the system from IPLing after the service pack is installed.  

Note 2:  

1.  When  upgrading firmware from firmware version 1.xx to version 3.xx:, there are dependencies between BMC and PNOR. For that reason, you must update BOTH BMC and  PNOR while system power is off.

1.1  Power off the system

1.2  Update BMC version 3.xx using pUpdate 2.20 or using BMC Web GUI.

1.3  After the BMC firmware is updated, the BMC is automatically reset.  Wait for the BMC to come back on line.

1.3.1  You can ping the BMC to see if it is active on the network or you connect to the BMC Web GUI.

1.4 Check the BMC version to ensure the right BMC version is updated.

1.4.1   Check Web GUI display for new BMC version, or      

1.4.2 Use the ipmitool to check the BMC version

1.5 Update PNOR version 3.xx using pUpdate 2.20 or using BMC Web GUI.

1.5.1 The new PNOR version is not yet available until a power on is completed.

1.6  Once the PNOR update is complete, power on the system to petitboot menu or OS.

1.6.1 When the system IPL reaches petitboot, SBE validation will be started automatically. This will take about 2 minutes. Please allow the system to complete the SBE validation before attempting to shutdown.  If SBE validation fails for any reason, the system power will be turned off by firmware.  Follow repair action given in the SEL to correct the problem.

1.6.2  Once the system reaches to OS, you can check the PNOR version to ensure it is correct.

1.7  The system is ready to be used.

  1.  

2.  Downgrade of firmware from version 3.xx or later to version 1.xx is NOT supported.

 

3.  Fast Reboot is not supported (fast reboot can be disabled with below command):

3.1 'nvram -p ibm,skiboot --update-config fast-reset=0'

3.2 Fast reboot is disabled by default.

 

4.  After updating BMC firmware to version 3.15 and newer,  the current BMC password for "ADMIN" login ID is still in affect until factory reset is issued to the BMC.  Once the factory reset is issued to the BMC, the BMC reset the password  for  the "ADMIN" login ID to the default password, "ADMIN", but expired.  No remote command will work except the command to change the password.  The "ADMIN" login ID's password can be changed with below interfaces.  New password strength rules (Must be at least 8 characters with at least one lower case  alphabet, one upper case alphabet and one numeric number) must be followed.

4.1 Web GUI

4.2 SSH

4.3 In-band IPMI command (host user must have root privilege)

 

7.1 IBM Power HMC Firmware maintenance

The updating and upgrading of system firmware depends on several factors, such as the current firmware that is installed, and what operating systems is running on the system.

These scenarios and the associated installation instructions are comprehensively outlined in the firmware section of Fix Central, found at the following website:

http://www.ibm.com/support/fixcentral/

 

Any hardware failures should be resolved before proceeding with the firmware updates to help insure the system will not be running degraded after the updates.

7.2 Updating the System Firmware with the pUpdate utility

The pUpdate utility is provided with the firmware update files from IBM Fix Central.  It can be used to perform out-of-band updates by selecting the "-i lan" parameter on the command invocation. The code update needs to be done in two steps:  1) Update the BMC firmware and 2) Update the CEC PNOR for the hostboot and the OPAL components.  It is recommended that the BMC be updated first unless otherwise specified in the firmware install instructions.

 

If a network connection can be made to the BMC, an out-of-band update can be done with the following LAN invocation from a Linux companion system:

 

BMC update: " pUpdate -f bmc.bin -i lan -h xx.xx.xx.xx  -u ADMIN -p ADMIN -r y" where bmc.bin is the name and location of the BMC image file, xx.xx.xx.xx is the IP address of the BMC.

 

PNOR update:  "pUpdate -pnor pnor.bin -i lan -h xx.xx.xx.xx -u ADMIN -p ADMIN " where pnor.bin is the name  and location of the PNOR image file and xx.xx.xx.xx is the IP address of the BMC.

 

For more details on how to use the pUpdate utility, refer to the following link:

https://www.ibm.com/support/knowledgecenter/POWER8/p8eit/p8eit_update_firmware_pupdate.htm

 

7.3 Supporting Diagnostics

You can use diagnostic utilities to diagnose adapter problems.

 

For more details on how to use the diagnostic utilities,  refer to the following link:

https://www.ibm.com/support/knowledgecenter/POWER8/p8eit/p8eit_diags_kickoff.htm

7.4  Updating the System Firmware using the BMC Web GUI

Another method to update the system firmware is by using the baseboard management controller (BMC).

The system firmware is a combination of the BMC firmware and the PNOR firmware. To update the system firmware, update both the BMC firmware and the PNOR firmware by using the BMC.

 

Note 1: System firmware update from the BMC Web GUI is only supported on Google Chrome and Mozilla Firefox browsers.

 

Note 2:  Use the firmware update procedure in this section when there is no dependency between BMC and PNOR.  When there is a dependency between BMC and PNOR, the procedure in this section may not work.  And possibly lead to unexpected system behavior.  When there is a dependency between BMC and PNOR that requires both BMC and PNOR to be updated,  the user will be alerted to this by the special instructions for the firmware update that can be found in either "Section 1.0 Affected Systems" or in "Section 7.0 Installing the Firmware".

 

Complete the following steps to update the BMC firmware:

1. Log in to the BMC by entering the user name and password. Then, press Enter.

2. From the Maintenance list on the BMC dashboard, select Firmware Update.

3. In the Firmware Update window, select Enter Update Mode. Click OK.

4. In the Firmware Upload window, choose the .bin file from your local system folder and click Upload Firmware. Wait for the file to be uploaded. Then, click OK.

5. The existing and new versions of the BMC firmware are displayed.  Ensure that the Preserve Configuration check box is selected and the Preserve SDR check box is not selected. Click Start Upgrade.

Note: You cannot perform other activities by using the BMC interface until the firmware update is complete.

6. The upgrade progress of the firmware update is displayed.  After the firmware update is complete, the BMC is reset automatically.

7. After the reset of the BMC is complete, verify the BMC firmware revision level in the System menu of the BMC dashboard.

8.  Restart the system.

 

Complete the following steps to update the PNOR firmware:

1. Log in to the BMC by entering the user name and password. Then, press Enter.

2. From the Maintenance list on the dashboard, select PNOR Update.

3. In the PNOR Upload window, choose the .pnor file from your local system folder and click Upload PNOR. Wait for the file to be uploaded. Then, click OK.

4. The existing and new dates of the PNOR firmware are displayed. Click Start Upgrade.

Note: You cannot perform other activities by using the BMC interface until the PNOR update is complete.

5. The progress of the PNOR update is displayed. After the PNOR update is completed,  the system must be restarted to finish installation of the new PNOR firmware.

 

For more information on updating the firmware using the BMC, refer to the following link:

https://www.ibm.com/support/knowledgecenter/POWER8/p8eit/p8eit_update_firmware_bmc.htm

8.0 System Management and Virtualization

The service processor, or baseboard management controller (BMC), provides a hypervisor and operating system-independent layer that uses the robust error detection and self-healing functions that are built into the POWER8 processor and memory buffer modules. Open power application layer (OPAL) is the system firmware in the stack of POWER8 processor-based Linux-only servers.

 

8.1  BMC Service Processor IPMI and Web GUI Access

The service processor, or baseboard management controller (BMC), is the primary control for autonomous sensor monitoring and event logging features on the Power HMC.

The BMC supports the Intelligent Platform Management Interface (IPMI) for system monitoring and management.  The BMC monitors the operation of the firmware during the boot process and also monitors the OPAL hypervisor for termination.  The firmware code update is supported through the BMC and Intelligent Platform Monitoring Interface (IPMI) and the BMC Web GUI  The GUI console is accessed using a web browser with a "http:" connection to port.  See section 1.2 for the supported browsers that can be used with BMC Web GUI.  

 

8.2 Open Power Abstraction Layer (OPAL) Hypervisor

The Open Power Abstraction Layer (OPAL) provides hardware abstraction and run time services to the running host Operating System.

For the 7063-CR1 servers,  only the OPAL bare-metal installs of the Hardware Management Console are supported.

 

Find out more about OPAL skiboot here:

https://github.com/open-power/skiboot

 

8.3 Intelligent Platform Management Interface (IPMI)

The Intelligent Platform Management Interface (IPMI) is an open standard for monitoring, logging, recovery, inventory, and control of hardware that is implemented independent of the main CPU, BIOS, and OS. The 7063-CR1 HMC  provides one 10M/100M baseT IPMI port.

The ipmitool is a utility for managing and configuring devices that support IPMI. It provides a simple command-line interface to the service processor.  You can install the ipmitool from the Linux distribution packages in your workstation, sourceforge.net, or another server (preferably on the same network as the installed server). For example, in Ubuntu, use this command:

$ sudo apt-get install ipmitool

For installing ipmitool from sourceforge, please see section 1.1 "Minimum ipmitool Code Level".

 

For more information about ipmitool, there are several good references for ipmitool commands:

 

  1. 1.The man page  

  2. 2.The built-in command line help provides a list of IPMItool commands:
    # ipmitool help 

  3. 3.You can also get help for many specific IPMItool commands by adding the word help after the command:
    # ipmitool channel help 

  4. 4.For a list of common ipmitool commands and help on each, you may use the following link:  
    www.ibm.com/support/knowledgecenter/linuxonibm/liabp/liabpcommonipmi.htm 

     

 

To connect to your host system with IPMI, you need to know the IP address of the server and have

a valid password. To power on the server with the ipmitool, follow these steps:

1. Open a terminal program.

2. Power on your server with the ipmitool:

ipmitool -I lanplus -H bmc_ip_address -P ipmi_password power on

3. Activate your IPMI console:

ipmitool -I lanplus -H bmc_ip_address -P ipmi_password sol activate

 

8.4 Petitboot bootloader

Petitboot is a kexec based bootloader used by IBM POWER8 systems for doing the bare-metal installs on the 8001 servers.

After the POWER8 system powers on, the petitboot bootloader scans local boot devices and network interfaces to find boot options that are available to the system. Petitboot returns a list of boot options that are available to the system. If you are using a static IP or if you did not provide boot arguments in your network boot server, you must provide the details to petitboot.  You can configure petitboot to find your boot with the following instructions:

https://www.ibm.com/support/knowledgecenter/linuxonibm/liabp/liabppetitbootadvanced.htm

 

You can edit petitboot configuration options, change the amount of time before Petitboot automatically boots, etc. with these instructions:

https://www.ibm.com/support/knowledgecenter/linuxonibm/liabp/liabppetitbootconfig.htm

 

After you select to boot the ISO media for the Hardware Management Console, the installer wizard for that Linux distribution walks you through the steps to set up disk options, your root password, time zones, and so on.

You can read more about the petitboot bootloader program here:

https://www.kernel.org/pub/linux/kernel/people/geoff/petitboot/petitboot.html

 

 

9.0 Quick Start Guide for Re- installing the HMC Image on the 7063-CR1 system

This guide helps you re-install HMC on the 7063-CR1.

 

1.) Create the virtual drive on the 7063-CR1 system, if needed.

Follow the steps in this procedure in the unlikely event that you need to re-create the virtual drive on the IBM 7063-CR1 Hardware Management Console.

About this task

This procedure assumes that:

The system was erroneously shipped without an already created and pre-loaded virtual disk

The existing virtual disk is somehow damaged and needs to be re-created.

Link to procedure:  https://www.ibm.com/support/knowledgecenter/en/8286-41A/p8ej8/p8ej8_recreate_drive.htm

 

2.) Use the HMC media to update or re-install the HMC.  If  the virtual disk had to be created in step 1, the HMC recovery media will be needed to re-install the HMC.

Follow the steps in the link below for upgrading the level of the HMC to obtain and install the recovery media:

https://www.ibm.com/support/knowledgecenter/TI0003M/p8hai/p8hai_upgrades_enh.htm

 

10.0 Change History

Date

Description

09/18/2017

New for HMC model 7063-CR1 for V2.10 release

10/13/2017

Service pack 1 release, version V2.20

03/12/2018

Service pack release, version V2.30 (OP825.21)

06/13/2019

Service pack release, version V3.07 (OP825.30)

07/08/2019

Update sections 4.0/4.1 with newer minimum required HMC level requirements (there are no updates to the delivered binaries)

09/25/2019

Service pack release, version V3.08 (OP825.31)

10/23/2019

Update section on BMC gui update of firmware

12/02/2019

Service pack release, version V3.09 (OP825.40)

01/31/2020

Service pack release, V3.09_V3.17  (OP825.41)

06/30/2020

Service pack release V3.11 with BMC V3.20 (OP825.42) with pUpdate zip package

07/29/2020

Republish for readme updates ONLY