Power6 Mid-Range Firmware
Applies to: 9117-MMA , 9406-MMA, and 8234-EMA
This document provides information about the installation of
Licensed
Machine or Licensed Internal Code, which is sometimes referred to
generically
as microcode or firmware.
Contents
1.0 Systems Affected
This package provides firmware for System p 570 (9117-MMA), System i570
(9406-MMA), Power 570 (9117-MMA), and Power 560 (8234-EMA) servers
only.
The firmware level in this package is:
1.1 Minimum HMC Code Level
This section is intended to describe the "Minimum HMC Code Level"
required by the System Firmware to complete the firmware installation
process. When installing the System Firmware, the HMC level must be
equal to or higher than the "Minimum HMC Code Level" before starting
the system firmware update. If the HMC managing the server
targeted for the System Firmware update is running a code level lower
than the "Minimum HMC
Code Level" the firmware update will not proceed.
The Minimum HMC Code level for this firmware is: HMC V7 R3.5.0 Service Pack 1 ( PTF
MH01212) and
MH01217.
Although
the Minimum HMC Code level for this firmware is listed
above, HMC V7 R7.9.0
Service Pack 1
(PTF MH01428) with security
fix (PTF MH01473) and POODLE fix (PTF MH01484) or higher is
recommended.
Important: To prevent
vulnerability to POODLE security issues, the HMC
should be updated to the above recommended level, prior to
installing this server firmware
level.
NOTE: Security fixes
provided in certain Power Server Firmware
levels impact the ability to access Advanced System Manager (ASM) from
HMCs at older levels.
For further information see http://www-01.ibm.com/support/docview.wss?uid=nas8N1019900
For specific fix level information on key components of IBM
Power
Systems running the AIX, IBM i and Linux operating systems, we suggest
using the Fix Level Recommendation Tool (FLRT):
http://www14.software.ibm.com/webapp/set2/flrt/home
For information concerning HMC releases and the latest PTFs,
go
to the following URL to access Fix Central.
http://www-933.ibm.com/support/fixcentral/
NOTE: You must be logged in as hscroot in order for the
firmware
installation to complete correctly.
1.2 Minimum SDMC Code
Level
This section is intended to describe the "Minimum Systems Director
Management Console (SDMC) Code Level"
required by the System Firmware to complete the firmware installation
process. When installing the System Firmware, the SDMC level must be
equal to or higher than the "Minimum SDMC Code Level" before starting
the system firmware update. If the SDMC managing the server
targeted for the System Firmware update is running a code level lower
than the "Minimum SDMC
Code Level" the firmware update will not proceed.
The Minimum SDMC Code level for
this firmware is: SDMC V6
R7.3.0 with Mandatory PTF MF53082.
Although the Minimum SDMC Code level for this firmware is listed
above, SDMC level V6 R7.3.0 with PTF MF55966
(SDMC_Update_6.730.3/Service Pack 3), or
higher is
suggested for
this
firmware level.
For information concerning SDMC releases and the latest PTFs,
go
to the following URL to access Fix Central:
http://www-933.ibm.com/support/fixcentral/
For specific fix level
information on key components of IBM
Power Systems running the AIX, IBM i and Linux operating systems, we
suggest using the Fix Level Recommendation Tool (FLRT):
http://www14.software.ibm.com/webapp/set2/flrt/home
2.0 Cautions
and Important
Information
2.1 Cautions
Downgrading firmware from any
given release level to an earlier release level is not recommended.
If you feel that it is
necessary to downgrade the firmware on
your system to an earlier release level, please contact your next level
of support.
Upgrading from EM320_031 to EM350_xxx
If your current level of firmware is EM320_031
you
must install any higher level of EM320 before upgrading your firmware
to
this level.
Upgrading from EM310_xxx to EM350_yyy
If your current level of firmware is
EM310_xxx,
you must install EM320_040 or higher before upgrading your firmware to
this level.
2.2 Important Information
HMC Notice: Please see section "1.1 Minimum HMC Code Level"
for import information on accessing the Advanced System Manager (ASM) from
HMCs at older levels.
IPv6 Support and Limitations
IPv6 (Internet Protocol version 6) is supported in the System
Management
Services (SMS) in this level of system firmware. There are several
limitations
that should be considered.
When configuring a network interface card (NIC) for remote IPL, only
the most recently configured protocol (IPv4 or IPv6) is retained. For
example,
if the network interface card was previously configured with IPv4
information
and is now being configured with IPv6 information, the IPv4
configuration
information is discarded.
A single network interface card may only be chosen once for the boot
device list. In other words, the interface cannot be configured for the
IPv6 protocol and for the IPv4 protocol at the same time.
Memory Considerations for Firmware Upgrades
The increase in memory used by the firmware is due to the additional
functionality
in later firmware releases.
3.0 Firmware
Information
and Description
Use the following examples as a reference to determine whether your
installation
will be concurrent or disruptive.
For systems that are not managed by an HMC or SDMC, the installation
of
system
firmware is always disruptive.
Note: The concurrent levels
of system firmware may, on occasion,
contain
fixes that are known as Deferred and/or Partition-Deferred. Deferred
fixes can be installed
concurrently, but will not be activated until the next IPL.
Partition-Deferred fixes can be installed concurrently, but will not be
activated until a partition reactivate is performed. Deferred
and/or Partition-Deferred
fixes,
if any, will be identified in the "Firmware Update Descriptions" table
of this document. For these types of fixes (Deferred and/or
Partition-Deferred) within a service pack, only the
fixes
in the service pack which cannot be concurrently activated are
deferred.
Note: The file names and service pack levels used in the
following
examples are for clarification only, and are not necessarily levels
that
have been, or will be released.
System firmware file naming convention:
01EMXXX_YYY_ZZZ
- XXX is the release level
- YYY is the service pack level
- ZZZ is the last disruptive service pack level
-
NOTE: Values of service pack and last disruptive service pack
level
(YYY and ZZZ) are only unique within a release level (XXX).
For example, 01EM310_067_045 and 01EM320_067_053 are different
service packs.
An installation is disruptive if:
- The release levels (XXX) are different.
Example: Currently installed release is EM310, new release is EM320
- The service pack level (YYY) and the last disruptive
service
pack level (ZZZ) are the same.
Example: EM310_120_120 is disruptive, no matter what level of EM310 is
currently
installed on the system
- The service pack level (YYY) currently installed on the system is
lower
than the last disruptive service pack level (ZZZ) of the service pack
to
be installed.
Example: Currently installed service pack is EM310_120_120 and
new service pack is EM310_152_130
An installation is concurrent if:
- The release level (XXX) is the same, and
- The service pack level (YYY) currently installed on the
system
is
the same or higher than the last disruptive service pack level
(ZZZ)
of the service pack to be installed.
Example: Currently installed service pack is EM310_126_120,
new service pack is EM310_143_120.
Firmware Information and Update Description
For information about previous firmware release levels, see
Section 7.0 Firmware History.
Filename |
Size |
Checksum |
01EM350_163_038.rpm |
24984421
|
61902
|
Note: The Checksum can be found by running the AIX sum command against the rpm file
(only the first 5 digits are listed).
ie: sum 01EM350_163_038.rpm
EM350
For Impact, Severity and other Firmware definitions, Please
refer to the below 'Glossary of firmware terms' url:
http://www14.software.ibm.com/webapp/set2/sas/f/power5cm/home.html#termdefs
The complete Firmware Fix History for this
Release Level can be
reviewed at the following url:
http://download.boulder.ibm.com/ibmdl/pub/software/server/firmware/EM-Firmware-Hist.html
|
EM350_163_038
01/08/15
|
Impact: Security
Severity: SPE
System firmware changes that
affect all systems
- A security problem
was fixed in the OpenSSL (Secure Socket Layer) protocol that allowed a
man-in -the middle attacker, via a specially crafted fragmented
handshake packet, to force a TLS/SSL server to use TLS 1.0, even if
both the client and server supported newer protocol versions. The
Common Vulnerabilities and Exposures issue number for this problem is
CVE-2014-3511.
- A security problem was fixed in OpenSSL for formatting
fields of security certificates without null-terminating the output
strings. This could be used to disclose portions of the program
memory on the service processor. The Common Vulnerabilities and
Exposures issue number for this problem is CVE-2014-3508.
- Multiple security problems were fixed in the way that
OpenSSL handled Datagram Transport Layer Security (DLTS) packets.
A specially crafted DTLS handshake packet could cause the service
processor to reset. The Common Vulnerabilities and Exposures
issue numbers for these problems are CVE-2014-3505, CVE-2014-3506 and
CVE-2014-3507.
- A security problem was fixed in OpenSSL to prevent a denial
of service when handling certain Datagram Transport Layer Security
(DTLS) ServerHello requests. A specially crafted DTLS handshake
packet with an included Supported EC Point Format extension could cause
the service processor to reset. The Common Vulnerabilities and
Exposures issue number for this problem is CVE-2014-3509.
- A security problem was fixed in OpenSSL to prevent a denial
of service by using an exploit of a null pointer de-reference during
anonymous Diffie Hellman (DH) key exchange. A specially crafted
handshake packet could cause the service processor to reset. The
Common Vulnerabilities and Exposures issue number for this problem is
CVE-2014-3510.
- A security problem was fixed in OpenSSL for memory leaks
that allowed remote attackers to cause a denial of service (out of
memory on the service processor). The Common Vulnerabilities and
Exposures issue numbers are CVE-2014-3513 and CVE-2014-3567.
- A security problem was fixed in OpenSSL for padding-oracle
attacks known as Padding Oracle On Dowgraded Legacy Encryption
(POODLE). This attack allows a man-in-the-middle attacker to
obtain a plain text version of the encrypted session data. The Common
Vulnerabilities and Exposures issue number is CVE-2014-3566. The
service processor POODLE fix is based on a selective disablement of
SSLv3 using the Advanced System Management Interface (ASMI) "System
Configuration/Security Configuration" menu options. The Security
Configuration options of "Disabled", "Default", and "Enabled" for SSLv3
determines the level of protection from POODLE. The management
console also requires a POODLE fix for APAR MB03867(FIX FOR
CVE-2014-3566 FOR HMC V7 R7.7.0 SP4 with PTF MH01482) to eliminate all
vulnerability to POODLE and allow use of option 1 "Disabled" as shown
below:
-1) Disabled: This highest level of security protection does not
allow service processor clients to connect using SSLv3, thereby
eliminating any possibility of a POODLE attack. All clients must
be capable of using TLS to make the secured connections to the service
processor to use this option. This requires the management
console be at a minimum level of HMC V7 R7.7.0 SP4 with POODLE PTF
MH01482.
-2) Default: This medium level of security protection disables
SSLv3 for the web browser sessions to ASMI and for the CIM clients and
assures them of POODLE-free connections. But the legacy
management consoles are allowed to use SSLv3 to connect to the service
processor. This is intended to allow non-POODLE compliant HMC
levels to be able to connect to the CEC servers until they can be
planned and upgraded to the POODLE compliant HMC levels. Running
a non-POODLE compliant HMC to a service processor in "Default"
mode will prevent the ASMI-proxy sessions from the HMC from connecting
as these proxy sessions require SSLv3 support in ASMI.
-3) Enabled: This basic level of security protection enables
SSLv3 for all service processor client connection. It relies on
all clients being at POODLE fix compliant levels to provide full POODLE
protection using the TLS Fallback Signaling Cipher Suite Value
(TLS_FALLBACK_SCSV) to prevent fallback to vulnerable SSLv3
connections. This option is intended for customer sites on
protected internal networks that have a large investment in legacy
hardware that need SSLv3 to make browser and HMC connection to the
service processor. The level of POODLE protection actually
achieved in "Enabled" mode is determined by the percentage of clients
that are at the POODLE fix compliant levels.
|
EM350_159_038
06/25/14
|
Impact: Security
Severity: HIPER
New Features and Functions
- Support was dropped
for Secured Socket Layer (SSL) Version 2 and SSL weak and medium cipher
suites in the service processor web server (Ligthttpd).
Unsupported web browser connections to the Advanced System Management
Interface (ASMI) secured port 443 (using https://) will now be rejected
if those browsers do not support SSL version 3. Supported web
browsers for Power6 ASMI are Netscape (version 9.0.0.4), Microsoft
Internet Explorer (version 7.0), Mozilla Firefox (version 2.0.0.11),
and Opera (version 9.24).
System firmware changes that
affect all systems
- HIPER/Pervasive:
A
security problem was fixed in the OpenSSL Montgomery ladder
implementation for the ECDSA (Elliptic Curve Digital Signature
Algorithm) to protect sensitive information from being obtained with a
flush and reload cache side-channel attack to recover ECDSA nonces from
the service processor. The Common Vulnerabilities and Exposures
issue
number is CVE-2014-0076. The stolen ECDSA nonces could be used to
decrypt the SSL sessions and compromise the Hardware Management Console
(HMC) access password to the service processor. Therefore, the
HMC
access password for the CEC should be changed after applying this fix.
- HIPER/Pervasive:
A
security problem was fixed in the OpenSSL Transport Layer Security
(TLS) and Datagram Transport Layer Security (DTLS) to not allow
Heartbeat Extension packets to trigger a buffer over-read to steal
private keys for the encrypted sessions on the service processor.
The
Common Vulnerabilities and Exposures issue number is CVE-2014-0160 and
it is also known as the heartbleed vulnerability. The stolen
private
keys could be used to decrypt the SSL sessions and and compromise the
Hardware Management Console (HMC) access password to the service
processor. Therefore, the HMC access password for the CEC should
be
changed after applying this fix.
- HIPER/Pervasive:
A security problem was fixed in the OpenSSL (Secure Socket Layer)
protocol that allowed clients and servers, via a specially crafted
handshake packet, to use weak keying material for communication.
A man-in-the-middle attacker could use this flaw to decrypt and modify
traffic between the management console and the service processor.
The Common Vulnerabilities and Exposures issue number for this problem
is CVE-2014-0224.
- HIPER/Pervasive:
A security problem was fixed in OpenSSL for a buffer overflow in the
Datagram Transport Layer Security (DTLS) when handling invalid DTLS
packet fragments. This could be used to execute arbitrary code on
the service processor. The Common Vulnerabilities and Exposures
issue number for this problem is CVE-2014-0195.
- HIPER/Pervasive:
Multiple security problems were fixed in the way that OpenSSL handled
read and write buffers when the SSL_MODE_RELEASE_BUFFERS mode was
enabled to prevent denial of service. These could cause the
service processor to reset or unexpectedly drop connections to the
management console when processing certain SSL commands. The
Common Vulnerabilities and Exposures issue numbers for these problems
are CVE-2010-5298 and CVE-2014-0198.
- HIPER/Pervasive:
A security problem was fixed in OpenSSL to prevent a denial of service
when handling certain Datagram Transport Layer Security (DTLS)
ServerHello requests. A specially crafted DTLS handshake packet could
cause the service processor to reset. The Common Vulnerabilities
and Exposures issue number for this problem is CVE-2014-0221.
- HIPER/Pervasive:
A security problem was fixed in OpenSSL to prevent a denial of service
by using an exploit of a null pointer de-reference during anonymous
Elliptic Curve Diffie Hellman (ECDH) key exchange. A specially
crafted handshake packet could cause the service processor to
reset. The Common Vulnerabilities and Exposures issue number for
this problem is CVE-2014-3470.
- A problem was fixed that caused the system
information LED to be lit without a corresponding SRC and error log for
the event. This problem typically occurs when an operating system
on a partition terminates abnormally.
- A security problem was fixed in the service processor
Lighttpd web server that allowed denial of service vulnerabilities for
the Advanced System Manager Interface (ASMI). The Common
Vulnerabilities and Exposures issue numbers for this problem are
CVE-2011-4362 and CVE-2012-5533.
- A problem was fixed on the service processor where the
Small-Footprint CIM Broker Daemon (SFCBD) process was accessing a null
pointer and failing with a core dump, triggering a FSP dump to collect
the core.
- A problem was fixed that caused a security scan of the
Advanced System Manager Interface (ASMI) to fail. The Lighttpd
web server configuration cipher list was updated to improve the
security.
- A security problem in the Secure Socket Layer (SSL)
protocol on the service processor was fixed to prevent a
man-in-the-middle attack. The Common Vulnerabilities and
Exposures issue number is CVE-2011-3389.
- A security problem was fixed for the Lighttpd web
server that allowed arbitrary SQL commands to be run on the service
processor of the CEC. The Common Vulnerabilities and Exposures
issue number is CVE-2014-2323.
- A security problem was fixed for the Lighttpd web server
where improperly-structured URLs could be used to view arbitrary files
on the service processor of the CEC. The Common Vulnerabilities
and Exposures issue number is CVE-2014-2324..
- A problem was fixed that caused a "code accept" during a
concurrent firmware installation from the HMC to fail with SRC E302F85C.
- A security problem was fixed in the service processor
TCP/IP stack to discard illegal TCP/IP packets that have the SYN and
FIN flags set at the same time. An explicit packet discard was
needed to prevent further processing of the packet that could result in
an bypass of the iptables firewall rules.
System firmware changes that
affect certain systems
- On systems using dynamic Distributed Host Control Protocol
(DHCP) IP addresses, a problem was fixed that caused communication
hangs when DHCP client processes were unable to renew their IP
addresses. The iptable rules needed to be updated to open DHCP
ports 67 and 68 to prevent the DHCP network traffic from being filtered
by the service processor.
- On a system with partitions with redundant Virtual
Asynchronous Services Interface (VASI) streams, a problem was fixed
that caused the system to terminate with SRC B170E540. The
affected partitions include Active Memory Sharing (AMS), encapsulated
state partitions, and hibernation-capable partitions. The problem
is triggered when the management console attempts to change the active
VASI stream in a redundant configuration. This may occur due to a
stream reconfiguration caused by Live Partition Mobility (LPM);
reconfiguring from a redundant Paging Service Partition (PSP) to a
single-PSP configuration; or conversion of a partition from AMS to
dedicated memory.
- On systems involved in a series of consecutive Live
Partition Mobility (LPM) operations, a memory leak problem was fixed in
the run time abstraction service (RTAS) that caused a partition run
time AIX crash with SRC 0c20. Other possible symptoms include
error logs with SRC BA330002 (RTAS memory allocation failure).
- On a system with a
disk device with multiple boot partitions, a problem was fixed that
caused System Management Services (SMS) to list only one boot
partition. Even though only one boot partition was listed in SMS,
the
AIX bootlist command could still be used to boot from any boot
partition.
- For a partition with a 256MB Real Memory
Offset (RMO) region size that has been migrated from a Power8 system
to Power7 or Power6 using Live Partition Mobility, a problem was
fixed
that caused a failure on the next boot of the partition with a BA210000
log with a CA000091 checkpoint just prior to the BA210000. The
fix
dynamically adjusts the memory footprint of the partition to fit on the
earlier Power systems.
- On systems with a redundant service processor, a problem
was fixed that caused a SRC B150D15E to be erroneously logged after a
failover to the sibling service processor.
- On systems with a F/C 5802 or 5877 I/O drawer installed, a
problem was fixed that where an Offline Converter Assembly (OCA) fault
would appear to persist after an OCA micro-reset or OCA
replacement. The fault bit reported to the OS may not be cleared,
indicating a fault still exists in the I/O drawer after it has been
repaired.
Concurrent hot add/repair
maintenance firmware fixes
- A problem was fixed that caused a concurrent hot add/repair
maintenance operation to fail with SRC B181394F.
|
EM350_149_038
07/25/13
|
Impact: Availability
Severity: SPE
System firmware changes that
affect all systems
- A problem was fixed that caused the managed system to go to
the incomplete state on the management console after a partition was
deleted.
- A problem was fixed that caused an error log generated by
the partition firmware to show conflicting firmware levels. This
problem occurs after a firmware update or a logical partition migration
(LPM) operation on the system.
- The firmware was enhanced to display on the management
console the correct number of concurrent live partition mobility (LPM)
operations that is supported.
- A problem was fixed that caused the state of the Host
Ethernet Adapter (HEA) port of be reported as down when the physical
port is actually up.
- A problem was fixed that caused the partition target of a
logical partition migration (LPM) to have its UTC time shifted forward
from the actual time on the source partition.
- A problem was fixed that that caused a HMC code update
failure for the FSP on the accept operation with SRC B1811402 or FSP is
unable to boot on the updated side.
System firmware changes that
affect certain systems
- On systems with I/O towers attached, a problem was fixed
that caused multiple service processor reset/reloads if the tower was
continuously sending invalid System Power Control Network (SPCN) status
data.
- On a partition with a large number of potentially bootable
devices, a problem was fixed that caused the partition to fail to boot
with a default catch, and SRC BA210000 may also be logged.
- On systems running AIX or Linux, a problem was fixed that
caused the operating system to halt when an InfiniBand Host Channel
Adapter (HCA) adapter fails or malfunctions.
- On systems running Active Memory Sharing (AMS) partitions,
a timing problem was fixed that may occur if the system is undergoing
AMS pool size changes.
- On systems with a F/C 5802 or 5877 I/O drawer installed,
the firmware was enhanced to guarantee that an SRC will be generated
when there is a power supply voltage fault. If no SRC is
generated, a loss of power redundancy may not be detected, which can
lead to a drawer crash if the other power supply goes down. This
also fixes a problem that causes an 8 GB Fiber channel adapter in
the drawer to log errors if the 12V level fails in the drawer.
- On systems with a F/C 5802 or 5877 I/O drawer installed, a
problem was fixed that caused the hardware topology on the management
console for the managed system to show "null" instead of "operational"
for the affected I/O drawers.
- A problem was fixed that caused a migrated partition to
reboot during transfer to a VIOS 2.2.2.0, and later, target system. A
manual reboot would be required if transferred to a target system
running an earlier VIOS release. Migration recovery may also be
necessary.
Concurrent hot add/repair
maintenance firmware fixes
- On systems running multiple IBM i partitions that are
configured to communicate with each other via virtual Opticonnect,
concurrent hot add/repair maintenance operations may time-out.
When this problem occurs, a platform reboot may be required to recover.
|
EM350_143_038
01/09/13
|
Impact: Function
Severity: ATT
System firmware changes that
affect all systems
- A problem was fixed that caused the hypervisor to be left
in an inconsistent state after a partition create operation failed.
- A problem was fixed that caused the hypervisor to become
unresponsive and the managed system to go the incomplete state on the
management console.
- A problem was fixed that caused the service processor to
fail to boot after a concurrent firmware update; this causes a system
crash.
System firmware changes that
affect certain systems
- A problem was fixed that prevented the HMC command
"lshwres" from showing any I/O adapters if any adapter name contained
the ampersand character in the VPD.
- The Power Hypervisor was enhanced to insure better
synchronization of vSCSI and NPIV I/O interrupts to partitions.
- On systems running AIX or Linux, a problem was fixed that
caused a partition to fail to boot with SRC CA260203. This
problem also can cause concurrent firmware updates to fail.
Concurrent hot add/repair
maintenance firmware fixes
- A problem was fixed that caused the Hypervisor to become
unresponsive during a concurrent maintenance operation.
|
EM350_132_038
07/27/12
|
Impact: Availability
Severity: SPE
New Features and Functions
- Support for live
partition mobility between systems running Ex350
system firmware, and 8246-L2S systems.
System firmware changes that
affect all systems
- The firmware was
enhanced to improve the isolation of the failing component when SRC
110016x1 (VRM failure) is logged.
System firmware changes that
affect certain systems
- On systems booting from an NPIV (N-port ID virtualization)
device, a problem was fixed that caused the boot to intermittently
terminate with the message "PReP-BOOT: unable to load full PReP
image.". This problem occurs more frequently on the IBM V7000
Storage System running the SAN Volume Controller (SVC), but not on
every boot.
- On systems on which Internet Explorer (IE) is used to
access the Advanced System Management Interface (ASMI) on the Hardware
Management Console (HMC), a problem was fixed that caused IE to hang
for about 10 minutes after saving changes to network parameters on the
ASMI.
- On systems running the AIX operating system, a problem was
fixed that caused the hypervisor to crash with SRC B7000103, after an
HEA (Host Ethernet Adapter) error was logged, when there is a lot of
AIX activity on the HEAs.
|
EM350_126_038
05/02/12
|
Impact: Availability
Severity: HIPER - High Impact/PERvasive, Should be installed as soon as
possible.
System firmware changes that
affect all systems
- The firmware was enhanced to log SRCs BA180030 and BA180031
as informational instead of predictive.
- The firmware was enhanced to increase the threshold of soft
NVRAM errors on the service processor to 32 before SRC B15xF109 is
logged. (Replacement of the service processor is recommended if
more than one B15xF109 is logged per week.)
System firmware changes that
affect certain systems
- The firmware resolves undetected N-mode stability problems
and improves error reporting on the feature code (F/C) 5802 and 5877
I/O drawer power subsystem.
- HIPER/Pervasive:
On systems with PCI adapters in a feature code (F/C) F/C 5802 or 5877
I/O drawer assigned to a Virtual I/O Server (VIOS), and on systems with
the I/O adapters in a CEC drawer assigned to a VIOS, a problem was
fixed that caused the system to crash with SRC B700F103.
- A problem was fixed that caused the hypervisor to hang
during a concurrent operation on a F/C 5802, 5803, 5873 or 5877 I/O
drawer. Recovering from the hypervisor hang required a platform
reboot.
- On system
performing Live Partition Mobility (LPM), a problem was fixed
that caused a partition to crash if the following sequence of
operations is performed:
1. The partition is configured with, and is using, more than 1
dedicated processor.
2. The partition is migrated using LPM from a POWER6 to a POWER7
platform.
3. At any time following the migration from POWER6 to POWER7, one
or more of the dedicated processors is removed from the partition using
a Dynamic Logical Partitioning (DLPAR) operation.
Once these 3 steps operations have been done, a partition crash
is likely if either:
- The partition is subsequently migrated to any other platform
(POWER6 or POWER7) using LPM, or
- The partition is resumed from hibernation.
- A problem was fixed that caused the output of the AIX
command "uname -m" to be incorrect on the POWER7 system after a
successful Live Partition Migration (LPM) operation from a POWER6 to a
POWER7 system.
- A problem was fixed that prevented the operating system
from being notified that a F/C 5802 or 5877 I/O drawer had recovered
from an input power fault (SRC 10001512 or 10001522).
- The firmware was enhanced to improve soft error recovery
and error reporting on feature code (F/C) 5802 and 5877 I/O drawers.
- A problem was fixed that caused booting from a virtual
fibre channel tape device to fail with SRC B2008105.
Concurrent hot add/repair
maintenance firmware fixes
- A problem was fixed that caused the hypervisor's memory
usage to grow during a concurrent maintenance node evacuation
operation. When this problem occurred, the amount of reserved
memory (the memory the hypervisor is using) increases, and the amount
of available memory decreases, as viewed on the Hardware Management
Console (HMC) or System Director Management Console (SDMC).
|
EM350_118_038
10/27/11
|
Impact: Availability
Severity: HIPER - High Impact/PERvasive, Should be installed as soon as
possible.
System firmware changes that
affect all systems
- A problem was fixed that
caused the system to terminate when rebooting after the power was
removed, then reapplied.
- A problem was fixed that
caused the message "IPL: 500 - Internal Server Error" to be displayed
when the Hardware Management Console option was selected (which is
under the System Information option) on the Advanced System Management
Interface (ASMI).
- On systems running more than
100 logical partitions, a problem was fixed that caused a concurrent
firmware installation to fail.
- A problem was fixed that caused a system's partition
dates to revert back to 1969 after the service processor or its battery
was replaced. This occurred regardless of whether or not the
service processor's time-of-day (TOD) clock was correctly set during
the service action.
- A problem was fixed that
caused a partition migration operation to abort when the partition has
more than 4096 virtual slots.
- A problem was fixed that
caused the message "500 - Internal Server Error." to be displayed when
a setting was changed on the Advanced System Management Interface's
(ASMI's) power on/off menu, when the change was attempted when the
system was powering down.
- A problem was fixed that
caused booting or installing a partition or system from a USB device to
fail with error code BA210012. This usually occurs when an
operating system (OS) other than the OS that is already on the
partition or system is being booted or installed.
- On the System Management Services (SMS) remote IPL (RIPL)
menus, a problem was fixed that caused the SMS menu to continue to show
that an Ethernet device is configured for iSCSI, even though the user
has changed it to BOOTP.
- A problem was fixed that
caused a firmware installation from the HMC with the "do not auto
accept" option selected to fail.
System firmware changes that
affect certain systems
- On systems
running IBM i partitions, a problem was fixed that caused changing the
processor weight on an IBM i partition to 255 to have no effect.
- On system using the utility
capacity on demand (COD) feature, a problem was fixed that prevented
the hypervisor from correctly crediting the time used when the sequence
number of the activation code reached certain values.
- HIPER/Non-Pervasive:
On systems running Active Memory Sharing (AMS) with a feature code
(F/C) 5802 or 5877 I/O drawer attached, a problem was fixed that caused
the system to crash with SRC B170E540 after a warm boot or platform
dump IPL.
- On systems with an iSCSI
network, a problem was fixed that caused the system to hang when
booting from an iSCSI device in the system management services (SMS)
menus.
- On systems with an iSCSI
network, when booting a logical partition using that iSCSI network, a
problem was fixed that caused the iSCSI gateway parameter displayed on
the screen to be incorrect. It did not impact iSCSI boot
functionality.
- On systems using fibre channel
adapters, the firmware was enhanced by the addition of a new option in
the system management services (SMS) Mutliboot menu that facilitates
zoning of physical and virtual fibre channel adapters.
- On systems with
external I/O drawers, the firmware was enhanced such that SRCs 10001B02
and 1000911C place a call home.
- On systems with
external InfiniBand or PCI-E drawers or towers, a problem was fixed
that caused the system to crash with SRC B7000103 if the I/O hub
adapter crashed at the same time an external drawer or tower was being
initialized.
Concurrent hot add/repair
maintenance firmware fixes
- On partitions running Red Hat
Linux 6.1, a problem was fixed that caused a node evacuation operation
to fail.
- HIPER/Non-Pervasive:
On systems with a F/C 5802 or 5877 I/O drawer attached, a
problem was fixed that caused the system to crash with SRC B170E540
after a warm boot or platform dump IPL.
- A problem was fixed
that caused the host Ethernet adapters (HEA) to be in a non-functional
state after a hot node add.
|
4.0
How to Determine Currently Installed Firmware Level
For HMC managed systems:
From the HMC, select Updates in the navigation (left-hand) pane, then
view the current levels of the desired server(s).
For SDMC managed systems:
From the SDMC Welcome page, select the desired server(s), then select
Release Management, then select Power System Firmware Management. Click
Gather Target Information, then view the current levels of the desired
server(s).
NOTE:
If Inventory has not previously been collected, a message will be
displayed indicating to "View and Collect Inventory" to proceed.
Alternately, you can view the server's current firmware level on the
Advanced System
Management Interface (ASMI) Welcome pane. It appears in the top right
corner.
Example: EM350_038.
5.0 Downloading
the
Firmware Package
Follow the instructions on Fix Central. You must read and agree to
the
license agreement to obtain the firmware packages.
Note: If your HMC or SDMC is not internet-connected you will need
to
download
the new firmware level to a CD-ROM or ftp server.
6.0 Installing the
Firmware
The method used to install new firmware will depend on the release
level
of firmware which is currently installed on your server. The release
level
can be determined by the prefix of the new firmware's filename.
Example: EMXXX_YYY_ZZZ
Where XXX = release level
- If the release level will stay the same (Example: Level
EM310_075_075
is
currently installed and you are attempting to install level
EM310_081_075)
this is considered an update.
- If the release level will change (Example: Level EM320_081_075 is
currently
installed and you are attempting to install level EM340_096_096) this
is
considered an upgrade.
Instructions for installing firmware updates and upgrades can be
found at http://publib.boulder.ibm.com/infocenter/systems/scope/hw/topic/ipha1/updupdates.htm
IBM i Systems
See "Server Firmware and HMC
Wizard",
http://www-912.ibm.com/s_dir/slkbase.nsf/recommendedfixes
7.0 Firmware History
The complete Firmware Fix History for this Release level can be
reviewed at the following url:
http://download.boulder.ibm.com/ibmdl/pub/software/server/firmware/EM-Firmware-Hist.html