Skip to main content
Some article numbers may have changed. If this isn't what you're looking for, try searching all articles. Search articles

iDRAC: iDRAC8 | UEFI0315 Error at POST after downgrading iDRAC8 firmware

Summary: This article provides steps to resolve PowerEdge Server get a UEFI0315 Error when the Secure boot is enabled and during update iDRAC firmware.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Instructions

Table of Contents

 

  1. Symptom
  2. Solution
  3. Confirming Result


Symptom

After downgrading iDRAC8 firmware from the 2.70.70.70 release, PowerEdge 13G servers may stop at POST with an UEFI0315 Error Banner. The error persists on each HOST reboot/ power-on.


iDRAC8-UEF0315-SecureBoot 
UEFI0315: Unable to process an iDRAC request to configure Secure Boot keys because of a communication error between BIOS and iDRAC.

Example of Lifecycle Controller Logs:

UEFI0315

Unable to process an iDRAC request to configure Secure Boot keys because of a communication error between BIOS and iDRAC.

 

This error banner is displayed when BIOS fails to receive an expected Secure Boot setting value during the Power-On Self-Test (POST) sequence. When iDRAC8 is downgraded from 2.70.70.70, this reading fails regardless of Secure Boot settings within the server BIOS.


The Lifecycle Controller Logs of the iDRAC8 record if the iDRAC8 firmware has changed. Searching for the event "PR36" shows the history of firmware updates that are applied to the server.

 

PR36

Version change detected for Lifecycle Controller firmware. Previous version:2.70.70.70, Current version:2.61.60.60

 

 



Solution

iDRAC8 firmware 2.70.70.70 resolved an issue that was leading to this sighting randomly. Downgrading from the iDRAC8 2.70.70.70 is persistently causing the error to return. If the iDRAC8 firmware is confirmed to have been downgraded, this error is not an indication of faulty hardware.

Use one of the following methods to clear the condition from impacted servers.
 

  • Option 1: Update iDRAC8 to 2.70.70.70

Reinstalling iDRAC8 to firmware version 2.70.70.70 restores the fix that corrects this condition. The server must be rebooted after the iDRAC firmware update completes.


iDRAC8 2.70.70.70 is available for download here

 

  • Option 2: Reset Secure Boot Keys using Redfish API

If the server must remain on downgraded iDRAC8 firmware, the Secure Boot Keys of the system BIOS must be reset. Redfish API is the only method to modify this setting. Follow the instructions below to modify the /redfish/v1/Systems/System.Embedded.1/SecureBoot/Actions/SecureBoot.ResetKeys value.
 

Warning: Resetting Secure Boot Keys is destructive for any configurations that are using the Secure Boot feature. Back up the keys through the BIOS menu before proceeding.

 
The secure Boot Policy setting must be set to Custom attempting to reset Secure Boot Keys. Secure Boot can be either Enable or Disabled. 


F2 System Setup >> System BIOS >> System Security >> Secure Boot:

BIOS-SecureBoot-Settings-v3

Note: Secure Boot is Disabled by default. In Legacy BIOS Boot Mode, the Secure Boot setting is not configurable.  

 

Note: Lifecycle Controller must collect system inventory on restart after changing the Secure Boot settings in the BIOS. Boot the server into the Operating System before sending the Redfish Post command.

  

Postman AppThis hyperlink is taking you to a website outside of Dell Technologies. was used in the following examples. Define the following fields in the application before sending the Redfish POST command.

 

Post URL Bar:
Postman-Post-ResetKeys 
 

  • Select POST from the action dropdown menu.
  • Enter URL Bar: https://iDRAC_IP/redfish/v1/Systems/System.Embedded.1/SecureBoot/Actions/SecureBoot.ResetKeys

 

Authorization Tab:
Postman-Authorization-ResetKeys 
 

  • Type: Basic Auth
  • Username: iDRAC user
  • Password: iDRAC User Password

 

Headers Tab:
Postman-headers-ResetKeys 
 

  • Key: Content-Type
  • Value: application/json

 

Body Tab:
Postman-Body-ResetKeys 
 

  • Select the raw radio button.
  • Add {"ResetKeysType":"ResetAllKeysToDefault"} to text field
  • Click "Send" when all fields have been populated.

Confirming Result

If the Redfish post command was successful, Postman shows similar messaging in the Response field:

{

    "@Message.ExtendedInfo": [

        {

            "Message": "Successfully Completed Request",

            "MessageArgs": [],

            "MessageArgs@odata.count": 0,

            "MessageId": "Base.1.0.Success",

            "RelatedProperties": [],

            "RelatedProperties@odata.count": 0,

            "Resolution": "None",

            "Severity": "OK"

        },

        {

            "Message": "The operation successfully completed.",

            "MessageArgs": [],

            "MessageArgs@odata.count": 0,

            "MessageId": "IDRAC.1.6.SYS413",

            "RelatedProperties": [],

            "RelatedProperties@odata.count": 0,

            "Resolution": "No response action is required.",

            "Severity": "Informational"

        }

    ]

}

Note: The server must be rebooted after successfully resetting the Secure Boot Keys.

Affected Products

iDRAC7/8 with Lifecycle Controller Version 2.63.60.61, iDRAC8 with Lifecycle Controller version 2.70.70.70, PowerEdge C4130, PowerEdge c6320, PowerEdge c6320p, Poweredge FC430, Poweredge FC630, Poweredge FC830, PowerEdge FM120x4 (for PE FX2/FX2s) , PowerEdge M630 ...

Products

PowerEdge M630 (for PE VRTX), PowerEdge M830, PowerEdge M830 (for PE VRTX), PowerEdge R230, PowerEdge R330, PowerEdge R430, PowerEdge R530, PowerEdge R530xd, PowerEdge R630, PowerEdge R730, PowerEdge R730xd, PowerEdge R830, PowerEdge R930 , PowerEdge T130, PowerEdge T330, PowerEdge T430, PowerEdge T630 ...
Article Properties
Article Number: 000177187
Article Type: How To
Last Modified: 10 Dec 2024
Version:  6
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.