...
On NxOS 10.1(X) upgrade of the EPLD Golden regions is sometimes unsuccessful. The device does not display any error when issuing the install command, instead it keeps booting from the Golden region with old EPLD version.
In some cases Nexus 9000 series device running NX-OS 10.1(2) does not upgrade the Golden EPLD region. - Upgrade of the Primary EPLD region: switch# install epld bootflash:n9000-epld.10.1.2.img module 1 - After the reload due to the upgrade of the Primary EPLD region the Switch boots on the Golden region. This is expected switch# show logging log | incl FPGA 2021 Jun 10 08:49:29 switch %CARDCLIENT-2-FPGA_BOOT_GOLDEN: IOFPGA booted from Golden 2021 Jun 10 08:49:29 switch %CARDCLIENT-2-FPGA_BOOT_GOLDEN: MIFPGA booted from Golden 2021 Jun 10 08:49:29 switch %CARDCLIENT-5-MOD_BOOT_GOLDEN: Module 1 IOFPGA booted from Golden 2021 Jun 10 08:49:29 switch %CARDCLIENT-5-MOD_BOOT_GOLDEN: Module 1 MIFPGA booted from Golden - Upgrade of the Golden EPLD region: switch# install epld bootflash:n9000-epld.10.1.2.img module 1 golden - After the reload due to the upgrade of the Golden EPLD region the Switch should boot on the Primary EPLD region. This is not expected switch# show logging log | incl FPGA 2021 Jun 10 09:02:34 switch %CARDCLIENT-2-FPGA_BOOT_GOLDEN: IOFPGA booted from Golden 2021 Jun 10 09:02:34 switch %CARDCLIENT-2-FPGA_BOOT_GOLDEN: MIFPGA booted from Golden 2021 Jun 10 09:02:34 switch %CARDCLIENT-5-MOD_BOOT_GOLDEN: Module 1 IOFPGA booted from Golden 2021 Jun 10 09:02:34 switch %CARDCLIENT-5-MOD_BOOT_GOLDEN: Module 1 MIFPGA booted from Golden
Upgrade EPLD on an earlier release of EPLD image that has same version as NX-OS 10.1(2) and then perform upgrade to NX-OS 10.1(2). Refer to the Cisco Nexus 9000 Series FPGA/EPLD Upgrade Release Notes for the specific releases.
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and determined it does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels. If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html