================================================================================
Intel(R) Server Board S2600ST Family
for Intel(R) Deployment Assistant, Intel(R) One Boot Flash Update Utility, 
Windows* Preboot Execution Environment 
================================================================================
Intel(R) Server Boards and Systems
Intel Corporation
2111 N.E. 25th Avenue, Hillsboro, OR 97124 USA
================================================================================
DATE    :	Oct 19, 2018
TO      :	Intel(R) Server Board S2600ST Family
SUBJECT : 	Release Notes for System Firmware Update Package 
================================================================================
                              ABOUT THIS RELEASE
================================================================================
BIOS   : 00.01.0014
ME     : 04.00.04.340
BMC    : 1.60.56383bef
FRUSDR : 1.40
================================================================================
                           Support Platforms and Dependency
================================================================================
Processors supported: 
Intel(R) Xeon(R) Scalable processors

Microcode versions:
        CPUID           Version       Status
	0x50653        0x01000144     (Xeon Scalable B1)
	0x50654        0x0200004D     (Xeon Scalable H0)

The following update process must be followed to ensure a trouble free update.
1.	BMC firmware
2.	BIOS
3.	Manageability Engine (ME) firmware
4. 	FD
5.	FRUSDR

================================================================================
                             IMPORTANT NOTE!!!                   
================================================================================
 - This Update package must be installed using 
   Intel(R) One-boot Flash Update (OFU) V14.1 Build 14 or later
   

1. Package C-State only works well with Xeon Scalable Family H0 parts, for other Xeon Scalable Family stepping, C6 non-retention is hardcode from BIOS side.
2. BIOS R00.01.0001 does not support online downgrade to any Dxxx or Xxxx BIOS.
3. BIOS R00.01.0001 removed Xeon Scalable Family A1 microcode(m1350651_8000002B) and Xeon Scalable Family B0 microcode(m9750652_80000035).
4. Removed 'UpdateNvram' support for iflash32 tool for security reason of SRA bios.
5. Security revision upgrade to v0002 on BIOS R00.01.0002 will prevent BIOS downgrade via normal mode to R00.01.0001, user can use BIOS recovery mode for BIOS downgrade. Although Intel doesn't recommend downgrading firmware
6. One new production key is integrated onto R0004 BIOS, which will correct an OEM string. 
7. This release include security revision upgrade to version 0004. This will prevent BIOS downgrade via normal mode to previous version with lower security revision, user can use BIOS recovery mode process for BIOS downgrade.
8. System will prevent downgrading ME from 04.00.04.288 to 04.00.04.235 or older version, if system BIOS version is R0009. This is an expected behavior. 
9. Security revision upgrade to 0005 since BIOS R010, it will prevent BIOS downgrade via normal mode to previous version that with lower security revision, user can use BIOS recovery mode for BIOS downgrade.
10. Downgrading below 1.43.660a4315 is not supported due to a security revision change.
================================================================================
                  System Firmware Update Package Usage instructions                   
================================================================================
This package can be updated using one of the following methods:
 - Windows* or Linux* operating system using Intel(R) One-boot Flash Update (OFU)
   V14.1 Build 14 or later)
 - Windows* Preboot Execution Environment (WinPE)

To update from Windows* and Linux* or operating systems using the Intel(R) One Boot
Flash Update Utility (OFU)

Intel(R) One boot Flash Update utility can be downloaded from http://downloadcenter.intel.com/
and it is part of the "BIOS, Firmware Update & Configuration Utilities" for 
Windows* and Linux*. Please refer to Intel(R) OFU user guide about the details of 
installation and usage of OFU.

Use OFU to update system firmware by the following steps:
- Install OFU on Windows* or Linux* system
- Download the latest firmware update package from http://downloadcenter.intel.com/
- Unzip package to a folder
- Run the following command in Windows* command line/Linux* terminal window:
  <OFU install folder name>:\flashupdt -u  <package folder name>\flashupdt.cfg
                       
To update from Windows* Preboot Execution Environment (WinPE)

The System Firmware Update Package can be inserted to Windows* PE customized image 
for creating a bootable Windows* PE CD. User is able to update system firmware from 
customized WinPE CD by the following steps:
- Boot server with customized WinPE CD
- Run script "WinPE_x64_Update.bat"
  (name may be varied depends on your own customization)
  
Note:
1. The Intel(R) OFU utility is case sensitive. Therefore, when you transfer the 
Firmware Update Package using USB flash drive from a Microsoft Windows* system to a Linux
environment, you must first extract under the Linux* environment. Otherwise, you 
will need to mount the USB flash drive manually with 'vfat' option under Linux to avoid 
conversion from upper case to lower case and vice versa.

2. To make Intel(R) OFU utility run properly under x64 OS, you have to read
OFU release notes on known issues for OFU installation.

3. In this SFUP package, Intel only provide batch file "WinPE_x64_Update.bat" 
for WinPE2.1/3.0 64 bit solution as an example. Please refer to white paper 
"White Paper-Intel Server Utilities Procedure for WinPE.pdf" for details on 
building your own customized WinPE CD.

4. Windows PE 2.0 - built from Windows Vista SP1 EM64T
5. Windows PE 2.1 - built from Windows Vista SP1 or Windows Server 2008, EM64T
6. Windows PE 3.1 - built from Windows Server 2008 R2, EM64T
7. Microsoft IPMI driver is loaded by default from WinPE CD, if you want to use 
Intel IPMI driver instead of MS IPMI driver for firmware update, you can un-install
Microsoft IPMI driver by:
                Devicesetup.exe Cv remove *IPI0001
                Note: IPI0001 is the device ID for Microsoft IPMI driver.

================================================================================
                         BIOS R00.01.0014(This release)
================================================================================
Rename BIOS ID from X0149 to R0014.
HSD-ES:1605354891, TPM Update fail on S2600ST and S2600WF
OSS_0008036:       Update Microcode 0x4d for Xeon Scalable H0 and 0x144 for Xeon Scalable B1  
                   Reference code version: 20180612_CP_PURLEY_PRODUCTION_155_R08 
                   [PC Stitching] Update OPA UEFI driver to v1.6.0.0.0 
HSD-ES:1506124820, CCB2334 [PSIRT Factory BMC & BIOS] enabling one-time software update to any version
OSS_0007838,       [PC Stitching]Update ME SPS version to 340
HSD-ES:2103621945, [S2600BP] Windows2016 cannot be installed with SATA port5+port7 RSTe RAID0
HSD-ES:1506125508, Other PCI device's SsidSvid is 0xFFFFFFFF and is different from NIC Controller on SFP+ S2600BP board
HSD-ES:1506122324, Higher security ID from 1.05 to 1.06 because HECI PRT and Backup BIOS PRT patch
HSD-ES:1504762466, BIOS Change for #CCB 2083[Syscfg tool]Add option to configure fan pwm offset in syscfg
HSD-ES:2202640819, System will not boot to IPV4 PXE if UEFI Network Stack disabled for IPV6 PXE in BIOS
HSD-ES:1504784817, CCB2267[BMC+BIOS]Need mechanism for BMC to return MAC addresses for add-in card on demand
HSD-ES:2103622021, Toshiba THNSN5128GPU7 M.2 PCIe SSD can't detect successful under Win2016 OS.
HSD-ES:1504707008, CCB2222 [BIOS] Add Infineon FW update capability support in BIOS and UEFI application
HSD-ES:2007351694, BSOD after warm reboot if HT is enabled with Windows Server 2016 version 17663 and 17666
HSD-ES:2103621261, [S2600WF]SMBIOS Type 8 NIC number does not match motherboard number 
HSD-ES:1504713715, [CCB#2284][S2600WF&S2600BP]Fix system will hang with POST code 0x94 when one riser slot of HOST connects two WRG JBOD nodes with 32 RSSDs
HSD-ES:1406736015, BIOS does not return Type 199 records
HSD-ES:1504707003, CCB1822 Support Relax Ordering and No Snoop in BIOS setup and ITK
HSD-ES:1504749247, [S2600WF]bios_wp protection has not been enabled
HSD-ES:1504749852, CCB2249 Add SMBIOS OEM String modification capability in ITK
HSD-ES:1504771459, After clear CMOS, EWS does not display about CMOS log when boot to BIOS setup
HSD_ES:2103620812, MMIO size set to Auto/1G can't boot to BIOS with NIC Card-XL710 in Legacy mode 
HSD-ES:1504762466, BIOS Change for #CCB 2083 [Syscfg tool]Add option to configure fan pwm offset in syscfg
HSD-ES:2103616363, Inject Memory Address Parity error and no error event occurred in SEL accordingly
HSD-ES:1504630755, Change "CPU Power and Performance Policy" from "Balanced Performance" to "Performance" on the custom BIOS capsule by ITK tool, related items "C1E" can not be changed automatically.
HSD-ES:1504788000, CL541242  5386244: BaseTraceHubInitLibNull references non-existing SkylakeSiPkg
HSD-ES:1504788000, CL547293  5386319: Xeon Scalable 2933 mc transient error
HSD-ES:1504788000, CL556508  5386005: BIOS NTB PPD Option Setup is Reversed
HSD-ES:1504788000, CL558559  5386307: Some validated DIMMs have not been included in the DimmWT4 table
HSD-ES:1504788000, CL558628  5385969: Advanced Memory Test failed at MT_CPGC_READ_WRITE   
HSD-ES:1504788000, CL570837  5386628: HECI_MBAR can be reallocated by ring-0 anywhere in the address map (BIOS vulnerability)
HSD-ES:1504788000, CL569535  5386412: 2 SKT DEBUG build ASSERTs with a Security Violation
HSD-ES:1504788000, CL566239  5386475: System hangs after error injection during DIMM Address Translation
HSD-ES:1504788000, CL571328  5386488: 2006702382: NVDIMM not in memory map when NUMA is disabled
HSD-ES:1504788000, CL576560  5386813: Enable MSR_VIRTUAL_MSR_LLC_PREFETCH reconfiguration on Skylake B-step
HSD-ES:1504788000, CL579507  5386817: Add device IDs for QS/PRQ S LBG SKU
OSS_0006624:       Integration BIOS ACM to 1.3.6 and SINIT to 1.3.3
OSS_0007339:       [PC Stitching] Update ME SPS version to 333
HSD-ES:2202565747, BIOS POST messaging shows no errors when in fact a DIMM is mapped out
HSD-ES:1504788000, CL575833 5386751: Function RemovePsfAccess () is not called with SPS FW binary
HSD-ES:1504788000, CL582692 5386573: IioEarlyInit.c:IioPciePortEWL() swaps link_width and link_speed in EWL
HSD-ES:1504788000, CL558927 5386052: [220586227] Early SEC RC is not properly programming the HPET due to coding bug, causing rogue write to memory [IPS 220586227]
HSD-ES:1504788000, CL 553223 + CL556549 5386074: ACPI table will miss some core with some specific bit mask processor
HSD-ES:1504790255, Clone from 5386949 FW-UEFI-Vuln-2018-008 - "PSIRT-BIOS-2018-008 Additional protection for DCI enable"
HSD-ES:2103617388, When hotplug NVMe HDDs the RSTe GUI location couldn't match actual HDDs location
HSD-ES:1505084878, XL710 show the same boot order name in Boot management
HSD-ES:1505083003, CCB 2161 [BIOS]Support more memory vendor DIMMs -- Apacer,ATP,Hyundai,Innodisk,intelimem,V Color
HSD-ES:1505083055, CCB 2401 [BIOS] BIOS support for WFC, WFD, WFS cluster systems
HSD-ES:2103619811, [S2600BP] Boot manager still show pcie device if disable it on PCIe Port Oprom Control. -->Fix CL552580 side effect
HSD-ES:2103620496, NIC Port Mapping between Chassis and Windows Server OS are inverted on S2600BP SFP+, RJ45 and S2600WFT
OSS_0006929:       [PC Stitching] Update RSTE Drivers to v5.4.0.1039
HSD-ES:2103621959, EWS and SEL viewer shown incorrect ME version when online update ME version
HSD-ES:1504784817, CCB2267 [BMC+BIOS]Need mechanism for BMC to return MAC addresses for add-in card on demand
HSD-ES:1505330637, Add two APIs in fast video ppi and protocol
HSD-ES:2103620418, [S2600WF] After downgrade FD and ME, SUT will halt with beep code 1-5-1-2 when reboot

===============================================================================
		BMC v1.60.56383bef - (Point Release for JAVA certificate expiring)
===============================================================================
    1407264248 - [S2600BP] BMC is not reporting redundancy lost by clearing STATUS_INPUT flags from PSU
    1506122908 - [S2600WF]The AIC Product Name information returned is replaced by part MAC address of the third cards when the connected AIC Cards are greater than two.
    1506123447 - BMC User and Network setting will change to default after online update BMC to 1.59.ba077703&AC cycle
    1505567118 - [S2600BT]SSL/TLS use of weak RC4 cipher
    1505573379 - [S2600BT]Birthday attacks against TLS ciphers with 64bit block size vulnerability (Sweet32)
    1506114971 - [S2600ST] Chinese characters are not displayed properly in Event Log page while login Web in Chinese
    1506118999 - Q2'18 #CCB2434 [Purley BMC]Implement 0xD5 return code when user requests power on and system is already on
    1506119149 - Completion code for OEM get sensor reading(platform power consumption) isn't right when no ADM chipset is available.
    1506123447 - BMC User and Network setting will change to default after online update BMC to 1.59.ba077703&AC cycle
    2103620859 - [S2600BT] Media will be unmounted after boot into OS
    2103621752 - [S2600WF] Media will be unmounted after boot into OS
    2103622022 - [S2600BT] Event log page can't be read via IE browser
    2103622102 - [S2600WF] The Event Log shown abnormally on EWS after pressed NMI Button.
    2103622115 - EWS: Use firefox browser to check the system event log, all the information is unreadable code unless clearing the browser cache
    2103622127 - EWS: There is a unreadable character in the system event log
    2103622137 - EWS: When set the language to Chinese, the event log information show unreadable characters
    2103622142 - EWS: It could not establish the session to EWS after setting the https port to customized value
    2103622186 - [S2600BT] BMC can't stuck in Safe mode after execute 4 times BMC watchdog
    2103622241 - [S2600BT] HTTPS Port can't login from other values after HTTPS Port modify 8443
    2203123584 - Remote ipmitool chassis power off returns error when chassis is already off.
    2203745825 - [KVM/VM] Virtual Media redirection fails installing OS and console spews SSL errors
    1504766995 - [S2600BP LCR]Sensors are not correctly display in one cycle when run AC/DC cycle test
    2103622260 - [S2600BT] Enable Remote Debug function command response incorrect via BMC Shared LAN IP
	
=============================================================================
				FRUSDR 1.40
=============================================================================

 1504784096    - [S2600ST] No CPU1/2 Fan SDR is loaded when we select other chassis and answer yes for Is Processor
                 Fan 1 installed and Is Processor Fan 2 installed.
 1504747423    - [S2600ST]CFG and SDR files couldn't be uploaded under EWS.
 2006708385    - CIM sensor information can not be read - Certification CIM test fails.
 1504702528    - "AutoCfg Status" sensor asserted when the server board is installed in a non-Intel chassis(Lenovo)
 2103620632    - The sensor "UPI Fatal" and "BIOS Evt" are appear repeatedly in sensor list by IPMItool.



================================================================================
			SYSTEM HARDWARE & SOFTWARE REQUIREMENTS/REVISIONS
================================================================================
- S2600STB, S2600STQ baseboards only.

  System BIOS  - 00.01.0013 or later
  ME Firmware  - 04.00.04.294 or later
  BMC Firmware - 1.43.91f76955 or later
  FRUSDR       - 1.28  or later

- Front Panel, Hot-swap backplane, and Baseboard FRU data must be available
  for chassis auto-detection to succeed.

- IMPORTANT: BIOS 00.01.2001 is an earlier version than 00.01.0004 if you have 
this version please update to 00.01.0004 first, and then follow the appropiate path
to get to this release.
===============================================================================
                        KNOWN ISSUES/WORKAROUNDS/REQUIREMENTS
===============================================================================
HSD-ES 2103620418: After downgrade FD and ME, SUT will halt with beep code 1-5-1-2 when reboot. 
       Please use the following WA when online downgrading SW stacks from R010 SUP to previous SUP version: 
       Online downgrade process: flash BIOS -> flash FD -> reset SUT -> flash ME -> flash BMC -> flash FRUSDR -> AC cycle SUT -> SUT can boot up normally.

WARNING: This release has the BMC PCIe bridge disabled. This will cause the 
    majority of operating systems to fail at boot as they stall during video 
    driver initialization
    
    Steps to recover a failing operating system:
    
	Linux variants (one of the below):
        A. Ensure the "modprobe.blacklist=ast" parameter is set in your boot loader (grub)
        B. Ensure you are using a kernel version v4.10 or newer
    For Red Hat* Enterprise Linux* v7.3, please refer to the included "RHEL73_InstallationGuide_Rev1.00.pdf"
	For SUSE* Linux* Enterprise Server v12 SP1 or SP2, please refer to the included "SLES12_InstallationGuide_Rev1.00.pdf"
	
    Windows variants:
        Boot to safe mode, and load aspeed video driver v1.03 or greater and reboot
	For Windows* Server 2016, please refer to the included "WinSrv16_InstallationGuide_Rev1.00.pdf" 

=============================================================================
                            LEGAL INFORMATION
=============================================================================
Information in this document is provided in connection with Intel products. 
No license, express or implied, by estoppel or otherwise, to any intellectual 
property rights is granted by this document. Except as provided in Intel's 
Terms and Conditions of Sale for such products, Intel assumes no liability 
whatsoever, and Intel disclaims any express or implied warranty, relating to 
sale and/or use of Intel products including liability or warranties relating 
to fitness for a particular purpose, merchantability, or infringement of any 
patent, copyright or other intellectual property right. Intel Corporation may 
have patents or pending patent applications, trademarks, copyrights, or other 
intellectual property rights that relate to the presented subject matter.  
The furnishing of documents and other materials and information does not 
provide any license, express or implied, by estoppel or otherwise, to any 
such patents, trademarks, copyrights, or other intellectual property rights.  
Intel products are not intended for use in medical, life saving, or life 
sustaining applications. Intel may make changes to specifications and product 
descriptions at any time, without notice.

Intel is a registered trademark of Intel Corporation. 
*Other names and brands are the property of their respective owners.
Copyright (c) 2018 Intel Corporation.

A portion of this firmware is open source code, which falls under the
GPL 2.0 license.