================================================================================
Intel(R) Server Board S2600BP and Intel(R) HNS2600BP Product Family
Firmware Update Package for Intel(R) One Boot Flash Update Utility and
Windows* Preboot Execution Environment 
================================================================================
Intel(R) Server Boards and Systems
Intel Corporation
2111 N.E. 25th Avenue, Hillsboro, OR 97124 USA
================================================================================
DATE    : 	February 26, 2019
TO      : 	Intel(R) Server Board S2600BP Product Family
			Intel(R) Compute Module HNS2600BP Product Family             
SUBJECT : Release Notes for System Firmware Update Package 
================================================================================
                              ABOUT THIS RELEASE
================================================================================
BIOS   : 00.01.0016
ME     : 04.00.04.393
BMC    : 1.90.0cf6e935
FRUSDR : 1.39
================================================================================
                           Support Platforms and Dependency
================================================================================
Processors supported: 
Intel(R) Xeon(R) Scalable processors

Microcode versions:
        CPUID           Version       Status
        0x50653        0x01000146     (Xeon Scalable B1)
        0x50654        0x02000050     (Xeon Scalable H0)
 
The following update process must be followed to ensure a trouble free update.
1.	BMC firmware
2.	BIOS
3.	Manageability Engine (ME) firmware
4. 	FD
5.	FRUSDR

================================================================================
                             IMPORTANT NOTE!!!                   
================================================================================
 - Cipher Suite 3 is disabled by default since BMC firmware 1.90 and only keep Cipher Suite 17 opened by default.
   Due to this the extra parameter "-C 17" is required for ipmitool to work via LAN.
   The Cipher Suite 17 was first introduced in ipmitool 1.8.18 on Oct 8th 2016, 
   you have to update ipmitool to this version or newer one, earlier versions of ipmitool don't have Cipher 17 support
   ipmitool is not working well when running in high load network. We recommend to add extra timeout by using "-N 5" 
   Default is 1 second for RMCP+, which is not enough. "-N 5" will set 5 second as timeout.
   So the command will look like:
   ipmitool -I lanplus -H ip -U user -P password -C 17 -N 5 command
   Please refer to the included "TA-1143_Extra_parameters_needed_for_ipmitool.pdf"

 - This Update package must be installed using 
   Intel(R) One-boot Flash Update (OFU) V14.1 Build 19 or later
   
1. Package C-State only works well with Xeon Scalable Family H0 parts, for other Xeon Scalable Family stepping, C6 non-retention is hardcode from BIOS side.
2. BIOS R00.01.0001 does not support online downgrade to any Dxxx or Xxxx BIOS.
3. BIOS R00.01.0001 removed Xeon Scalable Family A1 microcode(m1350651_8000002B) and Xeon Scalable Family B0 microcode(m9750652_80000035).
4. Removed 'UpdateNvram' support for iflash32 tool for security reason of SRA bios.
5. Security revision upgrade to v0002 on BIOS R00.01.0002 will prevent BIOS downgrade via normal mode to R00.01.0001, user can use BIOS recovery mode for BIOS downgrade. Although Intel doesn't recommend downgrading firmware
6. One new production key is integrated onto R0004 BIOS, which will correct an OEM string. 
7. This release include security revision upgrade to version 0004. This will prevent BIOS downgrade via normal mode to previous version with lower security revision, user can use BIOS recovery mode process for BIOS downgrade.
8. System will prevent downgrading ME from 04.00.04.288 to 04.00.04.235 or older version, if system BIOS version is R0009. This is an expected behavior. 
9. Security revision upgrade to 0005 since BIOS R010, it will prevent BIOS downgrade via normal mode to previous version that with lower security revision, user can use BIOS recovery mode for BIOS downgrade.
10. Downgrading below 1.43.660a4315 is not supported due to a security revision change.
11. Security revision upgrade to 0006 on BIOS R0014, it will prevent BIOS downgrade via normal mode to previous version that with lower security revision, user can use BIOS recovery mode for BIOS downgrade.
================================================================================
                  System Firmware Update Package Usage instructions                   
================================================================================
This package can be updated using one of the following methods:
 - Windows* or Linux* operating system using Intel(R) One-boot Flash Update (OFU)
   V14.1 Build 19 or later)
 - Windows* Preboot Execution Environment (WinPE)

To update from Windows* and Linux* or operating systems using the Intel(R) One Boot
Flash Update Utility (OFU)

Intel(R) One boot Flash Update utility can be downloaded from http://downloadcenter.intel.com/
and it is part of the "BIOS, Firmware Update & Configuration Utilities" for 
Windows* and Linux*. Please refer to Intel(R) OFU user guide about the details of 
installation and usage of OFU.

Use OFU to update system firmware by the following steps:
- Install OFU on Windows* or Linux* system
- Download the latest firmware update package from http://downloadcenter.intel.com/
- Unzip package to a folder
- Run the following command in Windows* command line/Linux* terminal window:
  <OFU install folder name>:\flashupdt -u  <package folder name>\flashupdt.cfg
                       
To update from Windows* Preboot Execution Environment (WinPE)

The System Firmware Update Package can be inserted to Windows* PE customized image 
for creating a bootable Windows* PE CD. User is able to update system firmware from 
customized WinPE CD by the following steps:
- Boot server with customized WinPE CD
- Run script "WinPE_x64_Update.bat"
  (name may be varied depends on your own customization)
  
Note:
1. The Intel(R) OFU utility is case sensitive. Therefore, when you transfer the 
Firmware Update Package using USB flash drive from a Microsoft Windows* system to a Linux
environment, you must first extract under the Linux* environment. Otherwise, you 
will need to mount the USB flash drive manually with 'vfat' option under Linux to avoid 
conversion from upper case to lower case and vice versa.

2. To make Intel(R) OFU utility run properly under x64 OS, you have to read
OFU release notes on known issues for OFU installation.

3. In this SFUP package, Intel only provide batch file "WinPE_x64_Update.bat" 
for WinPE2.1/3.0 64 bit solution as an example. Please refer to white paper 
"White Paper-Intel Server Utilities Procedure for WinPE.pdf" for details on 
building your own customized WinPE CD.

4. Windows PE 2.0 - built from Windows Vista SP1 EM64T
5. Windows PE 2.1 - built from Windows Vista SP1 or Windows Server 2008, EM64T
6. Windows PE 3.1 - built from Windows Server 2008 R2, EM64T
7. Microsoft IPMI driver is loaded by default from WinPE CD, if you want to use 
Intel IPMI driver instead of MS IPMI driver for firmware update, you can un-install
Microsoft IPMI driver by:
                Devicesetup.exe -v remove *IPI0001
                Note: IPI0001 is the device ID for Microsoft IPMI driver.

================================================================================
                         BIOS R00.01.0016 (This release)
================================================================================
Rename BIOS ID from X0191 to R0016
HSD-ES:2103625314, The copyright should be Copyright (c) 2006-2019 instead of Copyright(c) 2006-2018.
HSD-ES:1506731732, [S2600BP][Q2] SEL error during AC cycling: IPMI Watchdog reports the watchdog initiated a hard reset. 
HSD-ES:2103624878, With AIC Card populated in RJ45 MB, return data "CB" when execute "Get AIC MAC address".
HSD-ES:2103624556, Setting IPv6 address will display unexpected messages after enable/disable it.
HSD-ES:1606884710, [Intel Xeon Scalable]System hang up when press F9/F10 to load BIOS default after delete EM_Configuration value.
HSD-ES:1506131214, Q3'18 #CCB2343[Intel Xeon Scalable] Add BIOS options in ITK to change USB 2.0 ports equalization parameters.
HSD-ES:1504750181, SMBIOS type 9 segment group number should be all 0.
HSD-ES:2103624586, [S2600BP]OPROM and DOS screen cannot be redirected to remote terminal with CR 100x31 - Serial Port A Baud Rate 115.2K RTS-CTS mode.
HSD-ES:2103624653, SUT will halt on post code 0xD4 when injection MBE after reboot the system.
HSD-ES:1506980475, [server_bios][Intel Xeon Scalable]A coding error in IPMI KCS driver.
HSD-ES:2205485105, [PSAV] Flash illegal opcodes not Configured.
HSD-ES:1506766438, [OOB Firmware Update]OOB image update SEL sensor name and Description is unexpected while input wrong BIOS password.
HSD-ES:2103623988, [OOB BIOS CONFIGURATION]BIOS config cannot be updated via OOB method under Power on status.
HSD-ES:1506949739, [Intel Xeon Scalable][Add BIOS option [DMI-PCIe Port MPSWorkaround] to set PCIe max packet size to 128 bytes on DMI as PCIe slot port.
HSD-ES:1506875497, [Intel Xeon Scalable]System MAC address and IP is zero from Redfish.
HSD-ES:1506940429, Intel Xeon Scalable R15 BIOS CCB2343 port 12 implementation lacks of one ITK option [USB2.0 Per Port HS Transmitter Emphasis] compared to original CCB requirement. 
HSD-ES:1504750181, SMBIOS type 9 segment group number should be all 0.
HSD-ES:2103624203, Without AIC Card populated, return data contains onboard NIC info when execute  "Get AIC MAC address".
HSD-ES:1506861772, NVME UEFI driver should wait for  the correct timeout time as programmed in NVME card's timeout value from NVME spec.
HSD-ES:1504683590, Clone from HSD - Security VT - IIO UEFI FW shall delay PCI Bus Master Enable (PCICMD.BME) until end of POST to prevent DMA attacks on UEFI FW in RAM.
OSS_9231:[PC_Stitching]Integration for ME 4.0.4.393.0
HSD-ES:1506871190, syscfg /bldfs "" not working the same way an F9 in the BIOS setup does.
HSD-ES:2204077884, S2600WF server SUP R0013 hangs on first boot after memory configuration changed. 
HSD-ES:2103624158, OS CERT - Win2019- Check SMBIOS Table Specific Requirements test failed.
OSS_9371:[PC_Stitching]:Update RSTeSataEfi version to 5.5.0.1028
OSS_7213:Integration add Xeon Scalable B1 01000146
OSS_7215:Integration add Xeon Scalable H0 02000050
OSS_7021:Integration add BIOS ACM 1.3.9
OSS_7022:Integration add BIOS SINIT 1.3.6
HSD-ES:2103622487, 1st boot to DVD drive w/ ESXi6.7 disc will show "Boot failed" msg under uEFI mode.
HSD-ES:1504400810, Some information incomplete display at the bottom of BIOS setup main page by sol in linux.
HSD-ES:1505083118, Q2'18 #CCB2398 [Intel Xeon Scalable BIOS] Allow all SMBIOS extensions as defined by RSD extensions to be supported by default.
HSD-ES:1506657447, PC RAS - NMI was triggered for Memory uncorrectable error.
HSD-ES:2103623845, There are two WHEA ID 22 event after inject MBE on windows.
HSD-ES:1506755655, [OOB BIOS Configuration]EWS show some variables when SUT without install related device.mismatch bios setup that can't find related variables
HSD-ES:1506744997, [OOB BIOS Configuration]Some variables can find in BIOS setup but can't find in EWS
HSD-ES:1506757895, [OOB Firmware Update] The sensor name format about BIOS image update  SEL  is unexpected
HSD-ES:1506731999, [OOB]there is no warning message in sel log when update corrupt BIOS via OOB FW update
HSD-ES:1506780000, [Intel Xeon Scalable] There is a coding style issue with CL528438 ----[1504579741] Q3'17 #CCB 2030: [Intel Xeon Scalable BIOS/Azure Stack] Enable/disable individual NIC ports.
HSD-ES:2103623558, [Intel Xeon Scalable] 0x8461 SEL log not generate when remove power cord to terminate backup bios update.    
===============================================================================
		BMC v1.90.0cf6e935 - (This release)
===============================================================================
    1506985125 - BMC slow response and EWS can't login during DC/reset cycle test.
    1507018625 - Fan 6 Present show unknown from EWS and disabled from ipmitool sensor list.
    1306124875 - [S2600BP and S2600ST] BMC EWS can not login.
    1504691171 - [S2600BP LCR]BIOS/System Management Software controller time are not synchronous with BMC time in EWS event log
    1506999387 - DNS setting can't be changed
    1606903509 - FRUSDR update via EWS failing on one system with AIC cards for BMC 1.88a (1.88.2d047b47)
    2103624411 - [S2600ST_OOB BIOS Configuration] BIOS Variable Value cannot be changed Via EWS OOB BIOS configuration
    2206618701 - login to EWS and observe the Configuration->SDR Configuration the Processed Tags Copyright (c) 2018 messages should be 2019
    2202811235 - [S2600BP] [Q4] BMC reports PSU AC input lost and later regained
    2103624862 - VLAN channel shows "Unknow" when login EWS with operator privilege.
    1506761317 - [S2600BP LCR]Sel log appear Power Unit Failure detected - Power supply failure detected - Asserted during AC cycles.
    1506956417 - FRB2 WDT handling on BMC FW(1): BMC does not respond to FRB2 mailbox bit in time.
    1506983635 - [S2600BP LCR]SUT can't auto power on during the DC cycling and  it cannot auto power on in the next cycle.
    1606876077 - FRB2 WDT handling on BMC FW (2): Disabled FRB2 WDT when received GPIO from BIOS.
    2103625010 - Connect the "PWRGD_PVDDQ_CPU0_ABC_R"  or "PWRGD_PVDDQ_CPU1_ABC_R" signal to the ground, it could not generate the 1-5-1-2 beep code
    2206474697 - S2600WF SUT,  with DDR4s in a 1DPC mirror, configuration, injecting a mirror failover, causes an incorrect DDR4 slot indication in the SEL log.
    2103624841 - Spell error in keyboard Macro when KVM over HTML5 in EWS.
    1506132909 - [S2600BP LCR]BB CPU1 VR Temp /BB CPU2 VR Temp sensors show no reading when run AC cycles and can't recovery within 300s
    1506132916 - [S2600BP LCR]Mem 1VRD Tem/Mem 2 VRD Temp sensors  show no reading when run AC cycles and can't recovery within 300s
    1506769587 - PS1 Curr Out %/PS2 Curr Out %/PS1 Temperature/PS2 Temperature/PS1 Input Power/PS2 Input Power no reading during  AC test and can't recovery within 300s.
    2206474488 - [BMC CTF]  BootFlagCmds BootSetOptions Buffer Overflow on the heap
    2206474502 - [BMC CTF]   memory corruption in Redfish parse URL
    2206474881 - [BMC CTF] Hidden NM configurations can be added that are not visible from WebUI list
    2103624450 - The login screen of EWS page shown abnormal with OEM customized image
    2103624715 - No warning message displayed after opening 5th EWS sessions.
    2103624749 - No warning message displayed after opening 5th EWS session.
    2206192060 - [PS - Scandium] Debuglog command fails with PS Script 2.09
================================================================================
				FRUSDR 1.39
================================================================================    
-1506769657 Sel log appear "Cooling Device Sys Pump 2 | Lower Non-critical going low | Asserted" during AC cycles 
================================================================================

================================================================================
			SYSTEM HARDWARE & SOFTWARE REQUIREMENTS/REVISIONS
================================================================================
- S2600BPB, S2600BPQ, S2600BPS, S2600BPL baseboards only.

  System BIOS  - 00.01.0015 or later
  ME Firmware  - 04.00.04.340 or later
  BMC Firmware - 1.74.ee39402a or later
  FRUSDR       - 1.38  or later

- Front Panel, Hot-swap backplane, and Baseboard FRU data must be available
  for chassis auto-detection to succeed.

- IMPORTANT: BIOS 00.01.2001 is an earlier version than 00.01.0004 if you have 
this version please update to 00.01.0004 first, and then follow the appropiate path
to get to this release.
===============================================================================
                        KNOWN ISSUES/WORKAROUNDS/REQUIREMENTS
===============================================================================
HSD-ES 2103620418: After downgrade FD and ME, SUT will halt with beep code 1-5-1-2 when reboot. 
       Please use the following WA when online downgrading SW stacks from R010 SUP to previous SUP version: 
       Online downgrade process: flash BIOS -> flash FD -> reset SUT -> flash ME -> flash BMC -> flash FRUSDR -> AC cycle SUT -> SUT can boot up normally.

WARNING: This release has the BMC PCIe bridge disabled. This will cause the 
    majority of operating systems to fail at boot as they stall during video 
    driver initialization
    
    Steps to recover a failing operating system:
    
	Linux variants (one of the below):
        A. Ensure the "modprobe.blacklist=ast" parameter is set in your boot loader (grub)
        B. Ensure you are using a kernel version v4.10 or newer
    For Red Hat* Enterprise Linux* v7.3, please refer to the included "RHEL73_InstallationGuide_Rev1.00.pdf"
	For SUSE* Linux* Enterprise Server v12 SP1 or SP2, please refer to the included "SLES12_InstallationGuide_Rev1.00.pdf"
	
    Windows variants:
        Boot to safe mode, and load aspeed video driver v1.03 or greater and reboot
	For Windows* Server 2016, please refer to the included "WinSrv16_InstallationGuide_Rev1.00.pdf" 
	
=============================================================================
                            LEGAL INFORMATION
=============================================================================
Information in this document is provided in connection with Intel products. 
No license, express or implied, by estoppel or otherwise, to any intellectual 
property rights is granted by this document. Except as provided in Intel's 
Terms and Conditions of Sale for such products, Intel assumes no liability 
whatsoever, and Intel disclaims any express or implied warranty, relating to 
sale and/or use of Intel products including liability or warranties relating 
to fitness for a particular purpose, merchantability, or infringement of any 
patent, copyright or other intellectual property right. Intel Corporation may 
have patents or pending patent applications, trademarks, copyrights, or other 
intellectual property rights that relate to the presented subject matter.  
The furnishing of documents and other materials and information does not 
provide any license, express or implied, by estoppel or otherwise, to any 
such patents, trademarks, copyrights, or other intellectual property rights.  
Intel products are not intended for use in medical, life saving, or life 
sustaining applications. Intel may make changes to specifications and product 
descriptions at any time, without notice.

Intel is a registered trademark of Intel Corporation. 
*Other names and brands are the property of their respective owners.
Copyright (c) 2019 Intel Corporation.

A portion of this firmware is open source code, which falls under the
GPL 2.0 license.