================================================================================ Intel(R) Server Board S2600ST Family for Intel(R) Deployment Assistant, Intel(R) One Boot Flash Update Utility, Windows* Preboot Execution Environment ================================================================================ Intel(R) Server Boards and Systems Intel Corporation 2111 N.E. 25th Avenue, Hillsboro, OR 97124 USA ================================================================================ DATE : Oct 19, 2018 TO : Intel(R) Server Board S2600ST Family SUBJECT : Release Notes for System Firmware Update Package ================================================================================ ABOUT THIS RELEASE ================================================================================ BIOS : 00.01.0014 ME : 04.00.04.340 BMC : 1.60.56383bef FRUSDR : 1.40 ================================================================================ Support Platforms and Dependency ================================================================================ Processors supported: Intel(R) Xeon(R) Scalable processors Microcode versions: CPUID Version Status 0x50653 0x01000144 (Xeon Scalable B1) 0x50654 0x0200004D (Xeon Scalable H0) The following update process must be followed to ensure a trouble free update. 1. BMC firmware 2. BIOS 3. Manageability Engine (ME) firmware 4. FD 5. FRUSDR ================================================================================ IMPORTANT NOTE!!! ================================================================================ - This Update package must be installed using Intel(R) One-boot Flash Update (OFU) V14.1 Build 14 or later 1. Package C-State only works well with Xeon Scalable Family H0 parts, for other Xeon Scalable Family stepping, C6 non-retention is hardcode from BIOS side. 2. BIOS R00.01.0001 does not support online downgrade to any Dxxx or Xxxx BIOS. 3. BIOS R00.01.0001 removed Xeon Scalable Family A1 microcode(m1350651_8000002B) and Xeon Scalable Family B0 microcode(m9750652_80000035). 4. Removed 'UpdateNvram' support for iflash32 tool for security reason of SRA bios. 5. Security revision upgrade to v0002 on BIOS R00.01.0002 will prevent BIOS downgrade via normal mode to R00.01.0001, user can use BIOS recovery mode for BIOS downgrade. Although Intel doesn't recommend downgrading firmware 6. One new production key is integrated onto R0004 BIOS, which will correct an OEM string. 7. This release include security revision upgrade to version 0004. This will prevent BIOS downgrade via normal mode to previous version with lower security revision, user can use BIOS recovery mode process for BIOS downgrade. 8. System will prevent downgrading ME from 04.00.04.288 to 04.00.04.235 or older version, if system BIOS version is R0009. This is an expected behavior. 9. Security revision upgrade to 0005 since BIOS R010, it will prevent BIOS downgrade via normal mode to previous version that with lower security revision, user can use BIOS recovery mode for BIOS downgrade. 10. Downgrading below 1.43.660a4315 is not supported due to a security revision change. ================================================================================ System Firmware Update Package Usage instructions ================================================================================ This package can be updated using one of the following methods: - Windows* or Linux* operating system using Intel(R) One-boot Flash Update (OFU) V14.1 Build 14 or later) - Windows* Preboot Execution Environment (WinPE) To update from Windows* and Linux* or operating systems using the Intel(R) One Boot Flash Update Utility (OFU) Intel(R) One boot Flash Update utility can be downloaded from http://downloadcenter.intel.com/ and it is part of the "BIOS, Firmware Update & Configuration Utilities" for Windows* and Linux*. Please refer to Intel(R) OFU user guide about the details of installation and usage of OFU. Use OFU to update system firmware by the following steps: - Install OFU on Windows* or Linux* system - Download the latest firmware update package from http://downloadcenter.intel.com/ - Unzip package to a folder - Run the following command in Windows* command line/Linux* terminal window: :\flashupdt -u \flashupdt.cfg To update from Windows* Preboot Execution Environment (WinPE) The System Firmware Update Package can be inserted to Windows* PE customized image for creating a bootable Windows* PE CD. User is able to update system firmware from customized WinPE CD by the following steps: - Boot server with customized WinPE CD - Run script "WinPE_x64_Update.bat" (name may be varied depends on your own customization) Note: 1. The Intel(R) OFU utility is case sensitive. Therefore, when you transfer the Firmware Update Package using USB flash drive from a Microsoft Windows* system to a Linux environment, you must first extract under the Linux* environment. Otherwise, you will need to mount the USB flash drive manually with 'vfat' option under Linux to avoid conversion from upper case to lower case and vice versa. 2. To make Intel(R) OFU utility run properly under x64 OS, you have to read OFU release notes on known issues for OFU installation. 3. In this SFUP package, Intel only provide batch file "WinPE_x64_Update.bat" for WinPE2.1/3.0 64 bit solution as an example. Please refer to white paper "White Paper-Intel Server Utilities Procedure for WinPE.pdf" for details on building your own customized WinPE CD. 4. Windows PE 2.0 - built from Windows Vista SP1 EM64T 5. Windows PE 2.1 - built from Windows Vista SP1 or Windows Server 2008, EM64T 6. Windows PE 3.1 - built from Windows Server 2008 R2, EM64T 7. Microsoft IPMI driver is loaded by default from WinPE CD, if you want to use Intel IPMI driver instead of MS IPMI driver for firmware update, you can un-install Microsoft IPMI driver by: Devicesetup.exe ¨Cv remove *IPI0001 Note: IPI0001 is the device ID for Microsoft IPMI driver. ================================================================================ BIOS R00.01.0014(This release) ================================================================================ Rename BIOS ID from X0149 to R0014. HSD-ES:1605354891, TPM Update fail on S2600ST and S2600WF OSS_0008036: Update Microcode 0x4d for Xeon Scalable H0 and 0x144 for Xeon Scalable B1 Reference code version: 20180612_CP_PURLEY_PRODUCTION_155_R08 [PC Stitching] Update OPA UEFI driver to v1.6.0.0.0 HSD-ES:1506124820, CCB2334 [PSIRT Factory BMC & BIOS] enabling one-time software update to any version OSS_0007838, [PC Stitching]Update ME SPS version to 340 HSD-ES:2103621945, [S2600BP] Windows2016 cannot be installed with SATA port5+port7 RSTe RAID0 HSD-ES:1506125508, Other PCI device's SsidSvid is 0xFFFFFFFF and is different from NIC Controller on SFP+ S2600BP board HSD-ES:1506122324, Higher security ID from 1.05 to 1.06 because HECI PRT and Backup BIOS PRT patch HSD-ES:1504762466, BIOS Change for #CCB 2083[Syscfg tool]Add option to configure fan pwm offset in syscfg HSD-ES:2202640819, System will not boot to IPV4 PXE if UEFI Network Stack disabled for IPV6 PXE in BIOS HSD-ES:1504784817, CCB2267[BMC+BIOS]Need mechanism for BMC to return MAC addresses for add-in card on demand HSD-ES:2103622021, Toshiba THNSN5128GPU7 M.2 PCIe SSD can't detect successful under Win2016 OS. HSD-ES:1504707008, CCB2222 [BIOS] Add Infineon FW update capability support in BIOS and UEFI application HSD-ES:2007351694, BSOD after warm reboot if HT is enabled with Windows Server 2016 version 17663 and 17666 HSD-ES:2103621261, [S2600WF]SMBIOS Type 8 NIC number does not match motherboard number HSD-ES:1504713715, [CCB#2284][S2600WF&S2600BP]Fix system will hang with POST code 0x94 when one riser slot of HOST connects two WRG JBOD nodes with 32 RSSDs HSD-ES:1406736015, BIOS does not return Type 199 records HSD-ES:1504707003, CCB1822 Support Relax Ordering and No Snoop in BIOS setup and ITK HSD-ES:1504749247, [S2600WF]bios_wp protection has not been enabled HSD-ES:1504749852, CCB2249 Add SMBIOS OEM String modification capability in ITK HSD-ES:1504771459, After clear CMOS, EWS does not display about CMOS log when boot to BIOS setup HSD_ES:2103620812, MMIO size set to Auto/1G can't boot to BIOS with NIC Card-XL710 in Legacy mode HSD-ES:1504762466, BIOS Change for #CCB 2083 [Syscfg tool]Add option to configure fan pwm offset in syscfg HSD-ES:2103616363, Inject Memory Address Parity error and no error event occurred in SEL accordingly HSD-ES:1504630755, Change "CPU Power and Performance Policy" from "Balanced Performance" to "Performance" on the custom BIOS capsule by ITK tool, related items "C1E" can not be changed automatically. HSD-ES:1504788000, CL541242 5386244: BaseTraceHubInitLibNull references non-existing SkylakeSiPkg HSD-ES:1504788000, CL547293 5386319: Xeon Scalable 2933 mc transient error HSD-ES:1504788000, CL556508 5386005: BIOS NTB PPD Option Setup is Reversed HSD-ES:1504788000, CL558559 5386307: Some validated DIMMs have not been included in the DimmWT4 table HSD-ES:1504788000, CL558628 5385969: Advanced Memory Test failed at MT_CPGC_READ_WRITE HSD-ES:1504788000, CL570837 5386628: HECI_MBAR can be reallocated by ring-0 anywhere in the address map (BIOS vulnerability) HSD-ES:1504788000, CL569535 5386412: 2 SKT DEBUG build ASSERTs with a Security Violation HSD-ES:1504788000, CL566239 5386475: System hangs after error injection during DIMM Address Translation HSD-ES:1504788000, CL571328 5386488: 2006702382: NVDIMM not in memory map when NUMA is disabled HSD-ES:1504788000, CL576560 5386813: Enable MSR_VIRTUAL_MSR_LLC_PREFETCH reconfiguration on Skylake B-step HSD-ES:1504788000, CL579507 5386817: Add device IDs for QS/PRQ S LBG SKU OSS_0006624: Integration BIOS ACM to 1.3.6 and SINIT to 1.3.3 OSS_0007339: [PC Stitching] Update ME SPS version to 333 HSD-ES:2202565747, BIOS POST messaging shows no errors when in fact a DIMM is mapped out HSD-ES:1504788000, CL575833 5386751: Function RemovePsfAccess () is not called with SPS FW binary HSD-ES:1504788000, CL582692 5386573: IioEarlyInit.c:IioPciePortEWL() swaps link_width and link_speed in EWL HSD-ES:1504788000, CL558927 5386052: [220586227] Early SEC RC is not properly programming the HPET due to coding bug, causing rogue write to memory [IPS 220586227] HSD-ES:1504788000, CL 553223 + CL556549 5386074: ACPI table will miss some core with some specific bit mask processor HSD-ES:1504790255, Clone from 5386949 FW-UEFI-Vuln-2018-008 - "PSIRT-BIOS-2018-008 Additional protection for DCI enable" HSD-ES:2103617388, When hotplug NVMe HDDs the RSTe GUI location couldn't match actual HDDs location HSD-ES:1505084878, XL710 show the same boot order name in Boot management HSD-ES:1505083003, CCB 2161 [BIOS]Support more memory vendor DIMMs -- Apacer,ATP,Hyundai,Innodisk,intelimem,V Color HSD-ES:1505083055, CCB 2401 [BIOS] BIOS support for WFC, WFD, WFS cluster systems HSD-ES:2103619811, [S2600BP] Boot manager still show pcie device if disable it on PCIe Port Oprom Control. -->Fix CL552580 side effect HSD-ES:2103620496, NIC Port Mapping between Chassis and Windows Server OS are inverted on S2600BP SFP+, RJ45 and S2600WFT OSS_0006929: [PC Stitching] Update RSTE Drivers to v5.4.0.1039 HSD-ES:2103621959, EWS and SEL viewer shown incorrect ME version when online update ME version HSD-ES:1504784817, CCB2267 [BMC+BIOS]Need mechanism for BMC to return MAC addresses for add-in card on demand HSD-ES:1505330637, Add two APIs in fast video ppi and protocol HSD-ES:2103620418, [S2600WF] After downgrade FD and ME, SUT will halt with beep code 1-5-1-2 when reboot =============================================================================== BMC v1.60.56383bef - (Point Release for JAVA certificate expiring) =============================================================================== 1407264248 - [S2600BP] BMC is not reporting redundancy lost by clearing STATUS_INPUT flags from PSU 1506122908 - [S2600WF]The AIC Product Name information returned is replaced by part MAC address of the third cards when the connected AIC Cards are greater than two. 1506123447 - BMC User and Network setting will change to default after online update BMC to 1.59.ba077703&AC cycle 1505567118 - [S2600BT]SSL/TLS use of weak RC4 cipher 1505573379 - [S2600BT]Birthday attacks against TLS ciphers with 64bit block size vulnerability (Sweet32) 1506114971 - [S2600ST] Chinese characters are not displayed properly in Event Log page while login Web in Chinese 1506118999 - Q2'18 #CCB2434 [Purley BMC]Implement 0xD5 return code when user requests power on and system is already on 1506119149 - Completion code for OEM get sensor reading(platform power consumption) isn't right when no ADM chipset is available. 1506123447 - BMC User and Network setting will change to default after online update BMC to 1.59.ba077703&AC cycle 2103620859 - [S2600BT] Media will be unmounted after boot into OS 2103621752 - [S2600WF] Media will be unmounted after boot into OS 2103622022 - [S2600BT] Event log page can't be read via IE browser 2103622102 - [S2600WF] The Event Log shown abnormally on EWS after pressed NMI Button. 2103622115 - EWS: Use firefox browser to check the system event log, all the information is unreadable code unless clearing the browser cache 2103622127 - EWS: There is a unreadable character in the system event log 2103622137 - EWS: When set the language to Chinese, the event log information show unreadable characters 2103622142 - EWS: It could not establish the session to EWS after setting the https port to customized value 2103622186 - [S2600BT] BMC can't stuck in Safe mode after execute 4 times BMC watchdog 2103622241 - [S2600BT] HTTPS Port can't login from other values after HTTPS Port modify 8443 2203123584 - Remote ipmitool chassis power off returns error when chassis is already off. 2203745825 - [KVM/VM] Virtual Media redirection fails installing OS and console spews SSL errors 1504766995 - [S2600BP LCR]Sensors are not correctly display in one cycle when run AC/DC cycle test 2103622260 - [S2600BT] Enable Remote Debug function command response incorrect via BMC Shared LAN IP ============================================================================= FRUSDR 1.40 ============================================================================= 1504784096 - [S2600ST] No CPU1/2 Fan SDR is loaded when we select other chassis and answer yes for Is Processor Fan 1 installed and Is Processor Fan 2 installed. 1504747423 - [S2600ST]CFG and SDR files couldn't be uploaded under EWS. 2006708385 - CIM sensor information can not be read - Certification CIM test fails. 1504702528 - "AutoCfg Status" sensor asserted when the server board is installed in a non-Intel chassis(Lenovo) 2103620632 - The sensor "UPI Fatal" and "BIOS Evt" are appear repeatedly in sensor list by IPMItool. ================================================================================ SYSTEM HARDWARE & SOFTWARE REQUIREMENTS/REVISIONS ================================================================================ - S2600STB, S2600STQ baseboards only. System BIOS - 00.01.0013 or later ME Firmware - 04.00.04.294 or later BMC Firmware - 1.43.91f76955 or later FRUSDR - 1.28 or later - Front Panel, Hot-swap backplane, and Baseboard FRU data must be available for chassis auto-detection to succeed. - IMPORTANT: BIOS 00.01.2001 is an earlier version than 00.01.0004 if you have this version please update to 00.01.0004 first, and then follow the appropiate path to get to this release. =============================================================================== KNOWN ISSUES/WORKAROUNDS/REQUIREMENTS =============================================================================== HSD-ES 2103620418: After downgrade FD and ME, SUT will halt with beep code 1-5-1-2 when reboot. Please use the following WA when online downgrading SW stacks from R010 SUP to previous SUP version: Online downgrade process: flash BIOS -> flash FD -> reset SUT -> flash ME -> flash BMC -> flash FRUSDR -> AC cycle SUT -> SUT can boot up normally. WARNING: This release has the BMC PCIe bridge disabled. This will cause the majority of operating systems to fail at boot as they stall during video driver initialization Steps to recover a failing operating system: Linux variants (one of the below): A. Ensure the "modprobe.blacklist=ast" parameter is set in your boot loader (grub) B. Ensure you are using a kernel version v4.10 or newer For Red Hat* Enterprise Linux* v7.3, please refer to the included "RHEL73_InstallationGuide_Rev1.00.pdf" For SUSE* Linux* Enterprise Server v12 SP1 or SP2, please refer to the included "SLES12_InstallationGuide_Rev1.00.pdf" Windows variants: Boot to safe mode, and load aspeed video driver v1.03 or greater and reboot For Windows* Server 2016, please refer to the included "WinSrv16_InstallationGuide_Rev1.00.pdf" ============================================================================= LEGAL INFORMATION ============================================================================= Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel's Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the presented subject matter. The furnishing of documents and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any such patents, trademarks, copyrights, or other intellectual property rights. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Intel is a registered trademark of Intel Corporation. *Other names and brands are the property of their respective owners. Copyright (c) 2018 Intel Corporation. A portion of this firmware is open source code, which falls under the GPL 2.0 license.