================================================================================
Multi-Core Intel(R) Xeon(R) Processor-Based Server BIOS Development
================================================================================

INTEL Product Collaboration and Systems Division
Intel Corporation
2111 N.E. 25th Avenue, Hillsboro, OR 97124 USA

================================================================================

DATE    : Sep 05, 2014
TO      : Multi-Core Intel(R) Xeon(R) Processor-Based Server Platform customers
SUBJECT : BIOS Release notes for version R01.01.0003

================================================================================
                           LEGAL INFORMATION
================================================================================

INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO 
LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL 
PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS 
AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER 
AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE 
OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A 
PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR 
OTHER INTELLECTUAL PROPERTY RIGHT. 

A "Mission Critical Application" is any application in which failure of the Intel 
Product could result, directly or indirectly, in personal injury or death. SHOULD 
YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION, 
YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND 
AFFILIATES, AND THE DIRECTORS, OFFICERS, AND EMPLOYEES OF EACH, HARMLESS AGAINST 
ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE ATTORNEYS' FEES ARISING OUT 
OF, DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR 
DEATH ARISING IN ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION, WHETHER OR NOT 
INTEL OR ITS SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF 
THE INTEL PRODUCT OR ANY OF ITS PARTS. 

Intel may make changes to specifications and product descriptions at any time, 
without notice. Designers must not rely on the absence or characteristics of any 
features or instructions marked "reserved" or "undefined". Intel reserves these for 
future definition and shall have no responsibility whatsoever for conflicts or 
incompatibilities arising from future changes to them. The information here is 
subject to change without notice. Do not finalize a design with this information. 

The products described in this document may contain design defects or errors known 
as errata which may cause the product to deviate from published specifications. 
Current characterized errata are available on request. 

Contact your local Intel sales office or your distributor to obtain the latest 
specifications and before placing your product order. 

Copies of documents which have an order number and are referenced in this document, 
or other Intel literature, may be obtained by calling 1-800-548-4725, 
or go to: http://www.intel.com/design/literature.htm

Intel is a registered trademark of Intel Corporation. 

*Other names and brands are the property of their respective owners.

Copyright (C) 2014 Intel Corporation.

================================================================================
                              ABOUT THIS RELEASE
================================================================================
Build Stamp : SE5C610.86B.01.01.0003
Build Date  : Sep 05 2014

================================================================================
                           Supported Platforms
================================================================================        
        S2600WT
        S2600KP
        S2600CW
================================================================================
                           BIOS COMPONENTS/CONTENTS
================================================================================
Processors supported: 
Intel(R) Xeon processor E5-2600 v3 series

Microcode update versions:
Intel(R) Xeon processor E5-2600 V3 series C1 stepping: 0x00000023 CPUID = 0x306f2

On-Board Component Option ROM Versions:
all_gigabit_pxe_v1.5.48.LOM - 1G PXE OpROM v1.5.48
all_10g_pxe_v2.3.17.LOM     - 10G PXE OpROM v2.3.17
all_iscsi_v3.0.34.LOM       - iSCSI Boot OpROM v3.0.34
all_10g_fcoe_v1.8.08.LOM    - 10G FCoE OpROM v1.8.08
X540_Fcoe.LOM               - 10G FCoE OpROM v1.8.08

sSataOrom.bin               - sSata RAID OpROM V4.1.0.1020
SataOrom.bin                - Sata RAID OpROM V4.1.0.1020
SataDriver.efi              - Sata UEFI RAID OpROM V4.1.0.1020
sSataDriver.efi             - sSata UEFI RAID OpROM V4.1.0.1020

ESRT2.ROM                   - ESRT II legacy OpROM A.14.02121826I

ACM				    : v1.10PV PW
Intel(R) QPI Reference Code Version : v1.03
Memory Reference Code Version       : v1.03

Management Engine Firmware Version  : 03.00.06.274

================================================================================
			INSTALLATION NOTES
================================================================================
WARNING:  It is very important to follow these instructions as they are written.
Failure to update using the proper procedure may cause damage to your system.

1.User can update BIOS flash image via either of the follow methods...

  1.)  Copy the entire contents of the Package file to the HDD or USB flash drive. 
       (All of the files must reside in the same directory.)
  2.)  Boot to UEFI Shell, then change the Shell to the mapped device file system
       Example: Shell> fs0: (or fs1:)
  3.)  Run updAll.nsh for BIOS, ME and FD region upgrade together. 
       updBios.nsh, updME.nsh and updFD.nsh for each region upgrade respectively.
  4.)  Reboot system after the update is completed.
  5.)  Do *NOT* interrupt the BIOS POST during the first boot.

2.BIOS update under recovery mode as below methods
  The USB media is necessary for primary BIOS upgrade and must contain the following 
  files under the root directory, you can capture all the ingredients from BIOS release 
  package:
  1.)  UEFI iFlash32 (including IFlash32.efi and ipmi.efi )
  2.)  *.CAP( the released BIOS capsule which version you expect to update)
  3.)  Startup.nsh (update accordingly to use proper *.CAP file)

  A: Install USB media after recovery boot to shell, you need to follow below steps
  1.) Under Shell, type "map -r" to map all disc  
  2.) Change the Shell to mapped device file system
	   Example: Shell> fs0: (or fs1:)
  3.) Execute the startup.nsh scripts for BIOS update, wait for BIOS update complete
  4.) Power OFF the system, and revert the recovery jumper position to "normal operation".
  5.) Power ON the system. 
  6.) Do *NOT* interrupt the BIOS POST during the first boot.

  B: Installed USB media prior to recovery boot
     It will boot automatically into EFI Shell to invoke the Startup.nsh script and 
     start the flash update application (IFlash32.efi). 
     IFlash32.efi requires the supporting BIOS Capsule image file (*.CAP). After the 
     update is complete, there will be a message displayed stating that the "BIOS has 
     been updated successfully" indicating the recovery process is finished. The User 
     should then switch the recovery jumper back to normal operation and restart the 
     system by performing a power cycle.

Notes: If to update backup BIOS region, you need to customize the iflash32 update 
       scripts and add "UpdateBackupBios" parameter 
================================================================================
                        BIOS RECOVERY INSTRUCTIONS
================================================================================
The Recovery process can be initiated by setting the recovery jumper 
(called BIOS Recovery Boot Jumper)

A BIOS recovery can be accomplished from backup BIOS region. 

BIOS starts the recovery process by first loading and booting to the recovery image 
from backup BIOS region. This process takes place before any video or console is 
available. Once the system boots to recovery image.

The following steps demonstrate this recovery process:
   1.  Power OFF the system.
   2.  Switch the recovery jumper. Details regarding the jumper ID and location
       can be obtained from the Server Board TPS for that Platform.
   3.  Power ON the system.
   4.  The BIOS POST screen will appear displaying the progress and system automatically 
       boots to the EFI SHELL.


================================================================================
			IMPORTANT NOTICE
================================================================================
1. The BIOS R01.01.0002 auto scripts will force to update both normal and backup BIOS region since security revision was updated, 
    Once user upgrade BIOS to R01.01.0002, it will prevent BIOS downgrade to previous version that with low security revision, user can use BIOS recovery mode for BIOS downgrade
2. The BIOS R01.01.0003 included security fix and security revision upgrade, refer to item #1.
3. If doing online BIOS update to R01.01.0003, user must use the auto scripts enabled in the release package which will force update BIOS NVRAM and backup region. 

================================================================================
				R01.01.0001
================================================================================
	EPSD100026796	Setup Server Management Page , Console Redirection?item not synchronize with SOL change.
	EPSD100243718	[SLV_CWP] Wording mistake in 'Legacy Network Device Order' interface.
	EPSD100243720	Clone of: [SLV_CWP] Wording mistakes in 'USB Configuration' interface of BIOS Setup.
	EPSD100026816	Setup menu display will be distorted after changing Console Redirection settings
	EPSD100243746	[SLV_TLP] Wording mistake in 'CPU C State Control' interface of BIOS SETUP.
	EPSD100243716	[SLV_TLP] Wording mistake in 'Legacy Network Device Order' interface of BIOS SETUP.
	EPSD100243747	[SLV_TLP] Wording mistake in 'CPU C State Control-C1E Autopromote' interface of BIOS SETUP.
	EPSD100243755	Clone of: [SLV_CWP] Wording mistake in 'CPU C State Control-C1E Autopromote' interface of BIOS SETUP.
	EPSD100243763	Clone of: [SLV_CWP] Wording mistake in 'CPU C State Control' interface of BIOS SETUP.
	EPSD100026816   	Setup menu display will be distorted after changing Console Redirection settings
	EPSD100242907   	WCP - CATERR with PCIe SSD card in Riser 1
	EPSD100243596	System CATERRs when the Intel SSD PCIe AIC card is installed

================================================================================
				R01.01.0002
================================================================================
	EPSD100243732: Fibre channel boot drives are not being handled correctly by the BIOS

================================================================================
				R01.01.0003
================================================================================
	EPSD100244174 Security vulnerability on SMI GetVariable interface was captured by SeCOE