================================================================================
Intel(R) Server Board S2600TP Product Family
Firmware Update Package for Intel(R) One Boot Flash Update Utility and
Windows* Preboot Execution Environment 
================================================================================
Intel Enterprise Platform & Services Division - Marketing
Intel Corporation
2111 N.E. 25th Avenue, Hillsboro, OR 97124 USA
================================================================================
DATE    : 	October 10, 2016
TO      : 	Intel(R) Server Board S2600TP Product Family customers
SUBJECT : Release Notes for System Firmware Update Package 
================================================================================
                              ABOUT THIS RELEASE
================================================================================
BIOS:     	01.01.0019
ME:        	03.01.03.032
BMC:     	01.47.10181
FRUSDR:	    1.14
================================================================================
                           Support Platforms and Dependency
================================================================================
Processors supported:
Intel(R) Xeon processor E5-2600 v3 series
Intel(R) Xeon processor E5-2600 v4 series

Microcode update versions:
CPUID     Version      Status
0x306f2   0x00000036   Production (E5-2600 v3 C0/C1)
0x406f1   0x0b000010   External   (E5-2600 v4 B0)

Production boards:
  Product		Fab Version	      
  S2600TP		Fab3 or above    
  S2600TPF	    Fab3 or above 

The following update process must be followed to ensure a trouble free update.
1.	Manageability Engine (ME) firmware
2.  FD
2.	BMC firmware
3.	BIOS
4.	FRUSDR

================================================================================
                             IMPORTANT NOTE!!!                   
================================================================================
 - This Update package must be installed using 
 Intel(R) One-boot Flash Update (OFU) V14.0 Build 13

================================================================================
                  System Firmware Update Package Usage instructions                   
================================================================================
This package can be updated using one of the following methods:
 - Windows* or Linux* operating system using 
 Intel(R) One-boot Flash Update (OFU) V14.0 Build 13

Intel(R) One boot Flash Update utility can be downloaded from http://downloadcenter.intel.com/
and it is part of the "BIOS, Firmware Update & Configuration Utilities" for 
Windows* and Linux*. Please refer to Intel(R) OFU user guide about the details of 
installation and usage of OFU.

Use OFU to update system firmware by the following steps:
- Install OFU on Windows* or Linux* system
- Download the latest firmware update package from http://downloadcenter.intel.com/
- Unzip package to a folder
- Run the following command in Windows* command line/Linux* terminal window:
  <OFU install folder name>:\flashupdt -u  <package folder name>\flashupdt.cfg
                       
To update from Windows* Preboot Execution Environment (WinPE)

The System Firmware Update Package can be inserted to Windows* PE customized image 
for creating a bootable Windows* PE CD. User is able to update system firmware from 
customized WinPE CD by the following steps:
- Boot server with customized WinPE CD
- Run script "WinPE21_x64_Update.bat"
  (name may be varied depends on your own customization)
  
Note:
1. The Intel(R) OFU utility is case sensitive. Therefore, when you transfer the 
Firmware Update Package using USB flash drive from a Microsoft Windows* system to a Linux
environment, you must first extract under the Linux* environment. Otherwise, you 
will need to mount the USB flash drive manually with 'vfat' option under Linux to avoid 
conversion from upper case to lower case and vice versa.

2. To make Intel(R) OFU utility run properly under x86 or x64 OS, you have to read
OFU release notes on known issues for OFU installation.

3. In this SFUP package, Intel only provide batch file "WinPE_x64_Update.bat" 
for WinPE2.1/3.0 64 bit solution as an example. Please refer to white paper 
"White Paper-Intel Server Utilities Procedure for WinPE.pdf" for details on 
building your own customized WinPE CD.

4. Windows PE 2.0 - built from Windows Vista SP1 EM64T
5. Windows PE 2.1 - built from Windows Vista SP1 or Windows Server 2008, EM64T
6. Windows PE 3.1 - built from Windows Server 2008 R2, EM64T
7. Microsoft IPMI driver is loaded by default from WinPE CD, if you want to use 
Intel IPMI driver instead of MS IPMI driver for firmware update, you can un-install
Microsoft IPMI driver by:
                Devicesetup.exe Cv remove *IPI0001
                Note: IPI0001 is the device ID for Microsoft IPMI driver.
8. If to update backup BIOS region or NVRAM, you need to customize the OFU update 
       scripts (eg.flashupdt.cfg) and add "UpdateBackupBios" or "UpdateNvram" parameter.
 
================================================================================
			IMPORTANT NOTICE
================================================================================
1. BIOS R01.01.0018 will include a security revision upgraded. 
   BIOS downgrade is not allowed from the OS and can only be performed on uEFI shell using the BIOS recovery jumper method.

2. BIOS R01.01.0009 will enable UEFI Secure Boot and include below limitations:
    - Please read "BIOS UEFI SECURE BOOT IMPACT AND MITIGATION METHOD" section in this BIOS release notes
    - All customer settings saved in BIOS NVRAM will be lost after new BIOS upgrade
    - BIOS downgrade is not allowed if user has enabled BIOS secure boot. All customer setting will be lost also if downgrade to previous BIOS release
    - Backup BIOS region is also required to be updated to prevent recovery failure please use release package to update BIOS
    - There is downgrade hang risk if you don't follow above rules
    - Further BIOS release will not suffer from these side effects as the NVRAM region is formatted as authenticated variable storage
3. System will hang 0xbf after downgrading BIOS from D0055(E5-2600V4 code tree) to R0011/R0009(E5-2600V3 code tree) randomly
    - Set SUT to recovery mode to power on, then set it back to normal boot to see whether it is recovered
4. The iFlash32 utility parameter of 'UpdateNvram' is not supported under Normal Mode, however it is only supported under Recovery Mode
5. Design change from D076 for <PCIe correctable error threshold> to change default setting from <All> to <10>. Need to press <F9> to see the new default string
6. Suggest to press 'F9' to load default if using the 'IOU Non-posted prefetch control' setup options in the first time

================================================================================
     BIOS UEFI SECURE BOOT IMPACT AND MITIGATION METHOD
=================================================================================
1. Customer Setting Loss Issue and Mitigation Method
    When user upgrades BIOS with secure boot feature, the NVRAM will be automatically
  formatted as authenticated variable physical storage. However, all previous customer
  settings storage in NVRAM will be lost even if user does not enable UEFI secure boot
  feature.
    Users can take the follow recipe to save and restore their settings based on
  the actual NVRAM usage if they wish to upgrade or downgrade between BIOS with or
  without secure boot feature.
    Supposing customer requires to save & restore their specific NVRAM named 'var':
  Steps:
  1. Prepare FAT partition USB key (or HDD).
  2. Boot to EFI shell.
  3. Check the file system mapping (e.g. fs0:) of the USB key with 'map -r' command.
  4. Use 'dmpstore var -s fs0:\var.bin' to save the variable to the physical file.
  5. Perform BIOS update and reboot system.
  6. Boot to EFI shell.
  7. Use 'dmpstore var -l fs0:\var.bin' to restore the variable.
  8. Reboot the system if the customer setting requires reboot to take effect.

Notes:
  1. Immediate reboot after BIOS update is mandatory. Or the restore operation will
     not take effect.
  2. Customers can repeat step 4 and step 7 for several times if they need to save & restore
     multiple NVRAM variables.
  3. Most of BIOS customer settings by SysCfg can also be restored in this way. Customers
     can follow previous step1~8 by substituting 'Setup' for 'var' in the sample.
  4. For BIOS downgrade case, step7 cannot be used to restore authenticate variables
     (e.g. PK, KEK, DB, DBX) to non-authenticated NVRAM storage

2. Recovery Mode Failure
   There is known bug that it cannot POST successfully with authenticated NVRAM storage.
   This will cause platform recovery failure and permanent deny of service (PDOS) if the
   primary BIOS region gets corrupted for some reason. It is required to update backup BIOS
   region when upgrade BIOS capsule with secure boot feature.
Notes:
  For downgrade case, user is not required to update backup BIOS region as new
  BIOS with secure boot feature can handle NVRAM with old storage format:
  it will format it to new authenticated variable storage automatically.
  However, care must be taken when downgrading BIOS in recovery mode: After flashing
  BIOS without secure boot feature, user should restore recovery HW jumper immediately
  before platform reset.If platforms reset occurs before restoring recovery HW jumper,
  the backup BIOS will once again format NVRAM to new storage format, which will cause
  newly flashed BIOS (without secure boot feature) POST failure after user restores
  recovery HW jumper.
  
================================================================================
				BIOS 01.01.0019
================================================================================

EPSD 100253867 : [x] Customer reports the BIOS settings can not load user default
EPSD 100254081 : [X] To enable TXT is required to load BIOS default during BIOS R0016 update
EPSD 100252975 Staggered spin-up is not working properly on R2308WTTYSR causing 240VA trip 
Update RC code to 3.6.0
ACM binary update V3.1.0 
Update BDW uCode to 0b00001b 
EPSD 100254244 : MCE Error regarding QPI on Grantley Systems
EPSD 100253725 [E5-2600V4] SMBIOS Type10 and Type41 isn't correct under I350 NIC SKU system. 
CCB 427: To support ITK/Syscfg to adjust UEFI mode boot order. 
EPSD 100034249 : [BDW] Partition Row Position field value is repeated if there are multiple Type 20 structures
EPSD 100034250 : [E5-2600V4] Slot ID shown in type9 is different from PciSlotTest.efi shown.
SmbiosDataUpdateDxeWildcatPass inf is missed
SMBIOS Type 16 Physical Memory Array update
EPSD 100034655 : [E5-2600V4] Some of IO Module information not gray out in NIC Configuration page. 
EPSD 100034648 : [E5-2600V4] "Current SecureBoot State" is not grey out, it just information only. 
EPSD 100034500 : [E5-2600V4] system will auto shutdown on POST code 0x62 when plug-in 1DPC Micron 8G memory. 
According to the reprovisioning guidance, the TPM NV indices were changed, BIOS code should follow. 
EPSD 100034728 [E5-2600V4] system will auto reset when disable NIC1 Controller on S2600WT platform. 
CCB#472 - Add an ITK option in BIOS for KNLTLP USB bridge board over current workaround.
EPSD 100252480 [win2016precert]Assurance AQ test item failed for TPM
CCB462 - Memory speed support POR+1 for E5-2600V4 

================================================================================
                            ME 03.01.03.023
================================================================================

Can't set power policy in S5 after Power Button Override.
SPS generates health event in each AC cycle.
SmaRT&CLST Status of Get SEL Entry have wrong byte order.
Predictive Power Limiting NM Policy does not meet 99.5% below power limit criteria in case of SMBAlert assertions (Fast #PROCHOT).
CPU cannot reach max frequency when stressed by PTU in SMI Optimized mode.
NM PTU option ROM running on HSX systems will exit early, after first characterization, and may cause system instability. 

===============================================================================
                        KNOWN ISSUES/WORKAROUNDS/REQUIREMENTS
===============================================================================
- This BMC FW update package is to be used only on PCSD server baseboards and
  does NOT support customer reference boards (CRB) or silicon reference
  platforms (SRP).
  Contact your Intel Representatives to determine where to download the BMC FW
  for these products.

- The BMC FW image file in this package is to be used only with the provided
  FWPIAUPD update utility.
  Using the FW image file with a SPI flash device programmer will result in a
  non-functional system.  

- Some open source ipmi utilities may automatically retry multiple times during  
  access BMC using bad password and supporting IPMI specification 1.5 in Linux OS.
  CCB310 will log more bad password login SEL.
  
===============================================================================
                             BMC 01.47.10181
===============================================================================

-EPSD100254817: The HSBP's FRU can't be detected if install 4 HSBP in S2600WT system.
-EPSD100034620: Ping LAN1 (BMC management) IP failure after AC off/on sometimes
                with RoHS BB.
-EPSD100254941: HSBP3 sensors can not be accessed and shown as Unknown because of 
                SDR auto-configuration failure 
-EPSD100253829: vulnerabilities found on BMC_i_0146r9961
-EPSD100254410: BMC Ethernet hang issue in some case
-EPSD100254304: BMC alerts received in an email via SMTP have a different time
-EPSD100253866: BMC EWS Security settings issue (Bad password threshold)
-Fix issue of second CPU dump when IERR happened and first CPU dump failed, Use 
 PCH command to trigger warm reset, Increase handshake timeout with BIOS
-Fix "No SEL is added when FM_MEM_THERM_EVENT_N is grounded."
-Updated the stunnel conf to support TLSv1.2 only, with secured ciphers <= 128
-CCB 460: enable adoption of A1u2ULCP on S2600WT
-CCB 468: address the cipher suite zero vulnerability.
-none: update PSoC to version 1.25
-none: update SDR file for S2600WT thermal alert issue

=============================================================================
        SYSTEM HARDWARE & SOFTWARE REQUIREMENTS/REVISIONS
=============================================================================

- BMC firmware rev 1.33(or later) MUST be preinstalled prior to installing
  this FRU/SDR package.
- BIOS R01.01.0013 or later
- MB Ver 03.01.02.002

================================================================================
                             FRUSDR 1.14
================================================================================    
- (New) KNP FRUSDR String Error - Processing FRU file name is not correct
- EPSD100029551 - The "successfully Completed" message will occur after FRUSDR package for other platform is update
- EPSD100029318 - Fan duty issue
- Add S2600TPR.fru file for BDW CPU and probe this fru
- Update frusdr.efi and ipmi.efi utility 13.1 build 8
- Fixed master.cfg (Processing FRU file name is not correct)
- Add DISABLE_NVME_FUNCTIONS record for Auto Detect in the master.cfg file
- Add FSC Record Type = 1Dh (Backplane NVMe capabilities) records
- Add S2600TPFR.fru file
- Change SDR for NIC related tracker(EPSD100250298:Disable onboard NIC from BIOS of KNP/TLP, all system fan run at high speed)
- Update master.cfg for KPFR.fru file
- Add the Tag of "Others" to "NIC LAN Temp" SDR

=============================================================================
                            LEGAL INFORMATION
=============================================================================
Information in this document is provided in connection with Intel products. 
No license, express or implied, by estoppel or otherwise, to any intellectual 
property rights is granted by this document. Except as provided in Intel's 
Terms and Conditions of Sale for such products, Intel assumes no liability 
whatsoever, and Intel disclaims any express or implied warranty, relating to 
sale and/or use of Intel products including liability or warranties relating 
to fitness for a particular purpose, merchantability, or infringement of any 
patent, copyright or other intellectual property right. Intel Corporation may 
have patents or pending patent applications, trademarks, copyrights, or other 
intellectual property rights that relate to the presented subject matter.  
The furnishing of documents and other materials and information does not 
provide any license, express or implied, by estoppel or otherwise, to any 
such patents, trademarks, copyrights, or other intellectual property rights.  
Intel products are not intended for use in medical, life saving, or life 
sustaining applications. Intel may make changes to specifications and product 
descriptions at any time, without notice.

Intel is a registered trademark of Intel Corporation. 
*Other names and brands are the property of their respective owners.
Copyright (c) 2016 Intel Corporation.

A portion of this firmware is open source code, which falls under the
GPL 2.0 license.  

[END OF RELEASE NOTES]
