================================================================================ Intel(R) Server Platform BIOS Release Notes ================================================================================ INTEL(R) Server Boards and Systems Intel Corporation 2111 N.E. 25th Avenue, Hillsboro, OR 97124 USA ================================================================================ DATE :March 22,2022 TO : Multi-Core Intel(R) Xeon(R) Processor-Based Server Platform customers SUBJECT : BIOS Release notes ================================================================================ LEGAL INFORMATION ================================================================================ Information in this document is provided in connection with Intel Products and for the purpose of supporting Intel developed server boards and systems. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel's Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the presented subject matter. The furnishing of documents and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any such patents, trademarks, copyrights, or other intellectual property rights. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Intel is a registered trademark of Intel Corporation. *Other names and brands are the property of their respective owners. Copyright (C) 2022 Intel Corporation. ================================================================================ ABOUT THIS RELEASE ================================================================================ Build Stamp :SE5C620.86B.22.01.0098 Build Date : March 21,2022 ================================================================================ Supported Platforms ================================================================================ S9200WK Family ================================================================================ BIOS COMPONENTS/CONTENTS ================================================================================ Processors supported: 1st and 2nd Generation Intel(R) Xeon(R) Processor Scalable families Microcode versions: CPUID Version Status 0x50656 0x0400320a (CLX B0) 0x50657 0x0500320a (CLX B1) SataAHCI v2.00i RSTeSataEfi v6.3.0.1005 RSTeSataLegacy v6.3.0.1005 RSTesSataEfi v6.3.0.1005 RSTesSataLegacy v6.3.0.1005 BIOSACM Production,v1.7.51_LBG SINIT Production,v1.7.51_LBG AspeedVideo v1.09 ASTVBIOS v1.09 BiosGuard PV_Build_4558 HfiPcieGen3 v1.9.2.0.0 CLX AP B0 mbf50656_0400320a CLX AP B1 mbf50657_0500320a VMDVROC2 v6.3.0.1005 VMDVROC1 v6.3.0.1005 PDR v1.0 FpkSi v3.50_80000D2F_BNP ME SPS,E5_04_01_04_601_0,LBG_WKP_Full.xml non-display SE5C ================================================================================ INSTALLATION NOTES ================================================================================ WARNING: It is very important to follow these instructions as they are written. Failure to update using the proper procedure may cause damage to your system. Firmware Update Tools: iFlash32_V14_1_Build14 User can update BIOS flash image via the next method... UEFI iFlash32 1. Copy the entire contents of the zip file to the root of a USB flash drive 2. Boot to uEFI Shell, then change the Shell to the mapped device (USB flash drive) Example: Shell> fs0: (or fs1:) 3. Run updBIOS.nsh, updME.nsh, updFD.nsh and reset the system after each region upgrade 4. Reboot the system after the last upgrade is completed 5. Do *NOT* interrupt the BIOS POST during the first and second boot ================================================================================ BIOS RECOVERY INSTRUCTIONS ================================================================================ The Recovery process can be initiated by setting the recovery jumper (called BIOS Recovery Boot Jumper) Details regarding the jumper ID and location can be obtained from the Board TPS. BIOS starts the recovery process by first loading and booting to the recovery image from backup BIOS region. This process takes place before any video or console is available. Once the system boots to the recovery image use the following steps to perform the BIOS recovery: 1. The BIOS POST screen will appear displaying the progress and it automatically boots to the uEFI SHELL 2. Follow any of the next two methods for recovery process. Note: Recover mode will clean up all user previous changed BIOS settings including ITK saved settings BIOS update under recovery mode as below two methods: The USB flash drive is necessary for the primary BIOS upgrade and must contain the following files under its root directory: 1. uEFI iFlash32.efi (including iflash32_temp.efi and ipmi.efi ) 2. *.CAP( the released BIOS capsule which version you expect to update) 3. UpdBIOS.nsh (update accordingly to use proper *.CAP file) A Method: Install USB media after recovery boot to shell, you need to follow below steps 1. Under Shell, type "map -r" to map all disc 2. Change the Shell to mapped device file system Example: Shell> fs0: (or fs1:) 3. Execute the UpdBIOS.nsh script for BIOS update, wait for BIOS update complete 4. Power OFF the system, and revert the recovery jumper position to "normal operation". 5. Power ON the system. 6. Do *NOT* interrupt the BIOS POST during the first boot. B Method: Install USB media prior to recovery boot It will boot automatically into EFI Shell to invoke the Startup.nsh script and start the flash update application. IFlash32.efi requires the supporting BIOS Capsule image file (*.CAP). After the update is complete, there will be a message displayed stating that the "BIOS has been updated successfully" indicating the recovery process is finished. The user should then power off the system and revert the recovery jumper back to normal operation and restart the system by performing a power cycle. Note: The Startup.nsh file includes parameters to upgrade not only the BIOS, but the ME, FD, BMC, FRUSDR and DCPMM A BIOS recovery can be accomplished from backup BIOS region. BIOS starts the recovery process by first loading and booting to the recovery image from backup BIOS region. This process takes place before any video or console is available. Once the system boots to the recovery image use the following steps to perform the BIOS recovery: 1. Power OFF the system. 2. Switch the recovery jumper. Details regarding the jumper ID and location can be obtained from the Board EPS for that Platform. 3. Power ON the system. 4. The BIOS POST screen will appear displaying the progress and system automatically boots to the EFI SHELL. 5. Follow the BIOS recovery update manual for BIOS recovery. ================================================================================ IMPORTANT NOTICE ================================================================================ ================================================================================ KNOWN ISSUES/WORKAROUND ================================================================================ 1. [HSD-ES]:[2103648077] [STP] RH8.4 & Sles15.3 can NOT boot after BIOS load default when online update BIOS W/A: 1. After RH8.4 installed (UEFI mode), change "Red Hat Enterprise Linux" to be 1st boot option in the BIOS menu by manual. 2. Remove battery to clear CMOS setting, the issue will be fixed. ================================================================================ CHANGE LIST ================================================================================ 22.01.0098 ================================================================================ 1.[HSD-ES]:[2103648106]PurleyPcPkg/RasPkg: fix UCE SEL log error location will change to CPU1 A1 when enable 'Enhanced Error Containment Mode' and inject UCE on CPU2 DIMM 2.[HSD-ES]:[15010712364]ServerCommonPkg/LogoLib: Update ITK BIOS, reset system, and then System hang up at black screen 3.[HSD-ES]:[2103648679]CpPcRestrictedPkg/SetupBmcCfg: SUT can't log in the EWS when a user with a 20 characters password created in the BIOS setup 4.[HSD-ES]:[15010197917]CpPcPlatPkg/Password: fix HSD 15010197917, add flag check into SHELL_PASSWORD_SUPPORT feature. 5.[HSD-ES]:[2103648077]CpPcRestrictedPkg/MdeModulePkg: Fix OS boot option disappear after BIOS load default 6.[HSD-ES]:[1509670376]CpPcRestrictedPkg/UefiOpromSetup: BCM NIC card Oprom is disappeared in UEFI Option ROM control after BIOS load default 7.Update the copyright year to 2022 for BIOS release 8.[BIOS Option Change]:Hsd-es-id:[2103626048]PurleyPcPlatPkg : Hide "PCIe Port Oprom Control" option. Advance->PCI Configurtion,remove PCIe Port OpROM Control item 9.[BIOS Option Change]:Hsd-es-id:[1509878788][Purley_R]Remove “callback” for User Privilege at BIOS setup. Server Management->BMC LAN Configuration->User Configuration->Privilege->User/Operator/Administrator/No Access, No Access is default setting;(Remove "Callback") 10.[HSD-ES]:[2103641401][Purley][WFPR]The sensor name about "OEM System Boot Event - Asserted"is wrong.The sensor name should be "BIOS Evt Sensor", BMC2.83 & Frusdr 2.02 sensor name is "OOB FM update". 11.[HSD-ES]:[N/A]PurleyPcPkg/StitchingPkg:[WKP]Integrate Microcode 0500320a for clx B1 and 0400320a for clx B0 12.[HSD-ES]:[N/A]PurleyPcPkg/StitchingPkg:[WKP]Sync the BIOSACM version to Production v1_7_51_LBG and SINIT version to Production v1_7_51_LBG 13.[HSD-ES]:[N/A]PurleyPcPkg/StitchingPkg:[WKP]Integrate SPS FW to E5_04_01_04_601_0 to Trunk 14.[HSD-ES]:[14014516556]CpRcPkg/Library/BaseMemoryCoreLib: [IPU 2021.2] Bit flip within the EEPROM SPD cells 15.[HSD-ES]:[N/A]CryptoPkg/OpenSSL: [IPU 2021.2] update OpenSSL to 1.1.1j in submodule 16.[HSD-ES]:[N/A]Revert CryptoPkg/OpenSSL: [IPU 2021.2] update OpenSSL to 1.1.1j in submodule 17.[HSD-ES]:[N/A]CryptoPkg/OpenSSL: [IPU 2021.2] update OpenSSL to 1.1.1j in submodule 18.[HSD-ES]:[N/A]CryptoPkg/OpenSSL: [IPU 2021.2] Prepare for OpenSSL 1.1.1j upgrade 19.[HSD-ES]:[1509254412][IPU2021.2Beta][Purley-R][Regression][FIXED_IPU2021.2Beta] Ghosted WBINVD breaks CRAM mode loading of ACM, causing SUT to reboot automatically when run getsec64.efi -l SENTER -i with TXT enabled 20.[HSD-ES]:[22013243504]PurleySktPkg/Library/ProcMemInit/Chip: [IPU 2021.2] bad DIMM causes all AEP fail to be mapped to OS , also destroys AEP config 21.[HSD-ES]:[14014175540]PurleySktPkg/Library/ProcMemInit: [IPU 2021.2]Min_ops value is always 0 on various DIMM configs with SKX CPU 22.[HSD-ES]:[18016024150]PurleySktPkg/SouthClusterLbg: [IPU 2021.2][Purley Refresh PCH LBG BIOS] Fixed Eva Lock option 23.[HSD-ES]:[1509092847] PurleySktPkg/SouthClusterLbg: [IPU 2021.2][Purley Refresh PCH LBG BIOS] CVE-2021-0093 - Lewisburg PCH is not locking CL (bit 0) within MROM1 24.[HSD-ES]:[22012968660][IPU2021.1][Purley-R][FIXED_IPU2021.2][LEGACY] "EVA Registers Lock” BIOS option requires "Unlock all PCH Registers"=Disabled (OK) but then has no effect due to BIOS hard-coded to locked. 25.[HSD-ES]:[22012950705]PurleyR: [IPU 2021.2] Grantley/Purley potential arbitrary code execution during the Pre-Efi Initialization (PEI) 26.[HSD-ES]:[N/A]CryptoPkg/IntrinsicLib: [IPU 2021.2] Fix possible unresolved external symbol issue 27.[HSD-ES]:[22012713087]Package/Module: [IPU 2021.2] Log EWL4 major = WARN_FPT_CORRECTABLE_ERROR and minorCode = WARN_FPT_PPR_ROW_REPAIR for PPR independent flow 28.[HSD-ES]:[22011708444]CpRcPkg/Library: [IPU 2021.2] Update AdvMemTest EWL Type5 log message to reflect Bank info 29.[HSD-ES]:[14013604560]CpRcPkg/Library/BaseMemoryCoreLib: [IPU 2021.2] Avoid PPR flow for an invalid DIMM entry due to DIMM topology changes 30.[HSD-ES]:[1509006992]PurleySktPkg: [IPU 2021.2] Reorder BSP to the lowest APICID 31.[HSD-ES]:[22012611104]PurleySktPkg/Library/ProcMemInit: [IPU 2021.2] Update MRC DRAM_MIN_OPS table for CLX 32.[HSD-ES]:[14013065992]CpRcPkg/Library/AdvMemTestLib: [IPU 2021.2] System was not able to boot when AdvMemTestOptions are disabled 33.[HSD-ES]:[22011803204]CpRcPkg/Library/AdvMemTestLib, CpRcPkg/Library/BaseMemoryCoreLib : [IPU 2021.2] Track faulty channels per socket 34.[HSD-ES]:[18012660214]18012660214: [ME][SPS][IPU 2021.2] HmrfpoExt_GetStatus () 0x03 is not supported in bios 35.[HSD-ES]:[22012325949]PurleySktPkg/Library/ProcMemInit: [IPU 2021.2] Update Advanced Memory Test Pattern for SK Hynix 36.[HSD-ES]:[22011800884]PurleySktPkg/Dxe/CrystalRidge: [IPU 2021.2] CR MGMT Driver does not connect NvmDimmHii Driver 37.[HSD-ES]:[22012225842]PurleySktPkg/Library/ProcMemInit/Chip/Mem: [IPU 2021.2] Memory Map code enters infinite loop if installed system memory exceeds MMIOH Base 38.[HSD-ES]:[22012172123]CpRcPkg/Library/AdvMemTestLib: [IPU 2021.2] Update AMT Pattern for Micron 39.[HSD-ES]:[18014267290][SPS][IPU 2021.2] Nonce bytes can be read from HECI buffer 40.[HSD-ES]:[22012804657]PurleySktPkg/Library/ProcMemInit/Chip/Mem: [IPU 2021.2]PMEM introduction causing random system reboots 41.[HSD-ES]:[15010166283][Purley]espi_smi failed in the log while run "chipsec_main -vv" in windows2022 with chipsec 1.7.1 42.[HSD-ES]:[15010007307][WKP][CCB 3457][BIOS & BMC]Bypass BIOS admin password when FORCE_EFI_BOOT or SILENT_FORCE_EFI_BOOT is detected 43.[HSD-ES]:[15010197917]CpPcRestrictedPkg: 3rd patch for bypass BIOS password issue. ================================================================================ 22.01.0097 ================================================================================ 1.[HSD-ES]:[1509285222] PurleyPlatPkg/ProcessorErrorHandler: [IPU2021.1 PC RAS] Incorrect channel in PPR address after UCE error occur in mirrored backup region 2.[HSD-ES]:[1509285250] PurleyPcPkg/RasPkg: [IPU2021.1 PC RAS] ADDDC should do intra bank VLS when all ranks are unhealthy. 3.[HSD-ES]:[1509281933] PurleyPcPkg/WheaErrorInj: [IPU2021.1 PC RAS] SMI 0x9a mEinjParam address is not correctly passed to OS. 4.[HSD-ES]:[1509284076,1509297381] PurleyPcPkg/RasPkg: [IPU2021.1 PC RAS] Support single-rank bank VLS ADDDC 5.[HSD-ES]:[5388648] PurleyPlatPkg/ProcessorErrorHandler: [IPU 2021.1] [SKX] [CLX] [RAS] Disable fast string from SMI after the first poison detected when EMCA is enabled 6.[HSD-ES]:[22012477418] PurleyPlatPkg/ProcessorErrorHandler: [IPU 2021.1] [IPU-2021.1,Beta][Purley][Regression] Additional PPR entry is logged with incorrect information for DCU error. 7.[HSD-ES]:[22011769652] CpRcPkg/Library/BaseMemoryCoreLib: [IPU 2021.1] [NVDIMM-N] data is lost on warm boot when MRC sets setupChanged to 1 8.[HSD-ES]:[5355511] PurleyPlatPkg/SocketSetup, PurleySktPkg/PeiDxeCommonIioInitLib: [IPU 2021.1] Add option to throttle ability to create Posted Interrupts 9.[HSD-ES]:[5388662] PurleySktPkg/MemRas: [IPU 2021.1] [RAS] VLS operation uses non healthy rank as buddy rank 10.[HSD-ES]:[5388655] PurleySktPkg/ProcMemInit: [IPU 2021.1] Add Column Correction Disable Knob to BIOS 11.[HSD-ES]:[5388647] PurleySktPkg/Library/ProcMemInit, CpRcPkg/Library/BaseMemoryCoreLib, PurleyPlatPkg/Platform/Dxe/MemorySubClass: [IPU 2021.1] Fix critical KW Issues in Memory IP code 12.[HSD-ES]:[5388654] CpRcPkg/Library, PurleySktPkg/Library: [IPU 2021.1] Improve how MemTest failure list is being reset 13.[HSD-ES]:[5388609] [CVE-2020-12358] [IPU 2021.1] Attacker can change/crash SMI behavior by modifying the IioUdsData data structure 14.[HSD-ES]:[22011323440] PurleyRpPkg/PurleyPcPkg/AcpiPlatformTableLib/AcpiPlatformLibBdat: [IPU 2021.1] Added EWL to BDAT/ACPI table 15.[HSD-ES]:[5388593] [IPU 2021.1] [RAS] SMI will not be triggered on the new rank with increasing CE count over threshold while another spare copy ongoing in the same memory controller 16.[HSD-ES]:[5388649] PurleySktPkg/ProcMemErrReporting: [IPU 2021.1] [RAS] Ktiviral errors are not handled 17.[HSD-ES]:[5388645] [CVE-2020-24486] [IPU 2021.1] MemSetLocal may overwirte PEI stack 18.[HSD-ES]:[5388610] PurleyPlatPkg/Ras/Whea/WheaErrorInj: [CVE-2020-12360] [IPU 2021.1] SMI 0x9a mEinjParam address is not correctly passed to OS 19.[HSD-ES]: [5388646, 1508362522] PurleySktPkg/MemRas: [IPU 2021.1] Bank reverse VLS should not be allowed when single DIMM ,single rank is present. 20.[HSD-ES]:[5388594, 5388595] PurleyPlatPkg/ProcessorErrorHandler: [IPU 2021.1] Channel and bank information of PPR entry for the UCE PS error is wrong when the error is happening in mirrored backup region 21.[HSD-ES]:[5388658] PurleySktPkg/Library/ProcMemInit: [IPU 2021.1] Avoid MemTest type 17 logs invalid errors on DDR4 DIMMs 22.[HSD-ES]:[5388650] PurleySktPkg/Library, CpRcPkg/Library: [IPU 2021.1] Prevent CPGC Timeout during MemTest 23.[HSD-ES]:[05388630] PurleySktPkg/ProcMeminit: [IPU 2021.1] Support for 1:2 (NM:FM) ratio memory mode configuration for AEP 24.[HSD-ES]:[1509336085] PurleyPcPkg/Roms: The pointers coming from untrusted source can't be overlap or within SMM range. 25.[HSD-ES]: [N/A] PurleyPCPkg/StitchingPkg/ME/SPS: Integrate SPS E5_04_01_04_505_0 to Trunk 26.[HSD-ES]: [N/A] PurleyPCPkg/StitchingPkg/Microcode: Integrate Microcode 04003102 for CLX B0 and 05003102 for CLX B1 27.[HSD-ES]: [N/A] PurleyPCPkg/StitchingPkg: Integrate IntelDCPersistentMemoryDriver v01.00.00.3515 to WKP Trunk 28.[HSD-ES]: [N/A] PurleyPCPkg/StitchingPkg: Integrate BIOS ACM 1.7.43 PW and SINIT ACM 1.7.4A PW to purley trunk 29.[HSD-ES]:[1508891772] PurleyPcPkg/RasPkg: There is no PPR info record when inject CE error with parameter "PatrolConsume = True" 30.[HSD-ES]:[CCB3402] CpPcRestrictedPkg/BootOrder: CCB3402 - Add a new marker line, FORCE_EFI_BOOT_SILENT. 31.[HSD-ES]:[CCB3402] CpPcRestrictedPkg/BootOrder: CCB3402 - Port StartupMarkfileBootorder driver from Whitley 32.[HSD-ES]:[1508841518] PurleyPcPkg/RasPkg: Rank CE Time Window does not work 33.[HSD-ES]:[1508895086,1508895344] CpPcRestrictedPkg/Ipmi: BMC user setup does not report error if user2 name input is same as other user such as user3,BMC user setup does not report error if input user name is the same as user 14 or user 15 name 34.[HSD-ES]: [N/A] PurleyPcPkg\Tool: [S9200WK] Change the BIOS ID back to 2X.01.0119 35.[HSD-ES]:[1508841411] PurleyPcPkg/RasPkg: Rank CE will disable after inject 11 times error 36.[HSD-ES]:[1508733401] PurleyPcPkg/RasPkg: SUT will reboot after 3rd strike when do ADDDC test 37.[HSD-ES]:[CCB3356] CpPcRestrictedPkg/Ipmi: CCB3356 - Modify BIOS setup behavior around complex password 38.[HSD-ES]:[1508961754]PurleyPcPkg/PprVlsErrorLogListener: The debug log will show “[PPR] Entry already existed for” when inject 2nd CE just DIMM slot is different 39.[HSD-ES]:[CCB3390,2103639586] PurleyPcPkg/RasPkg: CCB3390 2nd Patch - ECC error logs will be generated after inject several PPR error on different one by one with BIOS 0X020312 40.[HSD-ES]:[CCB3390] PurleyPcPkg/RasPkg: CCB#3390: Request PPR within SW Error Threshold Flow for new row entries 41.[Hsd-Es]:[1508838608] PurleyPcPkg/RasPkg: Handle CSMI during VLS 42.[HSD-ES]:[CCB3389] PurleyPcPkg/RasPkg: CCB#3389: PPR Runtime request SEL event 43.[HSD-ES]:[1508923841] PurleyPcPkg/Restricted: Add "Disable FRB-2 if any bit is enabled" in "Adv MemTest Options" setup help information. 44.[Hsd-ES]:[CCB3272] PurleyPcPkg/RasPkg: Only record a single SEL entry for a single VLS copy during ADDDC 45.[Hsd-ES]:[1508774126] PurleyPcPkg/RasPkg: Handle SMI and CE Threshold for ADDDC handler 46.[HSD-ES]:[1507980834] PurleyPcPkg/RasPkg: TC2B fourth strike does not intiate any spare action 47.[HSD-ES]:[1507980834] PurleyPcPkg/RasPkg: Fix report incorrect bank number in case rank VLS. 48.[HSD-ES]:[1508779249] PurleyPcPkg/RasPkg: CE error triggered need inject over threshold errors after 2nd waiting for Correctable Error Time window 49.[Hsd-ES]:[1508773048] PurleyPcPkg/RasPkg: Bank error counter not clear when reach the time of correctable error time window 50.[Hsd-ES]:[1508772732] PurleyPcPkg/RasPkg: SW Bank Threshold, and Time Window only available when PcieErrEn != 0 51.[HSD-ES]:[CCB3243] PurleyPcPkg/RasPkg: Improve algorithm for when DSG Commercial BIOS enters VLS mode 52.[Hsd-ES]:[CCB3245] PurleyPcPkg/Restricted: Log AMT and PPR results in SEL - 2nd Patch 53.[HSD-ES]:[22011859965] CpPcRestrictedPkg/Library: MCA Recovery (Data Poison) should be enabled by default 54.[HSD-ES]: [2103636701] CpPcRestrictedPkg\Ipmi: The help notes for enable complex password is incorrect in the BIOS setup when set password complexity to "Medium" or "High" in EWS 55.[HSD-ES]:[1508903960] PurleyPcPkg/Restricted: Fix incorrect SEL info for AMT & PPR 56.[Hsd-ES]:[CCB3245] PurleyPcPkg/Restricted: Log AMT and PPR results in SEL 57.[HSD-ES]:[1507916987] PurleyPcPkg/Restricted: [S9200WK]Please replace BIOS RAID Option "Intel(R) RSTe" to "Intel(R) VROC (SATA RAID)" 58.[HSD-ES]:CCB 2707] PurleyPcPkg/Platform: CCB#2707: Customer ask for a way/tool to change SMBIOS Type0- BIOS Vendor String from Intel to DataON 59.[HSD-ES]:[1508903926] PurleyPcPkg/Restricted: The help info is not including bit 16 -19 about Adv MemTest Options 60.[Hsd-ES]:[1508836794] PurleyPcPkg/PlatformSetupVariableSyncLib: Leaky bucket interval not triggering when expected 61.[HSD-ES]:[1508836736] PurleyPcPkg: Enable Samsung and Hynix AMT test 62.[HSD-ES]:[1508639116, CCB3275] PurleyPcPkg/Uba:CCB3275 Enable NIC 190 and Storage(NVMe) 194 SMBIOS Table 63.[Hsd-ES]:[1507175309,2103629389] PurleyPlatPkg/Rsa/RsaInit: Send BIOS ID to BMC in RSD module 64.[HSD-ES]:[2103636820] CpPcRestrictedPkg/Ipmi: CCB3158 Integrate BMC features developed by InSyde 65.[Hsd-ES]:[2207690589] PurleyPcPkg/Uba: Unreleased product code names and build paths retrievable in capsule files. 66.[HSD-ES]: [N/A] PurleyPCPkg/StitchingPkg/ME/SPS: revert LBGNC_Full.xml changes. 67.[HSD-ES]: [N/A] PurleyPcPkg/Restricted: Switch back to SPS folder in the path: PurleyPcPkg/Restricted/Tool/ for ME stitching 68.[HSD-ES]: [N/A] PurleyPcPkg\Tool: [S9200WK] Change the BIOS ID to 22.01.0097 69.[HSD-ES]:[2103641990] CpPcRestrictedPkg/SetupBrowserDxe: Use the BIOS UI to modify the BMC password, it actually does not take effect. 70.[HSD-ES]:[1509426826] CpPcRestrictedPkg/Bds: The copyright should be Copyright (c) 2006-2021 instead of Copyright(c) 2006-2020. ================================================================================ 22.01.0096 ================================================================================ Hsd-es-id: 2103633496 - [Purley][S9200WK]S9200WK EWS Complex settings will be reset after system reboot. Hsd-es-id: 2103633792 - [Purley][S9200WK] BIOS Setup-->Main page has setting “POST errors Pause” but EWS BIOS Configurations Main page do not have it Hsd-es-id: 2103633816 - [Purley][S9200WK]A few typo under "EWS->BIOS configuration->Integrated IO Configuration"page, attached picture show it Hsd-es-id: 16011113015 - [S9200WK] modprobe acpi_cpufreq fails in BIOS Hsd-es-id: 16011640502 - [Purley][S9200WK]In BMC force update mode,the KCS mode of the BIOS setup still show allow all mode in the restricted/deny all mode. ================================================================================ 22.01.0095 ================================================================================ Hsd-es-id: 16011059201 - [Utilities - OFU_BUILD 25] - OFU BIOS update fails with BIOS admin password in S9200WK Hsd-es-id: 1507976044 - [HSD-ES][S9200WK]EVD2 of OOB update and OOB config SEL is incorrect Hsd-es-id: 2103633253 - in BIOS, Server CA configuration items is not greyed out when login as user credentials ================================================================================ 22.01.0094 ================================================================================ Hsd-es-id: 1507916987 - [S9200WK]Please replace BIOS RAID Option "Intel(R) RSTe" to "Intel VROC" Hsd-es-id: 1507916337 - [HSD-ES][S9200WK][STP_OOB]The Multi-Rank Sparing value of EWS is not match with BIOS setup menu Hsd-es-id: 2103632414 - [HSD-ES][S9200WK][BIOS][purley_refresh] OOB SEL definition is incorrect in S9200WK EPS 1.01 Hsd-es-id: 1507955461 - The format of processor info is incorrect in the BIOS setup Hsd-es-id: 2103632325 - [S9200WK]Setup menu has garbled when use SOL connect server Hsd-es-id: 1507959901 - [purley]KCS PSIRT enhancement ================================================================================ 22.01.0093 ================================================================================ Hsd-es-id: 2208222019 - Potential Memory Leak in GenSFID2 Hsd-es-id: 2103626884 - FRB2 triggered on the early video phase. Hsd-es-id: 1609246698 - BIOS sends bit0 as 1 by command D3h when the administrator password is null Hsd-es-id: 1507332013 - Single reboot to update BIOS, FD, ME & BMC: Current design requries 3 reboots to update FD, BIOS and ME. Unacceptable customer experience. Need to reduce to one boot only. Hsd-es-id: 1607211313 - [Security] Race conditions in VariableInterface() allow arbitrary writes inside of SMRAM Hsd-es-id: 1507469348 - [Purley][IPS00468888]syscfg /bbosys option in Linux ================================================================================ 22.01.0092 ================================================================================ Hsd-es-id: 1507608105 - [S9200WK]Request BIOS to implement DFT 2122 update for PICe riser slot enumeration. ================================================================================ 22.01.0091 ================================================================================ No new defects implemented in this release ================================================================================ 22.01.0090 ================================================================================ Hsd-es-id: 1409985190 - [S9200WK] System cannot boot to tboot mode on RHEL 7.6 ================================================================================ 2X.01.0086 ================================================================================ Hsd-es-id: 1507276035 - [S9200WK EA build] OEM Reserved,NM Exception (#0x18) Warning event: NM Exception reports a Node Manager (NM) Exception event. ================================================================================ 2X.01.0075 ================================================================================ Hsd-es-id: 5388356 - PCU machine check (MSCOD = 0x68) observed when memory channel fails to train Hsd-es-id: 5388371 - FW-UEFI-Vuln-2019-132 Unsecure write to SMRAM because of missing buffer validation Hsd-es-id: 5388416 - [Purley-R][Power Management] BIOS knob "TCC Activation Offset" Not Functional ================================================================================ 2X.01.0062 ================================================================================ Hsd-es-id: 1507355635 - [S9200WK][KCS]User configuration page is hidden after setting BMC KCS to Restricted Mode Hsd-es-id: 1507332013 - CCB2763: [BIOS/BMC Q3'19] Single reboot to update BIOS, FD, ME & BMC: Current design requries 3 reboots to update FD, BIOS and ME. Unacceptable customer experience. Need to reduce to one boot only. Hsd-es-id: 1607085596 - Restrict Update Nvram support for DC requirement Hsd-es-id: 1507354875 - [S9200WK][KCS] OOB update caused system be in reboot loop under restricted/Deny all mode Hsd-es-id: 1607584070 - [Purley-R][KCS]All BIOS knobs impacted by KCS will show up when load BIOS default via pressing F9 under Restricted/Deny All Mode Hsd-es-id: 2103627271 - [S9200WK]Sensor failure-LBG Temp – Asserted during OOB ME FW update from EWS. Hsd-es-id: 2103627364 - [S9200WK]There is unsupported BIOS Variable Value “Serial Port B” for Console Redirection on Server Management of EWS.