============================================================================= Intel(R) Server System S9200WK Product Family Firmware Update Package for Intel(R) One Boot Flash Update Utility ============================================================================= Intel(R) Server Boards and Systems Intel Corporation 2111 N.E. 25th Avenue, Hillsboro, OR 97124 USA ================================================================================ DATE : April 05, 2022 TO : Intel(R) Server System S9200WK Product Family ================================================================================ LEGAL INFORMATION ================================================================================ Information in this document is provided in connection with Intel Products and for the purpose of supporting Intel developed server boards and systems. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel's Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the presented subject matter. The furnishing of documents and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any such patents, trademarks, copyrights, or other intellectual property rights. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Intel is a registered trademark of Intel Corporation. *Other names and brands are the property of their respective owners. Copyright (C) 2021 Intel Corporation. SUBJECT : Release Notes for System Firmware Update Package ================================================================================ ABOUT THIS RELEASE ================================================================================ BIOS : 22.01.0098 ME : 04.01.04.601 BMC : 2.88.6999d21a FRUSDR : 0.35 ================================================================================ Supported Platforms ================================================================================ ================================================================================ BIOS COMPONENTS/CONTENTS ================================================================================ Processors supported: Intel(R) Xeon(R) Scalable processors (CLX-AP) Microcode versions: CPUID Version Status 0x50656 0x0400320a (CLX B0) 0x50657 0x0500320a (CLX B1) - Front Panel, Hot-swap backplane, and Baseboard FRU data must be available for chassis auto-detection to succeed. - JAVA Certificate: from: Wed Jan 19 08:00:00 CST 2022 UTC/GMT+08:00 until: Fri Jan 20 07:59:59 CST 2023 UTC/GMT+08:00 Embedded firmware files for the following components =============================================================================== KNOWN ISSUES/WORKAROUNDS/REQUIREMENTS =============================================================================== WARNING: This release disables RMCP authentication by default. ipmitool uses RMCP by default, so it will fail to authenticate. Add the '-I lanplus' parameter to all ipmitool commands to use RMCP+ instead. WARNING: This release has the BMC PCIe bridge disabled. This will cause the majority of operating systems to fail at boot as they stall during video driver initialization WARNING: When using IPMI to establish a SOL session using KONSOLE: A. The "Delete" input cannot be captured when pressing "Backspace" Workaround: Modify the "Backspace" key to "0x08" in the KONSOLE profile keyboard settings. B. Resizing a KONSOLE window with an active SOL session can cause the content to overlap Workaround: None. Recommend using the Java SOL Viewer instead of KONSOLE WARNING: Redfish API POST requests using a browser extension or plugin will fail if the extension manipulates the HTTP(S) Origin header. This affects REST clients which are implemented as browser (chrome, Firefox) plugins or extensions such as the older versions of Postman. It is recommended to use Postman version 6.0 or later.For security purposes, the BMC Redfish API requires that if a HTTP Origin header is present, the host portion of the Origin header must match the HTTP Host header. Some browser based REST clients alter the Origin header preventing their use with the BMC. Steps to recover a failing Operating System: Linux variants (one of the below): A. Ensure the "modprobe.blacklist=ast" parameter is set in your boot loader (grub) B. Ensure you are using a kernel version V4.10 or newer For Red Hat* Enterprise Linux* v7.3, please refer to the included "RHEL73_InstallationGuide_Rev1.00.pdf" For SUSE* Linux* Enterprise Server v12 SP1 or SP2, please refer to the included "SLES12_InstallationGuide_Rev1.00.pdf" Redfish API: Redfish API POST requests using a browser extension or plugin will fail if the extension manipulates the HTTP(S) Origin header. This affects REST clients which are implemented as browser (chrome, Firefox) plugins or extensions such as the older versions of Postman. It is recommended to use Postman version 6.0 or later. For security purposes, the BMC Redfish API requires that if a HTTP Origin header is present, the host portion of the Origin header must match the HTTP Host header. Some browser based REST clients alter the Origin header preventing their use with the BMC. WARNING: Start from BMC v1.89, by default BMC only enables cipher suite 17, to use that, you must add "-C 17" in command with ipmitool v1.8.18 or above. WARNING: Start from BMC v2.21, When KCS control mode is put in restricted and deny all mode, BMC EWS CPU and DIMM page displays blank or last DC on configuration information. WARNING: IPMIUtil can not support user password length larger than 16 bytes. WARNING: When KCS policy control mode is configured as "Deny All", BMC and FRUSDR cannot be upgraded/downgraded as expected behavior. KCS Policy control mode is "Allow all" by default on all BIOS from version R02.01.0008 and older WARNING: Starting from BMC 2.48.ce3e3bd2 implements new security rules about password complexity, please consult TA-1161 for more details WARNING: [HSD-ES]:[2103648077] [STP] RH8.4 & Sles15.3 can NOT boot after BIOS load default when online update BIOS W/A: 1. After RH8.4 installed (UEFI mode), change "Red Hat Enterprise Linux" to be 1st boot option in the BIOS menu by manual. 2. Remove battery to clear CMOS setting, the issue will be fixed. WARNING: A security issue HSD(16015511567) is fixed in Purley platform. BMC credential is required to access files in internal virtual media from BMC v2.88. Issue title: [Purley][Internal Virtual Media] Files in internal virtual media are accessible without BMC credential (#214) WARNING: Start from BMC v2.88, implemented CCB3458 that [BMC]Active Directory should allow domain name and user name longer than 16 characters. The AD Setting would be cleared after downgrade to v2.86 or lower version BMC if the Domain Name is equal to or longer than 32 characters. =============================================================================== INSTALLATION NOTES ================================================================================ WARNING: It is very important to follow these instructions as they are written. Failure to update using the proper procedure may cause damage to your system. WARNING: The installation sequence in the flashupdt.cfg file MUST not be modified when run flashupdt command. User can comment lines in the flashupdt.cfg file to select the FW componet to be installed but MUST not change the sequence of the installation when wants to update automatically all the FW components in the package when run flahsupdt -u ================================================================================ SYSTEM FIRMWARE UPDATE PACKAGE USAGE INSTRUCTIONS ================================================================================ This package can be updated using one of the following methods: - Windows* or Linux* operating system using Intel(R) One-boot Flash Update (OFU) V14.1 Build 26 or later - Windows* Preboot Execution Environment (WinPE) To update from Windows* and Linux* or operating systems using the Intel(R) One Boot Flash Update Utility (OFU) Intel(R) One boot Flash Update utility can be downloaded from http://downloadcenter.intel.com/ and it is part of the "BIOS, Firmware Update & Configuration Utilities" for Windows* and Linux*. Please refer to Intel(R) OFU user guide about the details of installation and usage of OFU. Use OFU to update system firmware by the following steps: - Install OFU on Windows* or Linux* system - Download the latest firmware update package from http://downloadcenter.intel.com/ - Unzip package to a folder - Run the following command in Windows* command line/Linux* terminal window: :\flashupdt -u \flashupdt.cfg Note: 1. The Intel(R) OFU utility is case sensitive. Therefore, when you transfer the Firmware Update Package using USB flash drive from a Microsoft Windows* system to a Linux environment, you must first extract under the Linux* environment. Otherwise, you will need to mount the USB flash drive manually with 'vfat' option under Linux to avoid conversion from upper case to lower case and vice versa. 2. To make Intel(R) OFU utility run properly under x64 OS, you have to read OFU release notes on known issues for OFU installation. ============================================================================= ISSUES fixed in BIOS (22.01.0098) ============================================================================= 1.[HSD-ES]:[2103648106]PurleyPcPkg/RasPkg: fix UCE SEL log error location will change to CPU1 A1 when enable 'Enhanced Error Containment Mode' and inject UCE on CPU2 DIMM 2.[HSD-ES]:[15010712364]ServerCommonPkg/LogoLib: Update ITK BIOS, reset system, and then System hang up at black screen 3.[HSD-ES]:[2103648679]CpPcRestrictedPkg/SetupBmcCfg: SUT can't log in the EWS when a user with a 20 characters password created in the BIOS setup 4.[HSD-ES]:[15010197917]CpPcPlatPkg/Password: fix HSD 15010197917, add flag check into SHELL_PASSWORD_SUPPORT feature. 5.[HSD-ES]:[2103648077]CpPcRestrictedPkg/MdeModulePkg: Fix OS boot option disappear after BIOS load default 6.[HSD-ES]:[1509670376]CpPcRestrictedPkg/UefiOpromSetup: BCM NIC card Oprom is disappeared in UEFI Option ROM control after BIOS load default 7.Update the copyright year to 2022 for BIOS release 8.[BIOS Option Change]:Hsd-es-id:[2103626048]PurleyPcPlatPkg : Hide "PCIe Port Oprom Control" option. Advance->PCI Configurtion,remove PCIe Port OpROM Control item 9.[BIOS Option Change]:Hsd-es-id:[1509878788][Purley_R]Remove “callback” for User Privilege at BIOS setup. Server Management->BMC LAN Configuration->User Configuration->Privilege->User/Operator/Administrator/No Access, No Access is default setting;(Remove "Callback") 10.[HSD-ES]:[2103641401][Purley][WFPR]The sensor name about "OEM System Boot Event - Asserted"is wrong.The sensor name should be "BIOS Evt Sensor", BMC2.83 & Frusdr 2.02 sensor name is "OOB FM update". 11.[HSD-ES]:[N/A]PurleyPcPkg/StitchingPkg:[WKP]Integrate Microcode 0500320a for clx B1 and 0400320a for clx B0 12.[HSD-ES]:[N/A]PurleyPcPkg/StitchingPkg:[WKP]Sync the BIOSACM version to Production v1_7_51_LBG and SINIT version to Production v1_7_51_LBG 13.[HSD-ES]:[N/A]PurleyPcPkg/StitchingPkg:[WKP]Integrate SPS FW to E5_04_01_04_601_0 to Trunk 14.[HSD-ES]:[14014516556]CpRcPkg/Library/BaseMemoryCoreLib: [IPU 2021.2] Bit flip within the EEPROM SPD cells 15.[HSD-ES]:[N/A]CryptoPkg/OpenSSL: [IPU 2021.2] update OpenSSL to 1.1.1j in submodule 16.[HSD-ES]:[N/A]Revert CryptoPkg/OpenSSL: [IPU 2021.2] update OpenSSL to 1.1.1j in submodule 17.[HSD-ES]:[N/A]CryptoPkg/OpenSSL: [IPU 2021.2] update OpenSSL to 1.1.1j in submodule 18.[HSD-ES]:[N/A]CryptoPkg/OpenSSL: [IPU 2021.2] Prepare for OpenSSL 1.1.1j upgrade 19.[HSD-ES]:[1509254412][IPU2021.2Beta][Purley-R][Regression][FIXED_IPU2021.2Beta] Ghosted WBINVD breaks CRAM mode loading of ACM, causing SUT to reboot automatically when run getsec64.efi -l SENTER -i with TXT enabled 20.[HSD-ES]:[22013243504]PurleySktPkg/Library/ProcMemInit/Chip: [IPU 2021.2] bad DIMM causes all AEP fail to be mapped to OS , also destroys AEP config 21.[HSD-ES]:[14014175540]PurleySktPkg/Library/ProcMemInit: [IPU 2021.2]Min_ops value is always 0 on various DIMM configs with SKX CPU 22.[HSD-ES]:[18016024150]PurleySktPkg/SouthClusterLbg: [IPU 2021.2][Purley Refresh PCH LBG BIOS] Fixed Eva Lock option 23.[HSD-ES]:[1509092847] PurleySktPkg/SouthClusterLbg: [IPU 2021.2][Purley Refresh PCH LBG BIOS] CVE-2021-0093 - Lewisburg PCH is not locking CL (bit 0) within MROM1 24.[HSD-ES]:[22012968660][IPU2021.1][Purley-R][FIXED_IPU2021.2][LEGACY] "EVA Registers Lock” BIOS option requires "Unlock all PCH Registers"=Disabled (OK) but then has no effect due to BIOS hard-coded to locked. 25.[HSD-ES]:[22012950705]PurleyR: [IPU 2021.2] Grantley/Purley potential arbitrary code execution during the Pre-Efi Initialization (PEI) 26.[HSD-ES]:[N/A]CryptoPkg/IntrinsicLib: [IPU 2021.2] Fix possible unresolved external symbol issue 27.[HSD-ES]:[22012713087]Package/Module: [IPU 2021.2] Log EWL4 major = WARN_FPT_CORRECTABLE_ERROR and minorCode = WARN_FPT_PPR_ROW_REPAIR for PPR independent flow 28.[HSD-ES]:[22011708444]CpRcPkg/Library: [IPU 2021.2] Update AdvMemTest EWL Type5 log message to reflect Bank info 29.[HSD-ES]:[14013604560]CpRcPkg/Library/BaseMemoryCoreLib: [IPU 2021.2] Avoid PPR flow for an invalid DIMM entry due to DIMM topology changes 30.[HSD-ES]:[1509006992]PurleySktPkg: [IPU 2021.2] Reorder BSP to the lowest APICID 31.[HSD-ES]:[22012611104]PurleySktPkg/Library/ProcMemInit: [IPU 2021.2] Update MRC DRAM_MIN_OPS table for CLX 32.[HSD-ES]:[14013065992]CpRcPkg/Library/AdvMemTestLib: [IPU 2021.2] System was not able to boot when AdvMemTestOptions are disabled 33.[HSD-ES]:[22011803204]CpRcPkg/Library/AdvMemTestLib, CpRcPkg/Library/BaseMemoryCoreLib : [IPU 2021.2] Track faulty channels per socket 34.[HSD-ES]:[18012660214]18012660214: [ME][SPS][IPU 2021.2] HmrfpoExt_GetStatus () 0x03 is not supported in bios 35.[HSD-ES]:[22012325949]PurleySktPkg/Library/ProcMemInit: [IPU 2021.2] Update Advanced Memory Test Pattern for SK Hynix 36.[HSD-ES]:[22011800884]PurleySktPkg/Dxe/CrystalRidge: [IPU 2021.2] CR MGMT Driver does not connect NvmDimmHii Driver 37.[HSD-ES]:[22012225842]PurleySktPkg/Library/ProcMemInit/Chip/Mem: [IPU 2021.2] Memory Map code enters infinite loop if installed system memory exceeds MMIOH Base 38.[HSD-ES]:[22012172123]CpRcPkg/Library/AdvMemTestLib: [IPU 2021.2] Update AMT Pattern for Micron 39.[HSD-ES]:[18014267290][SPS][IPU 2021.2] Nonce bytes can be read from HECI buffer 40.[HSD-ES]:[22012804657]PurleySktPkg/Library/ProcMemInit/Chip/Mem: [IPU 2021.2]PMEM introduction causing random system reboots 41.[HSD-ES]:[15010166283][Purley]espi_smi failed in the log while run "chipsec_main -vv" in windows2022 with chipsec 1.7.1 42.[HSD-ES]:[15010007307][WKP][CCB 3457][BIOS & BMC]Bypass BIOS admin password when FORCE_EFI_BOOT or SILENT_FORCE_EFI_BOOT is detected 43.[HSD-ES]:[15010197917]CpPcRestrictedPkg: 3rd patch for bypass BIOS password issue. ============================================================================= ISSUES fixed in BMC (v2.88.6999d21a) ============================================================================= 1507285344 - Upgrade libxml2 from v2.9.8 to v2.9.9 2103650029 - Purley][S2600WF] the response is wrong for IPMI command Get DIMM Information (DIMM assert slot). 2103649750 - [S2600ST] After mounting a virtual media via iKVM and selecting the Device again, it will pop up a message "Exist an effective Connect from others ". 16015595685 -[Utilities] [SDPTool-4.0.0] [Purley] - Stress failure on IVM 2103648087 - [S2600ST] The device mount function on iKVM console menu Virtual Media > virtual storage can't be released. 15010737507 -[Purley][S2600BP] BMC doesn't check the ISO/IMG header when mount virtual media via WebISO 2103649160 - [Purley][ S2600WF / S9200WK ] The SEL has no description about "SPS FW Health" on EWS. 2103648972 - [Purley][S9200WK] the response is wrong for IPMI command Get DIMM Information (DIMM assert slot). 2103643376 - [S2600ST] [internal virtual media]After mount a internal VM in redfish and turn off iKVM,the mounted internal VM will be automatically unmounted in OS 15010705608 -[S2600ST] [Redfish]After mounting the ISO through redfish and then reset BMC, the EWS and redfish will hang up. 2103647672 - [Purley][S2600WF] Run DC/AC cycling with SP3RT040X16SPP Retimer card, port 1~3 connected nvme drives will be lost(drive LED is off). Fail rate 178/200 15010697059 -[Purley][S2600BP] Session will reach to the maximum if repeat login and then logout the BMC EWS Web 15010705258 -[S2600ST] [Redfish]When uploading a compressed file with Spaces or & in the file name via redfish, it only displays a file link in the OEM list. 15010704983 -[S2600ST] [Redfish]When a zip or gz file containing a folder is uploaded via redfish,the timestamp of some files are displayed as 1935. 2103648673 - [S2600ST] The policy suspend timers can't be disabled when change the Policy Suspend Timers from "Yes" to "No". 2103648677 - [S2600ST] The ISO/IMA file can't be mounted in the Virtual Media > virtual storage > Device 2/Device 3 after mounting a folder in Device 1. 2103648687 - [S2600ST] When select media type to ISO/IMG/IMA in virtual media over HTML5,all ISO/IMG/IMA files can't be displayed in the "ISO.IMG.IMA File" search mode. 2103648682 - [S2600ST] Chinese and English EWS help information does not match. 2103648097 - [S2600ST] After AC off SUT,the HTML5 KVM session doesn't give any prompts of disconnection. 2103647974 - [S2600ST] The LAN channel1/2 are missing in the EWS->IPv4 Network Settings when power off SUT. 15010550057 -[Purley]Unnecessary prompt pops up when upload 2048-bits certificate 16015511567 -[SDPTool][Purley][Internal Virtual Media] Files in internal virtual media are accessible without BMC credential 2103648046 - [Purley] [S9200WK] The EWS "NIC Information" and "Storage Information" can't detect any device with BMC 2.88. 2103647923 - [S2600ST] The client IPv6 address is not displayed on the EWS->Current Users page when login the EWS with a dynamic BMC IPv6 address. 1509875853 - [Purley][ Internal Virtual Media] Upload an encrypted file via Internal Virtual Media, the response is successful but no file can be accessed under OS 2103644460 - [S2600ST] The warning dialog box have some English words and missing a double quotation mark in Chinese EWS when upload a new SSL certificate 2103647768 - [Purley][S2600WF / S9200WK ] The BMC force update is failure with BMC 2.88. 2103647740 - [Purley][S2600WF] the FTF FSC function test fail with BMC 2.88. 22014214787 -MDR SendMsgBlock redundacy fail 14012941881 -[S2600BP] : PSU on 3 Compute Module system chassis is reporting 0% current out and PS status indicating "Power Supply AC lost" 15010173897 -[Purley][S2600BP] The complex password is abnormal with high level. (username: testuser2 / Password: 4rfv$RFVB) 15010183182 -[Purley][ Internal Virtual Media] Update BIOS via EWS/Redfish, the mounted image will be automatically unmounted to BMC 22014000969 -Incorrect BMC password logged in SEL; incorrect BMC user not logged in SEL 14014263553 -NVMe drive information on HSBP3/Drive2 appears duplicated with HSBP3/Drive1 on BMC Web console 2103644569 - Redfish: Use Postman tool to mount an "empty" txt file, it shows an extra string in the content of the mounted file 15010201274 -[Purley][Point release][CCB3478/3457] Cannot set Bypass BIOS password flag by ipmitool via LAN1/2 2103643169 - [Purley][S2600WF / S9200WK ]The Java Cert validity period is not match the release note for BMC v2.86 1509724299 - [Purley][S2600ST] Sometimes the web login event log is not logged in log file when login out EWS and login again. 1509724203 - [Purley][S2600ST] The client IP address displays the abnormal address "#011 "privilege": #011 "4"". 2103642881 - [S2600ST] The date and time is synchronized with the secondary NTP server when both the primary and secondary NTP server are configured 1509725178 - [Purley][S2600WF / S9200WK ]The SOL log view is no display after running "ls -lR" command. 2103643384 - [S2600ST][internal virtual media]The Oem list can only display 20 file links 2103643380 - [S2600ST][internal virtual media]Failed to download files from the internal VM to OS 2103643416 - Login to EWS with LDAP or AD users, there shows a new added "CPLD Update" option in the "Configuration" menu 2103643309 - [S2600ST] SUT will fail to connect to the SSH console after change default port number to other port 2103643393 - [S2600ST] it pops up an empty dialog box when replace a new certificate with 512 bits or 1024 bits in Chinese EWS 2103643315 - [S2600ST] The SSH console is still active when disable SOL SSH in EWS 2103642310 - [S2600ST] There is no link to channel 4 in redfish after enable HOST interface 2103642381 - [S2600ST] The boot order can't be changed via redfish 1508380544 - [SOW] BMC doesn't check the ISO image header when via HTML5 mount ISO image 1509357645 - [Purley][S2600BP] User can't use Redfish to replace/upload a new certificate instead of current one 1509357868 - [Purley][S2600BP]User can not use EWS to replace/upload a new certificate instead of current one 1509411390 - [Purley][S2600ST] KVM "mouse mode setting" screen in ews shows exceptions 1509439269 - [PURLEY] [BMC]lost dynamic IP after online update BMC 2.83 1509442200 - [BMC][purley]mixed up in get nvme information command 1509464162 - #CCB 3402: [Purley][S2600BP] The file of size larger than 33M cannot be uploaded to the newly image created via Redfish internal interface 1509486843 - #CCB 3402: [Purley][S2600BP] Unmount image is successful while the image is not mounted 2103641466 - [Purley][ S2600WF / S9200WK ]The UI for "anonymous" user is abnormal and can't be modified in EWS 2103641472 - [S2600ST] The Mount type is missing NFS in web ISO help page 2103641482 - [S2600ST] Alert events cannot all be selected when click "Check All" button in EWS->Configuration->Alerts page 2103641549 - [S2600ST] There is an extra character '<' in the Date&Time help page in the Chinese EWS 2103641607 - [S2600ST] There is a unknow item in EWS->Miscellaneous->Power Statistics 2103641618 - [S2600ST] there is missing size limitation definition for Virtual Media Over HTML5 help page in EWS 2103641755 - [Purley] [S9200WK] Open EWS -> Miscellaneous -> Power Statistics, it will pop-up a caution about NM initialization have problem. (BMC 2.83) 2103641774 - [S2600ST] KVM cannot open Via JRE due to JAVA certificate expired. 2103641816 - [S2600ST] The NTP server IP can't be set successfully when NTP server IP is xxx.xxx.xxx.1~9 in EWS 2103642274 - [S2600ST] Alert events cannot all be cleared when click "Clear All" button in EWS->Configuration->Alerts page page 2103642310 - [S2600ST] There is no link to channel 4 in redfish after enable HOST interface 2103642388 - [S2600ST] The EWS can't be opened when online update BMC from 2.48(upload new certificate) to 2.83 1509261003 - [S2600BP][L9][Showstopper]Exit Air Temp (#0x2E) CRITICAL event: Exit Air Temp reports the sensor is high, critical, and going higher state. 1509352602 - [Purley][S2600BP] ISO image mount via Redfish fail. 1509363546 - [Purley][S2600BP]User can not use Redfish to upload CA certificate success 1509118656 - [Purley][S2600ST] Get event log abnormal in EWS after updating BIOS 14012450677 -[S2600WF] system reboots by interacting with OS Watchdog 1507285344 - Upgrade libxml2 from v2.9.8 to v2.9.9 1509247112 - [PURLEY][BMC][IPS 00615607]redfish alerting has power on/off backwards 16013122517 -SDPTool [DEV] - SDR Upload issue 16012935938 -[Purley][S2600BP]When BMC is running factory image, try to update BMC, BMC backup image instead of primary image will be updated. 1509122866 - [Purley] [S2600WF] Can’t mount Virtual Media via Redfish. 2103639108 - [Purley][ S2600WF ]It reports PSU1 FAN fail in SEL after AC cycle with BMC 2.48.f831fbb5. 2103636406 - [Purley][ S2600WF ]The settings is no function for "BootSourceOverrideMode" in Redfish. 22012657916 -jQuery vulnerability affecting Wolf Pass 22012633532 -BMC EWS iKVM over HTML5 disconnects, when Date or Time is selected and keypad '+' [scan code 79] is press 2103635937 - Purley][ S2600WF ][900W DC] The PSU FW isn't match the BMC release note 2103636054 - [Purley][ S2600WF ][900W DC] The blackbox data shows “This feature is not supported by any power supplies in the system” in the BMC debug log file. 2103639150 - [Purley] S9200WK Some MemoryLocation info show "null" when check it by Redfish 1508892684 - [Purley][S2600BP] the warning message is incorrect while adding the same user name in EWS. 1508871269 - User can set the same username as the password when user sets username separately which mismatch Password Complexity rule. ============================================================================= Features added to BMC (v2.88.6999d21a) ============================================================================= Upgrade kernel to 4.9.294 CCB3457:[BIOS & BMC]Bypass BIOS admin password when FORCE_EFI_BOOT or SILENT_FORCE_EFI_BOOT is detected CCB3458:[BMC]Active Directory should allow domain name and user name longer than 16 characters CCB3459:When updating BMC and BIOS, browser should limit search to .bin and .cap files respectively ============================================================================= ISSUES fixed in FRUSDR 0.35 ============================================================================= Updated BIOS sensors ============================================================================= LEGAL INFORMATION ============================================================================= Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel's Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the presented subject matter. The furnishing of documents and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any such patents, trademarks, copyrights, or other intellectual property rights. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Intel is a registered trademark of Intel Corporation. *Other names and brands are the property of their respective owners. Copyright (c) 2022 Intel Corporation. A portion of this firmware is open source code, which falls under the GPL 2.0 license.