================================================================================ Express5800/R120h-1M System ROM U32 v1.32 (02/01/2018) ================================================================================ Software name : Express5800/R120h-1M System ROM (BIOS) update module Models : Express5800/R120h-1M Operating System : This software supports offline update and the following OS. - Windows Server(R) 2012 R2 - Windows Server(R) 2016 - Red Hat(R) Enterprise Linux(R) 7 Target Users : See [Target Users for Update] below Type : System ROM ================================================================================ [About the software] The Express5800/R120h-1M System ROM (BIOS) update module supports the following changes in the Express5800/R120h-1M models: Problems Fixed: - Updated microcode for Intel(R) Xeon(R) Scalable Processors. This version mitigates security vulnerability of INTEL-SA-00088 in Intel Corporation. - Addressed an issue where the system may experience an erroneous boot-time message and Integrated Management Log (IML) entry stating that Core Boost Technology is disabled due to a lack of an iLO Advanced License (531 - Core Boost Technology missing required iLO License). ** Program and data included in this software ** Following program and data are included in this software. Use one of them according to the way of installation. a) Flash image for System Utilities/iLO Web User Interface firmware\U32_1.32_02_01_2018.signed.flash b) Executables for Windows(R) winx64\cp034828.exe c) RPM package for Linux(R) Linux\firmware-system-oem-u32-1.32_2018_02_01-1.1.x86_64.rpm ------------------------------------------------------------------------------- [ Target Users for Update ] This software is available for the users who use the following models with the following System ROM version. - Models to be supported 1. Express5800/R120h-1M - System ROM Versions to be supported 1. U32 v1.00 (06/01/2017) 2. U32 v1.20 (08/18/2017) 3. U32 v1.22 (09/29/2017) 4. U32 v1.26 (11/14/2017) Note: In case of using newer System ROM from the above version, it has already applied equivalent enhancements. Updating the System ROM isn't needed. Be sure to check the System ROM version and date with the following procedures. Select an arbitrary procedure and check the version before and after the update. ** System Utilities ** You can check the System ROM version and date by the following procedure. 1. Power on the system and the contents of process by POST (Power On Self- Test) will be shown on the screen. After a short time, the following message is shown. Press <F9> key, "System Utilities" is started. [F9] System Utilities 2. After starting "System Utilities", select "System Information". 3. Select "Firmware Information". 4. Each firmware version is shown on the screen. The System ROM version and date can be seen at "System ROM" option. Note: After checking the System ROM version, press the <ESC> key or select "Exit" to exit the System Utilities. Note: About detail of "System Utilities" usage, refer to "1. System Utilities" section in the chapter of "Useful Features" of the maintenance guide. ** Windows(R) OS ** You can check the System ROM date by a following procedure. 1. Hold down <Windows> key and press <R> key. 2. In the "Run" dialog box, type "msinfo32" and then click "OK". 3. After "System Information" has started, select "System Summary". 4. Check the System ROM version by the profile of "BIOS Version/Date". ** Linux(R) OS ** You can check the System ROM date by a following procedure. 1. Launch the terminal such as xterm. 2. Execute the command as follows. # /usr/sbin/dmidecode | less Note: "#" means prompt. You do not need to input "#". 3. Check the System ROM date by "BIOS Information->Release Date". Note: The dmidecode command has to be installed. Be certain to read carefully the following NEC software license agreement before applying this software update module. If you can not agree to the terms of the agreement, do not download this software. By downloading the software you will be bounded by the terms of the agreement. <User License Agreement> NEC Corporation ("NEC") grants you the right to use the software program ("Software") under the terms and conditions of this Agreement only in the country where you acquired the Software. You shall agree to all provisions of this Agreement and assume responsibility for selection, installation, use and effect of the Software purchased for your desired effect. 1. Period 1.1 This Agreement shall come into force on the day of the first download. 1.2 You may terminate the license granted hereunder by notifying us in writing at least one month prior to the desired termination date. 1.3 NEC may terminate the license granted you hereunder at any time if you fail to comply with any terms and conditions of this Agreement. 1.4 The license to the Software shall remain in force until the license is terminated on the date set forth hereunder. 1.5 Upon termination of the license, other rights granted you hereunder shall also be terminated. You must destroy, uninstall or dispose of the Software, any copies of the Software and other materials provided with the Software. 2. Right of use 2.1 You may use the Software only on the purchased products, the products which NEC defines as the supported models for the Software. 2.2 NEC grants you the right to use the Software only in the country in which you acquired the Software in accordance with the conditions of the preceding paragraph. 3. Intellectual Property Rights including patent and copyright All of the intellectual property rights to the Software including patent and copyright belong to NEC and/or the owners of the copyright or any other intellectual property rights to the Software. No Intellectual Property Rights including patent and copyright to the Software shall be transferred to you. The Intellectual Property Rights can be protected as a matter of Japan, U.S.A., and any other applicable laws and regulations. 4. Copying, altering, and combining of the Software 4.1 You may only make one copy of the Software solely for a backup purpose, provided, however, that the copy of the Software is loaded into permanent memory of the system (such as a hard disk drive). You may store the Software solely to prevent damages or loss of the memory media. 4.2 You shall place the copyright notice and other legends on each copy of the Software. 4.3 You may not use, copy, alter, combine, publish, reproduce the Software over the Internet, or otherwise dispose of the Software except as provided in this Agreement. 4.4 You may not copy, publish the manual and other related documentation provided with the Software, or reproduce such manual and documentation over the Internet. 4.5 No intangible property right to the Software shall be transferred to you. 5. Transfer You may not sublicense, assign, transfer, or otherwise dispose of the Software or the right of use to any third party except as provided herein. 6. Reverse compile You may not reverse engineer, decompile, or otherwise disassemble the Software. 7. Limitation of warranties 7.1 THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. NEC DISCLAIMS ALL WARRANTIES FOR THE SOFTWARE, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. FURTHER, NEC MAKES NO REPRESENTATION OR WARRANTY THAT THE USE OF ANY SOFTWARE WILL NOT INFRINGE ANY THIRD PARTY'S RIGHTS, INCLUDING BUT NOT LIMITED TO, ANY INTELLECTUAL PROPERTY RIGHTS. IN NO EVENT SHALL NEC BE HELD LIABLE WITH RESPECT TO ANY CLAIM BY YOU OR ANY THIRD PARTY ON ACCOUNT OF OR ARISING OUT OF THE USE OF THE SOFTWARE. 7.2 Notwithstanding the provisions of the preceding paragraph, in case NEC makes any bug-fix version to the Software, NEC will, at its expense, furnish you with such bug-fix version, update version, or information in relation to such bug-fix or update version both in the source code form and object code form, and such bug-fix version or update version shall be considered as the licensed Software. 8. No liability IN NO EVENT SHALL NEC BE LIABLE FOR ANY INDIRECT OR CONSEQUENTIAL DAMAGES OR LOSS OF PROFIT OR DAMAGES BASED ON ANY THIRD PARTY CLAIM, EVEN IF NEC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 9. Miscellaneous 9.1 This Agreement shall be governed by the laws of the country in which you acquired the Software. 9.2 You agree that NEC inspects the use of the Software and provides the information of the inspection to the owner of the copyright to the Software. 9.3 If the Software is licensed for use in the performance of a U.S. Government prime contract or subcontract, You agree that, consistent with FAR 12.211 and 12.212, commercial computer Software, computer Software documentation and technical data for commercial items are licensed under this Agreement. 9.4 If the Software has a file written about software license (hereinafter referred to as "License File"), the terms of License File are applied to the files specified in License File, regardless of the above-mentioned Agreement. ================================================================================ System ROM Installation Procedure ================================================================================ ** System Utilities ** [ Preparation ] - USB memory x1 1. Preparation of flash image (*.flash) (1) Prepare the USB memory that is formatted with FAT or FAT32. (2) Copy "a) Flash image for System Utilities/iLO Web User Interface file" (approx. size 32MB) to a USB memory. 2. System ROM installation procedure Install the System ROM by a following procedure. (1) Attach the USB memory created in the procedure of "1" and power on the system. (2) In POST, press <F9> key to enter System Utilities. (3) Select "Embedded Applications > Firmware Update > System ROM" menu. (4) Choose "Select Firmware File", and then select the device in which flash image was copied. (5) Select flash image (i.e. *.flash). (6) Select "Start Firmware Update". (7) When the popup message of "Press ENTER to start firmware update. This process might take a few minutes..." is shown, press <ENTER> key. Update process is started. (8) The progress of the update is shown. When it's completed, the popup message of "Firmware update completed successfully." is shown. Press <ENTER> key, the message is closed. (9) Detach the Installation USB memory from the system. (10) Reboot the system; Select the "Reboot the System" option at top level menu of System Utilities. (11) Wait reboot completion for update to take effect. The installation is successfully finished. ** iLO Web User Interface ** 1. Preparation of flash image (*.flash) (1) Copy "a) Flash image for System Utilities/iLO Web User Interface file" (i.e. *.flash) to any location which is accessible from the remote PC. 2. System ROM installation procedure (1) Start the Web Browser on remote PC. And log-in to the iLO Web User Interface by a "Configure to iLO Settings" privilege user. (2) Select "Firmware & OS Software tab" from the right menu. (3) Select "Update Firmware" from the left menu. (4) Select the flash image, copied by a procedure of "1." (5) Press "Flash" to begin update process. (6) Wait for the "Firmware Update Completed." message to display. (7) Reboot the system. (8) Wait reboot completion for update to take effect. The installation is successfully finished. ** Windows(R) OS ** 1. Preparation of Installation (1) Log on to the system as a user with administrator privilege. (2) Terminate all running application. (3) Copy "b) Executables for Windows(R) file" to a suitable folder. 2. System ROM installation procedure (1) Double-click "b) Executables for Windows(R) file" (i.e. *.exe). The System ROM Update Program will start. (2) Follow the messages will be shown and complete the operation. (3) If the messages requesting reboot will be shown, select "yes" to reboot of the system. (4) Wait reboot completion for update to take effect. The installation is successfully finished. ** Linux(R) OS ** 1. Preparation of Installation (1) Log-in as root. Or switch to root with "su" command. (2) Terminate all running application. (3) Copy "c) RPM package for Linux(R) file" to a suitable directory. e.g. /root 2. System ROM installation procedure (1) Install the RPM package of this System ROM update module by the command below. # rpm -Uvh <filename>.rpm Note: The "<filename>.rpm" should replace to RPM package name which is described at above "Binaries of this release" section. Note: "#" means prompt. You do not need to input "#". (2) See where the files land by the command below. # rpm -qlp <filename>.rpm (3) Change to the directory you see in the previous step. (4) Run setup by the command below. # ./setup (5) Follow the messages will be shown and complete the operation. (6) If a reboot inquiry is appear then press "y" to trigger reboot. (7) Wait reboot completion for update to take effect. The installation is successfully finished. ** Other OSes (e.g. VMware(R), etc.) ** Use the one of following procedures to update: - Install the System ROM from System Utilities - Install the System ROM from iLO Web User Interface ================================================================================ Notes ================================================================================ ** Notes in general ** * Refer to "license_en.txt" about the user license agreement. * When you install the system ROM, the flashing mechanism writes over the backup ROM and saves current ROM as a backup, enabling you to switch easily to the alternate ROM version if the new ROM becomes corrupted for any reason. This feature protects the existing ROM version, even if you experience a power failure while flashing the ROM. * When Windows(R) BitLocker(TM) function is set to "Enabled", install the System ROM after making the function "Disabled". Then make the function "Enabled" after install and reboot of the system. If you install the system ROM without making the function "Disabled", you may need the recovery password when you boot the system. * This software does not support a virtualized environment such as hyper visor, guest OS, etc. Please install either on the OS which this software supports or with the method of offline installation. ** Note for Windows(R) OS environment and Linux(R) OS environment ** * This software will access to iLO5 (Baseboard Management Controller). It is required that the "iLO 5 Channel Interface Driver" (CHIF) must be installed. The CHIF driver can be installed by using EXPRESSBUILDER or "Starter pack". -------------------------------------------------------------------------------- [Revision history] Version:1.32 (02/01/2018) Problems Fixed: - Updated microcode for Intel(R) Xeon(R) Scalable Processors. This version mitigates security vulnerability of INTEL-SA-00088 in Intel Corporation. - Addressed an issue where the system may experience an erroneous boot-time message and Integrated Management Log (IML) entry stating that Core Boost Technology is disabled due to a lack of an iLO Advanced License (531 - Core Boost Technology missing required iLO License). Version:1.26 (11/14/2017) Enhancements: - Added support for update function of Innovation Engine (IE) Firmware revision 0.1.4.4 and later. Updating System ROM to v1.26 is needed to apply IE Firmware 0.1.4.4 and SPS Firmware 4.0.4.288 or later. These version of firmware mitigate security vulnerability of INTEL-SA-00086 in Intel Corporation. Problems Fixed: - Addressed an issue where the High Performance Event Timer (HPET) was reported as "not functioning properly" under Device Manager on Windows(R). Version:1.22 (09/29/2017) Problems Fixed: - Addressed an issue where the system would not achieve maximum performance results when the BIOS/Platform Configuration (RBSU) Sub-NUMA Clustering option is enabled. This option is not enabled by default. - Addressed an issue where the system may have the system time incorrectly "shifted" to the incorrect time after the operating system has been running for an extended period of time. This issue was typically seen under Microsoft Windows(R) when the Set Time Automatically option was enabled from the Windows Date and Time Settings configuration page. - Addressed an issue where the system may report an inaccurate error message in the Integrated Management Log (IML) when a memory training failure occurred. It is recommended that customers update to this version of the system ROM before replacing any DIMMs due to a training issue. - Addressed an issue where the system may experience an erroneous boot-time message and Integrated Management Log (IML) entry stating that Core Boost Technology is disabled due to a lack of an iLO Advanced License (531 - Core Boost Technology missing required iLO License) when using the Version 1.20 System ROM. Version:1.20 (08/18/2017) Enhancements: - Added support for Dynamic Power Capping. This feature can be enabled from the BIOS/Platform Configuration (RBSU) Boot Time Optimizations Menu. This support requires Power Management Controller Firmware version 1.0.4 and Integrated Lights-Out (iLO) Firmware version 1.15 or later. - Added support for the Core Boost Technology. This feature requires IE Firmware 0.1.2.6 or later. - Added a new BIOS/Platform Configuration (RBSU) Power and Performance Tuning option for LLC Dead Line Allocation. When running certain applications, modifying this setting from its default value may improve system performance. - Added a new BIOS/Platform Configuration (RBSU) Power and Performance Tuning option for Stale A to S. When running certain applications, modifying this setting from its default value may improve system performance. - Added support to detect and report unbalanced memory configurations that may result in non-optimal performance. Please consult the User's Guide for more information on memory population rules and recommendations. - Added a new Auto option for the XPT Prefetcher in the BIOS/Platform Configuration (RBSU) menu that will default the XPT Prefetcher to disabled based on a current Intel sighting processor issue. Enabling this option (via setting this option for Force Enable) may improve latency performance, but Intel has indicated rare stability issues may occur if XPT Prefetcher is enabled. - Added support for 128GB Load Reduced DIMMs (LRDIMMs). - Updated the system thermal logic to support the latest GPU adapters. - Updated the RESTful API BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options. - Updated the language translations (non-English modes) for System Utilities. - Added support for "Fast Fault Tolerant (ADDC)" option on Advanced Memory Protection. Problems Fixed: - Addressed an issue where the UEFI or Legacy Boot Order could still be modified after an incorrect Administrator Password was entered in the BIOS/Platform Configuration (RBSU) menus. - Addressed an issue where the embedded AHCI SATA controller would not show up properly in the BIOS/Platform Configuration (RBSU) PCI Devices menu when no drives were attached to the controller. - Addressed an issue where saving a configuration setting from an optional device's configuration page in the System Utilities menu would not be saved properly. This issue was seen with one Network Adapter card. - Addressed an issue where the system ROM would not correctly report a configuration error for the Smart Battery storage subsystem when more devices were installed than could be supported by the installed battery. - Addressed an issue where a platform configured with direct attached NVMe hard drives may report the incorrect location (box and bay location) from the System Utilities page. - Addressed an issue where the System Utilities menu may not show the proper name for an optional PCIe Adapter. - Addressed an issue where the chassis power supply information would not be properly reported from the Industry Standard SMBIOS records. - Addressed an issue where the Integrated Lights-Out (iLO) remote Console Keyboard and Mouse may not function properly when the system is configured for Legacy Boot Mode. This issue does not exist on systems configured in UEFI Boot Mode. - Addressed an issue where the Jitter Performance feature settings could not be properly modified from the iLO web interface. - Addressed an issue where the system may report that the Smart Battery is charging when in fact the battery has failed. It is recommended to flash to this system ROM if a system is reporting Smart Battery issues. - Addressed an issue where the Trusted Platform Module (TPM) option for TPM Visibility could not be configured through the RESTful API. - Addressed an issue where the system may become unresponsive when repeatedly typing characters, such as DIR, in Legacy Boot Mode from a pre-OS environment. This issue does not impact systems in UEFI Boot Mode or a system once the system boots into an operating system. - Addressed an issue where certain third party PCIe adapters, such as a Dialogic adapter, would not function properly due to the PCIe Maximum Payload size being incorrectly programmed. - Addressed an issue where certain NVMe devices may not be detected when the x16 slot PCIe Riser and three slot x8 riser are present in the server. - Addressed an issue where a Network Boot option would still show an entry in the Legacy Boot Order when Network Boot was disabled on the device from the BIOS/Platform Configuration (RBSU) Network Options Menu. This issue does not affect systems configured for UEFI Boot Mode. - Addressed an issue where the system may become unresponsive when using the TAB key in the BIOS/Platform Configuration (RBSU) menus. - Addressed an issue where the BIOS would not properly identify and halt a system from booting with an invalid DIMM configuration. - Addressed an issue where the BIOS/Platform Configuration (RBSU) Energy Efficient Turbo setting was "backwards". When the configuration setting was set to enabled, the feature would actually be Disabled. When configured to Disabled, the feature would actually be enabled. - Addressed an issue where the server might lockup and display a red screen when trying to repair a failed RAID volume off of an S100i SW RAID controller. - Addressed an issue where the RESTful API may report that BIOS settings were not applied properly even when they are properly configured. - Addressed an issue where the system may become unresponsive during boot after a warm reset, typically seen with a blank screen, when a Trusted Platform Module (TPM) is installed. If reboot issues are seen with systems containing an optional TPM, it is highly recommended the System ROM be enabled to this revision or later. - Addressed an extremely rare issue where the system may incorrectly report a 413 Innovation Engine Authentication Error on a server reboot. - Removed support for the BIOS/Platform Configuration (RBSU) Power On Logo disable functionality. - Removed the Platform Configuration (RBSU) Option to enable or disable the Embedded Diagnostics. Embedded Diagnostics is not supported on this server and the menu option should not have been available and was not functional. - Remove Embedded Diagnostics support from System Utilities. - Removed support for the chipset firmware based Trusted Platform Module (TPM) known as Intel Platform Trust Technology (Intel PTT). This feature is no longer supported due to stability issues and Intel recommends not supporting this feature. Users should instead install a TPM kit for this support. - Addressed an issue the "iLO LUN 00 Media 0 USB Device" always exists. -------------------------------------------------------------------------------- [Copyright and Trademark] All contents on this software are the copyright of NEC Corporation or the third-party software developer. All other contents mentioned herein are copyright of their respective owners. Microsoft, Windows, Windows Server are trademarks or registered trademarks of Microsoft Corporation in the United States and other countries. Linux(R) is a registered trademark of Linus Torvalds in the United States and other countries. Red Hat is a trademark or a registered trademark of Red Hat Inc. in the United States and other countries. All other company names and product names mentioned herein are registered trademarks or trademarks of their respective owners. -------------------------------------------------------------------------------- Copyright NEC Corporation 2018 |