================================================================================
Express5800/R120h-1E
Express5800/R120h-2E
System ROM U31 v2.22 (11/13/2019)
================================================================================
Software name : Express5800/R120h-1E, Express5800/R120h-2E
System ROM (BIOS) update module
Models : Express5800/R120h-1E
Express5800/R120h-2E
Operating System : This software supports offline update and the following OS.
- Windows Server(R) 2012 R2
- Windows Server(R) 2016
- Windows Server(R) 2019
- Red Hat(R) Enterprise Linux(R) 7
- Red Hat(R) Enterprise Linux(R) 8
Target Users : See [Target Users for Update] below
Type : System ROM
================================================================================
[About the software]
The Express5800/R120h-1E, Express5800/R120h-2E System ROM (BIOS) update module
supports the following changes in the Express5800/R120h-1E,
Express5800/R120h-2E models:
Notes:
- Do not update on a system that meets all the following conditions.
OS :
VMWare ESXi
Processor :
- Intel(R) Xeon(R) Bronze 31xx processor
- Intel(R) Xeon(R) Silver 41xx processor
- Intel(R) Xeon(R) Gold 51xx processor
- Intel(R) Xeon(R) Gold 61xx processor
- Intel(R) Xeon(R) Platinum 81xx processor
BIOS/Platform Configuration(RBSU) :
- Intel(R) TXT Support is set to Enabled.
System Utilities > System Configuration >
RBSU > Server Security >
Intel(R) TXT Support
- "Current TPM Type" of "Trusted Platform Module Options" is set to
"TPM 1.2".
System Utilities > System Configuration >
RBSU > Server Security > Trusted Platform Module Options >
Current TPM Type
Note) The factory setting is "TPM 2.0".
Enhancements and problem fixes:
- Updated to the latest thermal support for the platform.
- Updated the RESTful API BIOS Attribute Registry resources to match the
latest BIOS/Platform Configuration(RBSU) options.
- Addressed following security vulnerabilities.
CVE-2017-5715, CVE-2019-0151, CVE-2019-0152, CVE-2019-11135, CVE-2019-11136,
CVE-2019-11137, CVE-2019-11139
- Updated microcode for Intel(R) Xeon(R) Scalable processor family.
- Addressed an issue where the server may become unresponsive during POST
when both iLO and the server are reset simultaneously.
Note) The server stops POST by a message of "Memory Initialization Start".
- Addressed an issue where the system may incorrectly report that a DIMM has
been mapped out in the Integrated Management Log (IML) even though DIMM was
not mapped out.
** Program and data included in this software **
Following program and data are included in this software.
Use one of them according to the way of installation.
a) Flash image for System Utilities/iLO Web User Interface
firmware\U31_2.22_11_13_2019.signed.flash
b) Executables for Windows(R)
winx64\cp042159.exe
c) RPM package for Linux(R)
Linux\firmware-system-oem-u31-2.22_2019_11_13-1.1.x86_64.rpm
-------------------------------------------------------------------------------
[ Target Users for Update ]
This software is available for the users who use the following models with the
following System ROM version.
- Models to be supported
1. Express5800/R120h-1E
2. Express5800/R120h-2E
- System ROM Versions to be supported
1. U31 v1.20 (08/18/2017)
2. U31 v1.22 (09/29/2017)
3. U31 v1.26 (11/14/2017)
4. U31 v1.28 (12/11/2017)
5. U31 v1.32 (02/01/2018)
6. U31 v1.36 (02/14/2018)
7. U31 v1.42 (06/20/2018)
8. U31 v1.46 (10/11/2018)
9. U31 v2.00 (02/02/2019)
10. U31 v2.02 (03/19/2019)
11. U31 v2.04 (04/18/2019)
12. U31 v2.10 (05/21/2019)
Note: In case of using newer System ROM from the above version, it has already
applied equivalent enhancements. Updating the System ROM isn't needed.
Be sure to check the System ROM version and date with the following procedures.
Select an arbitrary procedure and check the version before and after the update.
** System Utilities **
You can check the System ROM version and date by the following procedure.
1. Power on the system and the contents of process by POST (Power On Self-
Test) will be shown on the screen. After a short time, the following
message is shown. Press <F9> key, "System Utilities" is started.
[F9] System Utilities
2. After starting "System Utilities", select "System Information".
3. Select "Firmware Information".
4. Each firmware version is shown on the screen. The System ROM version and
date can be seen at "System ROM" option.
Note: After checking the System ROM version, press the <ESC> key or
select "Exit" to exit the System Utilities.
Note: About detail of "System Utilities" usage, refer to "1. System
Utilities" section in the chapter of "Useful Features" of the
maintenance guide.
** Windows(R) OS **
You can check the System ROM date by a following procedure.
1. Hold down <Windows> key and press <R> key.
2. In the "Run" dialog box, type "msinfo32" and then click "OK".
3. After "System Information" has started, select "System Summary".
4. Check the System ROM version by the profile of "BIOS Version/Date".
** Linux(R) OS **
You can check the System ROM date by a following procedure.
1. Launch the terminal such as xterm.
2. Execute the command as follows.
# /usr/sbin/dmidecode | less
Note: "#" means prompt. You do not need to input "#".
3. Check the System ROM date by "BIOS Information->Release Date".
Note: The dmidecode command has to be installed.
Be certain to read carefully the following NEC software license agreement
before applying this software update module. If you can not agree to the terms
of the agreement, do not download this software. By downloading the software
you will be bounded by the terms of the agreement.
<User License Agreement>
NEC Corporation ("NEC") grants you the right to use the software
program ("Software") under the terms and conditions of this Agreement
only in the country where you acquired the Software. You shall agree to all
provisions of this Agreement and assume responsibility for selection,
installation, use and effect of the Software purchased for your desired effect.
1. Period
1.1 This Agreement shall come into force on the day of the first download.
1.2 You may terminate the license granted hereunder by notifying us in writing
at least one month prior to the desired termination date.
1.3 NEC may terminate the license granted you hereunder at any time if you
fail to comply with any terms and conditions of this Agreement.
1.4 The license to the Software shall remain in force until the license is
terminated on the date set forth hereunder.
1.5 Upon termination of the license, other rights granted you hereunder shall
also be terminated. You must destroy, uninstall or dispose of the Software,
any copies of the Software and other materials provided with the Software.
2. Right of use
2.1 You may use the Software only on the purchased products, the products
which NEC defines as the supported models for the Software.
2.2 NEC grants you the right to use the Software only in the country in which
you acquired the Software in accordance with the conditions of the
preceding paragraph.
3. Intellectual Property Rights including patent and copyright
All of the intellectual property rights to the Software including patent
and copyright belong to NEC and/or the owners of the copyright or any
other intellectual property rights to the Software. No Intellectual
Property Rights including patent and copyright to the Software shall be
transferred to you. The Intellectual Property Rights can be protected as
a matter of Japan, U.S.A., and any other applicable laws and regulations.
4. Copying, altering, and combining of the Software
4.1 You may only make one copy of the Software solely for a backup purpose,
provided, however, that the copy of the Software is loaded into permanent
memory of the system (such as a hard disk drive). You may store the
Software solely to prevent damages or loss of the memory media.
4.2 You shall place the copyright notice and other legends on each copy of the
Software.
4.3 You may not use, copy, alter, combine, publish, reproduce the Software
over the Internet, or otherwise dispose of the Software except as provided
in this Agreement.
4.4 You may not copy, publish the manual and other related documentation
provided with the Software, or reproduce such manual and documentation
over the Internet.
4.5 No intangible property right to the Software shall be transferred to you.
5. Transfer
You may not sublicense, assign, transfer, or otherwise dispose of the Software
or the right of use to any third party except as provided herein.
6. Reverse compile
You may not reverse engineer, decompile, or otherwise disassemble the Software.
7. Limitation of warranties
7.1 THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. NEC
DISCLAIMS ALL WARRANTIES FOR THE SOFTWARE, EITHER EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE. FURTHER, NEC MAKES NO REPRESENTATION OR WARRANTY THAT
THE USE OF ANY SOFTWARE WILL NOT INFRINGE ANY THIRD PARTY'S RIGHTS,
INCLUDING BUT NOT LIMITED TO, ANY INTELLECTUAL PROPERTY RIGHTS. IN NO EVENT
SHALL NEC BE HELD LIABLE WITH RESPECT TO ANY CLAIM BY YOU OR ANY THIRD
PARTY ON ACCOUNT OF OR ARISING OUT OF THE USE OF THE SOFTWARE.
7.2 Notwithstanding the provisions of the preceding paragraph, in case NEC
makes any bug-fix version to the Software, NEC will, at its expense,
furnish you with such bug-fix version, update version, or information in
relation to such bug-fix or update version both in the source code form and
object code form, and such bug-fix version or update version shall be
considered as the licensed Software.
8. No liability
IN NO EVENT SHALL NEC BE LIABLE FOR ANY INDIRECT OR CONSEQUENTIAL DAMAGES OR
LOSS OF PROFIT OR DAMAGES BASED ON ANY THIRD PARTY CLAIM, EVEN IF NEC HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
9. Miscellaneous
9.1 This Agreement shall be governed by the laws of the country in which you
acquired the Software.
9.2 You agree that NEC inspects the use of the Software and provides the
information of the inspection to the owner of the copyright to the
Software.
9.3 If the Software is licensed for use in the performance of a U.S. Government
prime contract or subcontract, You agree that, consistent with FAR 12.211
and 12.212, commercial computer Software, computer Software documentation
and technical data
for commercial items are licensed under this Agreement.
9.4 If the Software has a file written about software license (hereinafter
referred to as "License File"), the terms of License File are applied to
the files specified in License File, regardless of the above-mentioned
Agreement.
================================================================================
System ROM Installation Procedure
================================================================================
** System Utilities **
[ Preparation ]
- USB memory x1
1. Preparation of flash image (*.flash)
(1) Prepare the USB memory that is formatted with FAT or FAT32.
(2) Copy "a) Flash image for System Utilities/iLO Web User Interface file"
(approx. size 32MB) to a USB memory.
2. System ROM installation procedure
Install the System ROM by a following procedure.
(1) Attach the USB memory created in the procedure of "1" and power on the
system.
(2) In POST, press <F9> key to enter System Utilities.
(3) Select "Embedded Applications > Firmware Update > System ROM" menu.
(4) Choose "Select Firmware File", and then select the device in which flash
image was copied.
(5) Select flash image (i.e. *.flash).
(6) Select "Start Firmware Update".
(7) When the popup message of "Press ENTER to start firmware update.
This process might take a few minutes..." is shown, press <ENTER> key.
Update process is started.
(8) The progress of the update is shown. When it's completed, the popup
message of "Firmware update completed successfully." is shown. Press
<ENTER> key, the message is closed.
(9) Detach the Installation USB memory from the system.
(10) Reboot the system; Select the "Reboot the System" option at top
level menu of System Utilities.
(11) Wait reboot completion for update to take effect.
The installation is successfully finished.
** iLO Web User Interface **
1. Preparation of flash image (*.flash)
(1) Copy "a) Flash image for System Utilities/iLO Web User Interface file"
(i.e. *.flash) to any location which is accessible from the remote PC.
2. System ROM installation procedure
(1) Start the Web Browser on remote PC. And log-in to the iLO Web User
Interface by a "Configure to iLO Settings" privilege user.
(2) Select "Firmware & OS Software tab" from the right menu.
(3) Select "Update Firmware" from the left menu.
(4) Select the flash image, copied by a procedure of "1."
(5) Press "Flash" to begin update process.
(6) Wait for the "Firmware Update Completed." message to display.
(7) Reboot the system.
(8) Wait reboot completion for update to take effect.
The installation is successfully finished.
** Windows(R) OS **
1. Preparation of Installation
(1) Log on to the system as a user with administrator privilege.
(2) Terminate all running application.
(3) Copy "b) Executables for Windows(R) file" to a suitable
folder.
2. System ROM installation procedure
(1) Double-click "b) Executables for Windows(R) file" (i.e. *.exe).
The System ROM Update Program will start.
(2) Follow the messages will be shown and complete the operation.
(3) If the messages requesting reboot will be shown, select "yes" to reboot
of the system.
(4) Wait reboot completion for update to take effect.
The installation is successfully finished.
** Linux(R) OS **
1. Preparation of Installation
(1) Log-in as root. Or switch to root with "su" command.
(2) Terminate all running application.
(3) Copy "c) RPM package for Linux(R) file" to a suitable directory.
e.g. /root
2. System ROM installation procedure
(1) Install the RPM package of this System ROM update module by the command
below.
# rpm -Uvh <filename>.rpm
Note: The "<filename>.rpm" should replace to RPM package name which
is described at above "Binaries of this release" section.
Note: "#" means prompt. You do not need to input "#".
(2) See where the files land by the command below.
# rpm -qlp <filename>.rpm
(3) Change to the directory you see in the previous step.
(4) Run setup by the command below.
# ./setup
(5) Follow the messages will be shown and complete the operation.
(6) If a reboot inquiry is appear then press "y" to trigger reboot.
(7) Wait reboot completion for update to take effect.
The installation is successfully finished.
** Other OSes (e.g. VMware(R), etc.) **
Use the one of following procedures to update:
- Install the System ROM from System Utilities
- Install the System ROM from iLO Web User Interface
================================================================================
Notes
================================================================================
** Notes in general **
* Refer to "license_en.txt" about the user license agreement.
* When you install the system ROM, the flashing mechanism writes over the
backup ROM and saves current ROM as a backup, enabling you to switch easily
to the alternate ROM version if the new ROM becomes corrupted for any
reason. This feature protects the existing ROM version, even if you
experience a power failure while flashing the ROM.
* When Windows(R) BitLocker(TM) function is set to "Enabled", install the
System ROM after making the function "Disabled". Then make the function
"Enabled" after install and reboot of the system. If you install the system
ROM without making the function "Disabled", you may need the recovery
password when you boot the system.
* This software does not support a virtualized environment such as hyper
visor, guest OS, etc. Please install either on the OS which this software
supports or with the method of offline installation.
* To meet firmware dependencies, you can update iLO firmware by latest
Starter Pack. And you can update Innovation Engine(IE) firmware by latest
"Server Platform Services(SPS) firmware update module and Innovation
Engine(IE) firmware update module".
You can download latest update module(s) from the following web site.
https://www.nec.com/express
("Support & Downloads" of the page top - PCs & Servers - Servers - Downloads
- Select Model)
** Note for Windows(R) OS environment and Linux(R) OS environment **
* This software will access to iLO5 (Baseboard Management Controller). It is
required that the "iLO 5 Channel Interface Driver" (CHIF) must be installed.
The CHIF driver can be installed by using EXPRESSBUILDER or "Starter Pack".
--------------------------------------------------------------------------------
[Revision history]
Version:2.22 (11/13/2019)
Notes:
- Do not update on a system that meets all the following conditions.
OS :
VMWare ESXi
Processor :
- Intel(R) Xeon(R) Bronze 31xx processor
- Intel(R) Xeon(R) Silver 41xx processor
- Intel(R) Xeon(R) Gold 51xx processor
- Intel(R) Xeon(R) Gold 61xx processor
- Intel(R) Xeon(R) Platinum 81xx processor
BIOS/Platform Configuration(RBSU) :
- Intel(R) TXT Support is set to Enabled.
System Utilities > System Configuration >
RBSU > Server Security >
Intel(R) TXT Support
- "Current TPM Type" of "Trusted Platform Module Options" is set to
"TPM 1.2".
System Utilities > System Configuration >
RBSU > Server Security > Trusted Platform Module Options >
Current TPM Type
Note) The factory setting is "TPM 2.0".
Enhancements and problem fixes:
- Updated to the latest thermal support for the platform.
- Updated the RESTful API BIOS Attribute Registry resources to match the
latest BIOS/Platform Configuration(RBSU) options.
- Addressed following security vulnerabilities.
CVE-2017-5715, CVE-2019-0151, CVE-2019-0152, CVE-2019-11135, CVE-2019-11136,
CVE-2019-11137, CVE-2019-11139
- Updated microcode for Intel(R) Xeon(R) Scalable processor family.
- Addressed an issue where the server may become unresponsive during POST
when both iLO and the server are reset simultaneously.
Note) The server stops POST by a message of "Memory Initialization Start".
- Addressed an issue where the system may incorrectly report that a DIMM has
been mapped out in the Integrated Management Log (IML) even though DIMM was
not mapped out.
Version:2.16 (09/12/2019)
Notes:
- Do not update on a system that meets all the following conditions.
OS :
VMWare ESXi
Processor :
- Intel(R) Xeon(R) Bronze 31xx processor
- Intel(R) Xeon(R) Silver 41xx processor
- Intel(R) Xeon(R) Gold 51xx processor
- Intel(R) Xeon(R) Gold 61xx processor
- Intel(R) Xeon(R) Platinum 81xx processor
BIOS/Platform Configuration(RBSU) :
- Intel(R) TXT Support is set to Enabled.
System Utilities > System Configuration >
RBSU > Server Security >
Intel(R) TXT Support
- "Current TPM Type" of "Trusted Platform Module Options" is set to
"TPM 1.2".
System Utilities > System Configuration >
RBSU > Server Security > Trusted Platform Module Options >
Current TPM Type
Note) The factory setting is "TPM 2.0".
Enhancements and problem fixes:
- Updated microcode for Intel(R) Xeon(R) Scalable processor family.
Version:2.14 (09/05/2019)
Notes:
- Do not update on a system that meets all the following conditions.
OS :
VMWare ESXi
Processor :
- Intel(R) Xeon(R) Bronze 31xx processor
- Intel(R) Xeon(R) Silver 41xx processor
- Intel(R) Xeon(R) Gold 51xx processor
- Intel(R) Xeon(R) Gold 61xx processor
- Intel(R) Xeon(R) Platinum 81xx processor
BIOS/Platform Configuration(RBSU) :
- Intel(R) TXT Support is set to Enabled.
System Utilities > System Configuration >
RBSU > Server Security >
Intel(R) TXT Support
- "Current TPM Type" of "Trusted Platform Module Options" is set to
"TPM 1.2".
System Utilities > System Configuration >
RBSU > Server Security > Trusted Platform Module Options >
Current TPM Type
Note) The factory setting is "TPM 2.0".
Enhancements and problem fixes:
- Addressed an issue where the system may experience an uncorrectable memory
error when 2nd Gen Intel(R) Xeon(R) Scalable processor family are installed
with the following LRDIMM and Processor C-states are enabled.
- 64GB DDR4-2933 LR Memory Kit (1x64GB/QR) [N8102-725]
- 128GB DDR4-2933 LR Memory Kit (1x64GB/OR) [N8102-726]
Version:2.10 (05/21/2019)
Notes:
- Do not update on a system that meets all the following conditions.
OS :
VMWare ESXi
Processor :
- Intel(R) Xeon(R) Bronze 31xx processor
- Intel(R) Xeon(R) Silver 41xx processor
- Intel(R) Xeon(R) Gold 51xx processor
- Intel(R) Xeon(R) Gold 61xx processor
- Intel(R) Xeon(R) Platinum 81xx processor
BIOS/Platform Configuration(RBSU) :
- Intel(R) TXT Support is set to Enabled.
System Utilities > System Configuration >
RBSU > Server Security >
Intel(R) TXT Support
- "Current TPM Type" of "Trusted Platform Module Options" is set to
"TPM 1.2".
System Utilities > System Configuration >
RBSU > Server Security > Trusted Platform Module Options >
Current TPM Type
Note) The factory setting is "TPM 2.0".
Enhancements and problem fixes:
- Added a new BIOS/Platform Configuration (RBSU) IODC Configuration option to
the Power and Performance Menu.
System Utilities > System Configuration >
RBSU > Power and Performance Options >
Advanced Performance Tuning Options > IODC Configuration
This option allows for tuning the policy for which I/O transactions interact
with the processor cache.
- Added support for Fast Fault Tolerant Memory (ADDDC) for memory configurations
with single rank memory implemented. After updating the System ROM, the server
will automatically configure Advanced Memory Protection option to Fault Tolerant
Memory (ADDDC) if both of the following two conditions are satisfied.
System Utilities > System Configuration >
RBSU > Memory Options > Advanced Memory Protection
- A memory configuration that supports Fast Fault Tolerant Memory (ADDDC).
- The configuration of Workload Profile is other than "Custom" and "Low latency".
System Utilities > System Configuration >
RBSU > Workload Profile
- Addressed an issue where the Server Backup and Restore functionality may not
work properly if initiated through the RESTful API returning a message "An
internal error occurred during RIS operation".
- Addressed an issue where the memory refresh rate is not set correctly when
"Memory Refresh rate" option is "2x Refresh" parameter.
System Utilities > System Configuration >
RBSU > Memory Options > Memory Refresh Rate = 2x Refresh
This issue was introduced with the v2.00 System ROM and did not impact
earlier versions of the System ROM.
- Addressed an issue where the system would not boot to a USB drive when a
non-bootable (non-formatted) drive was also present in the system. This issue
only impacts systems configured in Legacy BIOS Mode.
System Utilities > System Configuration >
RBSU > Boot Options > Boot Mode
- Addressed following security vulnerabilities.
CVE-2019-1559
Version:2.04 (04/18/2019)
Notes:
- Do not update on a system that meets all the following conditions.
OS :
VMWare ESXi
Processor :
- Intel(R) Xeon(R) Bronze 31xx processor
- Intel(R) Xeon(R) Silver 41xx processor
- Intel(R) Xeon(R) Gold 51xx processor
- Intel(R) Xeon(R) Gold 61xx processor
- Intel(R) Xeon(R) Platinum 81xx processor
BIOS/Platform Configuration(RBSU) :
- Intel(R) TXT Support is set to Enabled.
System Utilities > System Configuration >
RBSU > Server Security >
Intel(R) TXT Support
- "Current TPM Type" of "Trusted Platform Module Options" is set to
"TPM 1.2".
System Utilities > System Configuration >
RBSU > Server Security > Trusted Platform Module Options >
Current TPM Type
Note) The factory setting is "TPM 2.0".
Enhancements and problem fixes:
- Updated microcode for Intel(R) Xeon(R) Scalable processor family.
Contents of update
- Addressed following security vulnerabilities.
CVE-2018-12126, CVE-2018-12130, CVE-2018-12127, CVE-2019-11091,
CVE-2019-0119, CVE-2019-0126
- Addressed issues that may be cause for the following case.
- Correctable or Uncorrectable Memory Errors
- Uncorrectable Machine Check Exception (UMCE) Errors
- Addressed an issue where the system boot time may be longer with the
following processors.
- Intel(R) Xeon(R) Bronze 3xxx processor
- Intel(R) Xeon(R) Silver 4xxx processor
- Intel(R) Xeon(R) Gold 5xxx processor
Version:2.02 (03/19/2019)
Notes:
- Do not update on a system that meets all the following conditions.
OS :
VMWare ESXi
Processor :
Intel (R) Xeon (R) Scalable Processor
3100/4100/5100/6100/8100 series.
BIOS/Platform Configuration(RBSU) :
- Intel(R) TXT Support is set to Enabled.
System Utilities > System Configuration >
RBSU > Server Security >
Intel(R) TXT Support
- "Current TPM Type" of "Trusted Platform Module Options" is set to
"TPM 1.2".
System Utilities > System Configuration >
RBSU > Server Security > Trusted Platform Module Options >
Current TPM Type
Note) The factory setting is "TPM 2.0".
Enhancements and problem fixes:
- Addressed following security vulnerabilities.
CVE-2018-12201, CVE-2018-12202, CVE-2018-12203, CVE-2018-12204, CVE-2018-12205
- Updated microcode for Intel(R) Xeon(R) Scalable Processors.
Version:2.00 (02/02/2019)
Notes:
- Do not update on a system that meets all the following conditions.
OS :
VMWare ESXi
Processor :
Intel (R) Xeon (R) Scalable Processor
3100/4100/5100/6100/8100 series.
BIOS/Platform Configuration(RBSU) :
- Intel(R) TXT Support is set to Enabled.
System Utilities > System Configuration >
RBSU > Server Security >
Intel(R) TXT Support
- "Current TPM Type" of "Trusted Platform Module Options" is set to
"TPM 1.2".
System Utilities > System Configuration >
RBSU > Server Security > Trusted Platform Module Options >
Current TPM Type
Note) The factory setting is "TPM 2.0".
Enhancements and problem fixes:
- Added a new "Backup and Restore Settings" menu to "System Default Options"
in the BIOS/Platform Configuration (RBSU). This option allows you to save
the BIOS configuration to a USB storage device.
- Added a new "Dual Bifurcation" (quadfurcation) parameter of "PCIe Slot XX
Bifurcation option" to "Advanced PCIe Configuration Options" in BIOS/Platform
Configuration(RBSU). This option will allow a x16 PCIe slot to be bifurcated
into four x4 PCIe slot.
Note) XX is PCIe Slot Number.
This option is used for certain PCIe option cards that support/require
PCIe slot bifurcation.
- Updated description of Japanese and Chinese for System Utilities.
- Updated the RESTful API BIOS Attribute Registry resources to match the
latest BIOS/Platform Configuration(RBSU) options.
- Addressed following security vulnerabilities.
CVE-2018-3613, CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179,
CVE-2018-12180, CVE-2018-12181, CVE-2018-12182, CVE-2018-12183
- Updated microcode for Intel(R) Xeon(R) Scalable Processors.
- Addressed an issue where iLO virtual media may not boot properly after
setting the "Boot on Next Reset" option in the "Remote Console and Media -
Virtual Media" settings in the iLO web interface.
- Addressed an issue where "Embedded Applications - Active Health System Log"
in System Utilities may fail to work properly with iLO firmware 1.30 or later.
- Addressed an issue where an optional SATA DVD drive may not unlock and
allow media to be ejected after an operating system reboot.
- Addressed an issue where the system may become unresponsive during boot and
experience a Red Screen (RSOD) when booting in Legacy BIOS Mode with a
M.2 SATA SSD installed. This issue does not impact systems in UEFI Mode.
- Addressed an issue where difficult to input seconds part.
System Utilities > System Configuration >
RBSU > Date and Time > Time (hh:mm:ss)
- Addressed an issue that lost setting information such as Serial Number and
Product ID recorded in the system if processing such as POST execution or
setting change is advanced while iLO is restarted.
- Fixed the CPU L2 / L3 cache size display.
System Utilities > System Information > Processor Information > L2 Cache
System Utilities > System Information > Processor Information > L3 Cache
Version:1.50 (12/29/2018)
Enhancements and problem fixes:
- "Advanced Memory Protection" is now automatically changed to "Fast Fault
Tolerant Memory (ADDDC)" mode when the DIMM configuration supporting Fast
Fault Tolerant Memory Mode (ADDDC) and "Workload Profile" is other than "Low
Latency" and "Custom".
System Utilities > System Configuration >
RBSU > Processor Options > Workload Profile
System Utilities > System Configuration >
RBSU > Processor Options > Memory Options > Advanced Memory Protection
Fast Fault Tolerant Memory (ADDDC) allows system to detect and correct errors
before memory errors adversely affect the system, improving system fault
tolerance to memory problems.
Note) When The following memory configuration is installed, "Fast Fault
Tolerant Memory Mode (ADDDC)" does not work. The "Advanced Memory
Protection" setting will remain.
- A system that installs the following memory using x8 DRAM technology:
8GB additional memory board(1x8GB/R/SR) [N8102-708]
16GB additional memory board(1x16GB/R/DR) [N8102-710]
- A system in which only one memory is installed in one memory channel.
16GB additional memory board(1x16GB/R/SR) [N8102-709]
Also, when "Advanced Memory Protection" is set to "Mirrored Memory with
Advanced ECC Support" mode or "Online Spare with Advanced ECC Support" mode,
the "Advanced Memory Protection" setting will remain.
The automatic change to "Fast Fault Tolerant Memory (ADDDC)" mode can be
disabled by the following procedure.
1. Press the <F9> key during POST to start up the system utility.
2. Set "Workload Profile" to "Custom".
3. Set "Advanced Memory Protection" to "Advanced ECC Support" mode.
Version:1.46 (10/11/2018)
Firmware Dependencies:
- To use the System ROM v1.46 (10/11/2018), following requirements should be
met.
1. iLO Firmware: Version 1.35 Aug 14 2018 or later
2. Innovation Engine(IE) Firmware: Version 0.1.6.1 or later
Note: About detail of update firmware(s), refer to "Notes in general" in
this document.
Enhancements and problem fixes:
- Added support for flashing the firmware of the optional TPM (Trusted Platform
Module) Kit.
- Added a new PCIe Peer-to-Peer Serialization option to the Advanced
Performance Options menu in the BIOS/Platform Configuration (RBSU).
This option can be used to improve peer-to-peer performance between two
PCIe devices installed on the same processor.
- Updated the RESTful API BIOS Attribute Registry resources to match the
latest BIOS/Platform Configuration(RBSU) options.
- Addressed an issue where early server video output, on a locally attached
display, may not show correctly when the display is attached to the server
through a KVM Switch.
This issue does not impact video output on attached display that are not
using a KVM Switch or video output through the iLO Integrated Remote Console.
- Addressed an issue where firmware flashing through the RESTful API could
periodically fail and the task being marked with an exception in the iLO
Web interface. This issue could impact flashing firmware such as the
Innovation Engine, Intel SPS Firmware or the TPM (Trusted Platform Module)
Kit.
- Addressed an issue where a PCIe option card would not properly train to its
maximum speed when the PCIe Bifurcation option was enabled. This issue does
not impact PCIe option cards that do not require bifurcation.
- Addressed an extremely rare issue where a system configured with a SATA DVD
drive and a Smart Array controller may become unresponsive during boot,
usually with a Red Screen of Death (RSOD), when in legacy BIOS mode. This
issue does not impact systems configured in UEFI Mode.
- Addressed an issue where a PCIe option card's legacy option ROM may not
properly display its legacy setup menu prompt during boot when in legacy
BIOS mode. This issue does not impact systems configured in UEFI Mode.
- Addressed an issue where the Embedded LOM may not function properly under an
operating system when the server is configured with a high number of PCIe
option cards.
Version:1.42 (06/20/2018)
Firmware Dependencies:
- To use the System ROM v1.42 (06/20/2018), following requirements should be
met.
1. iLO Firmware: Version 1.35 Aug 14 2018 or later
2. Innovation Engine(IE) Firmware: Version 0.1.6.1 or later
Note: About detail of update firmware(s), refer to "Notes in general" in
this document.
Enhancements and problem fixes:
- Updated microcode for Intel(R) Xeon(R) Scalable Processors.
This version mitigates security vulnerability of INTEL-SA-00115 and INTEL-
SA-00161 in Intel Corporation.
- Addressed an issue where systems may experience an 389 - Unexpected Shutdown
and Restart - An undetermined error type resulted in a reboot of the server,
logged in the iLO Integrated Management Log (IML).
- Addressed an issue where systems may log an erroneous Bank 4 Machine Check
Exception (MCE) to the IML on a system reset event.
Version:1.40 (06/15/2018)
Firmware Dependencies:
- To use the System ROM v1.40 (06/15/2018), the following requirements
should be met.
1. iLO Firmware: Version 1.30 May 31 2018 or later
2. Innovation Engine(IE) Firmware: Version 0.1.6.1 or later
If the requirements aren't met, update to the appropriate firmware(s).
Enhancements and problem fixes:
- Added support for the latest VMware vSphere Secure Boot Certificate.
When you intend to use this new certificate, you need to reset "Allowed
Signatures Database" by selecting "Reset to Platform default" in
System Utilities. And then you need to reconfigure Secure Boot settings.
- Added support to decode certain Machine Check Exceptions(MCE) to a specific
failing PCIe device. Previous versions of the System ROM would log a generic
MCE to the Integrated Management Log (IML) for these error events.
- Added a new "Memory Controller Interleaving" to "Memory Options" option of
BIOS/Platform Configuration(RBSU). This option allows disabling memory
controller interleaving which may improve memory performance for systems
configured with an unbalanced memory configuration.
- Added a new "Processor Jitter Control Optimization" to "Advanced Performance
Options" option of BIOS/Platform Configuration(RBSU). This option setting
allows users to choose between optimizing Auto-tuned mode for maximum
throughput performance, low latency, or the default - zero latency.
- Updated the RESTful API BIOS Attribute Registry resources to match the
latest BIOS/Platform Configuration(RBSU) options.
- Updated description of Japanese and Chinese for System Utilities.
- Addressed an issue where the IML Viewer in the System Utilities menu may
become unresponsive when launched.
- Addressed an issue where the Dual microSD Card USB Module may not boot
properly when the UEFI POST Discovery Mode option is set to Force Fast
Discovery.
- Addressed an issue where the Trusted Platform Module (TPM) Firmware update
may not complete properly when the TPM is configured for "TPM 2.0" Mode.
This issue does not impact systems configured with a TPM operating in
"TPM 1.2" mode.
- Addressed an issue where the system may not be able to boot to EXPRESSBUILDER
when a specific USB Key was installed in one of the server USB Ports.
- Addressed an issue where Integrated Lights-Out (iLO) Virtual Media may not
boot properly when the "UEFI POST Discovery Mode" option is set to
"Force Full Discovery".
- Addressed an issue where the system may become unresponsive during POST or
experience a Red Screen on the next boot following an I/O Machine Check
Exception (MCE) at runtime.
- Addressed an issue where a system configured with the "Internal SD Card"
disabled from BIOS/Platform Configuration (RBSU) and an Dual microSD card
installed would not boot from the Dual microSD card USB Module when
configured in "Legacy Boot Mode". This issue does not impact systems
configured in UEFI Boot Mode.
- Addressed an issue where systems configured with Smart Array S100i SR Gen10
may experience a failed RAID volume on a system reset.
Version:1.36 (02/14/2018)
Enhancements and problem fixes:
- Added new "Storage Device Information" to "System Information" menu of
System Utilities.
- Added new "PCIe Bifurcation Options" menu and "PCIe Slot XX Bifurcation"
options to BIOS/Platform Configuration(RBSU). (XX is PCIe Slot Number.)
When enabled, this option will bifurcate a PCIe slot into two equal width
slots. This option is used for certain PCIe option cards that
support/require PCIe slot bifurcation.
- Added a new "Direct to UPI(D2K)" option to "Power and Performance Options"
of BIOS/Platform Configuration(RBSU). If the default "Auto" parameter is
selected, the function is configured to "Enabled" or "Disabled"
appropriately. Use this option in "Auto" of default unless otherwise
specified.
- Added a new "Enhanced CPU Cooling" parameter to "Thermal Configuration"
option of "Fan and Thermal Options" in BIOS/Platform Configuration(RBSU).
When running certain processor intensive workloads, this option can
provide additional cooling to the processors which can result in improved
performance.
- Added support for wheel functionality of the Integrated Lights-Out (iLO)
virtual mouse in the System Utilities. In Addition, the wheel function of
the virtual mouse is supported with iLO firmware version 1.20 or later.
- Added RESTful API configuration support for the Smart Array S100i SR Gen10 SW
RAID controller.
- Updated the RESTful API BIOS Attribute Registry resources to match the
latest BIOS/Platform Configuration(RBSU) options.
- Updated description of Japanese and Chinese for System Utilities.
- Addressed an issue where the UEFI Boot Order would not get reset to a default
value when loading a default configuration. This issue does not impact
systems configured in Legacy Boot Mode.
- Addressed an issue where the High Performance Event Timer (HPET) was
reported as "not functioning properly" under Device Manager on Windows(R).
- Addressed an issue where the "Embedded Serial Port" option could not be
properly configured through the RESTful Interface.
- Addressed an issue where the PCI Express I/O Proximity values were not
properly allocated in the ACPI System Locality Information Table (SLIT).
This change may help provide a performance benefit in applications and
configurations that are sensitive to PCIe Device I/O NUMA awareness.
- Addressed a rare issue where the system may become unresponsive when a SAS
drive was inserted with the Smart Array S100i SR Gen10 SW RAID enabled.
This issue does not impact systems configured in AHCI mode.
- Addressed an issue where the system may experience an erroneous boot-time
message and Integrated Management Log (IML) entry stating that Core Boost
Technology is disabled due to a lack of an iLO Advanced License (531 -
Core Boost Technology missing required iLO License).
Version:1.32 (02/01/2018)
Enhancements and problem fixes:
- Updated microcode for Intel(R) Xeon(R) Scalable Processors.
This version mitigates security vulnerability of INTEL-SA-00088 in Intel
Corporation.
- Addressed an issue where the system may experience an erroneous boot-time
message and Integrated Management Log (IML) entry stating that Core Boost
Technology is disabled due to a lack of an iLO Advanced License (531 -
Core Boost Technology missing required iLO License).
Version:1.26 (11/14/2017)
Enhancements and problem fixes:
- Added support for update function of Innovation Engine (IE) Firmware.
Updating System ROM to v1.26 or later is needed to apply IE firmware and
SPS firmware.
- Addressed an issue where the High Performance Event Timer (HPET) was
reported as "not functioning properly" under Device Manager on Windows(R).
Version:1.22 (09/29/2017)
Enhancements and problem fixes:
- Addressed an issue where the system would not achieve maximum performance
results when the BIOS/Platform Configuration (RBSU) Sub-NUMA Clustering
option is enabled. This option is not enabled by default.
- Addressed an issue where the system may have the system time incorrectly
"shifted" to the incorrect time after the operating system has been running
for an extended period of time. This issue was typically seen under
Microsoft Windows(R) when the Set Time Automatically option was enabled from
the Windows Date and Time Settings configuration page.
- Addressed an issue where the system may report an inaccurate error message
in the Integrated Management Log (IML) when a memory training failure
occurred. It is recommended that customers update to this version of the
system ROM before replacing any DIMMs due to a training issue.
- Addressed an issue where the system may experience an erroneous boot-time
message and Integrated Management Log (IML) entry stating that Core Boost
Technology is disabled due to a lack of an iLO Advanced License (531 - Core
Boost Technology missing required iLO License) when using the Version 1.20
System ROM.
--------------------------------------------------------------------------------
[Copyright and Trademark]
All contents on this software are the copyright of NEC Corporation or the
third-party software developer. All other contents mentioned herein are
copyright of their respective owners.
Microsoft, Windows, Windows Server are trademarks or registered trademarks of
Microsoft Corporation in the United States and other countries.
Linux(R) is a registered trademark of Linus Torvalds in the United States and
other countries.
Red Hat is a trademark or a registered trademark of Red Hat Inc. in the United
States and other countries.
All other company names and product names mentioned herein are registered
trademarks or trademarks of their respective owners.
--------------------------------------------------------------------------------
Copyright NEC Corporation 2020