﻿================================================================================
Express5800/R110j-1
System ROM U43 v2.14 (03/09/2020)
================================================================================
Software name    : Express5800/R110j-1
                   System ROM (BIOS) update module
Models           : Express5800/R110j-1
Operating System : This software supports offline update and the following OS.
                   - Windows Server(R) 2012 R2
                   - Windows Server(R) 2016
                   - Windows Server(R) 2019
                   - Red Hat(R) Enterprise Linux(R) 7
Target Users     : See [Target Users for Update] below
Type             : System ROM
================================================================================


[About the software]
The Express5800/R110j-1 System ROM (BIOS) update module supports the following
changes in the Express5800/R110j-1 models:

 Notes:
 - Do not update if Intel(R) Software Guard Extensions(SGX) is set to Enabled 
   in a system equipped with the following specific processors.

    System Utilities > System Configuration >
    RBSU > Processor Options >  
    Intel(R) Software Guard Extensions(SGX)

   Note) CPU board(4C/i3-8300) [N8101-1515]
         CPU board(2C/Pentium G5400) [N8101-1512]

 - Improved the function to set the memory frequency. Fault tolerance of the system
   is improved.
   The memory frequency will be set 2666MHz when all of the following requirements are
   met. If not satisfied, the memory frequency will be set 2400MHz. 
    - Intel (R) Xeon (R) E Processor is equipped.
    - Memories with the same part number are mounted on the same channel.
   
   Note) The memory part number can be confirmed in the following items of
         System Utilities.
          System Utilities > System Information > Memory Information >
          Part Number

   Note) In case of R110j-1, memory frequency will be set lower frequency
         depending on memory configuration.

 Enhancements and problem fixes:
 - Updated the UEFI driver of Smart Array S100i Software RAID.
   Addressed an issue where the Smart Array S100i Software RAID may experience
   potential data inconsistency during initial configuration or operation of
   a RAID volume configured in RAID 0/1/10.

  ** Program and data included in this software **
 Following program and data are included in this software.
 Use one of them according to the way of installation.

  a) Flash image for System Utilities/iLO Web User Interface
      firmware\U43_2.14_03_09_2020.signed.flash

  b) Executables for Windows(R)
      winx64\cp043271.exe

  c) RPM package for Linux(R)
      Linux\firmware-system-oem-u43-2.14_2020_03_09-1.1.x86_64.rpm

-------------------------------------------------------------------------------
[ Target Users for Update ]
This software is available for the users who use the following models with the
following System ROM version.

  - Models to be supported

     1. Express5800/R110j-1

  - System ROM Versions to be supported

     1. U43 v1.02 (10/02/2018)
     2. U43 v1.03 (11/28/2018)
     3. U43 v1.20 (02/02/2019)
     4. U43 v1.22 (04/04/2019)
     5. U43 v2.00 (05/16/2019)
     6. U43 v2.10 (09/12/2019)
     7. U43 v2.12 (12/06/2019)

Note: In case of using newer System ROM from the above version, it has already
      applied equivalent enhancements. Updating the System ROM isn't needed.

Be sure to check the System ROM version and date with the following procedures.
Select an arbitrary procedure and check the version before and after the update.

 ** System Utilities **

 You can check the System ROM version and date by the following procedure.

    1. Power on the system and the contents of process by POST (Power On Self-
       Test) will be shown on the screen. After a short time, the following
       message is shown. Press <F9> key, "System Utilities" is started.

                        [F9] System Utilities

    2. After starting "System Utilities", select "System Information".

    3. Select "Firmware Information".

    4. Each firmware version is shown on the screen. The System ROM version and
       date can be seen at "System ROM" option.

  Note: After checking the System ROM version, press the <ESC> key or
        select "Exit" to exit the System Utilities.

  Note: About detail of "System Utilities" usage, refer to "1. System
        Utilities" section in the chapter of "Useful Features" of the
        maintenance guide.

 ** Windows(R) OS **

 You can check the System ROM date by a following procedure.

    1. Hold down <Windows> key and press <R> key.

    2. In the "Run" dialog box, type "msinfo32" and then click "OK".

    3. After "System Information" has started, select "System Summary".

    4. Check the System ROM version by the profile of "BIOS Version/Date".

 ** Linux(R) OS **

 You can check the System ROM date by a following procedure.

    1. Launch the terminal such as xterm.

    2. Execute the command as follows.

        # /usr/sbin/dmidecode | less

        Note: "#" means prompt. You do not need to input "#".

    3. Check the System ROM date by "BIOS Information->Release Date".

    Note: The dmidecode command has to be installed.

================================================================================
 System ROM Installation Procedure
================================================================================

 ** System Utilities **

 [ Preparation ]
  - USB memory x1

  1. Preparation of flash image (*.flash)
   (1) Prepare the USB memory that is formatted with FAT or FAT32.
   
   (2) Copy "a) Flash image for System Utilities/iLO Web User Interface file"
       (approx. size 32MB) to a USB memory.

  2. System ROM installation procedure
     Install the System ROM by a following procedure.

   (1) Attach the USB memory created in the procedure of "1" and power on the
       system.

   (2) In POST, press <F9> key to enter System Utilities.
   
   (3) Select "Embedded Applications > Firmware Update > System ROM" menu.

   (4) Choose "Select Firmware File", and then select the device in which flash
       image was copied.
   
   (5) Select flash image (i.e. *.flash).

   (6) Select "Start Firmware Update".

   (7) When the popup message of "Press ENTER to start firmware update.
       This process might take a few minutes..." is shown, press <ENTER> key.
       Update process is started.

   (8) The progress of the update is shown. When it's completed, the popup
       message of "Firmware update completed successfully." is shown. Press
       <ENTER> key, the message is closed.

   (9) Detach the Installation USB memory from the system.
   
   (10) Reboot the system; Select the "Reboot the System" option at top
        level menu of System Utilities.

   (11) Wait reboot completion for update to take effect.

     The installation is successfully finished.

 ** iLO Web User Interface **

  1. Preparation of flash image (*.flash)

   (1) Copy "a) Flash image for System Utilities/iLO Web User Interface file"
       (i.e. *.flash) to any location which is accessible from the remote PC.

  2. System ROM installation procedure

   (1) Start the Web Browser on remote PC. And log-in to the iLO Web User
       Interface by a "Configure to iLO Settings" privilege user.

   (2) Select "Firmware & OS Software tab" from the right menu.

   (3) Select "Update Firmware" from the left menu.

   (4) Select the flash image, copied by a procedure of "1."

   (5) Press "Flash" to begin update process.

   (6) Wait for the "Firmware Update Completed." message to display.

   (7) Reboot the system.

   (8) Wait reboot completion for update to take effect.

     The installation is successfully finished.

 ** Windows(R) OS **

  1. Preparation of Installation

   (1) Log on to the system as a user with administrator privilege.

   (2) Terminate all running application.

   (3) Copy "b) Executables for Windows(R) file" to a suitable
       folder.

  2. System ROM installation procedure

   (1) Double-click "b) Executables for Windows(R) file" (i.e. *.exe).
       The System ROM Update Program will start.

   (2) Follow the messages will be shown and complete the operation.

   (3) If the messages requesting reboot will be shown, select "yes" to reboot
       of the system.

   (4) Wait reboot completion for update to take effect.
       
     The installation is successfully finished.

 ** Linux(R) OS **

  1. Preparation of Installation

   (1) Log-in as root. Or switch to root with "su" command.

   (2) Terminate all running application.

   (3) Copy "c) RPM package for Linux(R) file" to a suitable directory.

       e.g. /root 

  2. System ROM installation procedure

    (1) Install the RPM package of this System ROM update module by the command
       below.

        # rpm -Uvh <filename>.rpm

        Note: The "<filename>.rpm" should replace to RPM package name which
              is described at above "Binaries of this release" section.

        Note: "#" means prompt. You do not need to input "#".
 
   (2) See where the files land by the command below.

        # rpm -qlp <filename>.rpm

   (3) Change to the directory you see in the previous step.

   (4) Run setup by the command below.

        # ./setup

   (5) Follow the messages will be shown and complete the operation.

   (6) If a reboot inquiry is appear then press "y" to trigger reboot.

   (7) Wait reboot completion for update to take effect.
        
      The installation is successfully finished.

 ** Other OSes (e.g. VMware(R), etc.) **
 Use the one of following procedures to update:
 - Install the System ROM from System Utilities
 - Install the System ROM from iLO Web User Interface

================================================================================
 Notes
================================================================================
  ** Notes in general **

  * Refer to "license_en.txt" about the user license agreement.

  * When you install the system ROM, the flashing mechanism writes over the
    backup ROM and saves current ROM as a backup, enabling you to switch easily
    to the alternate ROM version if the new ROM becomes corrupted for any
    reason. This feature protects the existing ROM version, even if you
    experience a power failure while flashing the ROM.

  * When Windows(R) BitLocker(TM) function is set to "Enabled", install the
    System ROM after making the function "Disabled". Then make the function
    "Enabled" after install and reboot of the system. If you install the system
    ROM without making the function "Disabled", you may need the recovery
    password when you boot the system.

  * This software does not support a virtualized environment such as hyper
    visor, guest OS, etc. Please install either on the OS which this software
    supports or with the method of offline installation.

  * To meet firmware dependencies, you can update iLO firmware by latest
    Starter Pack. And you can update Innovation Engine(IE) firmware by latest
    "Server Platform Services(SPS) firmware update module and Innovation
    Engine(IE) firmware update module".
    You can download latest update module(s) from the following web site.
    https://www.nec.com/express
    ("Support & Downloads" of the page top - PCs & Servers - Servers - Downloads
    - Select Model)

  ** Note for Windows(R) OS environment and Linux(R) OS environment **

  * This software will access to iLO5 (Baseboard Management Controller). It is
    required that the "iLO 5 Channel Interface Driver" (CHIF) must be installed.
    The CHIF driver can be installed by using EXPRESSBUILDER or "Starter Pack".

--------------------------------------------------------------------------------
[Revision history]
Version:2.14 (03/09/2020)

 Notes:
 - Do not update if Intel(R) Software Guard Extensions(SGX) is set to Enabled 
   in a system equipped with the following specific processors.

    System Utilities > System Configuration >
    RBSU > Processor Options >  
    Intel(R) Software Guard Extensions(SGX)

   Note) CPU board(4C/i3-8300) [N8101-1515]
         CPU board(2C/Pentium G5400) [N8101-1512]

 - Improved the function to set the memory frequency. Fault tolerance of the system
   is improved.
   The memory frequency will be set 2666MHz when all of the following requirements are
   met. If not satisfied, the memory frequency will be set 2400MHz. 
    - Intel (R) Xeon (R) E Processor is equipped.
    - Memories with the same part number are mounted on the same channel.
   
   Note) The memory part number can be confirmed in the following items of
         System Utilities.
          System Utilities > System Information > Memory Information >
          Part Number

   Note) In case of R110j-1, memory frequency will be set lower frequency
         depending on memory configuration.

 Enhancements and problem fixes:
 - Updated the UEFI driver of Smart Array S100i Software RAID.
   Addressed an issue where the Smart Array S100i Software RAID may experience
   potential data inconsistency during initial configuration or operation of
   a RAID volume configured in RAID 0/1/10.

Version:2.12 (12/06/2019)

 Notes:
 - Do not update if Intel(R) Software Guard Extensions(SGX) is set to Enabled 
   in a system equipped with the following specific processors.

    System Utilities > System Configuration >
    RBSU > Processor Options >  
    Intel(R) Software Guard Extensions(SGX)

   Note) CPU board(4C/i3-8300) [N8101-1515]
         CPU board(2C/Pentium G5400) [N8101-1512]

 - Improved the function to set the memory frequency. Fault tolerance of the system
   is improved.
   The memory frequency will be set 2666MHz when all of the following requirements are
   met. If not satisfied, the memory frequency will be set 2400MHz. 
    - Intel (R) Xeon (R) E Processor is equipped.
    - Memories with the same part number are mounted on the same channel.
   
   Note) The memory part number can be confirmed in the following items of
         System Utilities.
          System Utilities > System Information > Memory Information >
          Part Number

   Note) In case of R110j-1, memory frequency will be set lower frequency
         depending on memory configuration.

 Enhancements and problem fixes:
 - Updated microcode for Processor. This version mitigates security
   vulnerability of CVE-2019-11157.
    Intel(R) Xeon(R) E Processor
    Intel(R) Pentium(R) Gold Processor Series
    8th Generation Intel(R) Core(TM) i3 Processors

Version:2.10 (09/12/2019)

 Notes:
 - Do not update if Intel(R) Software Guard Extensions(SGX) is set to Enabled 
   in a system equipped with the following specific processors.

    System Utilities > System Configuration >
    RBSU > Processor Options >  
    Intel(R) Software Guard Extensions(SGX)

   Note) CPU board(4C/i3-8300) [N8101-1515]
         CPU board(2C/Pentium G5400) [N8101-1512]

 - Improved the function to set the memory frequency. Fault tolerance of the system
   is improved.
   The memory frequency will be set 2666MHz when all of the following requirements are
   met. If not satisfied, the memory frequency will be set 2400MHz. 
    - Intel (R) Xeon (R) E Processor is equipped.
    - Memories with the same part number are mounted on the same channel.
   
   Note) The memory part number can be confirmed in the following items of
         System Utilities.
          System Utilities > System Information > Memory Information >
          Part Number

   Note) In case of R110j-1, memory frequency will be set lower frequency
         depending on memory configuration.

 Enhancements and problem fixes:
 - Addressed following security vulnerabilities.
    CVE-2017-5715
    CVE-2018-12126
    CVE-2018-12127
    CVE-2018-12130
    CVE-2019-11135
    CVE-2018-11091

 - Updated microcode for processor. 
    Intel(R) Xeon(R) E Processor
    Intel(R) Pentium(R) Gold Processor Series
    8th Generation Intel(R) Core(TM) i3 Processors

Version:2.00 (09/05/2019)

 Notes:
 - Do not update if Intel(R) Software Guard Extensions(SGX) is set to Enabled 
   in a system equipped with the following specific processors.

    System Utilities > System Configuration >
    RBSU > Processor Options >  
    Intel(R) Software Guard Extensions(SGX)

   Note) CPU board(4C/i3-8300) [N8101-1515]
         CPU board(2C/Pentium G5400) [N8101-1512]

 Enhancements and problem fixes:
 - Updated to the latest thermal support for the platform.

 - Addressed following security vulnerabilities.
    CVE-2019-1559

 - Addressed an issue where the Intel Software Guard Extensions(SGX) Remote
   attestation functionality may not work properly.

 - Addressed an issue where the Server Backup and Restore functionality may not
   work properly if initiated through the RESTful API returning a message "An
   internal error occurred during RIS operation".

 - Addressed an issue where the system would not boot to a USB drive when
   a non-bootable (non-formatted) drive was also present in the system.
   This issue only impacts systems configured in Legacy BIOS Mode.
    System Utilities > System Configuration >
    RBSU > Boot Options > Boot Mode

Version:1.22 (04/04/2019)

 Notes:
 - Do not update if Intel(R) Software Guard Extensions(SGX) is set to Enabled 
   in a system equipped with the following specific processors.

    System Utilities > System Configuration >
    RBSU > Processor Options >  
    Intel(R) Software Guard Extensions(SGX)

   Note) CPU board(4C/i3-8300) [N8101-1515]
         CPU board(2C/Pentium G5400) [N8101-1512]

 Enhancements and problem fixes:
 - Updated microcode for processor. This version mitigates security
   vulnerability of CVE-2018-12126, CVE-2018-12130, CVE-2018-12127, 
   CVE-2019-11091.
    Intel(R) Xeon(R) E Processor
    Intel(R) Pentium(R) Gold Processor Series
    8th Generation Intel(R) Core(TM) i3 Processors

Version:1.20 (02/02/2019)

 Notes:
 - Do not update if Intel(R) Software Guard Extensions(SGX) is set to Enabled 
   in a system equipped with the following specific processors.

    System Utilities > System Configuration >
    RBSU > Processor Options >  
    Intel(R) Software Guard Extensions(SGX)

   Note) CPU board(4C/i3-8300) [N8101-1515]
         CPU board(2C/Pentium G5400) [N8101-1512]

 Enhancements and problem fixes:
 - Added a new "Backup and Restore Settings" menu to "System Default Options" 
   in the BIOS/Platform Configuration (RBSU). This option allows you to save 
   the BIOS configuration to a USB storage device. 

 - Updated description of Japanese and Chinese for System Utilities.

 - Updated the RESTful API BIOS Attribute Registry resources to match the 
   latest BIOS/Platform Configuration(RBSU) options.

 - Addressed following security vulnerabilities.
   CVE-2018-3613,  CVE-2017-5731,  CVE-2017-5732,  CVE-2017-5733, CVE-2017-5734, 
   CVE-2017-5735,  CVE-2018-3630,  CVE-2018-12178, CVE-2018-12179, 
   CVE-2018-12180, CVE-2018-12181, CVE-2018-12182, CVE-2018-12183

 - Addressed an issue where certain PCIe option cards may not train properly 
   and cause the system to hang during POST.

 - Addressed an issue where iLO virtual media may not boot properly after 
   setting the "Boot on Next Reset" option in the "Remote Console and Media - 
   Virtual Media" settings in the iLO web interface.

 - Addressed an issue where the AHS Download application from the Embedded 
   Applications in System Utilities may fail to work properly with iLO 
   firmware 1.30 or later.

 - Addressed an issue where an optional SATA DVD drive may not unlock and 
   allow media to be ejected after an operating system reboot.

 - Addressed an issue where the system may become unresponsive during boot and 
   experience a Red Screen (RSOD) when booting in Legacy BIOS Mode with a 
   M.2 SATA SSD installed. This issue does not impact systems in UEFI Mode.

--------------------------------------------------------------------------------
[Copyright and Trademark]

All contents on this software are the copyright of NEC Corporation or the
third-party software developer. All other contents mentioned herein are
copyright of their respective owners.

Microsoft, Windows, Windows Server are trademarks or registered trademarks of
Microsoft Corporation in the United States and other countries.
Linux(R) is a registered trademark of Linus Torvalds in the United States and
other countries.
Red Hat is a trademark or a registered trademark of Red Hat Inc. in the United
States and other countries.

All other company names and product names mentioned herein are registered
trademarks or trademarks of their respective owners.

--------------------------------------------------------------------------------
   Copyright NEC Corporation 2020

