<?xml version="1.0" encoding="UTF-8"?>
<manifest schema_version="2.0.0.0">
<otherdata xmlns="http://linux.duke.edu/metadata/other" packages="441">
  <package pkgid="6d0647984514808ebd79fa3f30d2b60e17be7d91f40e0188c027466d374c80ac" name="HP-CNA-FC-Broadcom-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="12.0.1210.0" rel="1.rhel7"/>
    <changelog author="Broadcom Automated Build User" date="1497441600">- Changed version to 11.2
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1505995200">- Changed version to 11.4
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1507550400">- Changed version to 12.0
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
  </package>
  <package pkgid="b6c3a05c6c1416cf0507c2f5c94ae39ad7fa004f8e31979a6e4f9610377744a6" name="HP-CNA-FC-Broadcom-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="12.0.1210.0" rel="1.sles12sp3"/>
    <changelog author="Broadcom Automated Build User" date="1497441600">- Changed version to 11.2
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1505995200">- Changed version to 11.4
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1507550400">- Changed version to 12.0
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
  </package>
  <package pkgid="042005a605dcf5abdd73d38805ff327cbaf1cf4635dbd43041dc861afa490fee" name="HP-CNA-FC-Broadcom-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="12.0.1210.0" rel="1.sles12sp4"/>
    <changelog author="Broadcom Automated Build User" date="1497441600">- Changed version to 11.2
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1505995200">- Changed version to 11.4
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1507550400">- Changed version to 12.0
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
  </package>
  <package pkgid="2dca77d2ad6d44b4d6cba31c4b667d38afe665b907d4bef45bc6bdf4482c703b" name="HP-CNA-FC-Broadcom-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="12.0.1210.0" rel="1.sles15sp0"/>
    <changelog author="Broadcom Automated Build User" date="1497441600">- Changed version to 11.2
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1505995200">- Changed version to 11.4
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1507550400">- Changed version to 12.0
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
  </package>
  <package pkgid="ea849bfbbb4c55eb28602a68e3965580bd04e9e059bcb50433a5b0a24b61b804" name="HP-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="12.4.256.0" rel="1.rhel7"/>
    <changelog author="Emulex Automated Build User" date="1374926400">- Initial RPM release
- Changed version number to 6.4.9.2
- Added libdfc 4.2.25
- Added libdfc 3.2.23
- Added libemulexhbaapi 2.3.b
- Added libemsdm.so 1.1</changelog>
    <changelog author="Emulex Automated Build User" date="1376308800">- Changed version number to 6.4.10.2
- Fixed Bug 144987: Updated release string on RHEL 6
- Fixed Bug 145311: Improved Requires and Provides tag entries</changelog>
    <changelog author="Emulex Automated Build User" date="1379678400">- Changed version number to 6.4.12.3
- Fixed Bug 148456: Updated the spec file to use ldconfig -X</changelog>
    <changelog author="Emulex Automated Build User" date="1464782400">- Changed version to 10.7
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library 
- Added support for RHEL 7.2, SLES12 SP1</changelog>
    <changelog author="Broadcom Automated Build User" date="1497441600">- Changed version to 11.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1505995200">- Changed version to 11.4
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1507550400">- Changed version to 12.0
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
  </package>
  <package pkgid="94e5170826e82280e0e9927a4ff2bd5f89b5a197e8514ffee948b765c246aee7" name="HP-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="12.4.256.0" rel="1.rhel8"/>
    <changelog author="Emulex Automated Build User" date="1374926400">- Initial RPM release
- Changed version number to 6.4.9.2
- Added libdfc 4.2.25
- Added libdfc 3.2.23
- Added libemulexhbaapi 2.3.b
- Added libemsdm.so 1.1</changelog>
    <changelog author="Emulex Automated Build User" date="1376308800">- Changed version number to 6.4.10.2
- Fixed Bug 144987: Updated release string on RHEL 6
- Fixed Bug 145311: Improved Requires and Provides tag entries</changelog>
    <changelog author="Emulex Automated Build User" date="1379678400">- Changed version number to 6.4.12.3
- Fixed Bug 148456: Updated the spec file to use ldconfig -X</changelog>
    <changelog author="Emulex Automated Build User" date="1464782400">- Changed version to 10.7
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library 
- Added support for RHEL 7.2, SLES12 SP1</changelog>
    <changelog author="Broadcom Automated Build User" date="1497441600">- Changed version to 11.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1505995200">- Changed version to 11.4
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1507550400">- Changed version to 12.0
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
  </package>
  <package pkgid="653823f68de2e1c8b62cf8a4d7f8d7b35e0330975d5659d11cfcabd49977bba4" name="HP-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="12.4.256.0" rel="1.sles12sp3"/>
    <changelog author="Emulex Automated Build User" date="1374926400">- Initial RPM release
- Changed version number to 6.4.9.2
- Added libdfc 4.2.25
- Added libdfc 3.2.23
- Added libemulexhbaapi 2.3.b
- Added libemsdm.so 1.1</changelog>
    <changelog author="Emulex Automated Build User" date="1376308800">- Changed version number to 6.4.10.2
- Fixed Bug 144987: Updated release string on RHEL 6
- Fixed Bug 145311: Improved Requires and Provides tag entries</changelog>
    <changelog author="Emulex Automated Build User" date="1379678400">- Changed version number to 6.4.12.3
- Fixed Bug 148456: Updated the spec file to use ldconfig -X</changelog>
    <changelog author="Emulex Automated Build User" date="1464782400">- Changed version to 10.7
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library 
- Added support for RHEL 7.2, SLES12 SP1</changelog>
    <changelog author="Broadcom Automated Build User" date="1497441600">- Changed version to 11.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1505995200">- Changed version to 11.4
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1507550400">- Changed version to 12.0
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
  </package>
  <package pkgid="251dec25bd97f4f567ac0265124276c0d349bf9e9ab1b5878ce5bd4df86da34a" name="HP-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="12.4.256.0" rel="1.sles12sp4"/>
    <changelog author="Emulex Automated Build User" date="1374926400">- Initial RPM release
- Changed version number to 6.4.9.2
- Added libdfc 4.2.25
- Added libdfc 3.2.23
- Added libemulexhbaapi 2.3.b
- Added libemsdm.so 1.1</changelog>
    <changelog author="Emulex Automated Build User" date="1376308800">- Changed version number to 6.4.10.2
- Fixed Bug 144987: Updated release string on RHEL 6
- Fixed Bug 145311: Improved Requires and Provides tag entries</changelog>
    <changelog author="Emulex Automated Build User" date="1379678400">- Changed version number to 6.4.12.3
- Fixed Bug 148456: Updated the spec file to use ldconfig -X</changelog>
    <changelog author="Emulex Automated Build User" date="1464782400">- Changed version to 10.7
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library 
- Added support for RHEL 7.2, SLES12 SP1</changelog>
    <changelog author="Broadcom Automated Build User" date="1497441600">- Changed version to 11.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1505995200">- Changed version to 11.4
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1507550400">- Changed version to 12.0
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
  </package>
  <package pkgid="31f024c61589062d4b2f0bee41562641f42d6fb13af55a3244162e13926f763d" name="HP-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="12.4.256.0" rel="1.sles15sp0"/>
    <changelog author="Emulex Automated Build User" date="1374926400">- Initial RPM release
- Changed version number to 6.4.9.2
- Added libdfc 4.2.25
- Added libdfc 3.2.23
- Added libemulexhbaapi 2.3.b
- Added libemsdm.so 1.1</changelog>
    <changelog author="Emulex Automated Build User" date="1376308800">- Changed version number to 6.4.10.2
- Fixed Bug 144987: Updated release string on RHEL 6
- Fixed Bug 145311: Improved Requires and Provides tag entries</changelog>
    <changelog author="Emulex Automated Build User" date="1379678400">- Changed version number to 6.4.12.3
- Fixed Bug 148456: Updated the spec file to use ldconfig -X</changelog>
    <changelog author="Emulex Automated Build User" date="1464782400">- Changed version to 10.7
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library 
- Added support for RHEL 7.2, SLES12 SP1</changelog>
    <changelog author="Broadcom Automated Build User" date="1497441600">- Changed version to 11.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1505995200">- Changed version to 11.4
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1507550400">- Changed version to 12.0
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
  </package>
  <package pkgid="4ad5c155396c2e02e014da523870278d90be3e4dd092912626bf7ccd07688b12" name="HP-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="12.4.256.0" rel="1.sles15sp1"/>
    <changelog author="Emulex Automated Build User" date="1374926400">- Initial RPM release
- Changed version number to 6.4.9.2
- Added libdfc 4.2.25
- Added libdfc 3.2.23
- Added libemulexhbaapi 2.3.b
- Added libemsdm.so 1.1</changelog>
    <changelog author="Emulex Automated Build User" date="1376308800">- Changed version number to 6.4.10.2
- Fixed Bug 144987: Updated release string on RHEL 6
- Fixed Bug 145311: Improved Requires and Provides tag entries</changelog>
    <changelog author="Emulex Automated Build User" date="1379678400">- Changed version number to 6.4.12.3
- Fixed Bug 148456: Updated the spec file to use ldconfig -X</changelog>
    <changelog author="Emulex Automated Build User" date="1464782400">- Changed version to 10.7
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library 
- Added support for RHEL 7.2, SLES12 SP1</changelog>
    <changelog author="Broadcom Automated Build User" date="1497441600">- Changed version to 11.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1505995200">- Changed version to 11.4
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1507550400">- Changed version to 12.0
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
  </package>
  <package pkgid="33950dd90d262f1fa38fde3d62a29ec31409f6272c41d19ff53519a9d4e3a692" name="HP-CNA-FC-hpqlgc-Enablement-Kit" arch="noarch">
    <version epoch="0" ver="6.0.0.0" rel="11"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1441108800">v6.04 build3:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Add ppc64le (64-bit little endian PowerPC) API support
Introduced: N/A
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC, FCoE

Defect/Enhancement: Enhancement
Problem: N/A
Solution: Add Online Flash update support
Introduced: v6.04 build1
Impact: HW: ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

Defect/Enhancement: Enhancement
Problem: N/A
Solution: Add Smart SAN API support
Introduced: v6.04 build2
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC, FCoE

Defect/Enhancement: Defect
Problem: Flash update fails if online flash update feature is disabled
	 or not supported by QLogic applications
Solution: Allow flash update if online flash update feature is disabled
	  or not supported by QLogic applications
Introduced: v6.04 build1
Impact: HW: ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1447848000">v6.04 build8:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Return FW status in BBCR API for port down case
Introduced: v6.04 build6
Impact: HW: ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build6:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Add Buffer-to-Buffer Credit Recovery API support
Introduced: v6.04 build6
Impact: HW: ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

Defect/Enhancement: Enhancement
Problem: N/A
Solution: Add Private Statistics API support
Introduced: v6.04 build6
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC, FCoE

Defect/Enhancement: Defect
Problem: Multiple application may do flash update simultaneously for
	27xx adapters
Solution: Use serial number based file for 27xx flash update token
Introduced: v6.04 build1
Impact: HW: ISP2071, ISP2271, ISP2261
	OS: VMware ESXi 5.1
	Protocol: FC

v6.04 build5:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Read FW attributes at API initialization
Introduced: v6.04 build5
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC, FCoE

v6.04 build4:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Validate Capabilities and Outage duration before FW activation
Introduced: v6.04 build4
Impact: HW: ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1471348800">v6.04 build12:
-------------
Defect/Enhancement: Defect
Problem: timeout value is not properly converted from seconds into milliseconds
Solution: Avoid converting timeout value twice into 
	CPQFC_SendScsiCommandEx API
Introduced: v6.04 build12
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC, FCoE

v6.04 build11:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Add CPQFC_SendScsiCommandEx API support
Introduced: v6.04 build11
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC, FCoE

v6.04 build10:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Add DPort Diagnostics support
Introduced: v6.04 build10
Impact: HW: ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

Defect/Enhancement: Enhancement
Problem: N/A
Solution: Add Extended Private Statistics API support
Introduced: v6.04 build10
Impact: HW: ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC, FCoE

Defect/Enhancement: Enhancement
Problem: N/A
Solution: Add Linux ARM (Euler) support
Introduced: v6.04 build10
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC, FCoE

v6.04 build9:
-------------
Defect/Enhancement: Defect
Problem: Flash MPI and PEP version are seen out-of-sync
Solution: Read flash MPI and PEP verions from primary set
Introduced: v6.04 build1
Impact: HW: ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1551441600">v6.04 build39:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added ISP2081, ISP2281, ISP2089 and ISP2289 support
Introduced: v6.04 build1
Impact: HW: ISP2081. ISP2281, ISP2089 and ISP2289 based adapters
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1551960000">v6.04 build40:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Read flash MPI and PEP versions from active image set
Introduced: v6.04 build40
Impact: HW: ISP2071, ISP2271, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1553083200">v6.04 build41:
-------------
Defect/Enhancement: Defect
Problem: BSG interface fails if /tmp is mounted with tmpfs on shared memory
Solution: Use /var/cache/sdmapi for BSG device creation
Introduced: v6.04 build1
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC, FCoE</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1555502400">v6.04 build45:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Add NVRAM parameter to select FCP or NVME targets
Introduced: v6.04 build45
Impact: HW: ISP2071, ISP2271, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build44:
-------------
Defect/Enhancement: Defect
Problem: Apps issues seen with NVME target in RHEL
Solution: Detect NVME target/luns by traversing sysfs tree
Introduced: v6.04 build42
Impact: HW: ISP2071, ISP2271, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build43:
-------------
Defect/Enhancement: Defect
Problem: Apps issues seen with NVME target in NPIV configuration
Solution: Set deafult value of NVME targets for NPIV ports
Introduced: v6.04 build42
Impact: HW: ISP2071, ISP2271, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build42:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Add NVME target support for QLogic/Marvell Apps
Introduced: v6.04 build42
Impact: HW: ISP2071, ISP2271, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1558094400">v6.04 build47:
-------------
Defect/Enhancement: Defect
Problem: Apps initialization delay seen with NPIV ports
Solution: Allow reading active flash regions for NPIV ports
Introduced: v6.04 build39
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build46:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Restrict application features for NVME targets
Introduced: v6.04 build45
Impact: HW: ISP2071, ISP2271, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1559908800">v6.04 build48:
-------------
Defect/Enhancement: Defect
Problem: NVME targets not seen when NVME Id and Subsys Id are different
Solution: Identify NVME targets using subsys Id
Introduced: v6.04 build42
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1565006400">v6.04 build49:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Allow SDGetActiveRegions API for 27xx based adapters
Introduced: v6.04 build45
Impact: HW: ISP2071, ISP2271, ISP2261, ISP2871, ISP2971, ISP2A61
	OS: All supported Linux flavors
	Protocol: FC</changelog>
  </package>
  <package pkgid="496e8174441bbf7f4d507a7f6b9073e03d708c1d421441737b0809192ae3cde4" name="MRStorageAdministrator" arch="x86_64">
    <version epoch="0" ver="003.113.000.000" rel="00"/>
  </package>
  <package pkgid="231328b7a523d5a605a156529ea73a46329d790a959497a075e4675a9e7f0d1a" name="amsd" arch="x86_64">
    <version epoch="0" ver="2.1.0" rel="1406.73.rhel7"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.1.0-1406.73.rhel7" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="d48f454290dc777312c76e1a998eff9585f130656bf4a05edda6187a108ee0e6" name="amsd" arch="x86_64">
    <version epoch="0" ver="2.1.0" rel="1406.75.rhel8"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.1.0-1406.75.rhel8" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="cac340f66d2af10f4ba34f4c9bf3e971b358488ec2a30a79b929e280580f0d00" name="amsd" arch="x86_64">
    <version epoch="0" ver="2.1.0" rel="1406.76.sles12"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.1.0-1406.76" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="2367cf497c262c9167a58f3baa971b1d873afc617f8512471034f628e2c17a3f" name="amsd" arch="x86_64">
    <version epoch="0" ver="2.1.0" rel="1406.78.sles15"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.1.0-1406.78" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="ad11b10107a730cb2341dd98ae37332a7717fd002836679d6ae6d8f1cd57a442" name="be2iscsi-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1_k4.12.14_23" rel="1.sles15sp0"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="827e69ac5222ac39c7b59da1fca3a4db6b77271c669b8d5e395270695d4bd67e" name="be2iscsi-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="44b81ff9840bee6db042bb6f6e6f24172da49be831a1031a366ee2f5e254a276" name="be2iscsi-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1_k4.4.103_6.38" rel="1.sles12sp3MU5"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="6eb56f37406af4cd8c7775915edf64874ba289c7537279821ca3fec95967bdc7" name="be2iscsi_bl-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1_k4.12.14_23" rel="1.sles15sp0"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="effb14e600fa55af7ddd35a8688ffb20577a0b52cd74135cbf7848a9ccf49fe8" name="be2iscsi_bl-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="b4e17318aab547b35beff7d3d29e2d6706bca3c3ae1674b29754367e74972654" name="be2iscsi_bl-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1_k4.4.103_6.38" rel="1.sles12sp3MU5"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="9655f2269d1c06d7cbc322bc8f67d05b760d6315e28b12a020c6a6f6dfe9ae19" name="be2net-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1_k4.12.14_23" rel="1.sles15sp0"/>
    <changelog author="Emulex Corporation &lt;tech.support@emulex.com&gt; 10.6.35.0" date="1424174400">-</changelog>
  </package>
  <package pkgid="c84a17375fe4233acde230bc4440dd6c4880111cb253b865ab7e58945becc8d6" name="be2net-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="Emulex Corporation &lt;tech.support@emulex.com&gt; 10.6.35.0" date="1424174400">-</changelog>
  </package>
  <package pkgid="1115c55632c06cf31d80e56087cb8cc3dabacac34db48709f5b4eef36a215610" name="be2net-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1_k4.4.103_6.38" rel="1.sles12sp3MU5"/>
    <changelog author="Emulex Corporation &lt;tech.support@emulex.com&gt; 10.6.35.0" date="1424174400">-</changelog>
  </package>
  <package pkgid="6662e32239bc8aa3fc9873b5962bf96e49c840636024f715ab49a532db3ba309" name="be2net_bl-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1_k4.12.14_23" rel="1.sles15sp0"/>
    <changelog author="Emulex Corporation &lt;tech.support@emulex.com&gt; 10.6.35.0" date="1424174400">-</changelog>
  </package>
  <package pkgid="933e0d5e46a1ba71e7b057b433f79632d33e7642b112cbb6a7900c06cbfb4972" name="be2net_bl-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="Emulex Corporation &lt;tech.support@emulex.com&gt; 10.6.35.0" date="1424174400">-</changelog>
  </package>
  <package pkgid="859374d6b9755e3ab3194c14e120eea247918fe8f583594da4ad19f02bf9e358" name="be2net_bl-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1_k4.4.103_6.38" rel="1.sles12sp3MU5"/>
    <changelog author="Emulex Corporation &lt;tech.support@emulex.com&gt; 10.6.35.0" date="1424174400">-</changelog>
  </package>
  <package pkgid="f80c7b6139b5340d079686546264111f9fc0f75390b9dd0485af089894368ddb" name="bnxt_en-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.9.2_k4.12.14_23" rel="214.0.182.0.sles15"/>
  </package>
  <package pkgid="34c120e46b9b7f6f808d4e58c51dd6abd0e033887768c8580c158289440db4a4" name="bnxt_en-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.9.2_k4.12.14_94.41" rel="214.0.182.0.sles12sp4"/>
  </package>
  <package pkgid="f1453df071e435876f3798dc084fea8540f025f830e1b1a5edbecd1592d76f7c" name="bnxt_en-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.9.2_k4.4.73_5" rel="214.0.182.0.sles12sp3"/>
  </package>
  <package pkgid="116c7d341a83ec15a3dffb46ead936cb644ead23c79bf1efc4de71e1e05390ca" name="brcmfcoe-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1_k4.12.14_23" rel="1.sles15sp0"/>
    <changelog author="Emulex Corporation &lt;tech.support@emulex.com&gt; 12.0.1216.1" date="1545393600">- Built driver for sles15sp</changelog>
  </package>
  <package pkgid="70000b168234a4b87223947fd965a9e1e9d5452b83c86913ea1df9db8c20b030" name="brcmfcoe-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="Emulex Corporation &lt;tech.support@emulex.com&gt; 12.0.1216.1" date="1545393600">- Built driver for sles12sp</changelog>
  </package>
  <package pkgid="880d45da11fe23047507777a062a9c5faa0cd076b7c022b359792e70491823d9" name="brcmfcoe-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1_k4.4.73_5" rel="1.sles12sp3"/>
    <changelog author="Emulex Corporation &lt;tech.support@emulex.com&gt; 12.0.1216.1" date="1545393600">- Built driver for sles12sp</changelog>
  </package>
  <package pkgid="8ffc09904f6b3b89be2ef8eb9a289e31a597019c1d5458a5d2803f69a765ff5d" name="elx-lpfc-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.4.270.3_k4.12.14_195" rel="1.sles15sp1"/>
    <changelog author="Emulex Corporation &lt;ecd-tech.support@broadcom.com&gt; 12.4.270.3" date="1567080000">- Built driver for sles15sp</changelog>
  </package>
  <package pkgid="34daecc0fd50d0b052a6839b77f9a370bcbc3e359224204bc923ee8959255d61" name="elx-lpfc-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.4.270.3_k4.12.14_23" rel="1.sles15sp0"/>
    <changelog author="Emulex Corporation &lt;ecd-tech.support@broadcom.com&gt; 12.4.270.3" date="1567080000">- Built driver for sles15sp</changelog>
  </package>
  <package pkgid="fcf5426bc8827609fd5aaa9b27e5bce433c6b5dec07802223c65ec38a4b2043c" name="elx-lpfc-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.4.270.3_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="Emulex Corporation &lt;ecd-tech.support@broadcom.com&gt; 12.4.270.3" date="1567080000">- Built driver for sles12sp</changelog>
  </package>
  <package pkgid="b6291ff4f258f6d980b75cfe9c1b3284c0a2209792067b4de159a04a8e467b93" name="elx-lpfc-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.4.270.3_k4.4.126_94.22" rel="1.sles12sp3"/>
    <changelog author="Emulex Corporation &lt;ecd-tech.support@broadcom.com&gt; 12.4.270.3" date="1567080000">- Built driver for sles12sp</changelog>
  </package>
  <package pkgid="c71a7565e5e8bf855458f31ddb92149ea920b3fdfe946821f8d02aa3ea280e93" name="fibreutils" arch="x86_64">
    <version epoch="0" ver="4.1" rel="1_rhel"/>
    <changelog author="Chad Dupuis &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1-2" date="1248436800">- Fixed QLogic port state output on RHEL 5.3</changelog>
    <changelog author="Chad Dupuis &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1-3" date="1260446400">- Fixed discovery of HBAs in adapter_info on Integrity servers with multiple PCI
  busses</changelog>
    <changelog author="Keith Wortman &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-3" date="1298635200">- Initial release with Emulex CNA support</changelog>
    <changelog author="Keith Wortman &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-4" date="1323345600">- Fix for dependency check error seen when installing with HPSUM</changelog>
    <changelog author="Kumar Rahul&lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-5" date="1329220800">- Removed installation check for kernel 2.6 and addded Installation check for Rhel5.3 and SLES10 SP3 onwards</changelog>
    <changelog author="Shreya Roy Chowdhury&lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-6" date="1355832000">- Corrected Link state display information for Qlogic Adapters
- Added MSA G3 support in Scsi_info.h</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 3.3-6" date="1557316800">-Perl dependancy fix for RHEL8</changelog>
    <changelog author="Ratna Dey&lt;rathna.dey@hpe.com&gt; and Aravinda Rajanna &lt;aravinda.rajanna@hpe.com&gt; 4.1-1" date="1561550400">-Initial support added for E4 and will get updated subsequently</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.1-1" date="1563451200">-Fixed adpater_info code to display correct Vendor name instead of Unknown</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.1-1" date="1564056000">-Removed Brocade HBAs support</changelog>
  </package>
  <package pkgid="f996981c26cc1b87ecf0c9320d0b510a07e85f7c089e20c598ba4be482a44561" name="fibreutils" arch="x86_64">
    <version epoch="0" ver="4.1" rel="1_sles"/>
    <changelog author="Chad Dupuis &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1-2" date="1248436800">- Fixed QLogic port state output on RHEL 5.3</changelog>
    <changelog author="Chad Dupuis &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1-3" date="1260446400">- Fixed discovery of HBAs in adapter_info on Integrity servers with multiple PCI
  busses</changelog>
    <changelog author="Keith Wortman &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-3" date="1298635200">- Initial release with Emulex CNA support</changelog>
    <changelog author="Keith Wortman &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-4" date="1323345600">- Fix for dependency check error seen when installing with HPSUM</changelog>
    <changelog author="Kumar Rahul&lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-5" date="1329220800">- Removed installation check for kernel 2.6 and addded Installation check for Rhel5.3 and SLES10 SP3 onwards</changelog>
    <changelog author="Shreya Roy Chowdhury&lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-6" date="1355832000">- Corrected Link state display information for Qlogic Adapters
- Added MSA G3 support in Scsi_info.h</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 3.3-6" date="1557316800">-Separated code stream for RHEL and SLES</changelog>
    <changelog author="Ratna Dey&lt;rathna.dey@hpe.com&gt; and Aravinda Rajanna &lt;aravinda.rajanna@hpe.com&gt; 4.1-1" date="1561550400">-Initial support added for E4 and will get updated subsequently</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.1-1" date="1563451200">-Fixed adpater_info code to display correct Vendor name instead of Unknown</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.1-1" date="1564056000">-Removed Brocade HBAs support</changelog>
  </package>
  <package pkgid="133194da126b95b79543d4c07d9bd15a78561f536e66bce28f92397c008bec75" name="firmware-43d7eff89e" arch="i386">
    <version epoch="0" ver="15.10.10.00" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 15.10.07.00" date="1400155200">-     *Problems Fixed in version 15.10.07.00:**
    
      * Resolves POST error 'MPT BIOS Fault 13h'. If this error occurs, the system will not boot from any boot device attached to an HP H2xx Host Bus Adapter (HBA) and will be unable to access data on drives attached to the HP H2xx HBA. The fault is triggered if the link between the HP H2xx HBA and the drives goes down during link tuning process. Updated firmware will no longer trigger this fault and the link is now allowed to re-establish itself. This issue is seen only with Solid State Drives (SSD).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 15.10.07.00-2.1" date="1432555200">-      Customers who already installed firmware version 15.10.07.00 do not need to update to 15.10.07.00 (B).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 15.10.07.00-2.1" date="1432641600">-     *Problems Fixed in version 15.10.07.00:**
    
      * Resolves POST error 'MPT BIOS Fault 13h'. If this error occurs, the system will not boot from any boot device attached to an HP H2xx Host Bus Adapter (HBA) and will be unable to access data on drives attached to the HP H2xx HBA. The fault is triggered if the link between the HP H2xx HBA and the drives goes down during link tuning process. Updated firmware will no longer trigger this fault and the link is now allowed to re-establish itself. This issue is seen only with Solid State Drives (SSD).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 15.10.09.00" date="1440590400">-     Firmware Version 15.10.09.00
    
      * Resolves a performance issue that was caused by a 90 msec timeout on all read/write operations when no Smart Carrier was present. This firmware reduces the read/write timeout to 2 msec.
    
      * Resolves a lockup issue during boot up on the HP ProLiant DL580 Gen8 Server when configured with the HP Host Bus Adapter H220 connected to SATA SSD or HDD drives.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 15.10.09.00-2.1" date="1446465600">-     Firmware Version 15.10.09.00 (B)
    
      * Improved integration with HP Smart Update Manager
    
    Firmware Version 15.10.09.00
    
      * Resolves a performance issue that was caused by a 90 msec timeout on all read/write operations when no Smart Carrier was present. This firmware reduces the read/write timeout to 2 msec.
    
      * Resolves a lockup issue during boot up on the HP ProLiant DL580 Gen8 Server when configured with the HP Host Bus Adapter H220 connected to SATA SSD or HDD drives.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 15.10.10.00" date="1489924800">-      Added support for Gen9 servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 15.10.10.00" date="1490011200">-     *Problems Fixed in version 15.10.10.00:**
    
      * HPE ProLiant BL420c Gen8 server configured with HPE Dynamic Smart Array B320i RAID controllers, failed to boot and the system stopped responding during Power-On Self-Test (POST). In some instances, the message, "1783 Driver Array Controller Failure" was displayed. Please refer to HPE Customer Advisory [c05317927](http://h20566.www2.hpe.com/hpsc/doc/public/display?docId=c05317927) for details.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 15.10.10.00-1.1" date="1496404800">-      Supports H221 on Gen9 Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 15.10.10.00-2.1" date="1516363200">-     Fixes an issue where the appropriate FW version for the Host Bus Adapter (HBA)
    Stockade (H2xx) driver will not install when using the Service Pack ProLiant
    (SPP)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 15.10.10.00-3.1" date="1543752000">-</changelog>
  </package>
  <package pkgid="390ecb5c33478b5e78caa9a489a6772df5b715163235252a41736633b30b8fa0" name="firmware-cafee9b6e4" arch="x86_64">
    <version epoch="0" ver="24.23.0_0042" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 24.23.0-0019" date="1515499200">-      Initial Release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 24.23.0-0019-2.1" date="1540468800">-     Customers who already installed firmware version 24.23.0-0019 do not need to
    update to 24.23.0-0019 (B).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 24.23.0-0019-2.1" date="1540555200">-      Releasing support for SUSE LINUX Enterprise Server 15 OS</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 24.23.0-0042" date="1548676800">-      Added support for the Apollo 4510 system</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 24.23.0-0042-1.1" date="1563105600">-     Fixes installation issues with Intelligent Provisioning and Service Pack for
    ProLiant Offline.</changelog>
  </package>
  <package pkgid="d9048e44cfeaf857e389180e6f94fc6f58d62555a724abb62ab4168879bd5704" name="firmware-cna-emulex" arch="x86_64">
    <version epoch="0" ver="2019.03.01" rel="1.19"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2018.02.01" date="1515585600">-     Added support for the following:
    
    UEFI:
    
      * Modify Fibre Channel over Ethernet (FCoE) code base to compile with Unreal Development Kit 2015(UDK2015) for access to new Unified Extensible Firmware Interface (UEFI)
      * Implement HP Unified Extensible Firmware Interface (UEFI) reqs - spec changes from 2.2 and 2.3
    
    Firmware:
    
      * Security Encryption for Internet Small Computer System Interface(iSCSI) Challenge Handshake Authentication Protocol (CHAP) and Data Center Interconnect(DCi) config data
      * Platform Management Components Intercommunication (PMCI) v1.1.0 - which also covers Network Controller Sideband Interface (NC-SI) requirements V1.01
      * Active Health System (AHS) Device Capabilities support in the Auxiliary Port (Aux) power
    
    Updated CNA (XE100 series) firmware:
    
    **Contains:**
    
    CNA (XE100 series) firmware 11.4.1231.6</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2018.02.01" date="1515672000">-     Fixed the following:
    
    UEFI:
    
      * Boot From SAN(BFS) volume is seen offline during Microsoft Windows 2016 Operating System install with 11.2.1263.19 Firmware
      * Removal of Boot entry from card Basic Input /Output System(BIOS) caused a red screen on HPE ProLiant ML350 Gen10 Server
    
    BIOS/Firmware:
    
      * HP FlexFabric 20Gb 2-port 650M Adapter goes missing from Operating System (OS) post 1.1.183.624 firmware flash
      * Excessive number of timeouts overflowing Noted All or Nothing Gate(NAND)
      * For HP StoreFabric CN1200E 10Gb Converged Network Adapter and HPE StoreFabric CN1200E-T 10GBASE-T Converged Network Adapter Firmware Active Health System (AHS) log incorrect part number
      * Name of HP StoreFabric CN1200E 10Gb Converged Network Adapter show incomplete in Active Health System (AHS)
      * For HP FlexFabric 20Gb 2-port 650FLB Adapter "Function Driver" is missing in Active Health System (AHS) field
      * Ports of HP FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter/HPE StoreFabric CN1200E-T 10GBASE-T Converged Network Adapter will become Disconnected in ESXI6.0 update 3 Operating System
      * Server Profile Health Status is not stable during Power on</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2018.02.02" date="1524744000">-     Updated CNA (XE100 series) firmware:
    
    **Contains:**
    
    CNA (XE100 series) firmware 11.4.1253.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2018.02.02" date="1524830400">-     Fixed the following:
    
      * Uplink status on down link
      * PFC enable/disable feature
    
    For more details please go through the document titled " HPE Network Adapters
    - On Certain HPE ProLiant Gen9 Servers Running Windows Server 2016 And
    Configured With Certain Network Adapters, a Series of Windows System Event Log
    Messages #153 On Windows 2016 May Be Encountered" which is available at the
    following link:
    
    &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00046322en_us&gt;
    
    And the document titled "HPE Network Adapters - On Any HPE ProLiant
    Server Running VMware ESXi 6.0 or VMware ESXi 6.5, And Configured
    With Certain Network Adapters, The Network Ports May Show as Up,
    When These Should Show as Down In HPE iLO and In the OS" which is
    available at the following link:
    
    &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00046319en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2018.06.01" date="1524916800">-     We have separate components to update fibre channel and converged network
    adapters.  This is a converged network adapter update component.  
      
    Updated CNA (XE100 series) firmware
    
    **Firmware**
    
    Contains:  
    CNA (XE100 series) firmware 12.0.1110.11</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2018.06.01" date="1525003200">-     Fixed the following:
    
      * Add a check for zero capacity LUNs (Logical Units) and avoid creating device path for them.
      * HP StoreFabric CN1200E Dual Port Converged Network Adapter FCoE function only show "Slot 3 Port 3:CN1200E Function 2-FCoE"</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2018.06.02" date="1525089600">-     We have separate components to update fibre channel and converged network
    adapters.  This is a converged network adapter update component.  
      
    Updated CNA (XE100 series) firmware
    
    **Firmware**
    
    Contains:  
    CNA (XE100 series) firmware 12.0.1110.2302</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2018.06.02" date="1525176000">-     Fixed the following:
    
      * After update to firmware version 11.2.1263.19 the link lost is observed on HPE FlexFabric 10Gb 2-port 556FLR-T Adapter</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2018.09.01" date="1525262400">-     We have separate components to update fibre channel and converged network
    adapters.  This is a converged network adapter update component.  
      
    Updated CNA (XE100 series) firmware
    
    **Firmware**
    
    Contains:  
    CNA (XE100 series) firmware 12.0.1110.11</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.03.01" date="1525348800">-     Fixed the following:
    
      * Fixed unexpected behavior in Active Health System (AHS) logs show World Wide Node Name (wwnn) &amp; World Wide Port Name (wwpn) in reverse order.
      * Fixed unexpected behavior with HP FlexFabric 20Gb 2-port 650FLB Adapter, HP FlexFabric 20Gb 2-port 650M Adapter cards does not complete to boot to Linux SUSE Linux Enterprise Server 12 Service Pack 3(SLES12 SP3) Operating System (OS) when both adapter are enabled for Fibre Channel over Ethernet (FCoE) boot.
      * Microsoft Windows Server 2012 R2 Hyper-V Storage Area Network (SAN) Disconnect.
      * Link lost with firmware version 11.2.1263.19
      * "FW not responding" message seen on card when creating Virtual Function (VF) in loop for HPE StoreFabric CN1200E-T 10GBASE-T Converged Network Adapter [NIC+ iSCSI] in Gen10 server.
      * HP FlexFabric 20Gb 2-port 650FLB Adapter - Loss of access to storage after Virtual Connect (VC) login redistribution
      * HP StoreFabric CN1200E Dual Port Converged Network Adapter does not complete to boot in Legacy Mode on Gen 9 Server
      * Emulex Peripheral Component Interconnect (PCI) slot Network Interface Connector (NIC) reported as device path instead of product name
      * Unable to disable shared memory feature in Human Interface Infrastructure (HII) menu
      * 650M Adapter has some info in Chinese and Japanese show garbled code under Human Interface Infrastructure (HII) Form</changelog>
  </package>
  <package pkgid="9f0eff3fa40265bdc53210db73dcd0415aa8a367a187ff3a2005fe78bd975828" name="firmware-d3000" arch="x86_64">
    <version epoch="0" ver="4.12" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72" date="1436184000">-     *The following fix is added in this version:-**
    
      * Fixed an issue causing fan speed to run at the maximum level due to a false error indication reported on early production hardware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72-3.1" date="1475841600">-     Firmware upgrade to 1.72(C) is not necessary, if the device is currently
    running 1.72 firmware</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72-3.1" date="1475928000">-     *The following fix is added in this version:-**
    
    -Fixed an issue causing fan speed to run at the maximum level due to a false error indication reported on early production hardware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.64" date="1499774400">-     *The following enhancement was incorporated in this version:**
    
      * Added support for 3610 and 3710 disk enclosures</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.64" date="1499860800">-     *The following fix was incorporated in this version:**
    
      *  Fixed NVRAM CRC error</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.04" date="1520078400">-     *The following fix was incorporated in this version:**
    
      *  Fixed NVRAM CRC error</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.04-1.1" date="1528977600">-     *The following fix was incorporated in this version:**
    
      *  Fixed NVRAM CRC error
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v148867/D3000_P07231-001.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.04-2.1" date="1531828800">-     *The following fix was incorporated in this version:**
    
      *  Fixed NVRAM CRC error
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v155369/D3000_P07231-002.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.04-3.1" date="1531915200">-     *The following fix was incorporated in this version:**
    
      *  Fixed NVRAM CRC error
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v157942/P07231-003.html) for the complete listing of fixes,
    enhancements, known issues and work-arounds corresponding to this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.12" date="1532001600">-     *The following fixes were incorporated in this version:**
    
      * Fixed TLB exception during upgrade from Rev build 1.11.000 to 0412.000
    
      * Fixed expander bootstrap task which failed with 0xB1 error code appearing in the console due to missing NVRAM tag - Product Name
    
      * Enabled-ClusterS2D command that does not complete with SATA drive in D3610
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v154196/D3000_P07231-004.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
  </package>
  <package pkgid="e6c309b985bf2ac05cb9aa7cebcb87cc51edc2c21fb25b3c07687a5e796a721b" name="firmware-d6020" arch="x86_64">
    <version epoch="0" ver="2.74" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.09-1.1" date="1505908800">-     *The following fix is added in this version:**
    
      * Failed to set the power supply fail flag when power supply status was critical
      * General exception message appeared on the console
      * D6020 Disk Enclosure - Segments of node3 &amp; node4 of 6500-6600 Mixed Cluster going into"NotAvailable" or "OnBackup" State
      * Remove SysIndicators references from ESP</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.53" date="1506081600">-     *The following fix is added in this version:**
    
      * Enclosure in Unexpected status: Non-critical after restoring the Encl ID.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.53-1.1" date="1520078400">-     *The following fix is added in this version:**
    
      * Enclosure in Unexpected status: Non-critical after restoring the Encl ID.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72" date="1528977600">-     *The following fixes was incorporated in this version:**
    
      * Sensors presence reporting for single domain mode
      * When an IOM is pulled the surviving IOM reports False critical temperatures
      * Configure phy zone group to 0 (zero) for all phys in the initstring
    
    Please refer to the [Release
    Notes](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v148868/D6020_P07232-001.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74" date="1534852800">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the [Release
    Notes](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v154195/D6020_P07232-002.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-1.1" date="1540209600">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v157943/P07232-003.html) for the complete listing of fixes,
    enhancements, known issues and work-arounds corresponding to this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-2.1" date="1551700800">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v160758/D6020_P07232-004.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-4.1" date="1569067200">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _Release Notes_ for the complete listing of fixes,
    enhancements, known issues and work-arounds corresponding to this firmware.</changelog>
  </package>
  <package pkgid="1a82992230fe2c8cb933292774a6083f46ea560cb210cfc78c2af5abb605285a" name="firmware-d8000" arch="x86_64">
    <version epoch="0" ver="0105" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0105" date="1570363200">-     No value has been set</changelog>
  </package>
  <package pkgid="47d2a252dc50cd21ebec8fe892ba83920f664a9973aa2ef88dc0dc2e45550df8" name="firmware-dcpmm" arch="x86_64">
    <version epoch="0" ver="1.2.0.5375" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0.5375" date="1558526400">-</changelog>
  </package>
  <package pkgid="cc60b0d2d60b6f22d5d30cfe60692b71109d6adc9b73ace19a382ff55f2497e0" name="firmware-dl20ml30gen10sps" arch="x86_64">
    <version epoch="0" ver="05.01.03.078" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.03.078" date="1565956800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Silicon Platform Services (SPS) Firmware provides
    mitigation to the latest CSME security vulnerabilities, also known as Local
    Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="d68b511a2f39872a56eb25e866b8aa8ed9b9c3a5386e86a752b509dcb4e3e192" name="firmware-fc-emulex" arch="x86_64">
    <version epoch="0" ver="2019.12.01" rel="1.34"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2018.09.01" date="1534248000">-     We  have separate components to update fibre channel and converged network
    adapters. This is a fibre channel update component.
    
    Added support to the following:
    
    8G Standup and Mezzanine:
    
    BIOS:
    
      * Fabric assigned Boot Target/Logical Unit (LUN) to Fabric Assgined World Wide Name(FAWWN)
    
    Updated 16/32 Gb HBA/Mezz universal boot  
    Updated 16Gb  HBA/Mezz universal boot  
    Updated 8Gb  HBA/Mezz universal boot
    
    **Contains:**
    
    16/32 Gb HBA/Mezz universal boot 11.4.334.10  
    16 Gb HBA/Mezz universal boot 11.4.334.27
    
    8 Gb standup/mezz firmware 2.10X6
    
    8 Gb standup/mezz universal boot image 11.40a13 (11.4.305.0 BIOS, 11.4.344.0
    UEFI)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2018.09.02" date="1535457600">-     We  have separate components to update fibre channel and converged network
    adapters. This is a fibre channel update component.
    
    Added support to the following:
    
    8G Standup and Mezzanine:
    
    BIOS:
    
      * Fabric assigned Boot Target/Logical Unit (LUN) to Fabric Assgined World Wide Name(FAWWN)
    
    Updated 16/32 Gb HBA/Mezz universal boot  
    Updated 16Gb  HBA/Mezz universal boot  
    Updated 8Gb  HBA/Mezz universal boot
    
    **Contains:**
    
    16/32 Gb HBA/Mezz universal boot 11.4.334.10  
    16 Gb HBA/Mezz universal boot 11.4.334.31
    
    8 Gb standup/mezz firmware 2.10X6
    
    8 Gb standup/mezz universal boot image 11.40a13 (11.4.305.0 BIOS, 11.4.344.0
    UEFI)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2018.09.02" date="1535544000">-     Fixed the following:
    
      * Fixed an issue where OneView profile data is lost during firmware upgrades from versions earlier than 11.4.x.x</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2018.09.03" date="1539518400">-     We  have separate components to update fibre channel and converged network
    adapters. This is a fibre channel update component.
    
    Added support to the following:
    
    8G Standup and Mezzanine:
    
    BIOS:
    
      * Fabric assigned Boot Target/Logical Unit (LUN) to Fabric Assgined World Wide Name(FAWWN)
    
    Updated 16/32 Gb HBA/Mezz universal boot  
    Updated 16Gb  HBA/Mezz universal boot  
    Updated 8Gb  HBA/Mezz universal boot
    
    **Contains:**
    
    16/32 Gb HBA/Mezz universal boot 11.4.334.10  
    16 Gb HBA/Mezz universal boot 11.4.334.31
    
    8 Gb standup/mezz firmware 2.10X6
    
    8 Gb standup/mezz universal boot image 11.40a13 (11.4.305.0 BIOS, 11.4.344.0
    UEFI)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2018.09.03" date="1539604800">-     Fixed the following:
    
      * Entries in payload.json which was triggering firmware discovery and flash to be incomplete on HPE SN1200E 16Gb 1port/2port adapter when firmware flash was attempted via OneView, integrated Lights Out(iLO) and UEFI flash mode.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.03.01" date="1548331200">-     We have separate components to update fibre channel and converged network
    adapters. This is a fibre channel update component.
    
    **16 Gb Standup, 16 Gb Mezzanine, and 32 Gb Standup**
    
    Added support to the following:
    
      * Added duration support for the Link Cable Beacon command.This avoids situations in which the blinking of an Host Bus Adapter(HBA) Light Emitting Diode(LED) might be initiated, but no command is sent to stop the blinking.
      * HPE Synergy 5330C 32Gb Fibre Channel Host Bus Adapter
    
    Updated 16/32 Gb HBA/Mezz universal boot  
    Updated 16Gb  HBA/Mezz universal boot  
    Updated 8Gb  HBA/Mezz universal boot
    
    **Contains:**
    
    16/32 Gb HBA/Mezz universal boot 12.0.346.9  
    16 Gb HBA/Mezz universal boot 12.0.346.9
    
    8 Gb standup/mezz firmware 2.10X6
    
    8 Gb standup/mezz universal boot image 12.00a10 (12.0.325.0 BIOS, 12.0.348.0
    UEFI)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.03.02" date="1558440000">-     We have separate components to update fibre channel and converged network
    adapters. This is a fibre channel update component.
    
    **16 Gb Standup, 16 Gb Mezzanine, and 32 Gb Standup**
    
    Added support to the following:
    
      * Added duration support for the Link Cable Beacon command.This avoids situations in which the blinking of an Host Bus Adapter(HBA) Light Emitting Diode(LED) might be initiated, but no command is sent to stop the blinking.
      * HPE Synergy 5330C 32Gb Fibre Channel Host Bus Adapter
    
    Updated 16/32 Gb HBA/Mezz universal boot  
    Updated 16Gb  HBA/Mezz universal boot  
    Updated 8Gb  HBA/Mezz universal boot
    
    **Contains:**
    
    16/32 Gb HBA/Mezz universal boot 12.0.346.9  
    16 Gb HBA/Mezz universal boot 12.0.346.9
    
    8 Gb standup/mezz firmware 2.10X6
    
    8 Gb standup/mezz universal boot image 12.00a10 (12.0.325.0 BIOS, 12.0.348.0
    UEFI)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.03.03" date="1558526400">-     We have separate components to update fibre channel and converged network
    adapters. This is a fibre channel update component.
    
    **16 Gb Standup, 16 Gb Mezzanine, and 32 Gb Standup**
    
    Updated 16/32 Gb HBA/Mezz universal boot
    
    **Contains:**
    
    16/32 Gb HBA/Mezz universal boot 12.0.346.43  
    16 Gb HBA/Mezz universal boot 12.0.346.9
    
    8 Gb standup/mezz firmware 2.10X6
    
    8 Gb standup/mezz universal boot image 12.00a10 (12.0.325.0 BIOS, 12.0.348.0
    UEFI)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.03.03" date="1558612800">-     Fixes buffer overflow condition, which would result in Operating System
    terminating unexpectedly and unhandled machine check messages seen.
    
    For more details please go through the document titled " HPE Host Bus
    Adapters - Certain Emulex Based FC Host Bus Adapters Running
    Firmware 12.0.346.9 May Experience an Uncorrectable Machine Check
    Exception Preceded by the IML Log Message "Fibre Channel Host
    Controller Has a New Status Other"" which is available at the following
    link:
    
    &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00088747en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.12.01" date="1558699200">-</changelog>
  </package>
  <package pkgid="c719f14a4428c4c8e39144c08faea0ce41cd504150e0acd4cf3ad20a8961cb3c" name="firmware-fc-qlogic" arch="x86_64">
    <version epoch="0" ver="2019.12.01" rel="1.20"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2018.06.01" date="1526904000">-     Fixed the following
    
    **8Gb Standup &amp; 8Gb Mezzanine**
    
    UEFI
    
      * Firmware Management Protocol now supports flashing older Multiboot versions.
      * Firmware Management Protocol SetImage no longer displays dots on the screen.
      * The following HII (Human Interface Infrastructure) fields now require a reboot after value change:  
    Legacy BIOS (Basic Input Output System) Selectable Boot
    
    
    
    **16Gb Standup &amp; 16Gb Mezzanine**
    
    Firmware
    
      * Bring up up-link in 32G or 16G optical environment (FEC (Forward Error Correction) only) when connected with remote device that is not setting the SN bit to zero and TC bit to 1 at the same time during the speed negotiation phase and delays transmitting NOS during LQT phase.
      * Dropped FCP_CMD frame by a virtual port (VP index greater than 0) logged into the fabric via Fabric Login (FLOGI) while the primary adapter port (VP0) was disabled via Global VP (Virtual Port) Options bit 2 of Initialize Multi-ID Firmware MBC (0048h).
    
    UEFI
    
      * Firmware Management Protocol now supports flashing older Multiboot versions.
      * Firmware Management Protocol SetImage no longer displays dots on the screen.
      * The following HII (Human Interface Infrastructure) fields now require a reboot after value change:  
    Fabric Assigned WWPN (World Wide Port Name), Fabric Assigned Boot Logical Unit
    (LUN), Legacy BIOS (Basic Input Output System) Selectable Boot.
    
    
    
    **16Gb/32Gb Standup**
    
    Firmware
    
      * Bring up up-link in 32G or 16G optical environment (FEC (Forward Error Correction) only) when connected with remote device that is not setting the SN bit to zero and TC bit to 1 at the same time during the speed negotiation phase and delays transmitting NOS during LQT phase.
    
    UEFI
    
      * Firmware Management Protocol now supports flashing older Multiboot versions.
      * Firmware Management Protocol SetImage no longer displays dots on the screen.
      * The following HII (Human Interface Infrastructure)  fields now require a reboot after value change:  
    FC (Fibre Channel) Tape, Fabric Assigned WWPN (World Wide Port Name), Fabric
    Assigned Boot LUN (Logical Unit), Legacy BIOS (Basic Input Output System)
    Selectable Boot.
    
      * Changed Legacy BIOS (Basic Input Output System) Selectable Boot HII (Human Interface Infrastructure) default to Enabled.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2018.09.01" date="1534161600">-     Added support for the following:
    
    **16Gb Standup &amp; 16Gb Mezzanine**
    
      * Power Loss calculation in D_port (Destination port) operation.
    
    **16Gb/32Gb Standup **
    
      * Power Loss calculation in D_port (Destination port) operation.
      * Support maximum training timeout for 32Gbps data rate per FC-FS-4 (Fibre Channel Framing and Signaling) specification.
    
    Updated the Firmware/BIOS/UEFI packages for 8 Gb, 16 Gb and 32 Gb products.
    
      * 8 Gb HBA/Mezz 
        * Package 3.77.08
        * Firmware 8.07.00
        * UEFI 6.64
        * BIOS 3.56  
    
    
      * 16 Gb HBA/Mezz 
        * Package 6.01.59
        * Firmware 8.07.16
        * UEFI 6.63
        * BIOS 3.43  
    
    
      * 16/32 Gb 
        * Package 01.70.85
        * Firmware 8.07.18
        * UEFI 6.47
        * BIOS 3.54</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2018.09.01" date="1534248000">-     Fixed the following
    
    **8Gb Standup &amp; 8Gb Mezzanine**
    
    UEFI
    
      * Firmware Management Protocol now supports flashing older Multiboot versions.
      * Firmware Management Protocol SetImage no longer displays dots on the screen.
      * The following HII (Human Interface Infrastructure) fields now require a reboot after value change:  
    Legacy BIOS (Basic Input Output System) Selectable Boot
    
    
    
    **16Gb Standup &amp; 16Gb Mezzanine**
    
    Firmware
    
      * Bring up up-link in 32G or 16G optical environment (FEC (Forward Error Correction) only) when connected with remote device that is not setting the SN bit to zero and TC bit to 1 at the same time during the speed negotiation phase and delays transmitting NOS during LQT phase.
      * Dropped FCP_CMD frame by a virtual port (VP index greater than 0) logged into the fabric via Fabric Login (FLOGI) while the primary adapter port (VP0) was disabled via Global VP (Virtual Port) Options bit 2 of Initialize Multi-ID Firmware MBC (0048h).
    
    UEFI
    
      * Firmware Management Protocol now supports flashing older Multiboot versions.
      * Firmware Management Protocol SetImage no longer displays dots on the screen.
      * The following HII (Human Interface Infrastructure) fields now require a reboot after value change:  
    Fabric Assigned WWPN (World Wide Port Name), Fabric Assigned Boot Logical Unit
    (LUN), Legacy BIOS (Basic Input Output System) Selectable Boot.
    
    
    
    **16Gb/32Gb Standup**
    
    Firmware
    
      * Bring up up-link in 32G or 16G optical environment (FEC (Forward Error Correction) only) when connected with remote device that is not setting the SN bit to zero and TC bit to 1 at the same time during the speed negotiation phase and delays transmitting NOS during LQT phase.
    
    UEFI
    
      * Firmware Management Protocol now supports flashing older Multiboot versions.
      * Firmware Management Protocol SetImage no longer displays dots on the screen.
      * The following HII (Human Interface Infrastructure)  fields now require a reboot after value change:  
    FC (Fibre Channel) Tape, Fabric Assigned WWPN (World Wide Port Name), Fabric
    Assigned Boot LUN (Logical Unit), Legacy BIOS (Basic Input Output System)
    Selectable Boot.
    
      * Changed Legacy BIOS (Basic Input Output System) Selectable Boot HII (Human Interface Infrastructure) default to Enabled.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.03.01" date="1548936000">-     Added support for the following:
    
    **16Gb/32Gb Standup**
    
    Firmware:
    
      * Add support for FC NVMe (Non-volatile memory express) ready
      * Support Link cable Beacon (LCB)
    
    BIOS:** **
    
      * Added support for 5830C Secure flash
    
    UEFI:
    
      * Added support for 5830C Secure flash
    
    Updated the Firmware/BIOS/UEFI packages for 8 Gb, 16 Gb and 32 Gb products.
    
      * 8 Gb HBA/Mezz 
        * Package 3.79.02
        * Firmware 8.08.01
        * UEFI 6.66
        * BIOS 3.56
      * 16 Gb HBA/Mezz 
        * Package 6.01.79
        * Firmware 8.08.203
        * UEFI 6.65
        * BIOS 3.43
      * 16/32 Gb 
        * Package 1.71.03
        * Firmware 8.08.204
        * UEFI 6.51
        * BIOS 3.64</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.03.01" date="1549022400">-     Fixed the following
    
    **8Gb Standup &amp; 8Gb Mezzanine**
    
    Firmware:
    
      * Fix regression where the firmware returned Time Out error code under heavy load.
    
    UEFI
    
      * Driver progress messages are no longer displayed on SuperDome servers.
      * Corrected Driver Health string format on Gen10 servers
    
    **16Gb Standup &amp; 16Gb Mezzanine**
    
    Firmware:
    
      * Fix unexpected behavior related to Diagnostic Port and Link Diagnostics operations (loopback, echo etc)
    
    UEFI:
    
      * Driver progress messages are no longer displayed on SuperDome servers.
      * Corrected Driver Health string format on Gen10 servers.
    
      
    **16Gb/32Gb Standup**
    
    Firmware:
    
      * Fix unexpected behavior related to Diagnostic Port and Link Diagnostics operations (loopback, echo etc)
    
    UEFI:
    
      * Corrected Driver Health string format on Gen10 servers.
      * Driver progress messages are no longer displayed on SuperDome servers.
      * Fixed QUIC (QUIC Protocol)
      * Removed 8G Speed and Loop Only Options from 5830C Adapter</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.03.02" date="1558785600">-     Added support for RedHat Enterprise Linux 8
    
    Added support for the following:
    
    **16Gb/32Gb Standup**
    
    Firmware:
    
      * Add support for FC NVMe (Non-volatile memory express) ready
      * Support Link cable Beacon (LCB)
    
    BIOS:** **
    
      * Added support for 5830C Secure flash
    
    UEFI:
    
      * Added support for 5830C Secure flash
    
    Updated the Firmware/BIOS/UEFI packages for 8 Gb, 16 Gb and 32 Gb products.
    
      * 8 Gb HBA/Mezz 
        * Package 3.79.02
        * Firmware 8.08.01
        * UEFI 6.66
        * BIOS 3.56
      * 16 Gb HBA/Mezz 
        * Package 6.01.79
        * Firmware 8.08.203
        * UEFI 6.65
        * BIOS 3.43
      * 16/32 Gb 
        * Package 1.71.03
        * Firmware 8.08.204
        * UEFI 6.51
        * BIOS 3.64</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.03.02" date="1558872000">-     Fixed the following
    
    **8Gb Standup &amp; 8Gb Mezzanine**
    
    Firmware:
    
      * Fix regression where the firmware returned Time Out error code under heavy load.
    
    UEFI
    
      * Driver progress messages are no longer displayed on SuperDome servers.
      * Corrected Driver Health string format on Gen10 servers
    
    **16Gb Standup &amp; 16Gb Mezzanine**
    
    Firmware:
    
      * Fix unexpected behavior related to Diagnostic Port and Link Diagnostics operations (loopback, echo etc)
    
    UEFI:
    
      * Driver progress messages are no longer displayed on SuperDome servers.
      * Corrected Driver Health string format on Gen10 servers.
    
      
    **16Gb/32Gb Standup**
    
    Firmware:
    
      * Fix unexpected behavior related to Diagnostic Port and Link Diagnostics operations (loopback, echo etc)
    
    UEFI:
    
      * Corrected Driver Health string format on Gen10 servers.
      * Driver progress messages are no longer displayed on SuperDome servers.
      * Fixed QUIC (QUIC Protocol)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.03.03" date="1558958400">-     Updated the Firmware/BIOS/UEFI packages for 8 Gb, 16 Gb and 32 Gb products.
    
      * Gen4 Fibre Channel Host Bus Adapter: 
        * Package 3.79.02
        * Firmware 8.08.01
        * UEFI 6.66
        * BIOS 3.56
      * Gen5 Fibre Channel Host Bus Adapter: 
        * Package 6.01.79
        * Firmware 8.08.203
        * UEFI 6.65
        * BIOS 3.43
      * Gen6 Fibre Channel Host Bus Adapter: 
        * Package 1.72.02
        * Firmware 8.08.220
        * UEFI 6.51
        * BIOS 3.64</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.03.03" date="1559044800">-     Fixed the following
    
    Hisense SFP requires a minimum of 10ms after a write operation before reading
    it back. But the current Firmware is not waiting long enough, manifests as an
    intermittently incomplete to connect to Fabric</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.12.01" date="1559131200">-</changelog>
  </package>
  <package pkgid="a3ba338f78948a430517907ca66630016cc5238fc1567ef915986647efd2145c" name="firmware-hca-mellanox-infiniband-only" arch="x86_64">
    <version epoch="0" ver="1.0.7" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.3" date="1444392000">-     *Fixes:**
    
      * Fixed improper handling of sequential connect packets.
      * On rare occasions, after PXE boot, the port speed came up as SDR instead of a higher speed.
      * On very rare occasions, a false alarm thermal indication was reported when HP mezz cards were rebooted.
      * On very rare occasions, firmware wrongly reported board over-temperature warning.
      * destroy-DCT command handling may experience delays while the DCT port is down.
      * Fixed an issue causing diagnostic counters VS-MAD page offset to start at a wrong address.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1448971200">-     *Firmware for the following devices are updated to 10.10.5052:**  
      
    702211-B21 (HP Infiniband FDR 2P 545QSFP Adapter)  
    702212-B21 (HP Infiniband FDR 2P 545FLR-QSFP Adapter)  
    702213-B21 (HP Infiniband FDR 2P 545M Adapter)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1449057600">-     *Fixes:**
    
      * Fixed improper handling of sequential connect packets.
      * On rare occasions, after PXE boot, the port speed came up as SDR instead of a higher speed.
      * On very rare occasions, a false alarm thermal indication was reported when HP mezz cards were rebooted.
      * On very rare occasions, firmware wrongly reported board over-temperature warning.
      * destroy-DCT command handling may experience delays while the DCT port is down.
      * Fixed an issue causing diagnostic counters VS-MAD page offset to start at a wrong address.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5-2.1" date="1470571200">-     *Firmware for the following devices are updated to 10.16.1006:**  
      
    702211-B21 (HP Infiniband FDR 2P 545QSFP Adapter)  
    702212-B21 (HP Infiniband FDR 2P 545FLR-QSFP Adapter)  
    702213-B21 (HP Infiniband FDR 2P 545M Adapter)
    
    **New features in firmware version 10.16.1006:**
    
      * Increased the number of VFs from 32 to 64 per PF.
      * Keeps track of the creation of a packet. A time-stamping service supports assertions of proof that a datum existed before a particular time.
      * Custom port counters provide the user a clear indication about RDMA send/receive statistics and errors.
      * The change includes the following: 
        * Changed port configuration which required link re-training (such as speed)
        * PAOS down/up
        * This change, will cause the link to toggle and new configurations to take effect.
      * Flint utility allows performing an MD5 checksum on the non-persistent sections of the firmware image.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5-2.1" date="1470657600">-     *The following issues are fixed in firmware version 10.16.1006:**
    
      * Fixed an issue causing single port devices to query and write Physical Port TLVs to Port 2.
      * Fixed an issue which caused the device to hang when resetting qkey/pkey violation counter via port_info mad.
      * Improved RDMA READ bandwidth under packet lost scenario.
      * If the PF driver or the tool (e.g. ethtool) use PAOS DOWN command (e.g. by ifconfig down or ip link set down), loopback traffic is blocked for all functions on this port (PF&lt;-&gt;VFs / VF&lt;-&gt;VF)  
    In Multihost loopback, the traffic will be blocked once the firmware receives
    the PAOS down command from all PFs. However, the loopback traffic will not be
    blocked when the port is down due to the physical link (for example: cable
    plugged out, switch port down).
    
      * Fixed an issue which prevented QP permission for reserve lkey to be passed to the memop machine.
      * Fixed a MLX QP SL mismatch handling which 10.12.0780 occurred when the SL in the WQE was different than the SL in the QP.
      * Fixed wrongly implementation of SM SL2VL configuration.
      * Fixed a DC re-connect flow which in some cases 10.12.0780 sent bad completion.
      * Fixed a DC performance issue; separated DCRs 10.12.0780 SQ from the DCI SQs.
      * Fixed an issue causing the firmware to hang 10.12.0780 when running ibdiagnet. The received DiagData  
    MAD included the following values:  
     Clear_all = 1  
     PageNum = 0  
     Port_select = 0  
    To prevent the firmware from hanging, a port check was added to Set() as well.
    
      * Hardware fatal error used to occur when running "ibdump".
      * FDR10 incorrect speed indication was reported due to the usage of a translation function from the hardware speed to the PRM speed twice.
      * Invalid data was returned by EyeOpening MAD.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5-3.1" date="1472731200">-     *Firmware for the following devices are updated to 10.14.1100:**  
      
    702211-B21 (HP Infiniband FDR 2P 545QSFP Adapter)  
    702212-B21 (HP Infiniband FDR 2P 545FLR-QSFP Adapter)
    
    **Firmware for the following devices are updated to 10.16.1038:**
    
    702213-B21 (HP Infiniband FDR 2P 545M Adapter)
    
    **New features in firmware version 10.14.1100:**
    
      * Keeps track of the creation of a packet. A time-stamping service supports assertions of proof that a datum existed before a particular time.
      * Custom port counters provide the user a clear indication about RDMA send/receive statistics and errors.
      * The change includes the following: 
        * Changed port configuration which required link re-training (such as speed)
        * PAOS down/up
        * This change, will cause the link to toggle and new configurations to take effect.
      * Flint utility allows performing an MD5 checksum on the non-persistent sections of the firmware image.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5-3.1" date="1472817600">-     *The following issues are fixed in firmware version 10.16.1038****:**
    
      * Fixed RSOD bug.
    
    **The following issues are fixed in firmware version 10.14.1100:**
    
      * Fixed an issue which prevented QP permission for reserve lkey to be passed to the memop machine.
      * Fixed a MLX QP SL mismatch handling which 10.12.0780 occurred when the SL in the WQE was different than the SL in the QP.
      * Fixed wrongly implementation of SM SL2VL configuration.
      * Fixed a DC re-connect flow which in some cases 10.12.0780 sent bad completion.
      * Fixed a DC performance issue; separated DCRs 10.12.0780 SQ from the DCI SQs.
      * Fixed an issue causing the firmware to hang 10.12.0780 when running ibdiagnet. The received DiagData  
    MAD included the following values:  
     Clear_all = 1  
     PageNum = 0  
     Port_select = 0  
    To prevent the firmware from hanging, a port check was added to Set() as well.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1499688000">-     *Firmware for the following devices are updated to 10.16.1038:**
    
      
    702211-B21 (HP Infiniband FDR 2P 545QSFP Adapter)  
    702212-B21 (HP Infiniband FDR 2P 545FLR-QSFP Adapter)
    
    **Firmware for the following devices are updated to 10.16.1058:**
    
    702213-B21 (HP Infiniband FDR 2P 545M Adapter)
    
    **New features in firmware version 10.16.1038:**
    
      * Increased the number of VFs from 32 to 64 per PF.  
    **Note:** When increasing the number of VFs, the following limitations must be taken into consideration:  
     server_total_bar_size &gt;= (num_pfs)*(2log_pf_uar_bar_size +
    2log_vf_uar_bar_size*total_vfs)  
     server_total_msix &gt;=(num_pfs)*(num_pf_msix + num_vfs_msix * total_vfs)
    
      * Added v1, v3, v6 tags to VPD read only tag.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1499774400">-     *The following issues are fixed in firmware version 10.16.1058****:**
    
      * Fixed an issue which caused system fail when enabled SR-IOV.
      * Fixed a rare issue which caused the RX to hang when triggered the SRQ limit event.
      * Fixed an issue which occasionally caused the RX traffic to hang in DC when received a PCI error on WQE fetch.
      * Fixed an issue which caused the mlxconfig configuration of VF_LOG_BAR_SIZE to be ignored and to be set to 5 (32MB).
      * Fixed an EEH error from PCI which caused firmware to hang.
      * Fixed an issues which occasionally caused the driver to hang during unload on some VLs when configuring the SM with a VL weight 0 and running traffic on it.
      * Fixed a rare case which caused an assert reported to the driver when the DC transport was enabled in the following cases: retransmission occurred and the RX received the same packet twice
      * Fixed an issue which caused the HCA to hang when enabled /disabled the VFs vports when the VFs GUIDs configuration were overloaded in the steering table.
    
    **The following issues are fixed in firmware version 10.16.1038****:**
    
      * Fixed RSOD bug.
      * Fixed an issue causing single port devices to query and write Physical Port TLVs to Port 2.
      * Fixed an issue which caused the device to hang when resetting qkey/pkey violation counter via port_info mad.
      * Improved RDMA READ bandwidth under packet lost scenario.
      * If the PF driver or the tool (e.g. ethtool) use PAOS DOWN command (e.g. by ifconfig down or ip link set down), loopback traffic is blocked for all functions on this port (PF&lt;-&gt;VFs / VF&lt;-&gt;VF)  
    In Multihost loopback, the traffic will be blocked once the firmware receives
    the PAOS down command from all PFs. However, the loopback traffic will not be
    blocked when the port is down due to the physical link (for example: cable
    plugged out, switch port down).
    
      * Fixed an issue which prevented QP permission for reserve lkey to be passed to the memop machine.
      * Fixed a MLX QP SL mismatch handling which occurred when the SL in the WQE was different than the SL in the QP.
      * Fixed wrongly implementation of SM SL2VL configuration.
      * Fixed a DC re-connect flow which in some cases sent bad completion.
      * Fixed a DC performance issue; separated DCRs SQ from the DCI SQs.
      * Fixed an issue causing the firmware to hang when running ibdiagnet. The received DiagData MAD included the following values:  
     Clear_all = 1  
     PageNum = 0  
     Port_select = 0  
    To prevent the firmware from hanging, a port check was added to Set() as well.
    
      * Fixed an issue which caused hardware fatal error when running ibdump.
      * Fixed an FDR10 incorrect speed indication reported due to the usage of a translation function from the hardware speed to the PRM speed twice.
      * Fixed a Phy manager PCS event handling when the port's next state was disable.
      * Fixed an issue that caused invalid data returned by EyeOpening MAD.
      * Reduced the VF ICM footprint for VFs.
      * Increased the number of regular memory region from 2^21 to 2^22.
      * Fixed improper handling of sequential connect packets.
      * On rare occasions, after PXE boot, the port speed came up as SDR instead of a higher speed.
      * On very rare occasions, firmware wrongly reported board over-temperature warning.
      * destroy-DCT command handling may experience delays while the DCT port is down.
      * Fixed an issue causing diagnostic counters VS-MAD page offset to start at a wrong address.
      * Fixed stability issue in the event of no-local-DC-resources.
      * Fixed improper handling of multiple DCT errors.
      * Fixed bad handling of DC RNR state.
      * Reduced DCT destroy firmware handling time.
      * Fixed link flapping issue which occurred when LLR was active.
      * Deprecated code 0x0c0600 was changed to 0x020700 (InfiniBand network adapter).
      * Atomic response endianess is always a big endian.
      * **[Documentation fix in PRM v2.01, no changes to the firmware code.]**  
    Port asynchronous events documentation are different from the PRM. All port
    events have a type value of 0x9.  
    The following subtype values are used for the following events:  
     link down=0x1  
     link up=0x4  
     link initialized=0x5  
     lid change=0x6  
     PKEY change=0x7  
     GUID change=0x8  
     client reregister=0x9
    
      * Alternate Path Migration (APM) triggers only a single affiliated asynchronous error event in the case of a path migration failure.
      * Using a min_rnr_nak value of 0x5 will cause failures when creating reliable connection (RC) QPs.
      * On rare occasions DC Initiator completions might be lost.
      * The following signature rules are not supported (Numbering based on "signature rules table" in PRM):  
     Rule #12: T10 DIF  
     Rule #13: T10 DIF CS  
     Rule #14 T10 DIF CS
    
      * VL arbitration configuration does not ensure minimum bandwidth for VL as configured.
      * On very rare occasions, a false firmware "hanged" report is printed in the dmesg.
      * CQ buffer resize not supported.
      * When connecting to InfiniScale family switches and non-Mellanox InfiniBand switches DDR and QDR speeds may show line errors and in some cases might downgrade to SDR speed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1565956800">-     *The following issues are fixed in firmware version 10.16.1058****:**
    
      * Fixed an issue which caused system fail when enabled SR-IOV.
      * Fixed a rare issue which caused the RX to hang when triggered the SRQ limit event.
      * Fixed an issue which occasionally caused the RX traffic to hang in DC when received a PCI error on WQE fetch.
      * Fixed an issue which caused the mlxconfig configuration of VF_LOG_BAR_SIZE to be ignored and to be set to 5 (32MB).
      * Fixed an EEH error from PCI which caused firmware to hang.
      * Fixed an issues which occasionally caused the driver to hang during unload on some VLs when configuring the SM with a VL weight 0 and running traffic on it.
      * Fixed a rare case which caused an assert reported to the driver when the DC transport was enabled in the following cases: retransmission occurred and the RX received the same packet twice
      * Fixed an issue which caused the HCA to hang when enabled /disabled the VFs vports when the VFs GUIDs configuration were overloaded in the steering table.
    
    **The following issues are fixed in firmware version 10.16.1038****:**
    
      * Fixed RSOD bug.
      * Fixed an issue causing single port devices to query and write Physical Port TLVs to Port 2.
      * Fixed an issue which caused the device to hang when resetting qkey/pkey violation counter via port_info mad.
      * Improved RDMA READ bandwidth under packet lost scenario.
      * If the PF driver or the tool (e.g. ethtool) use PAOS DOWN command (e.g. by ifconfig down or ip link set down), loopback traffic is blocked for all functions on this port (PF&lt;-&gt;VFs / VF&lt;-&gt;VF)  
    In Multihost loopback, the traffic will be blocked once the firmware receives
    the PAOS down command from all PFs. However, the loopback traffic will not be
    blocked when the port is down due to the physical link (for example: cable
    plugged out, switch port down).
    
      * Fixed an issue which prevented QP permission for reserve lkey to be passed to the memop machine.
      * Fixed a MLX QP SL mismatch handling which occurred when the SL in the WQE was different than the SL in the QP.
      * Fixed wrongly implementation of SM SL2VL configuration.
      * Fixed a DC re-connect flow which in some cases sent bad completion.
      * Fixed a DC performance issue; separated DCRs SQ from the DCI SQs.
      * Fixed an issue causing the firmware to hang when running ibdiagnet. The received DiagData MAD included the following values:  
     Clear_all = 1  
     PageNum = 0  
     Port_select = 0  
    To prevent the firmware from hanging, a port check was added to Set() as well.
    
      * Fixed an issue which caused hardware fatal error when running ibdump.
      * Fixed an FDR10 incorrect speed indication reported due to the usage of a translation function from the hardware speed to the PRM speed twice.
      * Fixed a Phy manager PCS event handling when the port's next state was disable.
      * Fixed an issue that caused invalid data returned by EyeOpening MAD.
      * Reduced the VF ICM footprint for VFs.
      * Increased the number of regular memory region from 2^21 to 2^22.
      * Fixed improper handling of sequential connect packets.
      * On rare occasions, after PXE boot, the port speed came up as SDR instead of a higher speed.
      * On very rare occasions, firmware wrongly reported board over-temperature warning.
      * destroy-DCT command handling may experience delays while the DCT port is down.
      * Fixed an issue causing diagnostic counters VS-MAD page offset to start at a wrong address.
      * Fixed stability issue in the event of no-local-DC-resources.
      * Fixed improper handling of multiple DCT errors.
      * Fixed bad handling of DC RNR state.
      * Reduced DCT destroy firmware handling time.
      * Fixed link flapping issue which occurred when LLR was active.
      * Deprecated code 0x0c0600 was changed to 0x020700 (InfiniBand network adapter).
      * Atomic response endianess is always a big endian.
      * **[Documentation fix in PRM v2.01, no changes to the firmware code.]**  
    Port asynchronous events documentation are different from the PRM. All port
    events have a type value of 0x9.  
    The following subtype values are used for the following events:  
     link down=0x1  
     link up=0x4  
     link initialized=0x5  
     lid change=0x6  
     PKEY change=0x7  
     GUID change=0x8  
     client reregister=0x9
    
      * Alternate Path Migration (APM) triggers only a single affiliated asynchronous error event in the case of a path migration failure.
      * Using a min_rnr_nak value of 0x5 will cause failures when creating reliable connection (RC) QPs.
      * On rare occasions DC Initiator completions might be lost.
      * The following signature rules are not supported (Numbering based on "signature rules table" in PRM):  
     Rule #12: T10 DIF  
     Rule #13: T10 DIF CS  
     Rule #14 T10 DIF CS
    
      * VL arbitration configuration does not ensure minimum bandwidth for VL as configured.
      * On very rare occasions, a false firmware "hanged" report is printed in the dmesg.
      * CQ buffer resize not supported.
      * When connecting to InfiniScale family switches and non-Mellanox InfiniBand switches DDR and QDR speeds may show line errors and in some cases might downgrade to SDR speed.</changelog>
  </package>
  <package pkgid="bcc19e351a123c3b09e26af37d678cb826db2d524250bc1de22573cf8a29a070" name="firmware-hca-mellanox-vpi-connectx4" arch="x86_64">
    <version epoch="0" ver="1.0.7" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.1" date="1499774400">-     *Fixes in FW version 12.18.2030:**
    
      * Fixed an issue which caused bi-directional traffic 10% BW degradation in Multihost.
      * Increased the CQE zipping aggressive mode timer to 9000.
      * Moving IPoIB enhanced QP to ERR or RST state results in the corruption of the service_type and pm_state in the QPC.
      * Attaching RoCE IPv4 QPs to MCG when the vport state is set to toggle (DOWN/UP), prevents the QPs that are listed on that MCG from receiving any traffic.
      * When arming SRQ for limit event, the device might issue an event with context_index=0.
      * Occasionally, when moving UD QP from error state to RTS, the QP re-enters the error state
      * When performing Pkey check for IPoIB enhanced traffic, the Pkey membership bit is ignored.
      * Stopping the Rate Limiter while traffic is being transmitted might cause the adapter card to hang.
      * Privileged Vport egress traffic is not blocked when Vport is not active
      * PF direct pass-through is not supported in InfiniBand (since PF FLR is not supported)
      * Missing invalidation upon Set().pkey leads to bad Pkey checks.
      * Fixed an issue which caused the HCA mad response to contain the incoming packet Pkey and not the matched Pkey.
      * Modified PCIe Tx configuration.
      * Fixed an issue that prevented the software to set ECN parameters (min_rate, max_rate, rate_to_set_on_first_cnp) to values &gt;32768.
      * Fixed an issue which caused the link speed to raise as DDR when connected with certain copper cables to devices supporting up to QDR speed.
      * Fixed an issue which prevented physical counters from reseting. Now the physical counters are reset on first driver start.
      * Fixed possible negotiation issues with 3rd parties.
      * Fixed a rare issue which caused 56GbE link to raise with errors.
      * Fixed an issue which caused scheduling_context.element_type to be taken into consideration with performing verifications, when running the modify_scheduling_context command, although the field is reserved.
      * Fixed an issue which caused the eSwitch max_average_bw ref counter to decrement in TEARDOWN_HCA/ FLR VF regardless of the max_average_bw value set, although the ref counter design was to increment on every max_average_bw != 0 (limited).
      * On rare occasions during UEFI boot cycles system got stuck while WinPE is loaded. (OS WinPE, system DL160).
      * Single FTE that catches both untagged and prio-tagged packets (by giving an FTE with match_value.vlan_tag = 0 and match_value.vid = 0) is currently not supported.
      * Flashing the firmware requires server reboot. Firmware cannot be flashed twice without server reboot after first flashing.
      * If the vport state is DOWN and a packet is sent in local loopback, the sx_sniffer tool will not function.
      * Fixed an issue causing bubbles to appear as symbol errors when link raised FDR 1x.
      * When Clause 74 Fire-Code FEC is active, and there are FC corrected errors, both the FC_correctable counter and the FC_uncoreectable counter are increment.
      * Some Port Control Register do not return to the default value after the last port owner host restarts the driver.
      * Fixed an issue which caused RX to hang when the UDP packet had a reserved UDP destination port.
      * Fixed DMAC reporting mapping per host.
      * Fixed an EEH error from PCI which caused firmware to hang.
      * Fixed the default value of the PCIe target_link_speed to Gen3 in link control2.
      * Fixed an issue which prevented LEDs from blinking when the traffic was less than 0.1% of the link speed.
      * Fixed an issue which caused the mlxconfig configuration of VF_LOG_BAR_SIZE to be ignored and to be set to 5 (32MB).
      * Fixed an issues which occasionally caused the driver to hang during unload on some VLs when configuring the SM with a VL weight 0 and running traffic on it.
      * A server getting into a Standby mode while Packet-Pacing is enabled might cause firmware to hang and driver call-trace.
      * Fixed an issue which caused unexpected QoS functionality in case of multiple sources to single destination traffic transmission.
      * Fixed an issue which occasionally caused the RX traffic to hang in DC when received a PCI error on WQE fetch.
      * Fixed OOB connection issue during Intel's ITP inject errors test.
      * Fixed an issue in IEEE Auto-Negotiation where 25G FireCode FEC and 25G Reed-Solomon FEC bits were reversed.
      * Fixed an issue which caused RX to hang when a UDP packet with destination port of RoCE v2 arrived and the data matched the DC transport service.
      * Added protection from IOPX thermal diode destabilization to prevent UEFI IPv6 PXE boot failure on ConnectX-4 Lx 25GE OCP card.
      * Fixed an issue causing single port devices to query and write Physical Port TLVs to Port 2.
      * Enabled mlxfwreset to work using the PCIe Secondary Bus Reset.
      * Fixed an issue causing link flapping as a result, incorrect link settings.
      * Fixed an issue causing wrong alignment markers to be used when running 50G with Clause91 FEC enabled.
      * Reduced the default BAR size for VF (SR-IOV) from 5 (32 MB) to 1 (2MB).
      * Added legacy interrupts support in FlexBoot.
      * Modified the TX configuration to support EMI crossing margins in 16Ghz.
      * In some cases, a Bit Error Rate is not optimal on 10G/40G links.
      * Instability of Link Training Flow occurs during 100G Auto-Negotiation.
      * Fixed a rare issue which caused the command to hang when moved the QP to RESET and back to RTS.
      * Improved RDMA READ bandwidth under packet lost scenario.
      * Added support for pnat = 1 in HCA access_reg command as required by the ibdiagnet tool.
      * Fixed the LLDP OCBB response: return value is now ascii.
      * Fixed a very rare NMI issue during PXE cycles.
      * Increased the steering hash tables static size from 128 to a maximum of 32K entries.
      * Prevented miscalculation of module temperature when using 100Gb/s cables (OPN: MFA1A00-Cxxx for 100GbE and MFA1A00-Exxx for IB EDR).
      * Fixed an issue which caused the device to hang when resetting qkey/pkey violation counter via port_info mad.
      * Changed the MTU size in OCBB report. Now MTU size does not include the packet headers.
      * Reduced one hop for Unicast RX steering, steering pipes balancing.
      * Non-volatile configuration of Port Type TLV more than 50 times might cause system hang.
      * Fixed a 25G and 50G link issue when Clause 91 RS FEC was active.
      * Added a missing invalidation of SwitchX cache upon FLR which caused the upcoming driver load to either fail or not to be able to transmit.
      * Fixed an issue which prevented Vport counters from counting local loopback packets. Packets now are filter by the self-loopback prevent
      * Reported INTx as unsupported to allow PFs Passthrough on PowerKVM.
      * SR-IOV Ethernet supports up to 18 VFs per port only.
      * Fixed and incident what allowed local (internal) loopbacked packets to be counted by the Vport counters, although Vport counters should count only traffic that crosses the Vport.
      * Fixed an issue preventing driver loading or TX traffic sending upon reboot, after ungraceful driver unload.
      * Fixed casting of BMC MAC before steering API.
      * Fixed the PCI write flow to take into consideration the PCI MTU. This fix eliminates the need for NOPs in the flow, which resulted from PPC larger PCI MTU.  
    The single queue limitation for READ is due to a hardware limitation of the
    number of READ request in a given time.
    
      * Fixed a case that caused FlexBoot to not work as expected with systems that run with "large bar" enabled (Above 4G Decoding) over Connect-IB or ConnectX-4 HCAs.
      * Fixed PLDM support for single port NICs. Currently port's relevant sensors/states are reported only for a single port.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.2" date="1519905600">-     *Firmware for the following devices are updated to 12.21.1000:**
    
    825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)  
    825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)
    
    **New features and changes in version 12.21.1000:**
    
      * Added support for the following features: 
        * InfiniBand native (No SR-IOV) dual port device (Function per port is disabled). In this mode virtualization is not supported and ISSI = 0.
        * 10G/40G on 100GbE AOC/transceivers vs. non Mellanox devices.
      * PTP packets time stamping is enabled upon packet's arrival to the port.
      * Explicit Congestion Notification (ECN) is enabled by default for all priorities on Ethernet ports.
      * DC CNAK improves sent CNAK performance and avoids back pressure in ConnectX-4 adapter cards.
      * Receiver Signal Integrity Improvements: 
        * Raised the link only with phase greater than 15 ticks to improve signal integrity.
        * Extended measurement test between two similar RX configurations.
        * Moved the data path to use the second input buffer to improve signal integrity.
      * RDMA over Converged Ethernet (RoCE) Dual Port Mode enables the usage of a dual port Virtual HCA (vHCA) to share RDMA resources (e.g., MR, CQ, SRQ, PDs) across the two Ethernet (RoCE) NIC network ports and display the NIC as a dual port device. For this feature to function properly, the following requirements must be met: 
        * Either the LAG or the Dual Port mode is enabled by the driver.
        * Dual port device: both ports must be set as ETH.
        * In ConnectX-4/ConnectX-4 Lx adapter cards, the maximum allowed number of VFs per PF is 32.
        * Function per port is enabled.
      * QPDPM register is added to support dynamic mapping between DSCP and priority.
      * Trust level for QoS prioritization is added according to the DSCP or PCP.
      * Ingress buffer management is added for: 
        * ingress traffic mapping to a buffer according to priority.
        * buffers sizes and lossless parameters.
      * Enhanced steering rules update rate to up to 50K rules per second.
      * Enabled Windows single root input/output virtualization (SR-IOV) Enhanced eIPoIB (without Secure Connection) for Windows-over-Windows setups.
      * crdump operation takes a snapshot of the device's crspace dword-by-dword. It enables the driver to collect debug information upon firmware failure.
      * Secure Firmware Updates provides devices with the ability to verify digital signatures of new firmware binaries, in order to ensure that only officially approved versions are installed on the devices.
      * Changed the default Forward Error Connection (FEC) mode for cables with attenuation 16 and below from Reed Solomon (RS) to FC.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.2" date="1519992000">-     *Fixes in version 12.21.1000:**
    
      * RDMA_CM driver was causing the Queue Pair (QP) Rate Limit to be activated unexpectedly and reduce the bandwidth significantly on this QP.
      * Low throughput when Eplicit Congestion Notification (ECN) was enabled in a many-to-one scenario.
      * A rare issue that caused the firmware to hang.
      * The maximum temperature in a setup was incorrectly reported as the current temperature regardless of the actual temperature.
      * Virtual Addressing Capability incorrect report in NC-SI (Sideband).
      * Enhanced RX sensitivity per Vcore.
      * Disabled the option to write to the protected modules to avoid receiving NACK upon module initialization.
      * Enabled cold_flicks reset when sending invalidate_all command to invalidate all the ECs.
      * SR-IOV min &amp; max rate limiter can only support up to 64 VFs per port.
      * Explicit Congestion Notification (ECN) did not function as expected when the number of Queue Pairs (QPs) &gt; ~500 per host.
      * When using Unreliable Datagram (UD) RDMA over Converged Ethernet (RoCE) multicast traffic over SR-IOV, packets were scattered to all the attached QPs in the e-sw (PF and its VFs) and not only on the vport that was specified in the e-se FDB.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1524139200">-     *Firmware for the following devices are updated to 12.22.4030:**
    
    825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)  
    825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)
    
    **New features and changes in version 12.22.4030:**
    
      * **AS Notify:** AS Notify enables IBM's Power CPU architecture to boost performance by allowing the hardware to issue light weight "interrupts" to replace the traditional MSI interrupts.
      * **Dump Me Now (DMN):** Dump Me Now (DMN) generated dumps and traces from various components that are crucial for offline debugging. Once an issue is discovered, the dumps can provide useful information about the NIC's state at the time of the failure
      * Added support for DSCP mapping on QP RTS2RTS.
      * **Port Enable:** When set, the device supports emulating link down for all the associated functions using "ICMD_SET_VIRTUAL_PARAMETERS - Set Device Virtual Parameters".
      * **mlxfwreset:** Reduced and accelerated the mlxfwreset loading time of the firmware update flow.
      * **Virtual Functions (VF):** Increased the number of VFs that can work with full VMQoS (8 TC) per PFs as follow: 
        * in dual port devices to 20 VFs
        * in single port devices to 64 VFs
      * Extended the retry counter (extended_retry_count) to up to 255 instead of 7.
    
    **Firmware for the following devices are updated to 16.22.4030:**
    
    879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)  
    872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 841QSFP28 Adapter)
    
    **New features and changes in version 16.22.4030:**
    
      * **AS Notify:** AS Notify enables IBM's Power CPU architecture to boost performance by allowing the hardware to issue light weight "interrupts" to replace the traditional MSI interrupts.
      * **Dump Me Now (DMN):** Dump Me Now (DMN) generated dumps and traces from various components that are crucial for offline debugging. Once an issue is discovered, the dumps can provide useful information about the NIC's state at the time of the failure
      * Added support for DSCP mapping on QP RTS2RTS.
      * **Port Enable:** When set, the device supports emulating link down for all the associated functions using "ICMD_SET_VIRTUAL_PARAMETERS - Set Device Virtual Parameters".
      * **mlxfwreset:** Reduced and accelerated the mlxfwreset loading time of the firmware update flow.
      * **Virtual Functions (VF): **Increased the number of VFs that can work with full VMQoS (8 TC) per PFs as follow: 
        * in dual port devices to 20 VFs
        * in single port devices to 64 VFs
      * Extended the retry counter (extended_retry_count) to up to 255 instead of 7.
      * Added support for striding RQ in InfiniBand.
      * **QoS "Rate Limit":** Added support to limit the transmission rate of individual InfiniBand port Service Levels. This capability is configurable through a new vendor-specific MAD (QosConfigSL).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1524225600">-     *Fixes in firmware version 12.22.4030 and 16.22.4030:**
    
      * In rare cases, where the width of the receiver's electrical eye is narrow, the link might raise with BER lower than 10^-12.
      * LRO timeout configuration is now taken from the TLV configuration instead of the static defined values.
      * Added a filter to ignore module temperature reads below -40C and above 125C.
      * Closed the vport as part of the fast teardown flow, to prevent Ack to be sent without been scatter to memory.
      * A rare scenario where the PERST# de-assertion arrived at a specific critical time period was handled.
      * Temperature normalization function calculation issue. Now the cable gain that is not pure integer is taken into account.
      * The parser of object 0x8 in ASN that caused different structure in response.
      * An issue that caused MSIX interrupt lost while the HCA performed an FLR was handled.
      * An issue that caused a race condition between the firmware boot process and the MSIX access from the PCIe, which resulted in lost writes into the MSIX vector was fixed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1552219200">-     *Firmware for the following devices are updated to 12.24.1000:**
    
    825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)  
    825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)
    
    **Firmware for the following devices are updated to 16.24.1000:**
    
    879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)  
    872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 841QSFP28 Adapter)
    
    **Changes and New features in firmware version 12.24.1000 and 16.24.1000:**
    
      * Added support for the following: 
        * An additional layer (Layer 3) of packet processing at the hypervisor level that enables adding and removing protocol headers (e.g., the MAC address is removed during encapsulation, and added during decapsulation) for the encapsulated traffic.
        * Transmission histogram counter set as part of the Ethernet extended group counters.
        * TX steering rule on flow_table_metadata in WQE Ethernet segment.
        * Added L3 encapsulation/decapsulation support in the reformat context allocation. 
          * L3 encapsulation removes L2 headers and adds generic L3 tunnel encapsulation.
          * L3 decapsulation removes the generic L3 tunnel decapsulation and L2 header.
        * Flow steering header modification (header rewrite) for IPv4 TTL header for loopback traffic (VF-VF/VF-PF).  
    Note: TTL modification for traffic from the network is currently not
    supported.
    
        * Requester QP packet based on E2E credits mode. The new flow control supports HCA-to-switch RDMA traffic packet-based End-2-End.
        * IPoIB non-default Partition Keys (PKeys). Now the PKey values can be modified in the PKey table without the need of recreating the IPoIB (underlay) QPs.
        * [Beta] SR-IOV in Multi-Host/Socket-Direct.
        * QUERY_DRIVER_VERSION command. This command allows the PF driver to query its VFs driver version which was set by the SET_DRIVER_VERSION command.
        * New diagnostic counters to evaluate the number of ICMC hits and misses for particular resources.
      * Enabled the hardware to generate an event upon counter incrementation, in order to reduce an overhead from the software from reading rarely updated counters such as error counters.
      * Enabled NOIDNIC connectivity to the network through the e-switch and not directly to the physical port.
      * Enabled setting the QP and the Mkey values by the software upon these resources creation.
      * Enabled advanced PCIe atomic operations. The HCA will perform PCIe atomic operations as a requestor towards the host memory when receiving compatible atomic messages from the network, and according to the configuration of NV_SW_OFFLOAD_CONFIG pci_atomic_mode field and the PCI AtomicOp Requester Enable bit in the Device Control 2 register.
      * Enabled TTL modification in the Rx NIC steering. When modifying the TTL in the Rx NIC, the CQE checksum will not recalculated automatically.  
    Note: TTL modification in the FDB for traffic from the network is currently
    not supported.
    
      * Enabled a single TIR destination from the FDB.
      * Changed the WRED default mode to OFF for Multi-Host adapter cards.
      * [Developers only] Moved the fast teardown HCA cap bit to offset 0x1c.4:1.
      * Enabled Virtual Functions to read QPDPM/QPDP/QPTS.
      * Multi PCI RDMA IB: This capability enables the user to expose two PCI/IB devices per network port.
      * Reduced firmware's memory consumption to increase the supported number of VFs per PF to up to 100.
      * Shutting Down RDMA QPs with Excessive Retransmissions is a mechanism used to detect excessive retransmissions for an RC connection, and to close the connection in response to it. If the number of retransmissions due to a Local Ack Timeout, NAK-Sequence Error, or Implied NAK, during a specified period, exceeds the specified threshold, the QP will be handled as if the IB spec defined Retry Count was exceeded.
    
    **New features in firmware version 12.24.1000:**
    
      * Enabled e-switch steering rule in the NIC without matching it with the Directional MACs (DMAC) protocol. Now the rule is only according to the MC/UC bit.
      * The IB Sniffer utility provides the user the ability to capture the e-switch traffic directly to a hypervisor queue.
      * Increased the number of VFs that can work with full VMQoS (8 TC) per PFs as follow: 
        * in dual port devices to: 0-21, 33-45 VFs (22-32 VFs has single TC)
        * in single port devices to: 0-64 VFs
    
    **New features in firmware version 16.24.1000:**
    
      * Enabled QoS ETS for systems with 64 VFs to better allocate bandwidth in the NIC.
      * Enabled TTL modification for received packets.
      * Mirrors the traffic from/to one VF to a dedicate admin VF for monitoring and traffic analysis. Note that in this process packets are duplicated and different packet modifications apply to different duplications.
      * Enabled TTL modification in the Rx NIC steering. When modifying the TTL in the Rx NIC, the CQE checksum will not recalculated automatically.  
    Note: TTL modification in the FDB for traffic from the network is currently
    not supported.
    
      * Added support for Dynamically Connected Transport (DC) in RoCE in ConnectX-5 adapter cards.
      * Enabled Rx mini-CQE compressed format for striding RQ.
      * Enabled TX steering rule on the application meta-data from the WQE. This functionality implements meta-data Reg A steering and meta-data Reg A and Reg B rewriting.
      * Added MPLS over UDP and MPLS over GRE protocols for tunneling offload/steering match criteria.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1552305600">-     *Fixes in version** **12.24.1000 and 16.24.1000:**
    
      * mlxconfig tool reported all possible expansion ROM images, instead of presenting only the existing images.
      * Modifying VMQoS rate limiter parameters during traffic caused transmission failure.
      * Aligned the default tuning type in PHY TEST MODE to the device protocol.
      * When a device is operating in Safe Mode state, and the user issues the mlxfwreset command, the device might fail to come-up correctly after the reset.  
    Note: Do not run mlxfwreset when operating in a Safe Mode state.
    
      * Fixed an issue related to PCIe "Surprise link down" event reporting capability.
      * Fixed an issue that resulted in the link partner experiencing false active linkup when plugging in a base-T cable to a closed port.
    
    **Fixes in version** **12.24.1000:**
    
      * Fixed an issue that caused the max_qp_retry_freq_exceeded counter (including a CQE with error syndrome 0x97, and the QP moving to error state) to be activated only after exceeding the NIC Vport context max_qp_retry_limit, and not when reaching it.
    
    **Fixes in version** **16.24.1000:**
    
      * PCIe bifurcation issue.
      * Deadlock in RX related to the "send-invalidate" flow, resulted in RX getting stuck.
      * Rare errors in RX that resulted in double completion.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1570017600">-     *Firmware for the following devices are updated to 12.26.1040:**
    
    825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)  
    825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)
    
    **Firmware for the following devices are updated to 16.26.1040:**
    
    879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)  
    872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 841QSFP28 Adapter)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1570104000">-     *Fixes in version 12.26.1040 and 16.26.1040:**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1572868800">-     *Fixes submitted in version 12.26.1040:**
    
      * IPoIB could not to function when there were Dynamically Connected Transport (DC) CNAK Queue Pairs (QPs) active.
      * On rare occasions, when firmware coalesce Host stuck events occur, a async event might be delayed to be reported, and not be triggered until the next time the PCIe hangs on one of the hosts.
      * Renamed the GMP Mellanox Vendor Specific External Capability mask enum from IsDiagnosticCountersSupported to IsDiagnosticDataSupported.
      * Fixed an issue that caused a function to misbehave when a PCIe Transaction Layer Packet (TLP) was set with a poisoned indication.
    
    **Fixes submitted in version 16.26.1040:**
    
      * On rare occasions, when firmware coalesce Host stuck events occur, a async event might be delayed to be reported, and not be triggered until the next time the PCIe hangs on one of the hosts.
      * Unexpected queue pairs transitioned to error in lossy tests.
      * Limited the maximum amount of dumps created on a PF.
      * Renamed the GMP Mellanox Vendor Specific External Capability mask enum from IsDiagnosticCountersSupported to IsDiagnosticDataSupported.
      * Stability issues with RDMA over Converged Ethernet (RoCE) retransmissions under stress were affecting Zero-Touch-RoCE.
      * Fixed an issue that caused a function to misbehave when a PCIe Transaction Layer Packet (TLP) was set with a poisoned indication.
      * Large number of packets dropped when running Jumbo frames with TTL rewrite.
      * Limited the number of the elements in the Quality of Service (QoS) tree 2K.  
    Note: Creating more than 250 Vport_tc for every TC is not allowed.
    
      * Queue Pair (QP) flow query was always taking port 1, Firmware will now reply the proper port, 1 or 2, for the dual port RoCE net device.
      * The nack counters constantly reported as "0".
      * In a rare scenario when the driver is executing the "2err" command and the QP is in Send Queue (SQ) drain state, the firmware might post event of broken Work Queue (WQ) instead of sending error Completion Queue Element (CQEs) on all the Work Queue Entry (WQEs).</changelog>
  </package>
  <package pkgid="368d5d6e7c9daf168e2307f422d768d5ad9fcb1842119eff5e33b25946e021c0" name="firmware-hca-mellanox-vpi-connectx6-mft" arch="x86_64">
    <version epoch="0" ver="1.0.1" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.1" date="1564920000">-     Initial version</changelog>
  </package>
  <package pkgid="8482fae2cb4cf56752f4c2f529e37e9f2fd42a3beed24fa58ad373c433c635a6" name="firmware-hca-mellanox-vpi-eth-ib" arch="x86_64">
    <version epoch="0" ver="1.0.9" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1499774400">-     *Fixes in 2.40.5030 and 2.40.5072:**
    
      * Fixed a race between the firmware and the hardware during driver start which blocked outbound completions.
      * Fixed an issue which caused the firmware not to send link_down event to the driver when running the close_port command.
      * Fixed an issue where in rare cases the Auto Sense failed to detect the right protocol.
      * Fixed signal integrity issue when connecting a WCS ConnectX4 mezz card to Pikes peak FPGA.
      * Added the option to transmit corrupted DME pages for a very short period of time at the beginning of the Auto-Negotiation flow.
      * Fixed an incorrect report of the PortRcvDataVLExtended/ PortXmitDataVLExtended counters by the firmware.
      * Fixed a rare issue which caused firmware's packet injector to cut off packets when the TX was congested.
      * Fixed an issue that caused the response to TX requests to take up to 10 miliseconds in IEEE clause 72 Link Training.
      * Fixed a race between 2 iriscs which caused a QP to get stuck in burst control limit state.
      * When a QP was in error state, the firmware generated too many err CQEs at once, thus causing the cmdif responsiveness to be too slow. To prevent the above, the number of err CQEs was limited to 16 at a time.
      * Fixed an issue that caused the MAC address that was set from the OS using ifconfig to be not reflected in the OCBB buffer.
      * Fixed an issue where the ibdump got broken when running with loopback traffic.
      * Fixed an issue where the firmware took QP to firmware ownership and then released it to the hardware ownership without checking if another firmware flow owns the same QP.
      * Fixed an issue which occurred after disconnecting cable which showed the link type as IB even if the link type of the port is ETH.
      * Fixed an issue related to the HCA PoerXmitWait counter on port 2 (connected to port 2 on Switch-IB) where it started counting and reached 0xFF's regardless of connection to switch.
      * Fixed a completion error issue when ECN was enabled. The ECN usage caused ordering errors in completion queues (CQ).
      * Fixed the length calculation of UDP. The incorrect UDP length in the CNP packet caused miss-calculation of the ICRC.
      * Fixed a wrong returned status in cable info MAD when the cable was not connected.
      * Fixed failure instances when initiating FLR inthe Physical Function.
      * Disabled High Rate Steering mode in the INI to enable its compatibility with NC-SI over VLAN.
      * Fixed performance issues causing slow performance when running in NO-DRAM-NIC mode.
      * Fixed a default hardware configuration issue which caused RDP over IPv4 traffic to be dropped.
      * Prevented a Virtual Function from injecting pause frames into the network.
      * MLNX_OEM command GET_TEMP returned a wrong value in the max_temp field.
      * Fixed an issue which caused TX traffic to stop when the message MTU size was larger than QP.mtu.
      * Fixed an issue which caused NVCONFIG to fail when the number of sector was set to 1 and the sector was zeroed.
      * Fixed a race in handling a duplicated "read request from middle".
      * Fixed an issue which caused lack of IB traffic on SR-IOV VPI.
      * Fixed an issue which caused NVRAM to get stuck when it filled non-valid information in TLV.
      * Fixed an issue which caused an internal firmware error when APM changed the QPs port mapping.
      * Fixed an issue which caused a firmware internal error when handling QP alternative context.
      * Fixed an issue which caused packet transmission to get stuck when the software tried to send pause frames with dmac equal to one of the device's MAC addresses.
      * Fixed a mistakenly dropped ETH packet with ethertype 0x600 by the NIC.
      * Fixed a case preventing broadcast traffic from arriving to their destination after detaching high priority broadcast rule on a port where NC-SI was enabled.
      * Fixed a failure to update RSS QP in steering rules.
      * Fixed an issue where the port raised as SDR vs. InfiniScale IV QDR Switch.
      * Fixed a rare case of completion Error with Bad Opcode sequence status which occurred when retransmitting read requests.
      * Fixed a case where the actual bandwidth did not match the user settings in VM QoS.
      * Fixed a case where on rare cases, communication to BMC was lost during driver initialization.
      * Fixed an issue with cable reading, which caused the link not to raise.
      * Set the maximum EQN number to 1024.
      * Fixed a rare issue with VPD init flow which caused read failures.
      * Fixed an issue with RX size counter not being reported.
      * The first Read response was not treated as implicit ACK.
      * Reduced a long 40GbE link up time with Cisco Nexus3064 and Arista-7050S.
      * Fixed promiscuous mode compatibility with A0-DMFS steering.
      * Fixed promiscuous mode compatibility when NC-SI is enabled and configured.
      * Fixed sending/receiving OEM temp commands (set/get) with channel ID 0x1f failure.
      * Fixed an issue which caused packets to drop on a port when changing the interface state of the other port.
      * Fixed long management communication loss and SOL hang during reboot cycles.
      * Fixed wrong processing of inbound traffic towards BMC which caused communication loss.
      * Fixed management link loss upon closing port interface through the driver.
      * Fixed a false indication in firmware of an expander presence causing delay in EEPROM reading.
      * Fixed an issue which caused a link down on a port when the cable was removed from the other port.
      * Fixed a rare case where packet with length zero got stuck in hardware queues.
      * Fixed an issue which caused InfiniBand congestion control packet (CNP) to hang in hardware.
      * Fixed an issue which caused AEN to be sent after channel reset.
      * Fixed an issue which prevented the restoring of QoS setting to its default consequently causing bandwidth degradation.
      * Fixed an occasional long link up time with 10GbE based devices.
      * Fixed an issue preventing cable readings from i2c slave address 0x51.
      * Fixed a possible deadlock in PM turnoff request transmission and ack acceptance flow.
      * Fixed a rare case with alignments state machines which caused occasional width degradation.
      * Fixed an issue where the transmit queues hanged while congestion control was enabled and operational (EQC/QCN).
      * Fixed an unexpected work completion syndrome with vendor syndrome 0x77 received when running RDMA SEN/WRITE traffic with retransmissions.
      * Fixed an issue which caused SetPortInfo to return a good status when receiving invalid LinkSpeedEnabled value.
      * Fixed an issue which caused dual port SFPP module cards to be automatically mapped with expander. Fixed an issue where firmware overrides the steering mode that was chosen by the driver.
      * Fixed invalid return sensing results occurred when the link was up.
      * Fixed an issue causing the sensing result to be delayed when cable was unplugged.
      * Fixed an issue causing the link type to be displayed as ETH when set to AUTO.
      * Fixed 2us glitch in Wake Up signal.
      * Fixed performance degradation when running IBDump.
      * Occasionaly, a link training timeout occurred in EQ phase0 during disable/enable test.
      * Improved strict bandwidth mode functionality.
      * Fixed an issue with the PortRcvPkts counter always displaying zero value.
      * Fixed an issue with processing GMP MADs with SET method in SecureHost mode.
      * Fixed an issue causing a wrong usage of MCG size when configuring Global Multicast filter.
      * Disabling the first port occasionally causes second port TX failure.
      * Fixed a mismach in links status reported. The adapter reports links as down while the switch perceives them as up.
      * Fixed an occasional 40GbE link failure with SCM5 Switch blade.
      * Fixed a wrong FDR10 speed reporting in MAD.
      * Fixed an issue preventing theports to to rise up when set to FDR10 vs QDR.
      * Fixed an occasional link failure vs Arista switch.
      * Retransmission started from the first PSN of message instead of the last acknowledged PSN.
      * Firmware hangs when receiving GeneralInfoMad during inline firmware burning.
      * L1 flow adjustments and threshold tuning.
      * Fixed a rare hanging issue during PERST_ assertion.
      * Wrong coefficients were reported during phase3.
      * Fixed an issue causing wrong behavior due to reset timing.
      * Fixed lack of steering options.
      * Fixed long timeout issues.
      * Fixed NVRAM write issues in driver-less mode.
      * Fixed 40GbE link support in aux mode.
      * Dropped commands with non-existing channel ID.
      * Fixed issues in extended speed reporting.
      * Fixed bad QP reporting in trap 257/8.
      * Fixed an issue causing false bad q_key error messages.
      * Fixed Pause Frame opcode mismatch.
      * Fixed communication loss upon PCIe error detection.
      * Fixed wrong channel value in the SELECT/ DESELECT PACKAGE commands.
      * Fixed an issue caused response packet to include 4 extra bytes.
      * Fixed wrong reason code value returned when using Set Link command with unsupported speed.
      * Added protection from bad MAC address given by BMC. Removed false TX pulse after PERST_ deassertion.
      * Fixed FLR capability bit inconsistency when SR-IOV is enabled.
      * Fixed an issue with the device not reporting PCIe related errors.
      * When a link is configured to DDR in a setup of ConnectX-3 to SX6036, SDR link is established instead.
      * VXLAN used the wrong default UDP port. the UDP port number was changed to 4789.
      * Fixed wrong setting of the UDP destination port for VXLAN.
      * Fixed an internal error caused when moving to the DMS mode with IPMI/NC-SI enabled.
      * In a back-to-back setup of FDR cards connected with a 0.5m FDR cable, a link may be established as FDR10 instead of FDR.
      * Fixed issues related to working with PCI legacy interrupts.
      * Wrong checksum calculation for short packets which are padded by the software.
      * Reading PCIe configuration space after using the MFT flint tool caused the device to crash.
      * Fixed occasional packet loss over IPMI.
      * Fixed wrong values reported in the Eye opening MAD.
      * Fixed occasional link width degrades during link negotiation and link transitions from L1 state.
      * Fixed adjust signal detect thresholds.
      * PortExtendedSpeedsCounters MAD counters were mistakenly increased while LLR was active.
      * Lane reversal was not considered when configured TX parameters.
      * Fixed ROL factory MAC usage when a Flex- Boot address was given.
      * Fixed Pause frames factory MAC usage when FlexBoot address was given.
      * The device did not different between WOL/ROL packets.
      * Fixed a set of extended fields in PortInfo MAD which did not function.
      * Adjusted LLR cell size according to the MLPN negotiation of ib_128b_llr.
      * The max speed restriction was active in full power mode instead of standby mode only.
      * The InfiniBand Path migration did not work with GRH. http://webdev01:8080/commit/ConnectX.git/a9c37ee4c31038f2c1179d4d9e79c9337e0ab5c7 
      * Reading MGM after writing it returned wrong members count.
      * Fixed corruption of the RSS hash key given by the driver.
      * Fixed QoS rate limit BW offset.
      * Fixed FDR10 speed_en reporting.
      * Fixed long management link com loss.
      * The command results reported both link types active at the same time. Fixed collision between forcing phy type and port sensing. Fixed a wrong core clock freq reporting in QUERY_HCA command.
      * Fixeds occasional link failure when 56GbE is enabled.
      * Fixed max eye margins to be per protocol.
      * perfquery reported wrong error symbol on ConnectX(C)-3 VPI mode: IB, ETH.
      * On ConnectX-3Pro dual-port QDR and FDR/FDR10 switch setups, symbol errors may occur with MC2207312-030 AOCs.
      * Symbol errors occur on ConnectX-3Pro dualport QDR connected to FDR switches with MC2207126-004 copper cables.
      * Driver restart required when switching from InfiniBand FDR link with LLR enabled to InfiniBand link w/o LLR (for example: between SwitchX and GD4036).
      * On rare occasions, the adapter card may fail to link up when performing parallel detect to 40GbE.
      * Automatic Path Migration (APM) did not update the new MGIDs from the Alternate Path.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1519905600">-     *Firmware for the following devices are updated to 2.40.5030:**  
    764286-B21  
    778509-B21
    
    **Firmware for the following devices are updated to 2.40.5072:**  
    764285-B21
    
    **Firmware for the following devices are updated to 2.42.5004:**  
    764283-B21  
    764284-B21
    
    **Firmware for the following devices are updated to 2.42.5000:**  
    764282-B21
    
    **New features in firmware version 2.40.5030:**
    
      * Added support for the following features. 
        * Temperature thresholds high/low default for MAD sensing and NCSI/IPMI OEM commands.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
        * A protection mechanism which ensures the firmware drops packets which are received in internal Queue Pairs (QPs) and disables the WQE producer fetching.
    
    **New features in firmware version 2.40.5072:**
    
      * Platform Level Data Model (PLDM) support.
    
    **New features in firmware version 2.42.5000:**
    
      * Added support for the following features. 
        * new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * A mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
      * Improved the debug ability for command timeout cases</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1519992000">-     *Fixes in version 2.40.5030 and 2.40.5072:**
    
      * Race between the firmware and the hardware during driver start which blocked outbound completions.
      * The firmware did not send link_down event to the driver when running the close_port command.
    
    **Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5004:**
    
      * In UEFI (Unified Extensible Firmware Interface) HII (Human Interface Infrastructure) menu, when using HPE Gen10 devices, both ports appear as port 1.
      * In UEFI (Unified Extensible Firmware Interface) boot menu, when using HPE Gen10 devices,  the device name appears with an unneeded port number.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1552219200">-     *Firmware for the following devices are updated to 2.42.5000:**  
        764282-B21  
        764286-B21  
        778509-B21
    
    **Firmware for the following devices are updated to 2.42.5044:**  
        764283-B21  
        764284-B21  
        764285-B21
    
    **New features in firmware version 2.42.5000:**
    
      * Added support for the following features. 
        * new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * A mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
      * Improved the debug ability for command timeout cases</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1552305600">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5044:**
    
      * Fixed an issue that  prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1565179200">-     *Firmware for the following devices are updated to 2.42.5000:**  
        764282-B21  
        764286-B21  
    
    **Firmware for the following devices are updated to 2.42.5044:**  
        764284-B21  
        764285-B21
    
    **Firmware for the following devices are updated to 2.42.5052:**  
        764283-B21
    
    **New features in firmware version 2.42.5000:**
    
      * Added support for the following features. 
        * new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * A mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
      * Improved the debug ability for command timeout cases</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1565265600">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5044:**
    
      * Fixed an issue that  prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode 
    
    **Fixes in version 2.42.5052:**
    
      * Fixed Uncorrectable Machine Check Exception issue. The internal resources for handling packets were not allowed to be flushed when the driver was brought down and occasionally caused Red Screen of Death (RSOD). The fix was applied to the ROM code only and has only external timing influences upon the driver's teardown.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8-2.1" date="1566648000">-     *Firmware for the following devices are updated to 2.42.5000:**  
        764282-B21  
        764286-B21  
    
    **Firmware for the following devices are updated to 2.42.5044:**  
        764284-B21  
        764285-B21
    
    **Firmware for the following devices are updated to 2.42.5052:**  
        764283-B21
    
    **New features in firmware version 2.42.5000:**
    
      * Added support for the following features. 
        * new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * A mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
      * Improved the debug ability for command timeout cases
    
    **Smart Component Fixes:**
    
      * Mellanox Infiniband 544 NIC Interface Shows Incorrectly as PCI Bus:Dev.Funtion in Smart Update Manager(SUM) Report.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8-2.1" date="1566734400">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5044:**
    
      * Fixed an issue that  prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode 
    
    **Fixes in version 2.42.5052:**
    
      * Fixed Uncorrectable Machine Check Exception issue. The internal resources for handling packets were not allowed to be flushed when the driver was brought down and occasionally caused Red Screen of Death (RSOD). The fix was applied to the ROM code only and has only external timing influences upon the driver's teardown.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1566820800">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5052:**
    
      * Fixed Uncorrectable Machine Check Exception issue. The internal resources for handling packets were not allowed to be flushed when the driver was brought down and occasionally caused Red Screen of Death (RSOD). The fix was applied to the ROM code only and has only external timing influences upon the driver's teardown.</changelog>
  </package>
  <package pkgid="fe1c189cc2fda2bb4bd8638c08d7957fa86c96df87967b512426b1ac39e1c53a" name="firmware-hdd-0595c2a887" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1496836800">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1496923200">-     *Problems Fixed:**
    
      * This firmware contains a change to prevent occasional command completion times in the 4-5 second window when command is received just as the drive is transitioning from active to Idle A.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1524657600">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPD2 do not need to update to HPD2(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1547467200">-      This firmware contains a change to prevent occasional command completion times in the 4-5 second window when command is received just as the drive is transitioning from active to Idle A.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="048eb0d106e09fe1fc071aa1da249c2fb92ca93a6110b765b2982059a929eb4b" name="firmware-hdd-059b8654a6" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1533211200">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1533297600">-      Corrects a potential data integrity issue during unaligned write commands, found in supplier ongoing lab testing.Includes additional fixes to improve error handling and reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1547467200">-      Corrects a potential data integrity issue during unaligned write commands, only found in supplier ongoing lab testing.Includes additional fixes to improve error handling and reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1563969600">-      Corrects a potential data integrity issue during unaligned write commands, only found in supplier ongoing lab testing.Includes additional fixes to improve error handling and reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1564056000">-      Corrects a potential data integrity issue during unaligned write commands, only found in supplier ongoing lab testing.Includes additional fixes to improve error handling and reliability.</changelog>
  </package>
  <package pkgid="104ad8971f6712fab99fb6221c0663f9e255981673e6a47aa815987ad7a979a4" name="firmware-hdd-0a38b25661" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1496836800">-     *Enhancements/New Features:**
    
      * Adds support for HPE ProLiant Gen10 servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1496923200">-     *Problems Fixed:**
    
      * Under rarely occurring conditions where a host error occurred during a write with 4K unaligned sectors, the write operation might result in stale data. Firmware HPD3 prevents the possibility of stale data occurring under these conditions.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1524657600">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager**
      * **Customers who already installed firmware version HPD5 do not need to update to HPD5(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1524744000">-        Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1547467200">-      This firmware includes a fix for slow performance during sequential write workloads with small queue depth.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="8169dc407ceedf4025cb3a6c4788ffa18dcb32d48b427a436bb82b504d08ccc9" name="firmware-hdd-0a7010918e" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1524657600">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG4 do not need to update to HPG4(C).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1534248000">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG4 do not need to update to HPG4(D).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1534334400">-      Fixed the issue of Online firmware update fails when drives are connected behind AHCI controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1547467200">-      Firmware version HPG4 prevents the occurrence of a rare issue which could lead to slow drive performance. This issue has the potential to impact all drives in configurations where the drives might be allowed to be idle for greater than 1 second.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="d1b4014dc201e98ab09d2b1f730e2d4b6da4ab68b8c84d9e39e832cf69afa3c2" name="firmware-hdd-0a7d4aa47f" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4" date="1547467200">-      This firmware includes a fix for slow performance during sequential write workloads with small queue depth.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-2.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-2.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="2deed7880463436cf3d9ac4f61814860d52f02758cfae1adf219c2cc5c52fe09" name="firmware-hdd-0b575b5895" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1524657600">-      Added support for HPE Smart Array P824i-p MR Gen10 controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1524744000">-      This firmware has a change that allows the drive to meet the requirements for Azure Stack certification.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1534248000">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG3 do not need to update to HPG3(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1534334400">-      This firmware has a change that allows the drive to meet the requirements for Azure Stack certification.
      * Fixed the issue of Online firmware update fails when drives are connected behind AHCI controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1547467200">-      This firmware has a change that allows the drive to meet the requirements for Azure Stack certification.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="55fb635ce795324c5f74d29a8003d109af55e43c6bc843bb88fd060bb8abfe7c" name="firmware-hdd-0f923833e9" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1502366400">-     *Enhancements/New Features:**
    
      * Improves Sequential Write and Random Write Performance under certain workloads.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1502452800">-     *Problems Fixed:**
    
      * Fixes a data integrity risk which could occur during 4k or greater unaligned writes while the device incurs a smart trip event. During these conditions there is a potential for data intended to be written directly to disk to fail to be written.
      * Eliminates a data integrity risk when an unaligned Write and Verify command is sent to a bad sector. During these conditions there is a potential for data intended to be written to disk to fail to be written.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1524657600">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPD8 do not need to update to HPD8(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1547467200">-     This firmware:  
    Fixes the cause of internal reboots detected in the MSA system.  
    Removes a vendor unique sense code that the controller does not handle
    properly.  
    Includes changes to eliminate the cause of a potential hang condition.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1563969600">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="91647550381924c18ec5af4516a3a465394da5cb7311c07ba7fe8f5ea92a318a" name="firmware-hdd-10385ef3e6" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1568635200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1568721600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1568808000">-      This firmware contains a fix for a data integrity issue that could occur during a power cycle while the drive is processing write commands.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1571486400">-</changelog>
  </package>
  <package pkgid="c6e19c015890d02a7066ba2155231f24896e54a1457421429435536f9dd0c0e1" name="firmware-hdd-1656c1b14a" arch="x86_64">
    <version epoch="0" ver="HPK1" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK1" date="1535112000">-      This firmware corrects the potential for a drive to become disabled and nonfunctional during certain conditions or workloads.After the drive is upgraded to firmware version HPK1, it cannot be downgraded to firmware version HPK0.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK1-2.1" date="1547380800">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK1-2.1" date="1547467200">-      This firmware corrects the potential for a drive to become disabled and nonfunctional during certain conditions or workloads.After the drive is upgraded to firmware version HPK1, it cannot be downgraded to firmware version HPK0.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK1-3.1" date="1562241600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK1-3.1" date="1562328000">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK1-3.1" date="1562414400">-      This firmware corrects the potential for a drive to become disabled and nonfunctional during certain conditions or workloads.After the drive is upgraded to firmware version HPK1, it cannot be downgraded to firmware version HPK0.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK1-4.1" date="1562500800">-      This firmware corrects the potential for a drive to become disabled and nonfunctional during certain conditions or workloads.After the drive is upgraded to firmware version HPK1, it cannot be downgraded to firmware version HPK0.</changelog>
  </package>
  <package pkgid="d8cc2f73eca0be22013ae46ac0c5bb778a6913e15fe1a528b5370efaa773b2bc" name="firmware-hdd-1a516522d1" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1496923200">-     *Enhancements/New Features :**
    
      * HPG1 is a maintenance firmware release with minor performance enhancements for 2.5" SSD 6Gb SATA drive models VK0240GEPQN, VK0480GEPQP, and VK0960GEPQQ .
      * Adds support for HPE ProLiant Gen10 servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1524657600">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG1 do not need to update to HPG1(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1524744000">-      Added FW binary unencrypted</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1534248000">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG1 do not need to update to HPG1(C).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1534334400">-      Fixed the issue of Online firmware update fails when drives are connected behind AHCI controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1547380800">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="ef244b249e2d01b478f5eae6f904c12c8f218340fc608eee4d9f419d0c57787f" name="firmware-hdd-1cbab97ff0" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1496836800">-     *Enhancements/New Features:**
    
      * Adds support for HPE ProLiant Gen10 servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1496923200">-     *Problems Fixed:**
    
      *     Corrects Activity LED behavior on HPE drive carrier.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1524571200">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPD5 do not need to update to HPD5(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1524657600">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1524744000">-      Added FW binary unencrypted</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1547380800">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="bbfbd8f610c09cd9ee2d53bf895bef745f2456ce0486d040ba7c807c26bcaf81" name="firmware-hdd-1d7f19120b" arch="x86_64">
    <version epoch="0" ver="HPGB" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB" date="1524744000">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was only found during supplier ongoing reliability testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-3.1" date="1534248000">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPGB do not need to update to HPGB(C).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-3.1" date="1534334400">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was only found during supplier ongoing reliability testing.
      * Fixed the issue of Online firmware update fails when drives are connected behind AHCI controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-4.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-4.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-4.1" date="1547467200">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was only found during supplier ongoing reliability testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-5.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-5.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-5.1" date="1563969600">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was only found during supplier ongoing reliability testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-6.1" date="1564056000">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was only found during supplier ongoing reliability testing.</changelog>
  </package>
  <package pkgid="ab609d0c3f8384203c038718f3ad50adab89a3ac81b56c1eb3e173abc0342dc3" name="firmware-hdd-1e51a57347" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1568894400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1568980800">-      Fixed a rare occurance where sanitize block erase failure occured Fixed an issue where temperature smart warnings were not reported at the correct interval.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1571832000">-</changelog>
  </package>
  <package pkgid="3ee52136cf04303b0d0bd306fc0f23e2d9553f9a24111044d5af6f1214a4eb08" name="firmware-hdd-24fe569b72" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1572436800">-</changelog>
  </package>
  <package pkgid="e8a540d413a18546d704dc36a80567d699c07f6bdd40c21690ec958137f7f65b" name="firmware-hdd-252770cdda" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1496923200">-     *Problems Fixed:**
    
      * Under rarely occurring conditions where a host error occurred during a write with 4K unaligned sectors, the write operation might result in stale data. Firmware HPD4 prevents the possibility of stale data occurring under these conditions.
      * After greater than 2 seconds of idle time following a forced power transition or no activity, random seeks might not occur as required. Firmware HPD4 initiates random seeks following  the device being placed into a forced power condition. Random seeks are necessary to maintain the reliability and life of the device.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1524571200">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1524657600">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1524744000">-      This firmware includes a fix for slow performance during sequential write workloads with small queue depth.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1547467200">-      This firmware includes a fix for slow performance during sequential write workloads with small queue depth.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="32beaaa7b1d5e17968e641952d6257b1a0cd2b1c460bb3193262dadfc9b159f3" name="firmware-hdd-2a5b65f157" arch="x86_64">
    <version epoch="0" ver="HPK4" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3" date="1524657600">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3" date="1524744000">-     *Problems Fixed:**
    
      * HPK3 firmware resolved an issue that caused the disk activity ring, which is located on NVME SSD drive carrier, to constantly spin regardless of drive activity status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4" date="1534334400">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1547294400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1547467200">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1562241600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1562328000">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-4.1" date="1562414400">-</changelog>
  </package>
  <package pkgid="34ed5d8163ec435c782e8f844b95b69bd9ab0acae5f8d3c7dac6d6d8744d4c13" name="firmware-hdd-2c27a7a9a4" arch="x86_64">
    <version epoch="0" ver="HPD1" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1571572800">-</changelog>
  </package>
  <package pkgid="a8e9cedeefa53c60c7e1a0a05a3349b5585a9d41b7209cb63fbb3b07ab9bf5a2" name="firmware-hdd-2cfaac41db" arch="x86_64">
    <version epoch="0" ver="HPDB" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB" date="1522065600">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB" date="1522152000">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-2.1" date="1524657600">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager**
      * **Customers who already installed firmware version HPDB do not need to update to HPDB(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-2.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-3.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-3.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-3.1" date="1547467200">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-4.1" date="1563537600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-4.1" date="1563624000">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-5.1" date="1563710400">-</changelog>
  </package>
  <package pkgid="7a87736c66a25c1b86538086ba5b536cb093bcc7edd70838f9def2f4184338ca" name="firmware-hdd-2e4c61fc63" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1496923200">-     *Problems Fixed:**
    
      * Corrects Activity LED behavior on HPE drive carrier.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1524571200">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPD3 do not need to update to HPD3(C).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1524657600">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1524744000">-      Added FW binary unencrypted</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1547467200">-      Fixed some minor logging and diagnostic test issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="8ed6bd9eae8693a6ec384a3b6fcf6c13b40f66ba6e316d0afe2c24378a356940" name="firmware-hdd-2e70ce7412" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-2.1" date="1496923200">-     *Problems Fixed:**
    
      * Improves the drive idle time behavior by reducing long periods of track dwell time, which if not implemented, could increase media lube depletion and reduce drive reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1524657600">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager**
      * **Customers who already installed firmware version HPG4 do not need to update to HPG4(C).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1534248000">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG4 do not need to update to HPG4(D).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1534334400">-      Fixed the issue of Online firmware update fails when drives are connected behind AHCI controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1547380800">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="7fddc4830549a512c68cfdbb44acd82e34434f117ff7f4e8216f539934e1d8f0" name="firmware-hdd-31f91b8622" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1496923200">-     *Problems Fixed:**
    
      * Self-initiated reset during ATI (Adjacent Track Interference) mitigation issue, where the drive reported a 06/29/04 (Self-Initiated Reset) to the controller.  Then the controller would re-establish link with the drive and resend the command.
      * Servo miscalculations that resulted in degraded drive performance.
    
    **Problems Fixed for HPD3 (B):**
    
      * Component would fail to install drive firmware for drives present in a system configured with two or more external drive enclosures attached to an HP Host Bus Adapter H22x. The following message would be reported in the component log file - "Device appears more than once in tree". The drive firmware installation failure was not observed in configurations having only one external drive enclosure attached to an HP Host Bus Adapter H22x.
      * Component fails to update the firmware for drives connected behind an HP Smart Array P431 controller. Component reports the firmware update was successful. However, after a power cycle, the firmware version remains unchanged.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1513252800">-      Fixes a data integrity risk where a recoverable error can prevent a write command from completing properly.
      * Fixes a data integrity risk due to incorrect re-ordering of commands, when overlapped commands occur. 
      * Fixes a data integrity risk during very large blocks of sequential commands with a data transfer between 1020MB and 1024MB.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1524657600">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG5 do not need to update to HPG5(C).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1524744000">-       Added support for HPE Smart Array P824i-p MR Gen10 controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1547467200">-      Fixes a data integrity risk where a recoverable error can prevent a write command from completing properly.
      * Fixes a data integrity risk due to incorrect re-ordering of commands, when overlapped commands occur. 
      * Fixes a data integrity risk during very large blocks of sequential commands with a data transfer between 1020MB and 1024MB.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="effe97c0312b75de6340f02600164ff7b0a125e0af3eb63024768a6ff84aa05e" name="firmware-hdd-3243fce9a0" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-2.1" date="1524657600">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG4 do not need to update to HPG4(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-2.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1534248000">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG4 do not need to update to HPG4(C).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1534334400">-      Fixed the issue of Online firmware update fails when drives are connected behind AHCI controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1547467200">-      This firmware improves potential timeouts that could occur during the write error recovery process, for drives that have head contaminant build up.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="2dc6dc7feb23d216fa79ed4fa80ae8e55c54ae1faaf81f52943d7e9769f5d805" name="firmware-hdd-326de7c0f2" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1496750400">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1496836800">-     *Enhancements/New Features:**
    
      * Adds support for HPE ProLiant Gen10 servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1496923200">-     *Problems Fixed:**
    
      * This firmware contains a change to prevent occasional command completion times in the 4-5 second window when command is received just as the drive is transitioning from active to Idle A.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1524657600">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager**
      * **Customers who already installed firmware version HPD5 do not need to update to HPD5(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1547380800">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="df1ce755238c7cca2c40a8bc7ae5bfa0f71aa069267e1ac7d9eba1664a49d83f" name="firmware-hdd-3ab4c70e64" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-2.1" date="1496923200">-     *Problems Fixed:**
    
      * Reliability enhancement for applications that write data to a narrow range of tracks.
    
    **Known Issues:**
    
      * Firmware cannot be downgraded to HPG3 after updating to HPG4.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1524657600">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager**
      * **Customers who already installed firmware version HPG4 do not need to update to HPG4(C).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1534248000">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG4 do not need to update to HPG4(D).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1534334400">-      Fixed the issue of Online firmware update fails when drives are connected behind AHCI controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1547380800">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="2e19c3118639b0dc67c4c5816cf55505fe15dbf1a6ffe28b9f269dc708e3c724" name="firmware-hdd-3d97759111" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1524571200">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPD3 do not need to update to HPD3(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1524657600">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1524744000">-      Added FW binary unencrypted</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1547380800">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1557835200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1557921600">-     This firmware includes:
    
      * New servo which disables a feature that could cause unrecoverable data errors. 
      * A fix for an issue where the drive could become unresponsive after a hard reset.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1563969600">-     Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="f686cec4f88c124b263e634211aa7c9f39fd28833439c8cbf7d0ebe39b0e5214" name="firmware-hdd-3db7640485" arch="x86_64">
    <version epoch="0" ver="HPGE" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB" date="1535457600">-      Fixed issue to a read-disturb mechanism within the NAND induced only during 4K reads with partially programed blocks. The NAND read time is modified to prevent the impact of the reads. This change prevents premature or false failure of the drive.
      * Fix to a non-exploitable vulnerability in the firmware download process. Corrected FW will increment the security version to ensure that all SSDs receiving the update will not be capable of downloading previous FW with the issue.  Regression back to an earlier version of firmware will not be possible.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-2.1" date="1547294400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-2.1" date="1547467200">-      Fixed issue to a read-disturb mechanism within the NAND induced only during 4K reads with partially programed blocks. The NAND read time is modified to prevent the impact of the reads. This change prevents premature or false failure of the drive.
      * Fix to a non-exploitable vulnerability in the firmware download process. Corrected FW will increment the security version to ensure that all SSDs receiving the update will not be capable of downloading previous FW with the issue.  Regression back to an earlier version of firmware will not be possible.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-3.1" date="1565438400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-3.1" date="1565524800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-3.1" date="1565611200">-      Fixed issue to a read-disturb mechanism within the NAND induced only during 4K reads with partially programed blocks. The NAND read time is modified to prevent the impact of the reads. This change prevents premature or false failure of the drive.
      * Fix to a non-exploitable vulnerability in the firmware download process. Corrected FW will increment the security version to ensure that all SSDs receiving the update will not be capable of downloading previous FW with the issue.  Regression back to an earlier version of firmware will not be possible.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE" date="1566388800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE" date="1566475200">-      Fix to issue in bootloader download during power loss. 
      * Change IDF Word 106 report 4K TU for 4/8TB drives to align with Microsoft SQL requirement.
      * Improvements to error exception.
      * Improvements to Secure lock fix during multi-thread read tests with high freq. power cycling.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE-2.1" date="1570708800">-</changelog>
  </package>
  <package pkgid="b5f55a941820a663a254e14941657f1aad0790c9683bcc42ca54dcca588c5030" name="firmware-hdd-3e34285be7" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1524744000">-      Added FW binary unencrypted</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1534248000">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG3 do not need to update to HPG3(E).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1534334400">-      Fixed the issue of Online firmware update fails when drives are connected behind AHCI controller.
      * Firmware fixes intermittent data corruption issue associated with unaligned sequential write operations.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1547467200">-      Firmware fixes intermittent data corruption issue associated with unaligned sequential write operations.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1563451200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1563537600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1563624000">-      Firmware fixes intermittent data corruption issue associated with unaligned sequential write operations.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1563710400">-      Firmware fixes intermittent data corruption issue associated with unaligned sequential write operations.</changelog>
  </package>
  <package pkgid="8e479064102026d2b590106de5b7f942141325b67b260dfa18e933ce8ca24af1" name="firmware-hdd-40277d55d3" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1502971200">-     *Problems Fixed:**
    
      * HPG6 firmware improves drive reliability where disk drives are exposed to long periods of host inactivity which exceed 1 second.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1524657600">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager**
      * **Customers who already installed firmware version HPG6 do not need to update to HPG6(C).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1534248000">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG6 do not need to update to HPG6(D).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1534334400">-      Fixed the issue of Online firmware update fails when drives are connected behind AHCI controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1547380800">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1563537600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1563624000">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1563710400">-</changelog>
  </package>
  <package pkgid="0f3dfd2f3d7129e17775390aa81118c0147624ccf576737dde09d5851acd9c50" name="firmware-hdd-41cdb1c9da" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1568894400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1568980800">-      This firmware fixes an issue where the drive can become inaccessible after an emergency power off, and corrects a potential verification issue during read recovery.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1571832000">-</changelog>
  </package>
  <package pkgid="414287904610d9d51fc009a4da030a99e22f73efe5affeb446b11232d085ecd0" name="firmware-hdd-46fc43ab26" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1477310400">-     *Enhancements/New Features:**
    
      * Reliability enhancement for applications that write data to a narrow range of tracks.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1496836800">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1496923200">-     *Enhancements/New Features:**
    
      * Adds support for HPE ProLiant Gen10 servers.
      * Improved write performance.
    
      * A reliability enhancement for applications that write data to a narrow range of tracks</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1524657600">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager**
      * **Customers who already installed firmware version HPD4 do not need to update to HPD4(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1547380800">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="e481044316086278ef9c96d2219e63ce2159a551017b2694bac3ecd87680ebae" name="firmware-hdd-492a9952f6" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1571572800">-</changelog>
  </package>
  <package pkgid="59ce7467765939590b2b88558c82380eaf24dbaa32d8aded8339cb6563a1265b" name="firmware-hdd-5bf9355926" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1535544000">-      Fix to the error recovery algorithm to improve the overall reliability of the device.
      * Fix to insure complete support of internal logging during a sudden power off event which prevents the device entering into a degraded state.
      * Fixed a mishandling of error handling data during back ground media activities prevent a data issue.
      * Fix to  correct a buffer management timing issue internal to the device allowing for a more robust internal movement of data.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1547294400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1547380800">-      Error Recovery Optimization Enhancements.
      * Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1547467200">-      Fixed a rare issue that could lead to data loss during an unexpected power loss</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="67b26af79f0fcb6f9371ec6b135010af8a8cdb17bb404dc3731981f0bb4750c6" name="firmware-hdd-5d9e841607" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1502971200">-     *Enhancements/New Features:**
    
      * Firmware version HPD3 supports NDU (non-disruptive update) firmware updates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1524571200">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPD3 do not need to update to HPD3(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1524657600">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1524744000">-      Added FW binary unencrypted</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1547467200">-      Firmware version HPD3 supports NDU (non-disruptive update) firmware updates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="626853929ade49765979c2b1a6e99c70c45b7abbfc4a3226982eeeaada3a5a3f" name="firmware-hdd-5dcf26fa42" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1518350400">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1518436800">-      Removed support of UNMAP command.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1524657600">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1524744000">-      Added support for HPE Smart Array P824i-p MR Gen10 controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-3.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-3.1" date="1547380800">-     Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-3.1" date="1547467200">-      Removed support of UNMAP command.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="c3f5be90fa5037e8d1f03fe8bad827739e6c221226ed89c781073d7efaba4bcb" name="firmware-hdd-624b75c7e2" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1522152000">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1524657600">-      Added support for HPE Smart Array P824i-p MR Gen10 controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1524744000">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1547467200">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1563969600">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1564056000">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
  </package>
  <package pkgid="9edcf5cbcb8be4d6bde622765e5335c2806a3e2b25c3f938f66764fdf08f0cdc" name="firmware-hdd-68b12e54d2" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1534248000">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG4 do not need to update to HPG4(D).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1534334400">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1547380800">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1563710400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1563796800">-      This firmware includes a fix that changes the response to "SMART READ LOG" command from 04/80/80 to 05/26/00, which prevents the drive from incorrectly reporting an error.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1565438400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1565524800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1565611200">-      This firmware includes a fix that changes the response to "SMART READ LOG" command from 04/80/80 to 05/26/00, which prevents the drive from incorrectly reporting an error.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1566734400">-</changelog>
  </package>
  <package pkgid="12db8c81e14befef3462d487312997f7bf46523a8f626fe53795a5706268f29c" name="firmware-hdd-693b9a2853" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1501588800">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1501675200">-     *Problems Fixed:**
    
      * This firmware update eliminates a data integrity risk when an unaligned WRITE and VERIFY command is sent to a bad sector. During these conditions there is a potential for data intended to be written to disk to fail to be written.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1524657600">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPD2 do not need to update to HPD2(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1547294400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1547467200">-      Improves JetStress READ Latency performance.
      * Fixes the cause of internal reboots detected in the MSA system.
      * Removes a vendor unique sense code that the controller does not handle properly.
      * Includes changes to eliminate the cause of a potential hang condition.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="774f8a4a7879486d34f2ad60ddb7382e6a629c4445c67f083d21ddba25ca800c" name="firmware-hdd-6b7ce3da0e" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1568635200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1568721600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1568808000">-      This firmware contains a fix for a data integrity issue that could occur during a power cycle while the drive is processing write commands.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1571486400">-</changelog>
  </package>
  <package pkgid="5688ded211aaafa52c7beea6168d4572883d372a31c6ebb328915a91c86b1000" name="firmware-hdd-6d922fc9a8" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-2.1" date="1524657600">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager**
      * **Customers who already installed firmware version HPG5 do not need to update to HPG5(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-2.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-3.1" date="1534248000">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG5 do not need to update to HPG5(C).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-3.1" date="1534334400">-      Fixed the issue of Online firmware update fails when drives are connected behind AHCI controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1547467200">-      This firmware includes a fix for slow performance during sequential write workloads with small queue depth.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="ec78a3d9bbe400f1bf209e3f7ec8a8ed1f3e71c57f164a532d1d8014c6f914c7" name="firmware-hdd-6e3845def5" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1547380800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1547467200">-      Adds support for the HPE Security Log Page BBh, and improves drive reliability and responsiveness by including the latest firmware maintenance updates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="2fc38d1e9e1c0ca187fcb312061770decabcac0d7c4ea118f8a9778b704d175a" name="firmware-hdd-6ec35faf90" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1524657600">-       Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1524744000">-      Firmware corrects potential data integrity issues caused by incomplete cache table updates during unaligned writes, an incorrect write retry start location calculation, and improper media read ranges overlapped with cached writes.  These issues were only found during supplier ongoing reliability testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1532692800">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1547467200">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1563969600">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1564056000">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
  </package>
  <package pkgid="9073f7bd7106b6b3bb21575061fc46c49938adf3d7b70cbf11d6e2458eddbe34" name="firmware-hdd-70e3962f98" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1524744000">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1534248000">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG6 do not need to update to HPG6(C).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1534334400">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.
    
      * Fixed the issue of Online firmware update fails when drives are connected behind AHCI controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1547467200">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1563969600">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1564056000">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
  </package>
  <package pkgid="63c67ea475dcc26fb4299cd27a5668f0cdb7b15c51662a289bb8907a0653eef2" name="firmware-hdd-71af849f3b" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1502884800">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1502971200">-     *Enhancements/New Features:**
    
      * Firmware version HPD3 supports NDU (non-disruptive update) firmware updates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1524571200">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPD3 do not need to update to HPD3(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1524657600">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1524744000">-      Added FW binary unencrypted</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1547380800">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1547467200">-      Added support for SLES15.
      * Firmware version HPD3 supports NDU (non-disruptive update) firmware updates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1563537600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1563624000">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1563710400">-</changelog>
  </package>
  <package pkgid="eb6998b941e85c67e0e8f920d36743e672b2fd990d88b719e346ea75248a7c23" name="firmware-hdd-7505dfb5ae" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1496923200">-     *Problems Fixed:**
    
      *      Corrects Activity LED behavior on HPE drive carrier.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1524571200">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPD6 do not need to update to HPD6(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1524657600">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1524744000">-      Added FW binary unencrypted</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1547467200">-      This firmware fixes an infrequent drive internal reset issue.  When managing a Task Set Full condition in its firmware the drive may do an internal reset. The drive may not be accessible during the reset recovery process.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="f34bd683c28a6c0788f76493666cbd6a6243786ad858778aff18683c8e422cc8" name="firmware-hdd-7677644a25" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1535544000">-      Fix to the error recovery algorithm to improve the overall reliability of the device.
      * Fix to insure complete support of internal logging during a sudden power off event which prevents the device entering into a degraded state.
      * Fixed a mishandling of error handling data during back ground media activities prevent a data issue.
      * Fix to  correct a buffer management timing issue internal to the device allowing for a more robust internal movement of data.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1547294400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1547380800">-      Error Recovery Optimization Enhancements</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1547467200">-      Fixed a rare issue that could lead to data loss during an unexpected power loss</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="48774dda47820d190117f51bc7db77aefeae0113741e5757a7615bf803a52fbf" name="firmware-hdd-7c1a1734f9" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1496836800">-     *Enhancements/New Features:**
    
      * Adds support for HPE ProLiant Gen10 servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1496923200">-     *Problems Fixed:**
    
      * Reliability enhancement for applications that write data to a narrow range of tracks.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1524571200">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPD2 do not need to update to HPD2(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1524657600">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1524744000">-      Added FW binary unencrypted</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1547380800">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="0f78cd3824069e321f87400eea1b1ea59c753b466f54c9afc3f263e193c71dc6" name="firmware-hdd-7f2a26e6d0" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1568894400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1568980800">-      This firmware fixes an issue where the drive can become inaccessible after an emergency power off, and corrects a potential verification issue during read recovery.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1571918400">-</changelog>
  </package>
  <package pkgid="2c55a4752fc1122c0c27255b98b4a40200416db03f560dd7374e4291a7148809" name="firmware-hdd-7fc5497116" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1496923200">-     *Problems Fixed:**
    
      * Fixes a data integrity risk which could occur during 4k or greater unaligned writes while the device incurs a smart trip or smart warning event. During these conditions there is a potential for data intended to be written directly to disk to fail to be written.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1510747200">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1510833600">-     *Problems Fixed:**
    
      * This firmware eliminates a data integrity risk when an unaligned Write and Verify command is sent to a bad sector. During these conditions there is a potential for data intended to be written to disk to fail to be written.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1524744000">-      Added FW binary unencrypted.
      * This firmware:  
    1) Improves JetStress READ Latency performance  
    2) Fixes the cause of internal reboots detected in the MSA system  
    3) Removes a vendor unique sense code that the controller does not handle
    properly  
    4) Includes changes to eliminate the cause of a potential hang condition</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1547467200">-      This firmware:  
    1) Improves JetStress READ Latency performance  
    2) Fixes the cause of internal reboots detected in the MSA system  
    3) Removes a vendor unique sense code that the controller does not handle
    properly  
    4) Includes changes to eliminate the cause of a potential hang condition</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="2039357752e10a66c9f988817ff7660c37184cb244eca4043e119b6217018672" name="firmware-hdd-82894b9e0a" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1571572800">-</changelog>
  </package>
  <package pkgid="09d37ca49ab482d671f7b28445019873e1ecbc85400431dac9f5be20a90b3fc4" name="firmware-hdd-852266afdf" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1572436800">-</changelog>
  </package>
  <package pkgid="55b5ade3d9ee94191c296e1154218ed7e54fbf7660ce8eed4a780f119b4ca0ea" name="firmware-hdd-8a2c06af48" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1496923200">-     *Problems Fixed:**
    
      * Self-initiated reset during ATI (Adjacent Track Interference) mitigation issue, where the drive reported a 06/29/04 (Self-Initiated Reset) to the controller.  Then the controller would re-establish link with the drive and resend the command.
      * Servo miscalculations that resulted in degraded drive performance.
    
    **Problems Fixed for HPD4 (B): **
    
      * Linux Smart Component fails to update the firmware for drives connected behind an HP Smart Array P431 controller. Component reports the firmware update was successful. However, after a power cycle, the firmware version remains unchanged.
    
    **Problems Fixed for HPD4 (C):**
    
      * Component would fail to install drive firmware for drives present in a system configured with two or more external drive enclosures attached to an HP Host Bus Adapter H22x. The following message would be reported in the component log file - "Device appears more than once in tree". The drive firmware installation failure was not observed in configurations having only one external drive enclosure attached to an HP Host Bus Adapter H22x.
      * Component fails to update the firmware for drives connected behind an HP Smart Array P431 controller. Component reports the firmware update was successful. However, after a power cycle, the firmware version remains unchanged.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1513252800">-      Fixes a data integrity risk where stale data is mistakenly used from cache.
      * Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1524657600">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPD6 do not need to update to HPD6(C).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1524744000">-       Added support for HPE Smart Array P824i-p MR Gen10 controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1547467200">-      Fixes a data integrity risk where stale data is mistakenly used from cache.
      * Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-6.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="8082682e611f421e9857fd4678309d233f97a9320a565ff1f1af6b834d7aceb7" name="firmware-hdd-8b26d1ef02" arch="x86_64">
    <version epoch="0" ver="HPD1" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1571572800">-</changelog>
  </package>
  <package pkgid="e5e9c7d57fc0958d05adfa1a4c876c637784e00915644d930747c04f52749f21" name="firmware-hdd-8c4a212ff9" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1496836800">-     *Enhancements/New Features for HPD4 (B):**
    
      * Adds support for HPE ProLiant Gen10 servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1496923200">-     *Problems Fixed:**
    
      * This firmware improves HDD reliability when HDDs are exposed to long periods of host inactivity that exceed 1 second. HDDs may become unresponsive when using HDD firmware prior to version HPD4.  This firmware also contains a change which prevents an incorrect reassign status of a repaired sector from being logged.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1524571200">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPD4 do not need to update to HPD4(c).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1524657600">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1524744000">-      Added FW binary unencrypted</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1547380800">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1563537600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1563624000">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1563710400">-</changelog>
  </package>
  <package pkgid="771bd95711e5a461f9bb7024d7f29f8a576c675858945fd795a1c093fce78a3d" name="firmware-hdd-8d68452816" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1547467200">-      Removes a vendor unique sense code that the controller does not handle properly.
      * Includes changes to eliminate the cause of a potential hang condition.
      * Changes some settings to comply with Microsoft Storage Spaces Certification requirements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="13d720bcf5bc089532404b46cfa4fb8b09b666a4150c7aeeabb081e5909f61e6" name="firmware-hdd-8e8ddc5265" arch="x86_64">
    <version epoch="0" ver="HPS1" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK1" date="1519992000">-      Firmware corrects an issue where the drive will be in a failed state after an unexpected power loss. When this occurs the drive will not recover after subsequent power cycles and will not be accessible by the system configuration and Host applications.
      * Refer Customer Bulletin for workarounds &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00042733en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK1-2.1" date="1547380800">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK1-2.1" date="1547467200">-      Firmware corrects an issue where the drive will be in a failed state after an unexpected power loss. When this occurs the drive will not recover after subsequent power cycles and will not be accessible by the system configuration and Host applications.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS1-2.1" date="1562587200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS1-3.1" date="1562673600">-</changelog>
  </package>
  <package pkgid="2b35332a9d56b22bfc49883441c12715144bd16097ed51dcbe0fba7c66011918" name="firmware-hdd-8ed8893abd" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1524657600">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1524744000">-      Added FW binary unencrypted</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1547467200">-      During a hot removal/hot plug event, the drive failed discovery operation. To address this problem, the drive firmware handling of the Start/Stop Unit command has been improved.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1576756800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
  </package>
  <package pkgid="07c632a848e6125096f72037aad9ce027856257d32ddacbae1481791018b1411" name="firmware-hdd-9196d4f720" arch="x86_64">
    <version epoch="0" ver="HPGE" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB" date="1535457600">-      Fixed issue to a read-disturb mechanism within the NAND induced only during 4K reads with partially programed blocks. The NAND read time is modified to prevent the impact of the reads. This change prevents premature or false failure of the drive.
      * Fix to a non-exploitable vulnerability in the firmware download process. Corrected FW will increment the security version to ensure that all SSDs receiving the update will not be capable of downloading previous FW with the issue.  Regression back to an earlier version of firmware will not be possible.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-2.1" date="1547294400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-2.1" date="1547467200">-      Fixed issue to a read-disturb mechanism within the NAND induced only during 4K reads with partially programed blocks. The NAND read time is modified to prevent the impact of the reads. This change prevents premature or false failure of the drive.
      * Fix to a non-exploitable vulnerability in the firmware download process. Corrected FW will increment the security version to ensure that all SSDs receiving the update will not be capable of downloading previous FW with the issue.  Regression back to an earlier version of firmware will not be possible.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-3.1" date="1565438400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-3.1" date="1565524800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-3.1" date="1565611200">-      Fixed issue to a read-disturb mechanism within the NAND induced only during 4K reads with partially programed blocks. The NAND read time is modified to prevent the impact of the reads. This change prevents premature or false failure of the drive.
      * Fix to a non-exploitable vulnerability in the firmware download process. Corrected FW will increment the security version to ensure that all SSDs receiving the update will not be capable of downloading previous FW with the issue.  Regression back to an earlier version of firmware will not be possible.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE" date="1566388800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE" date="1566475200">-      Fix to issue in bootloader download during power loss. 
      * Improvements to error exception.
      * Improvements to Secure lock fix during multi-thread read tests with high freq. power cycling.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE-2.1" date="1570708800">-</changelog>
  </package>
  <package pkgid="c94e456347147e2c72304e87f4628fa56fc8fb7b9216da18e880593733e9395a" name="firmware-hdd-95a2e5abcb" arch="x86_64">
    <version epoch="0" ver="HPK4" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4" date="1547467200">-      Fixed timing issue to pass VMWare VSAN certification. Downgrading to any previous version of firmware is not allowed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1565524800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1565611200">-      Fixed timing issue to pass VMWare VSAN certification. Downgrading to any previous version of firmware is not allowed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1567339200">-      Fixed timing issue to pass VMWare VSAN certification. Downgrading to any previous version of firmware is not allowed.</changelog>
  </package>
  <package pkgid="7c7c46b58e9b8254a8600f868fcd825364839685a12a77ffe9aea04d4e446955" name="firmware-hdd-95af9a555e" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1524571200">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG1 do not need to update to HPG1(C).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1524657600">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1524744000">-      Added FW binary unencrypted</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-2.1" date="1534334400">-      This firmware updates the drive to indicate NDU compliance.
      * Online firmware update fails when drives are connected behind AHCI controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1547294400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1547467200">-      This firmware includes a fix for an issue where the LED would continue blinking after a Sanitize operation completed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-2.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-2.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-3.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="b4e8d9823ae887b1809d6242ba94e5e33d018c346ec3be333b7d9cc9f28d0d54" name="firmware-hdd-9a826ccd8a" arch="x86_64">
    <version epoch="0" ver="HPK4" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3" date="1524657600">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3" date="1524744000">-     *Problems Fixed:**
    
      * HPK3 firmware resolved an issue that caused the disk activity ring, which is located on NVME SSD drive carrier, to constantly spin regardless of drive activity status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4" date="1534334400">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1547294400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1547467200">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1562155200">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1562241600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1562328000">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-4.1" date="1562414400">-</changelog>
  </package>
  <package pkgid="3dd383260351801c4628eb57539fc8de39a1f42de792c077198e699987bdc567" name="firmware-hdd-9ad359dac1" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1554897600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1554984000">-      The new firmware improves robustness during dual port heavy workload environments for both runtime and after sudden power off events.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1555070400">-      Firmware version HPD5 fixes an issue where drive may fail with command timeout messages.  This condition may occur within a few days of initial use if a very small amount of data is written to the drives and they are left powered on without additional data being written to the drive.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1564228800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1564315200">-      Added Support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1564401600">-      Firmware version HPD5 fixes an issue where drive may fail with command timeout messages.  This condition may occur within a few days of initial use if a very small amount of data is written to the drives and they are left powered on without additional data being written to the drive.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1564488000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1564574400">-      Improved perfromance during a raid 5 drive rebuild.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1565611200">-</changelog>
  </package>
  <package pkgid="4c19c2187161d665c21db70b3405e846c44977516374ae251bb2c412719bbb1f" name="firmware-hdd-9e87eecb3f" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1563710400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1563796800">-      Fix to issue in bootloader download during power loss. 
      * Change IDF Word 106 report 4K TU for 4/8TB drives to align with Microsoft SQL requirement.
      * Improvements to error exception.
      * Improvements to Secure lock fix during multi-thread read tests with high freq. power cycling.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1565438400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1565524800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1565611200">-      Fix to issue in bootloader download during power loss. 
      * Change IDF Word 106 report 4K TU for 4/8TB drives to align with Microsoft SQL requirement.
      * Improvements to error exception.
      * Improvements to Secure lock fix during multi-thread read tests with high freq. power cycling.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1566734400">-</changelog>
  </package>
  <package pkgid="ce24bf9b6248f5bffb5a7dfa89424ad3282648b62b8c6a43ad76f358ac0dfbe9" name="firmware-hdd-a05f29cef3" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1524571200">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPD3 do not need to update to HPD3(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1524657600">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1524744000">-      Added FW binary unencrypted</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1547380800">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1562500800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1562587200">-      New servo which disables a feature that could cause unrecoverable data errors. 
      * A fix to prevent the drive from becoming unresponsive during certain mixed read/write random workloads.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1566475200">-</changelog>
  </package>
  <package pkgid="488ec3c083e6427739f0085f0d09bd256116fd3e753316719aef1fa8214815fb" name="firmware-hdd-a1fd19f9ca" arch="x86_64">
    <version epoch="0" ver="HPG8" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1496923200">-     *Problems Fixed:**
    
      * Fixed an occasional and potentially significant delay in completion time of the SANITIZE function, along with alignment of some settings, features and internal logging with specifications.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-3.1" date="1524657600">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG5 do not need to update to HPG5(C).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-3.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1534334400">-      Corrects some internal diagnostic logging and reporting functions.
      * Streamlines internal buffer management.
      * Fixed the issue of Online firmware update fails when drives are connected behind AHCI controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8" date="1563710400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8" date="1563796800">-      Eliminates a potential hang on 4TB under certain pattern-dependent read conditions
      * Eliminates the possibility of a weak read signal under a sequenced combination of read/write conditions
      * Provides reliability enhancements involving head fly height dynamics
      * Enables download Mode 0Eh activation by Mode 0Fh</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-2.1" date="1565438400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-2.1" date="1565524800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-2.1" date="1565611200">-      Eliminates a potential hang on 4TB under certain pattern-dependent read conditions
      * Eliminates the possibility of a weak read signal under a sequenced combination of read/write conditions
      * Provides reliability enhancements involving head fly height dynamics
      * Enables download Mode 0Eh activation by Mode 0Fh</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-3.1" date="1566734400">-</changelog>
  </package>
  <package pkgid="c8181b99453d447c2afdccb867aabe713cb703e1902e1c1a7d526aa6c18377d6" name="firmware-hdd-a2d4b5c742" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1524657600">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1524744000">-      Added FW binary unencrypted</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1534248000">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG1 do not need to update to HPG1(D).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1534334400">-      Fixed the issue of Online firmware update fails when drives are connected behind AHCI controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1547467200">-      Firmware corrects an issue where drives were not found during Power-On Self-Test device discovery.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="b07aa9600ef22c21220932adabd6fe05d150f62282ca47238a39666d801cb776" name="firmware-hdd-a629fcea59" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1524657600">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager**
      * **Customers who already installed firmware version HPG2 do not need to update to HPG2(C).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1534248000">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG2 do not need to update to HPG2(D).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1534334400">-      Fixed the issue of Online firmware update fails when drives are connected behind AHCI controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1547380800">-     Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1547467200">-      Reliability enhancement for applications that write data to a narrow range of tracks.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1563883200">-     Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-7.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="71fa88b1fb0d7ed545442cac077b80f7ccf24990f3b9b07e07fd98e9900c8e6d" name="firmware-hdd-a886842a99" arch="x86_64">
    <version epoch="0" ver="HPD1" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1571572800">-</changelog>
  </package>
  <package pkgid="57562b55893b61dcd976bbeb735281c2ee9fab0cd5fcc25823d2ff2693ddf953" name="firmware-hdd-aa9e289524" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1496923200">-     *Problems Fixed:**
    
      * This firmware implements the Firmware Security Log Page.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1524571200">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPD3 do not need to update to HPD3(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1524657600">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1524744000">-      Added FW binary unencrypted</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1547294400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1547467200">-      This firmware adds a feature that will periodically assess the health of the writer element of the head by verifying the data after a write operation to ensure more robust data integrity.
      * When performing format on drives with marginal servo flaws, it takes too long to format or format fails with 03/31 reported across the interface on subsequent commands. This firmware includes a change that moves the servo flaw characterization retries earlier in the sequence of format.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1563969600">-      Added support for RHEL 8</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="cf286b80487c6e42e3ddc9521beecf0c0d0bc72461beba1977b125cb035d76e4" name="firmware-hdd-aaf1014ede" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1533211200">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1533297600">-      Corrects a potential data integrity issue during unaligned write commands, found in supplier ongoing lab testing.Includes additional fixes to improve error handling and reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1547467200">-      Corrects a potential data integrity issue during unaligned write commands, only found in supplier ongoing lab testing.Includes additional fixes to improve error handling and reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1563969600">-      Corrects a potential data integrity issue during unaligned write commands, only found in supplier ongoing lab testing.Includes additional fixes to improve error handling and reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1564056000">-      Corrects a potential data integrity issue during unaligned write commands, only found in supplier ongoing lab testing.Includes additional fixes to improve error handling and reliability.</changelog>
  </package>
  <package pkgid="0e055a8d40437b9f8fa4ccd53d510816c31ba8493c3df45a29533e6899f1c4f0" name="firmware-hdd-ac20a1e1c6" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1566388800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1566475200">-      Fix to issue in bootloader download during power loss. 
      * Change IDF Word 106 report 4K TU for 4/8TB drives to align with Microsoft SQL requirement.
      * Improvements to error exception.
      * Improvements to Secure lock fix during multi-thread read tests with high freq. power cycling.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1570708800">-</changelog>
  </package>
  <package pkgid="50b121cb299c8daed6367868062db3340cf0ecf216bf012772c613230b616804" name="firmware-hdd-ac3fda26eb" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1496836800">-     *Enhancements/New Features:**
    
      * Adds support for HPE ProLiant Gen10 servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1496923200">-     *Problems Fixed:**
    
      * This firmware improves HDD reliability when HDDs are exposed to long periods of host inactivity that exceed 1 second. HDDs may become unresponsive when using HDD firmware prior to version HPD6. 
    
      * This firmware also contains a change which prevents an incorrect reassign status of a repaired sector from being logged.
    
      * This firmware contains a change to prevent an incorrect sense code from being posted when a Stop command is received during power-on sequence.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1524571200">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPD6 do not need to update to HPD6(C).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1524657600">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1524744000">-      Added FW binary unencrypted</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1547380800">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-6.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="d3ac62084a40ac4e91d17fdb5ea9c37275622b2840b5abb6c82d4d6bd05dda90" name="firmware-hdd-aef2a690c9" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1519646400">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1519732800">-      Fixes an issue where the drive may become unresponsive and stop functioning under certain initial usage conditions (eg, idle, low workloads, or continuous system reboot).
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00041830en_us&gt;.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1525262400">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1525348800">-      Added support for HPE Smart Array P824i-p MR Gen10 controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1528718400">-     Firmware version HPG3 addresses the following issues:
    
      * Corrects the potential for drives to become unresponsive. For details about this issue, refer to HPE Customer Bulletin: HPE Solid State Drives (SSD) - SSD FIRMWARE UPGRADE REQUIRED to Prevent a Higher Than Expected Failure Rate Noted on Certain Model SSD Drives: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00048133en_us&gt;.   
      * Improves drive reliability by including the latest firmware maintenance updates.  
      
    After HPG3 firmware is downloaded to the drive, the new HPG3 firmware will be
    active on the drive. The new drive bootloader code will be activated after the
    next drive power cycle.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1547380800">-       
      * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1547467200">-     Firmware version HPG3(C) addresses the following issue :
    
      * Added a fix for changing the order of write buffer modes in the flash engine.
    
    Firmware version HPG3 addresses the following issues:
    
      * Corrects the potential for drives to become unresponsive. For details about this issue, refer to HPE Customer Bulletin: HPE Solid State Drives (SSD) - SSD FIRMWARE UPGRADE REQUIRED to Prevent a Higher Than Expected Failure Rate Noted on Certain Model SSD Drives: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00048133en_us&gt;.   
      * Improves drive reliability by including the latest firmware maintenance updates.  
      
    After HPG3 firmware is downloaded to the drive, the new HPG3 firmware will be
    active on the drive. The new drive bootloader code will be activated after the
    next drive power cycle.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1562068800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1562155200">-      Fixes a rare link loss issue and adds enhancements for drive reliability.
      * After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.
      * The new drive bootloader code will be activated after the next drive power cycle.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-3.1" date="1566734400">-      Fixes a rare link loss issue and adds enhancements for drive reliability.
      * After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.
      * The new drive bootloader code will be activated after the next drive power cycle.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us&gt;</changelog>
  </package>
  <package pkgid="193a90d60336254b22636ac0cc9e0eed9b048b6fbabc084b6e7ca44659d31823" name="firmware-hdd-af802bb412" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1496923200">-     *Problems Fixed:**
    
      * This firmware improves HDD reliability when HDDs are exposed to long periods of host inactivity that exceed 1 second. HDDs may become unresponsive when using HDD firmware prior to version HPD5.  This firmware also contains a change which prevents an incorrect reassign status of a repaired sector from being logged.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1502884800">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1502971200">-     *Problems Fixed:**
    
      * This firmware contains a change to prevent a drive reset issue, which may affect performance.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1524657600">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager**
      * **Customers who already installed firmware version HPD9 do not need to update to HPD9(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1547380800">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="754e1eb36fb144b9c70c2a328f87533d86b333bb70cf2b13d23e92243047037b" name="firmware-hdd-b04257b77b" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1496923200">-     *Problems Fixed:**
    
      * This firmware improves HDD reliability when HDDs are exposed to long periods of host inactivity that exceed 1 second. HDDs may become unresponsive when using HDD firmware prior to version HPD7. 
    
      * This firmware also contains a change which prevents an incorrect reassign status of a repaired sector from being logged.
    
      * This firmware prevents asserts on a sequential write which can result in devices being lost from the configuration. It also preserves persistent reservation through downloads which prevents loss of performance.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1524571200">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1524657600">-      Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1524744000">-      This firmware allows the drive to meet the requirements for Azure Stack certification. 
      * This firmware contains a change to the reported drive serial number in VPD page 80. It will now report the same as is displayed on the drive label.  Any removed characters are replaced with blank place holders so the log format will not be changed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1547467200">-      This firmware allows the drive to meet the requirements for Azure Stack certification. 
      * This firmware contains a change to the reported drive serial number in VPD page 80. It will now report the same as is displayed on the drive label.  Any removed characters are replaced with blank place holders so the log format will not be changed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="6b9c49a85c39e2f9ead7ec87d1cc9b198ced5300b4d5955f57f4b8c211ae21fb" name="firmware-hdd-b1c9eaf74c" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1524657600">-       Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1524744000">-      This firmware includes a fix for an issue that could cause timeout errors during certain sequential write corner cases. There is also a fix for slow response time during random write workloads.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1547294400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1547467200">-      This firmware includes a fix for an issue where a drive could become format corrupt after a power cycle if write commands were being executed before the power loss.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1562500800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1562587200">-      New servo which prevents the drive from posting non-media errors.
      * A fix to prevent the drive from becoming unresponsive during certain mixed read/write random workloads.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1563969600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1564056000">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1564142400">-</changelog>
  </package>
  <package pkgid="933955a580f2d5ccada05db7a623816594cbd8582e4f4c0de71c0563ac7146a1" name="firmware-hdd-b45e49679c" arch="x86_64">
    <version epoch="0" ver="HPK4" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1524657600">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1524744000">-      Additional improvements in MCTP functionality.
      * Drive fails to train in BL460 after Windows warm reset or iLO reset.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4" date="1547467200">-      Fixed timing issue to pass VMWare VSAN certification.  Downgrading to any previous version of firmware is not allowed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1565524800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1565611200">-      Fixed timing issue to pass VMWare VSAN certification.  Downgrading to any previous version of firmware is not allowed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1567339200">-      Fixed timing issue to pass VMWare VSAN certification.  Downgrading to any previous version of firmware is not allowed.</changelog>
  </package>
  <package pkgid="90db07a124f58dfdf521fb321c2ab71f8f8ef99569e97a96f74302b9ba121c1f" name="firmware-hdd-b460823f70" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1563710400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1563796800">-      Fix to issue in bootloader download during power loss. 
      * Change IDF Word 106 report 4K TU for 4/8TB drives to align with Microsoft SQL requirement.
      * Improvements to error exception.
      * Improvements to Secure lock fix during multi-thread read tests with high freq. power cycling.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1565438400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1565524800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1565611200">-      Fix to issue in bootloader download during power loss. 
      * Change IDF Word 106 report 4K TU for 4/8TB drives to align with Microsoft SQL requirement.
      * Improvements to error exception.
      * Improvements to Secure lock fix during multi-thread read tests with high freq. power cycling.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1566734400">-</changelog>
  </package>
  <package pkgid="46a459b6c54bd2a89ff8e6356fae5744d884ba7228d6df2e2ab9a9391705dec4" name="firmware-hdd-b7eb905efe" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1515499200">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1515585600">-      Fixes an issue which caused the drive to become non-functional.  
     Fixes VPD Log D0h reported drive Sanitize times.  
     Adds support for Security Log Page BBh</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1547380800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1547467200">-      Fixes an issue which caused the drive to become non-functional.  
     Fixes VPD Log D0h reported drive Sanitize times.  
     Adds support for Security Log Page BBh.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1563969600">-      Fixes an issue which caused the drive to become non-functional.  
     Fixes VPD Log D0h reported drive Sanitize times.  
     Adds support for Security Log Page BBh.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1564056000">-      Fixes an issue which caused the drive to become non-functional.
      * Fixes VPD Log D0h reported drive Sanitize times. 
      * Adds support for Security Log Page BBh.</changelog>
  </package>
  <package pkgid="c6849db5f205131ba9d9968190c6ce1ac4f6a9e4f87c3fc79608e013e18ecdce" name="firmware-hdd-b85516c7d2" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1496836800">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1496923200">-     *Problems Fixed:**
    
      * This firmware contains a change to prevent occasional command completion times in the 4-5 second window when command is received just as the drive is transitioning from active to Idle A.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1524657600">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPD2 do not need to update to HPD2(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1547294400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1547467200">-      This firmware adds a feature that will periodically assess the health of the writer element of the head by verifying the data after a write operation to ensure more robust data integrity.
      * When performing format on drives with marginal servo flaws, it takes too long to format or format fails with 03/31 reported across the interface on subsequent commands. This firmware includes a change that moves the servo flaw characterization retries earlier in the sequence of format.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="4e7c474a5c032fe45d45c00ef6a9831b2b3b71a2fcb54082d8f9f88f4d45183f" name="firmware-hdd-b8a60fbe9a" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1566734400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1566820800">-      Enhancement Improved perfromance during a raid 5 drive rebuild.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1571400000">-</changelog>
  </package>
  <package pkgid="d1108f7b66ec4c884b45fc6eb12f84a2d810a8591399275e59de6bccb06a153d" name="firmware-hdd-b9340d29be" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1513252800">-      Fixes a data integrity risk where a recoverable error can prevent a write command from completing properly.
      * Fixes a data integrity risk due to incorrect re-ordering of commands, when overlapped commands occur. 
      * Fixes a data integrity risk during very large blocks of sequential commands with a data transfer between 1020MB and 1024MB.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1524571200">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager**
      * **Customers who already installed firmware version HPD6 do not need to update to HPD6(C).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1524657600">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1524744000">-      Added FW binary unencrypted.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1547467200">-      Fixes a data integrity risk where a recoverable error can prevent a write command from completing properly.
      * Fixes a data integrity risk due to incorrect re-ordering of commands, when overlapped commands occur. 
      * Fixes a data integrity risk during very large blocks of sequential commands with a data transfer between 1020MB and 1024MB.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-6.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="cb4c7fd0c29112bbefb710613ac2390a23d2747ecd4970ed1de5f9e6f3099caf" name="firmware-hdd-bdc37cb37f" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1524657600">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG2 do not need to update to HPG2(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1534248000">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPG2 do not need to update to HPG2(C).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1534334400">-      Fixed the issue of Online firmware update fails when drives are connected behind AHCI controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1547467200">-      Firmware version HPG2 prevents the occurrence of a rare issue which could lead to slow drive performance. This issue has the potential to impact all drives in configurations where the drives might be allowed to be idle for greater than 1 second.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="1879287b28e95e143daecd9b646dab24acc07fdaee3a891470f4cba7be6e86bc" name="firmware-hdd-bdfb8e99d9" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1524657600">-        Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1524744000">-      This firmware includes a fix for an issue that could cause timeout errors during certain sequential write corner cases. There is also a fix for slow response time during random write workloads.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1547467200">-      This firmware includes a fix for an issue that could cause timeout errors during certain sequential write corner cases. There is also a fix for slow response time during random write workloads.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1557835200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1557921600">-     This firmware includes
    
      * New servo which prevents the drive from posting non-media errors
      * A fix for an issue where the drive could become unresponsive after a hard reset</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="6f5f54b992dd7225e123c6ad5eddd564256518b32601f819f6608371071855ae" name="firmware-hdd-bfc4af697b" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1547467200">-      This firmware corrects a potential issue where the data in the reserved tracks is not properly updated, eliminating the risk of a drive not finishing the boot process on power up.  This firmware is also designed to prevent any previous firmware revisions to be loaded onto the drive, once the HPG4 firmware is downloaded.  Other maintenance fixes and updates are also included with the new firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1552392000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1552478400">-      This firmware corrects a rare but potential data integrity issue, found in specific workloads with improperly ordered write commands or during overlapped read command processing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-2.1" date="1563451200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-2.1" date="1563537600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-2.1" date="1563624000">-      This firmware corrects a rare but potential data integrity issue, found in specific workloads with improperly ordered write commands or during overlapped read command processing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1563710400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1563796800">-      This firmware includes a fix that changes the response to "SMART READ LOG" command from 04/80/80 to 05/26/00, which prevents the drive from incorrectly reporting an error.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1566734400">-      This firmware includes a fix that changes the response to "SMART READ LOG" command from 04/80/80 to 05/26/00, which prevents the drive from incorrectly reporting an error.</changelog>
  </package>
  <package pkgid="fe2a13c7820b34b2406deaeed9807d101cac8734a5b33e66e0f90d11d9ced2fc" name="firmware-hdd-bfc95f0628" arch="x86_64">
    <version epoch="0" ver="HPGB" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-2.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-3.1" date="1534248000">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPGB do not need to update to HPGB(C).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-3.1" date="1534334400">-      Fixed the issue of Online firmware update fails when drives are connected behind AHCI controller.
      * Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
    
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-4.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-4.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-4.1" date="1547467200">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-5.1" date="1563710400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-5.1" date="1563796800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-5.1" date="1563883200">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-6.1" date="1563969600">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
  </package>
  <package pkgid="9fff49b1bf4735df61bd01f6c1092c55dcbcbc5f5631b2c8ac70b3df7be4a84b" name="firmware-hdd-c4355d15c4" arch="x86_64">
    <version epoch="0" ver="HPK2" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1533816000">-      After a warm reboot, the drive would fail to be recognized.
      * Addressed a potential for data integrity issues during unaligned data transfers.
      * A drive would become non-functional due to a disabled logic state that resulted from a vSAN PCIe Advance Error Reporting issue where device registers were accessed before they became ready.  
    
     For details about this issue, refer to HPE Customer Bulletin:
    &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00052541en_us&gt;  
    
     **Important:** After the drive is upgraded to firmware version HPK2, it cannot be downgraded firmware version HPK0.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1547294400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1547380800">-      Added support for SLES15 operating system.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1547467200">-      Resolves an issue where the drive may fail to be recognized after a warm reboot.
      * Corrects a potential data integrity issue during unaligned data transfers.
      * Fixes an issue where the drive may become disabled during improper access of error registers.
      * Once HPK2 is downloaded, the drive cannot be changed back to HPK0 firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-3.1" date="1562328000">-      Added support for SLES15 operating system.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-3.1" date="1562414400">-      Resolves an issue where the drive may fail to be recognized after a warm reboot.
      * Corrects a potential data integrity issue during unaligned data transfers.
      * Fixes an issue where the drive may become disabled during improper access of error registers.
      * Once HPK2 is downloaded, the drive cannot be changed back to HPK0 firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-4.1" date="1562500800">-      Resolves an issue where the drive may fail to be recognized after a warm reboot.
      * Corrects a potential data integrity issue during unaligned data transfers.
      * Fixes an issue where the drive may become disabled during improper access of error registers.
      * Once HPK2 is downloaded, the drive cannot be changed back to HPK0 firmware.</changelog>
  </package>
  <package pkgid="57d708136818be38e6a7e27acc7e2940759e70594d604f9b9d98545cf155b2e0" name="firmware-hdd-c566d63ca0" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1560859200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1560945600">-      Corrects a potential unresponsiveness during a Secure Erase operation, and fixes an incorrect error reporting issue during certain SATA protocol transfers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1566734400">-</changelog>
  </package>
  <package pkgid="9a52e3d4ac3f56481619c2425d83b18db4cb4da3eaa36a5d5b1357484030ebe9" name="firmware-hdd-c5cd837c29" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1524657600">-       Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1524744000">-      This firmware changes some settings to comply with Microsoft Storage Spaces Certification requirements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1547467200">-      This firmware changes some settings to comply with Microsoft Storage Spaces Certification requirements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="b47f3a2a6eb0b8be83d66275b22e1a388d8735ad483edb76b7fa2573f16129a4" name="firmware-hdd-c7df7ceedb" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1547467200">-      Removes a vendor unique sense code that the controller does not handle properly.
      * Includes changes to eliminate the cause of a potential hang condition.
      * Changes some settings to comply with Microsoft Storage Spaces Certification requirements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="65c3e85b317aedad342b07f4a74963a5d73d529f2c5510bec007473fde3a6ffc" name="firmware-hdd-ca21e169e2" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1568721600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1568808000">-      This firmware fixes an issue where the drive can become inaccessible after an emergency power off, and corrects a potential verification issue during read recovery.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1571572800">-</changelog>
  </package>
  <package pkgid="c2b3fc6ffdade9a7d86b884f5a8d6b06099df9332cc096974a9216413cb8fe1a" name="firmware-hdd-cc819d4bff" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-2.1" date="1524657600">-      Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-2.1" date="1524744000">-      Firmware corrects potential data integrity issues caused by incomplete cache table updates during unaligned writes, an incorrect write retry start location calculation, and improper media read ranges overlapped with cached writes.  These issues were only found during supplier ongoing reliability testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1532692800">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-2.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-2.1" date="1547467200">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-3.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-3.1" date="1563883200">-      Added support for RHEL8</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-3.1" date="1563969600">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-4.1" date="1564056000">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
  </package>
  <package pkgid="95ed3899049316c56a51d1ab20bbbdd3fc0f1055c37ec334642250b2e41fd96c" name="firmware-hdd-cfd7436fcc" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1568894400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1568980800">-      This firmware fixes an issue where the drive can become inaccessible after an emergency power off, and corrects a potential verification issue during read recovery.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1571918400">-</changelog>
  </package>
  <package pkgid="3102ef509417a4e3eed22010645c0b97147c30b79a5d27a9d6fbc031ca9e1b0c" name="firmware-hdd-d1cf327bc4" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1563451200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1563537600">-      Fix to issue in bootloader download during power loss. 
      * Change IDF Word 106 report 4K TU for 4/8TB drives to align with Microsoft SQL requirement.
      * Improvements to error exception.
      * Improvements to Secure lock fix during multi-thread read tests with high freq. power cycling.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1565438400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1565524800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1565611200">-      Fix to issue in bootloader download during power loss. 
      * Change IDF Word 106 report 4K TU for 4/8TB drives to align with Microsoft SQL requirement.
      * Improvements to error exception.
      * Improvements to Secure lock fix during multi-thread read tests with high freq. power cycling.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1566734400">-</changelog>
  </package>
  <package pkgid="427bfe7f85b255e9551759e4ecf739464013fa54346d79bce4503700f567ea5f" name="firmware-hdd-d355375539" arch="x86_64">
    <version epoch="0" ver="HPS4" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-3.1" date="1524657600">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPS4 do not need to update to HPS4(c).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-3.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-4.1" date="1534248000">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPS4 do not need to update to HPS4(D).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-4.1" date="1534334400">-      Fixed the issue of Online firmware update fails when drives are connected behind AHCI controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-5.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-5.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-5.1" date="1547467200">-      HPS4 firmware release resolved a firmware timing issue which occurred during drive long self-test and resulted in a timeout condition that caused the drive to become unrecognized by the system.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-6.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-6.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-7.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="c6bf74002d801a595ed697511ae35195747e4b04391047eeb8c93b6a1f59fdc7" name="firmware-hdd-d39e7a7e75" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="0c31a062ba6ce3edcd4394c5cace387a8c05b79108fd5c45a9e407fed237351c" name="firmware-hdd-d64642c780" arch="x86_64">
    <version epoch="0" ver="HPK4" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3" date="1524657600">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3" date="1524744000">-     *Problems Fixed:**
    
      * HPK3 firmware resolved an issue that caused the disk activity ring, which is located on NVME SSD drive carrier, to constantly spin regardless of drive activity status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4" date="1534334400">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1547294400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1547467200">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1562328000">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1562414400">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-4.1" date="1562500800">-</changelog>
  </package>
  <package pkgid="5122c55ce151300c0e3da1e3512bf31f985cc40e70593fdb1e77fa19412d56e6" name="firmware-hdd-d7af557f47" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1547467200">-      Removes a vendor unique sense code that the controller does not handle properly.
      * Includes changes to eliminate the cause of a potential hang condition.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="0b2bccd13719dbbf75d82e83a0322f6e56be9325c65b05556428ea3f93bf4a30" name="firmware-hdd-db687966b4" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1556020800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1556107200">-      Fixes Addressed a sustained write performance by improving the efficiency of background tasks. - Addressed a rare occurrence of a data loss issue during a sudden power event. - Addressed a rare occurrence of a Data Management Error after an interface reset when the device's Software Setting Prevention (SSP) is disabled.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1567771200">-      Fixed an issues where work load logging tasks were not properly reported.
      * Fixed an issue where temperatures below 10 degree celsius were being shown as a high temperature.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1570708800">-</changelog>
  </package>
  <package pkgid="6d3c89d987a1c40f899f46ec6dfddf1ebac049332e183db3fa8b52922c2f981f" name="firmware-hdd-df22f7effd" arch="x86_64">
    <version epoch="0" ver="HPDB" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB" date="1500897600">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB" date="1500984000">-     *Problems Fixed:**
    
      * This firmware improves potential timeouts that could occur during the write error recovery process (causing the drive to internally reset), and corrects possible data mismanagement issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-2.1" date="1524657600">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPDB do not need to update to HPDB(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-2.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-3.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-3.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-3.1" date="1547467200">-      This firmware improves potential timeouts that could occur during the write error recovery process (causing the drive to internally reset), and corrects possible data mismanagement issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-4.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-4.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-5.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="d23a1b896ea4e17d99a81b87b7317aa907a8f4cbcce6e3ba1ff3efce9611b05f" name="firmware-hdd-e800e8d3b9" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1524657600">-      Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1524744000">-      This firmware has a change that allows the drive to meet the requirements for Microsoft Azure Stack certification.  It also includes a fix for an issue that could cause timeout errors during certain sequential write corner cases.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1547467200">-      This firmware includes a fix for slow performance during sequential write workloads with small queue depth.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="8dc3e1766879eec2f95b0a190ddf65c4cce9d6bb44357bb56851bcad651c8fb1" name="firmware-hdd-ec908c3650" arch="x86_64">
    <version epoch="0" ver="HPG8" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-2.1" date="1524571200">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.**
      * **Customers who already installed firmware version HPG5 do not need to update to HPG5 (B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-2.1" date="1524657600">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-2.1" date="1524744000">-      Added FW binary unencrypted</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-2.1" date="1534334400">-      This firmware updates the drive to indicate NDU compliance.
      * Fixed the issue of Online firmware update fails when drives are connected behind AHCI controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-3.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-3.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-3.1" date="1547467200">-      This firmware updates the drive to indicate NDU compliance.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-4.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-4.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-5.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="f422edeb84becb5e40c1a2954d5a75d06277394da9dec02123d40fff11c49edf" name="firmware-hdd-edf6dcd906" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1547467200">-      This firmware provides a drive command update that allows the drive to become fully ready before returning good status during the power up sequence.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1570017600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1570104000">-      Fixed an issue where drive usage was not being properly reported in the HPE Wear Gauge Utility</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1576756800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
  </package>
  <package pkgid="f5733bf89f2b7db493ca09dcbe047ec313bb1476fac75d8ae50c0413da039a2b" name="firmware-hdd-ee2b63de1d" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1569499200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1569585600">-      Includes the latest maintenance code enhancements.
      * Fixes the Sanitize command progress indicator.
      * Once the firmware is updated to HPG5, it cannot be downgraded back to HPG1.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-2.1" date="1572436800">-</changelog>
  </package>
  <package pkgid="28034536365737fa298f264ec470d1a3ade3f161f8f71e69b3d98d5d5e42119c" name="firmware-hdd-ef93133161" arch="x86_64">
    <version epoch="0" ver="HPD1" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1554292800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1554379200">-      Fix for a potential timeout.
      * Self-Test code is now logged in the correct location.
      * Fix for a potential error during error recovery.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-3.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="98646a0c4042c8695b72a4eb3da8be6fb98d5368cf8d84e2cc7d5299365ee55a" name="firmware-hdd-f0c91d2fe3" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1524657600">-      Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1524744000">-      This firmware changes some settings to comply with Microsoft Storage Spaces Certification requirements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1547467200">-      This firmware changes some settings to comply with Microsoft Storage Spaces Certification requirements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="b3184769ea514748a3fe546fab207438cbb0e13f16957b772a51ac1f501c5e08" name="firmware-hdd-f286f98973" arch="x86_64">
    <version epoch="0" ver="HPS8" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS8-3.1" date="1524657600">-      **Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or a ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager**
      * **Customers who already installed firmware version HPS8 do not need to update to HPS8(C).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS8-3.1" date="1524744000">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS8-4.1" date="1534248000">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPS8 do not need to update to HPS8(D).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS8-4.1" date="1534334400">-      Fixed the issue of Online firmware update fails when drives are connected behind AHCI controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS8-5.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS8-5.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS8-5.1" date="1547467200">-      HPS8 firmware release resolved a firmware timing issue which occurred during drive long self-test and resulted in a timeout condition that caused the drive to become unrecognized by the system.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS8-6.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS8-6.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS8-7.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="2f8241427f5fa46099f76d47e5806ef4cc5211b16be169a86b11fb2490685e71" name="firmware-hdd-f3faa195ff" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1477224000">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**
      * **Customers who already installed firmware version HPD5 do not need to update to HPD5 (B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1477310400">-     *Problems Fixed:**
    
      * Self-initiated reset during ATI (Adjacent Track Interference) mitigation issue, where the drive reported a 06/29/04 (Self-Initiated Reset) to the controller.  Then the controller would re-establish link with the drive and resend the command.
      * Servo miscalculations that resulted in degraded drive performance.
    
    **Problems Fixed for HPD5 (B):**
    
      * Component would fail to install drive firmware for drives present in a system configured with two or more external drive enclosures attached to an HP Host Bus Adapter H22x. The following message would be reported in the component log file - "Device appears more than once in tree". The drive firmware installation failure was not observed in configurations having only one external drive enclosure attached to an HP Host Bus Adapter H22x.
      * Component fails to update the firmware for drives connected behind an HP Smart Array P431 controller. Component reports the firmware update was successful. However, after a power cycle, the firmware version remains unchanged.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1513252800">-      Fixes a data integrity risk where stale data is mistakenly used from cache.
      * Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1547467200">-      Fixes a data integrity risk where stale data is mistakenly used from cache.
      * Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1563969600">-      Fixes a data integrity risk where stale data is mistakenly used from cache.
      * Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1564056000">-      Fixes a data integrity risk where stale data is mistakenly used from cache.
      * Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
  </package>
  <package pkgid="3983eeb5e1637ae1aad069f3344b37d9fd4467f2bfd8b63464bcc0d0d0da2f1e" name="firmware-hdd-f42438de3d" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1535544000">-      Fix to the error recovery algorithm to improve the overall reliability of the device.
      * Fix to insure complete support of internal logging during a sudden power off event which prevents the device entering into a degraded state.
      * Fixed a mishandling of error handling data during back ground media activities prevent a data issue.
      * Fix to  correct a buffer management timing issue internal to the device allowing for a more robust internal movement of data.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1547294400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1547467200">-      Fix to the error recovery algorithm to improve the overall reliability of the device.
      * Fix to insure complete support of internal logging during a sudden power off event which prevents the device entering into a degraded state.
      * Fixed a mishandling of error handling data during back ground media activities prevent a data issue.
      * Fix to  correct a buffer management timing issue internal to the device allowing for a more robust internal movement of data.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="ee03d67a621eaee1e9c88199c9e6c91063bb70df146b50eb73b25db63d6d8fe5" name="firmware-hdd-f6d00bd17e" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1547467200">-      Fixes the cause of internal reboots detected in the MSA system.
      * Removes a vendor unique sense code that the controller does not handle properly.
      * Includes changes to eliminate the cause of a potential hang condition.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="882cde3e5e520120335a030845d60b0e1b2d41edec135daba611c34cf641f132" name="firmware-hdd-fa46c607d6" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1496923200">-     *Problems Fixed:**
    
      * This firmware prevents asserts on a sequential write which can result in devices being lost from the configuration. It also preserves persistent reservation through downloads which prevents loss of performance.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1524571200">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1524657600">-      Added support for SmartRAID 3154-8e RAID controller.
      * Added support for HPE Smart Array P824i-p MR Gen10 Controller.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1524744000">-      This firmware allows the drive to meet the requirements for Azure Stack certification. 
      * This firmware contains a change to the reported drive serial number in VPD page 80. It will now report the same as is displayed on the drive label.  Any removed characters are replaced with blank place holders so the log format will not be changed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1547294400">-          * Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
        * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager
        * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1547467200">-      This firmware allows the drive to meet the requirements for Azure Stack certification. 
      * This firmware contains a change to the reported drive serial number in VPD page 80. It will now report the same as is displayed on the drive label.  Any removed characters are replaced with blank place holders so the log format will not be changed</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1563796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1563883200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1563969600">-</changelog>
  </package>
  <package pkgid="2e9c5d7993429c521f711167a6f061ba7b8912c1bb4d9c1ee90e6db95218649a" name="firmware-hdd-faf39e0ff7" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1556020800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1556107200">-      This firmware release provides a more graceful termination of certain commands and prevents a read/write command hang under an unusual timing condition when resuming from a suspend operation</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1563883200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1563969600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1564056000">-</changelog>
  </package>
  <package pkgid="469d9cf080331c50b72b7d26bc07c7f194fdbed4a1bec37246f2f07f20e5a6a8" name="firmware-iegen10" arch="x86_64">
    <version epoch="0" ver="0.2.1.2" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.1.2.6" date="1504785600">-     Added support for HPE Core Boost Technology.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.1.2.6" date="1504872000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where HPE Jitter support may not respond to configuration
    changes from the Integrated Lights-Out webpage.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.1.4.4" date="1510747200">-     None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.1.4.4" date="1510833600">-     *Important Notes:**
    
    This is a new release of HPE Gen10 Innovation Engine (IE) Firmware revision
    0.1.4.4. System ROM V1.26 must be installed prior to updating to IE FW
    0.1.4.4. This revision of the IE FW is required for updating the Intel
    Platform Service (SPS) Firmware revision 04.00.04.288 and later. It should be
    installed prior to updating to SPS FW 04.00.04.288 or later. SPS FW
    04.00.04.288 mitigates security vulnerability CVE-2017-5706
    (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and
    CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709).
    It is anticipated that details regarding these security vulnerabilities will
    be published to these links on November 20,2017. These security
    vulnerabilities are not unique to HPE servers.  
    
    **Firmware Dependencies:**
    
    System ROM V1.26  
    
    **Problems Fixed:**
    
    This is a new release of HPE Gen10 Innovation Engine (IE) Firmware revision
    0.1.4.4. System ROM V1.26 must be installed prior to updating to IE FW
    0.1.4.4. This revision of the IE FW is required for updating the Intel
    Platform Service (SPS) Firmware revision 04.00.04.288 and later. It should be
    installed prior to updating to SPS FW 04.00.04.288 or later. SPS FW
    04.00.04.288 mitigates security vulnerability CVE-2017-5706
    (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and
    CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709).
    It is anticipated that details regarding these security vulnerabilities will
    be published to these links on November 20,2017. These security
    vulnerabilities are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.1.5.2" date="1512993600">-     *Important Notes:**
    
     HPE Innovation Engine (IE) Firmware 0.1.4.4 has been removed from the web for
    the following reasons:
    
    1\. Systems could experience a rare issue where processor and memory
    temperatures stop reporting, resulting in increased system fan speeds. This
    issue is seen during a system reboot and is only recovered by another system
    reset. This issue did not exist with previous versions of the Innovation
    Engine Firmware.
    
    2\. Systems configured with Jitter Smoothing support could experience a rare
    issue where on a given boot the functionality does not function. Resetting the
    system typically corrects the issue. This issue did not exist with previous
    versions of the Innovation Engine Firmware.
    
    3\. Systems configured with the Intel Xeon Scalable 6143 Gold and 8165
    Platinum processors with HPE's Core Boosting support enabled could experience
    a rare issue where on a given boot the functionality does not function.
    Resetting the system typically corrects the issue. This issue did not exist
    with previous versions of the Innovation Engine Firmware.
    
    This is a new release of HPE Gen10 Innovation Engine (IE) Firmware revision
    0.1.5.2 to replace IE version 0.1.4.4. If updating from IE version 0.1.4.4,
    follow the installation notes. If updating from an IE version prior to 0.1.4.4
    please read the following note.
    
    System ROM V1.26 must be installed prior to updating to IE FW 0.1.5.2. This
    revision of the IE FW is required for updating the Intel Platform Service
    (SPS) Firmware revision 04.00.04.288 and later. It should be installed prior
    to updating to SPS FW 04.00.04.288 or later. SPS FW 04.00.04.288 mitigates
    security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-
    bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org
    /cgi-bin/cvename.cgi?name=2017-5709). The details regarding these security
    vulnerabilities were published to these links on November 20,2017. These
    security vulnerabilities are not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    System ROM V1.26 or later  
    
    **Problems Fixed:**
    
    Addressed an issue where systems configured with Innovation Engine Firmware
    0.1.4.4 could experience a rare issue where processor and memory temperatures
    stop reporting, resulting in increased system fan speeds. This issue is seen
    during a system reboot and is only recovered by another system reset. This
    issue did not exist with previous versions of the Innovation Engine Firmware.
    
    Addressed an issue where systems configured with Innovation Engine Firmware
    0.1.4.4 and Jitter Smoothing support could experience a rare issue where on a
    given boot the functionality does not function. Resetting the system typically
    corrects the issue. This issue did not exist with previous versions of the
    Innovation Engine Firmware.
    
    Addressed an issue where systems configured with Innovation Engine Firmware
    0.1.4.4 and the Intel Xeon Scalable 6143 Gold and 8165 Platinum processors
    with HPE's Core Boosting support enabled could experience a rare issue where
    on a given boot the functionality does not function. Resetting the system
    typically corrects the issue. This issue did not exist with previous versions
    of the Innovation Engine Firmware.
    
    **Known Issues:**
    
    This flash component will report the Current Revision of the Innovation Engine
    FW as "n/a" when updating the Innovation Engine FW. This does not affect the
    flash update or impact how the Innovation Engine FW operates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.1.6.1" date="1525780800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    System ROM V1.26 or later
    
    **Problems Fixed:**
    
    Addressed an issue where the Integrated Lights-Out (iLO) web interface may
    incorrectly report the Innovation Engine is running in a degraded state.
    
    Addressed an issue where memory telemetry data may not be reported properly in
    the Integrated Lights-Out (iLO) web interface or through the HPE RESTful API.
    
    Addressed an issue where the Innovation Engine Firmware flash would fail if a
    previous flash attempt was interrupted and not completed successfully.
    
    **Known Issues:**
    
    This flash component will report the Current Revision of the Innovation Engine
    FW as "n/a" when updating the Innovation Engine FW. This does not affect the
    flash update or impact how the Innovation Engine FW operates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.1.6.1-3.1" date="1544184000">-     *Important Notes:**
    
    Ver. 0.1.6.1(C) contains updates to the component packaging and is
    functionally equivalent to ver. 0.1.6.1.  It is not necessary to upgrade with
    Revision C if a previous component Revision was used to upgrade the firmware
    to version 0.1.6.1.
    
    **Firmware Dependencies:**
    
    System ROM V1.26 or later  
    
    **Problems Fixed:**
    
    Addressed an issue where the Integrated Lights-Out (iLO) web interface may
    incorrectly report the Innovation Engine is running in a degraded state.
    
    Addressed an issue where memory telemetry data may not be reported properly in
    the Integrated Lights-Out (iLO) web interface or through the HPE RESTful API.
    
    Addressed an issue where the Innovation Engine Firmware flash would fail if a
    previous flash attempt was interrupted and not completed successfully.
    
    **Known Issues:**
    
    This flash component will report the Current Revision of the Innovation Engine
    FW as "n/a" when updating the Innovation Engine FW. This does not affect the
    flash update or impact how the Innovation Engine FW operates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.0.11" date="1550059200">-     Added support for Intel Xeon Scalable Performance 3200, 4200, 5200, 6200 and
    8200 series processors.
    
    Added support for HPE system performance monitoring and workload performance
    advisor. This feature also requires Integrated Lights-Out (iLO) firmware
    version 1.40 or later.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.0.11" date="1550145600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where updates to the Intel Server Platform
    Services (SPS) firmware may fail.
    
    **Known Issues:**
    
    This flash component will report the Current Revision of the Innovation Engine
    FW as "n/a" when updating the Innovation Engine FW. This does not affect the
    flash update or impact how the Innovation Engine FW operates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.1.2-2.1" date="1562932800">-</changelog>
  </package>
  <package pkgid="fae77280b7b64ab72b6fa0bfa93aca8579378b69304da2ada1f4825a13848ae9" name="firmware-ilo4" arch="i386">
    <version epoch="0" ver="2.72" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60" date="1527595200">-     This version adds support for the following features and enhancements:
    
      * IPMI/DCMI over LAN access is disabled by default on new servers with iLO 4 2.60.
      * IPMI/DCMI over LAN access is disabled after you reset iLO 4 2.60 to the factory default settings. 
      * Each time iLO starts, it backs up the iLO configuration to the nonvolatile flash memory (NAND). If the SRAM is erased, the configuration is automatically restored.
      * Improved Active Health System logging efficiency to prolong the NAND lifespan. 
      * Added iLO health status to the Overview page. If the status is Degraded, this value is also displayed on the Login page.  
      * Added an SNMP trap for a power fault condition on Gen8 servers.
      * Added the list of open source licenses to the login page.  
      * Added a Format Embedded Flash and reset iLO button to the Diagnostics page. When directed by Hewlett Packard Enterprise support, you can use this feature to recover Active Health System functionality.
      * Re-signed the Java IRC to extend the certificate expiration date. 
      * Re-signed the .NET IRC to extend the certificate expiration date. 
        * With this enhancement, the .NET IRC requires version 4.5.1 or later of the .NET Framework.
      * Added the ability to remove a SSL certificate and regenerate the iLO self-signed certificate. 
        * Note: HPE recommends using a CA signed certificate.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60" date="1527681600">-     The following issues are resolved in this version:
    
      *  iLO 4 unexpectedly restored itself to factory default settings when an user did not initiate the process. 
      * When Auto Power-On is set to Always Power On to Restore Last Power State, the server might not power on after a cold reset. 
      * False nonvolatile flash memory (NAND) test failures might occur after a firmware upgrade.
      * Incorrect RAM and Storage values are displayed on the HPE OneView for VMware vCenter tab.
      * Remote Support disk events include the text "Not Available" for the variables when data is missing.
      * Some Power Supply information is missing from the iLO web interface.
      * iLO displays Failed status instead of Disabled status when the Smart Array Cache Module battery is disconnected.
      * An iLO SSH port disconnection issue was observed after more than two days of continuous operation.
      * Values do not move up when the preceding entries in the Directory User Context fields are cleared.
      * Boot failures might occur when booting with a MicroSD card in Legacy mode.
      * Changed the resolution of a Redfish SSD wear field to display in percentage.
      * The date and time settings are reset after a firmware update.
      * The server powers on instead of shutting down when multiple power-on requests are sent.
    
    SECURITY FIXES:
    
      For the latest security bulletins and vulnerabilities addressed in this
    version, please visit:  
      https://support.hpe.com/hpesc/public/home  
    
    Security best practices:
    
      Please refer to the HPE Integrated Lights-Out Security Technology Brief for
    the latest on security best practices at:  
      http://www.hpe.com/support/iLO4_security_en</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.61" date="1533470400">-     None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.61" date="1533556800">-     The following issues are resolved in this version:
    
      * Intermittent boot failures encountered when server boots from MicroSD card.
      * Fixed problem with AHS download that might have unreadable data for the current day.
      * iLO Web GUI sessions might not logoff at the end of timeout period.
      * Incorrect information displayed for Power Supply Bay in AHS viewer.
      * Licence hyperlink in Access Settings page of GUI leads to Page Not Found.
      * Unable to login to iLO CLI after setting iLO to factory defaults, requiring an additional iLO reset.
      * Unable to delete REST interface sessions with users having certain special characters.
      * SNMP may become unresponsive over a period of time.
    
    SECURITY:
    
      For the latest security bulletins and vulnerabilities, please visit:  
      https://support.hpe.com/hpesc/public/home  
    
    Security bulletins:
    
      * HPESBHF03866
    
    Security best practices:
    
      Please refer to the HPE Integrated Lights-Out Security Technology Brief for
    the latest on security best practices at:  
      http://www.hpe.com/support/iLO4_security_en</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62" date="1548676800">-      Resolved an issue where iLO could intermittently cause adapters to lose configuration after updating adapters to newer firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70" date="1557748800">-      HTML5 Remote Console
      * SNMP trap 18015 cpqNicAllLinksDown (all Links down on a network adapter)
      * Confirmation dialog box for Remote Console power button actions
      * New Key Manager software support: 
        * SafeNet AT KeySecure G350v 8.6.0 and later
        * Gemalto SafeNet KeySecure 8.9.0 and later
      * Active Health System updates: 
        * Support for the InfoSight Optimized Active Health System download.
        * iLO nonvolatile flash memory wear data logging.
      * Embedded remote support updates: 
        * Modified the Active Health System log filename used for Embedded Remote Support uploads.
        * Updated Embedded Remote Support service events for compatibility with Windows Server 2019.
      * Support for hyphens in the State and City or Locality boxes in Certificate Signing requests.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70" date="1557835200">-     The following issues are resolved in this version:
    
      * Linux or VMware systems only: An OS exception or memory corruption might occur when using the hpilo driver.
      * Automatic restoration of the iLO backup configuration does not work correctly.
      * Redfish calls with iLO 4 2.61 sometimes include an invalid UTF-8 character in the power supply part number.
      * The REST call "ilorest -d serverlogs --selectlog=IML --clearlog rc 255" fails when it should succeed.
    
    SECURITY:
    
      * HPESBHF03917
    
      For the latest security bulletins and vulnerabilities, please visit:  
      https://support.hpe.com/hpesc/public/home  
        
    Security best practices:
    
      Please refer to the HPE Integrated Lights-Out Security Technology Brief for
    the latest on security best practices at:  
      http://www.hpe.com/support/iLO4_security_en</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70-2.1" date="1564315200">-      HTML5 Remote Console
      * SNMP trap 18015 cpqNicAllLinksDown (all Links down on a network adapter)
      * Confirmation dialog box for Remote Console power button actions
      * New Key Manager software support: 
        * SafeNet AT KeySecure G350v 8.6.0 and later
        * Gemalto SafeNet KeySecure 8.9.0 and later
      * Active Health System updates: 
        * Support for the InfoSight Optimized Active Health System download.
        * iLO nonvolatile flash memory wear data logging.
      * Embedded remote support updates: 
        * Modified the Active Health System log filename used for Embedded Remote Support uploads.
        * Updated Embedded Remote Support service events for compatibility with Windows Server 2019.
      * Support for hyphens in the State and City or Locality boxes in Certificate Signing requests.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70-2.1" date="1564401600">-     The following issues are resolved in this version:
    
      * Linux or VMware systems only: An OS exception or memory corruption might occur when using the hpilo driver.
      * Automatic restoration of the iLO backup configuration does not work correctly.
      * Redfish calls with iLO 4 2.61 sometimes include an invalid UTF-8 character in the power supply part number.
      * The REST call "ilorest -d serverlogs --selectlog=IML --clearlog rc 255" fails when it should succeed.
    
    SECURITY:
    
      * HPESBHF03917
    
      For the latest security bulletins and vulnerabilities, please visit:  
      https://support.hpe.com/hpesc/public/home  
        
    Security best practices:
    
      Please refer to the HPE Integrated Lights-Out Security Technology Brief for
    the latest on security best practices at:  
      http://www.hpe.com/support/iLO4_security_en</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72" date="1568289600">-     The following issues are resolved in this version:
    
      \- iLO gets stalled when IPv4 static address is not assigned in an IPv6 only
    environment using Embedded Remote Support.  
      \- Embedded Remote Support crashes if more than 17 IP addresses are assigned
    to host network interface.  
      \- Embedded Remote Support is not reporting all host IP addresses in Service
    Events.</changelog>
  </package>
  <package pkgid="955411cb046bc9e326f54854c07d4411b7b6da40bdc0441ea622fe70374c2351" name="firmware-ilo5" arch="x86_64">
    <version epoch="0" ver="2.10" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.40" date="1548504000">-      Ability to edit Maintenance Windows in Firmware &amp; OS Software section
      * Added Password Complexity feature to Security &gt; Access Settings
      * Enable/disable for overlay video showing Server Health Summary
      * Downgrade Policy - Specifies how iLO handles requests to downgrade any of the firmware types that you can update through iLO. 
      * Virtual NIC functionality (disabled by default)
      * Enabled One-button Secure Erase via Intelligent Provisioning
      * LDAP/Directory settings configurable via Redfish
      * Security Dashboard - displays the status of important security features, the Overall Security Status for the system, and the current configuration for the Security State and Server Configuration Lock features.
      * Support for Gemalto SafeNet and SafeNet AT key managers
      * InfoSight Optimized AHS Download
      * Show NVMe wear level
      * Workload performance advisor: provides server tuning recommendations to improve server performance</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.40" date="1548590400">-     The following issues are resolved in this version:
    
      * User interface fixes and improvements
      * Fixed an issue where power supply status changes may be delayed
      * Device Inventory could display a parse error under Internet Explorer 11 when certain PCI Cards are installed
    
    SECURITY FIXES:
    
      * HPESBHF03907
    
    For the latest security bulletins and vulnerabilities, please visit:  
    &lt;https://support.hpe.com/hpesc/public/home&gt;  Security best practices:
    
    Please refer to the HPE Integrated Lights-Out 5 Security Technology Brief for
    the latest on security best practices at:  
    [http://www.hpe.com/support/ilo5-security-en](http://www.hpe.com/support/ilo5
    -security-enn)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.40-1.1" date="1548676800">-      Ability to edit Maintenance Windows in Firmware &amp; OS Software section
      * Added Password Complexity feature to Security &gt; Access Settings
      * Enable/disable for overlay video showing Server Health Summary
      * Downgrade Policy - Specifies how iLO handles requests to downgrade any of the firmware types that you can update through iLO. 
      * Virtual NIC functionality (disabled by default)
      * Enabled One-button Secure Erase via Intelligent Provisioning
      * LDAP/Directory settings configurable via Redfish
      * Security Dashboard - displays the status of important security features, the Overall Security Status for the system, and the current configuration for the Security State and Server Configuration Lock features.
      * Support for Gemalto SafeNet and SafeNet AT key managers
      * InfoSight Optimized AHS Download
      * Show NVMe wear level
      * Workload performance advisor: provides server tuning recommendations to improve server performance</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.40-1.1" date="1548763200">-     The following issues are resolved in this version:
    
      * User interface fixes and improvements.
      * The text "R&amp;D Server" is incorrectly displayed in the iLO web interface navigation pane.
      * Fixed an issue where power supply status changes may be delayed.
      * Device Inventory could display a parse error under Internet Explorer 11 when certain PCI Cards are installed.
      * Improved shared network port out-of-band LOM resuscitation to reduce the scope and the frequency of system power-on/power-off during systems shutdown/reboot.
      * iLO communication issues in certain configurations where a server is set to Auto-Power-On after an AC power cycle.
    
    SECURITY FIXES:
    
      * HPESBHF03907
    
    For the latest security bulletins and vulnerabilities, please visit:  
    &lt;https://support.hpe.com/hpesc/public/home&gt;  Security best practices:
    
    Please refer to the HPE Integrated Lights-Out 5 Security Technology Brief for
    the latest on security best practices at:  
    [http://www.hpe.com/support/ilo5-security-en](http://www.hpe.com/support/ilo5
    -security-enn)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.43" date="1548849600">-     This version adds support for the following features and enhancements:
    
    
    
     \- Added VLAN tagging support on iLO Dedicated NIC for non-blades.
    
    \- Modified the iLO auto-generated SNMP EngineID to not change upon iLO
    resets.
    
     \- Modified Embedded Remote Support (eRS) service events to properly report
    Windows 2019.
    
     \- Reduced the number of Redfish resource change events sent.   Removed
    watching of fields that
    
       change frequently.
    
    \- BIOS Admin password will NOT cause iLO to act as if Require Host
    Authentication is Enabled</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.43" date="1548936000">-     The following issues are resolved in this version:
    
    \- Fix for potential firmware use of system memory after free, which could
    lead to an OS exception or
    
       memory corruption under Linux or ESX when using hpilo driver.  It was not
    an issue for Windows.
    
     \- Fix so iLO 5 can connect to switch when both are set to 100 Full Duplex.
    
     \- Fixed REST call so that "ilorest -d serverlogs --selectlog=IML --clearlog
    rc 255" does not fail when
    
       it should succeed.
    
    \- Fixed problem with erroneously logging an IML event for "exceeding power
    capacity threshold" when
    
       it should not be logged.
    
     \- Modified time zone string for "Asia/Taipei" to "Beijing, Chongqing, Hong
    Kong, Urumqi, Taipei, Perth"
    
    \- Only send Remote Support type 1000 events for Critical IML events when they
    should be sent
    
    
    
    SECURITY FIXES:
    
    \- HPESBHF03917
    
      For the latest security bulletins and vulnerabilities addressed in this
    version, please visit:
    
      &lt;https://support.hpe.com/hpesc/public/home&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.45" date="1549022400">-     \- Fixed problem introduced in iLO 5 v1.43 which could cause an HTTP
    connection to be refused under high activity of REST calls.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.46" date="1549108800">-     None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.46" date="1549195200">-     Fixed potential problem of Gen10 Synergy server NIC port being down after
    complete Synergy frame power cycle.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10" date="1549281600">-     The following issues are resolved in this version:
    
      * The iLO clock incorrectly changes when iLO is reset due to a configuration change, firmware update, or a cause other than system power loss.
      * System GPUs might be listed without GPU version information.
      * Incorrect power consumption information is displayed in RIBCL output and the Active Health System Log.
      * If the domain name system is unavailable, an HPE ProLiant Gen10 Server might stop responding for up to three minutes during startup.
    
    Security Fixes:
    
      *   For information about the latest security bulletins and vulnerabilities addressed in this version, see the following website: &lt;https://support.hpe.com/hpesc/public/home&gt;.
    
    Security best practices:
    
      *   For the latest information about security best practices, see the HPE Integrated Lights-Out Security Technology Brief at the following website: &lt;http://www.hpe.com/support/ilo-docs&gt;.</changelog>
  </package>
  <package pkgid="5496f1d8ec03ca3eec49f938568be3f8a4d0d524f3626bbeb87188742164f9a9" name="firmware-nic-bcm-nxe" arch="x86_64">
    <version epoch="0" ver="1.7.6" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.7" date="1503403200">-     This product now supports Red Hat Enterprise Linux 7 Update 4.  
    This product now supports SUSE Linux Enterprise Server 12 SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.7" date="1503489600">-     This product corrects an issue where a prompt to save configuration changes is
    displayed when no changes have been made from the adapter's configuration
    menu.  
    This product addresses an issue where an adapter fails to boot to PXE with
    VLAN ID enabled.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.16" date="1515672000">-      This product corrects an issue where a user sees a 'Submit Fail for Form:' error message when attempting to load the default (F7) adapter settings.
      * This product corrects an issue where the user is prompted to save changes when no adapter configuration settings have been modified.
      * This product corrects an issue where an adapter's branding information is lost when a non-English language is selected for the 'System Utilities' (F9) menu.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.3.10" date="1526644800">-     This product corrects a link flap seen when updating NIC firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.3.56" date="1534075200">-     This product now supports SUSE Linux Enterprise Server 15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.3.56" date="1534161600">-     N/A</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.4.2" date="1541419200">-     This product now supports Red Hat Enterprise Linux 6 Update 10.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.5.11" date="1549022400">-     This product corrects an issue where adapters incorrectly send a NULL padded
    System Description LLDP (Link Layer Discovery Protocol) TLV.
    
    This product corrects an issue where an incorrect device (Network Controller)
    name is displayed in the RBSU.
    
    This product corrects an issue where adapters become Firmware corruption
    during rebooting.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4" date="1565611200">-     This product addresses an issue where firmware is corrupted during multiple
    system reboots.
    
    This product addresses an LLDP message issue where adapters send incorrect
    System Description, System Name, Chassis ID and Management Address.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.7.6" date="1573214400">-</changelog>
  </package>
  <package pkgid="a52edfbde54fc2859ad0fba0aaea4c59284cdcb00c7b69b68a6e1b963911f9a3" name="firmware-nic-broadcom" arch="x86_64">
    <version epoch="0" ver="2.24.2" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.19.6" date="1503403200">-     This product now supports Red Hat Enterprise Linux 7 Update 4.  
    This product now supports SUSE Linux Enterprise Server 12 SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.19.6" date="1503489600">-     This product addresses an issue where negative temperatures on the adapter are
    incorrectly displayed in Integrated Lights Out (iLO).  
    This product addresses an issue where an incorrect firmware image is landed on
    an adapter.  
    This product addresses an issue where an adapter's configuration menu doesn't
    correctly prompt for reboot after changes are made that require a reboot.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20.7" date="1515672000">-      This product corrects an issue where an adapter's configuration menu doesn't prompt for reboot after changes are made that require a reboot.
      * This firmware now correctly displays a progress bar information when updating the firmware via the 'Firmware Update' feature (under 'System Utilities-&gt;Embedded Applications').</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.21.3" date="1526644800">-     This product addresses an issue where the NIC Serial Number for the HPE
    Ethernet 1Gb 4-port 331FLR Adapter is not displayed in AHS.
    
    The firmware in this product  addresses an issue where the "Reboot Required"
    icon is not highlighted after a NIC firmware update (via System
    Utilities-&gt;Embedded Application-&gt;Firmware Update) completes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.21.58" date="1534075200">-     This product now supports SUSE Linux Enterprise Server 15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.21.58" date="1534161600">-     N/A</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.22.3" date="1541419200">-     This product now supports Red Hat Enterprise Linux 6 Update 10.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.23.10" date="1549022400">-     This product corrects an issue where the component fails to update adapter
    firmware when running on ESXi 6.7.  
    This product corrects an issue where an incorrect device (Network Controller)
    name is displayed in the RBSU.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.23.11" date="1559908800">-     This product corrects an issue where random PXE boot installation failures
    occur when booting in UEFI mode.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.24.2" date="1573214400">-</changelog>
  </package>
  <package pkgid="3f6773640b33ec9ff768746cd4d148c59145bceb70567e0c1077fa1bdf7b0448" name="firmware-nic-intel" arch="x86_64">
    <version epoch="0" ver="1.19.11" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.14.14" date="1519300800">-     This product addresses an issue where link flapping is seen when the 'HP
    Ethernet 10Gb 2-port 560FLB Adapter' is connected to 1Gb interfaces and
    operated at 1Gb speeds.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.15.9" date="1526644800">-     This product addresses a NIC VLAN ID issue seen in the NIC Human Interface
    Infrastructure (HII) menu when operating in UEFI mode.  
    This product addresses a teaming issue where the HPE Ethernet 10Gb 2-port 561T
    Adapter still shows connected on the switch after the NIC has been disabled.  
    This product addresses a link issue and a PXE issue seen with the HPE Ethernet
    10Gb 2-port 560FLB Adapter.  
    This product addresses a WOL issue seen with the HPE Ethernet 1Gb 4-port 366T
    Adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.15.56" date="1534075200">-     This product now supports SUSE Linux Enterprise Server 15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.15.56" date="1534161600">-     N/A</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.16.0" date="1541419200">-     This product now supports Red Hat Enterprise Linux 6 Update 10.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.17.17-2.1" date="1549368000">-     This product now supports the HPE Synergy 4610C 10/25Gb Ethernet Adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.17.17-2.1" date="1549454400">-     This product addresses a failure to update adapter firmware on a system
    running SUSE Linux Enterprise Server 15.  
    This product corrects an issue where the name for the HP Ethernet 1Gb 4-port
    366FLR Adapter is displayed incorrectly in the network boot options.  
    This product corrects an issue where the HPE Ethernet 10Gb 2-port 562FLR-T
    Adapter can be awakened when the NIC WOL setting is disabled.  
    This product corrects an issue where system hangs when booting from the PXE
    boot menu.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.18.7" date="1563796800">-     This product addresses an issue where shared memory settings are not preserved
    after a firmware update.
    
    This product addresses an issue where the Legacy VLAN ID isn't reset to 0
    while pressing F7 to reset to default.
    
    This product addresses an issue where, after a firmware update for the HPE
    Synergy 4610C 10/25Gb Ethernet Adapter, the server fails to power up due to
    thermal fault errors.
    
    This product addresses an issue where firmware update for all Intel adapters
    fails when the system contains an obsolete Intel adapter.
    
    This product addresses an issue where the MAC of the HPE Ethernet 10Gb 2-port
    562T Adapter is duplicated after applying the 09.2018 SPP.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.18.10" date="1563883200">-     This product corrects an issue where the default value of Legacy Noot Protocol
    isn't set to PXE with HP Ethernet 1Gb 4-port 366FLR Adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.19.11" date="1573214400">-     This product addresses an issue where LLDP are disabled.  
    This product addresses an issue where "Firmware Image Properties", "Device
    Level Configuration", and "Link Speed Status" options in NIC HII menu will
    disappear when F7 is pressed.  
    This product addresses an issue where Firmware upgrade fail in SLES15 with
    secureboot enabled.  
    This product addresses an issue where POST when ESC Is Pressed to Enter The
    BIOS Setup Utility with HP Ethernet 1Gb 4-port 366FLR Adapter.  
    This product addresses an issue where there is no VLAN function under Legacy
    mode.</changelog>
  </package>
  <package pkgid="b9c0f070d0f87180c9820b8c497eccf1877b6b0baf74571504f55302f5eac078" name="firmware-nic-intel-bl" arch="x86_64">
    <version epoch="0" ver="1.0.14" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.14" date="1573214400">-     This product addresses an issue where the "Firmware Image Properties," "Device
    Level Configuration," and "Link Speed Status" options in NIC HII menu
    disappear when F7 is pressed.</changelog>
  </package>
  <package pkgid="0fe973410fb2c66d5cded37e31cf307d2154db1ef1797045df709d31b32ddbea" name="firmware-nic-intel-opa-hfi" arch="x86_64">
    <version epoch="0" ver="1.9.2" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.8.1" date="1552305600">-     *Changes and New Features in version 1.8.1.0.0 :**
    
      * Added hfi1_eprom **v10_8_0_0_13.**
      * Loader ROM **HfiPcieGen3Loader_1.8.1.0.0.rom** and driver EFI **HfiPcieGen3_1.8.1.0.0.efi** were added.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.9.2" date="1559995200">-     *Following issues have been resolved in version 1.9.2:**
    
      * Due to a SLES 15 kernel setting, hfi1_eprom cannot work while the HFI driver is loaded. The tool and driver are mutually exclusive.</changelog>
  </package>
  <package pkgid="e55cfa81339453df62a0269d5dce98d86f0e60d9d2675dc1f151db8205ada769" name="firmware-nic-is-intel" arch="x86_64">
    <version epoch="0" ver="1.19.10" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.19.10" date="1573214400">-</changelog>
  </package>
  <package pkgid="eabe7d767ce8fcdbbbf258c492969226ac4c892d51698c721f2df632c6cca16e" name="firmware-nic-is-marvell-flq" arch="x86_64">
    <version epoch="0" ver="1.8.13" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.8.13" date="1573214400">-     TBD</changelog>
  </package>
  <package pkgid="6af54047aa4f27a17bc267aeba68e6da4eeab53a7cdcac90072ef24b10e2cd0f" name="firmware-nic-mellanox-ethernet-only" arch="x86_64">
    <version epoch="0" ver="1.0.11" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5-4.1" date="1504526400">-     *Fixes in 2.40.7000:**
    
      * Fixed a race between the firmware and the hardware during driver start which blocked outbound completions.
      * Fixed an issue which caused the firmware not to send link_down event to the driver when running the close_port command.
      * Fixed an issue where in rare cases the Auto Sense failed to detect the right protocol.
      * Fixed signal integrity issue when connecting a WCS ConnectX4 mezz card to Pikes peak FPGA..
      * Added the option to transmit corrupted DME pages for a very short period of time at the beginning of the Auto-Negotiation flow.
      * Fixed an incorrect report of the PortRcvDataVLExtended / PortXmitDataVLExtended counters by the firmware.
      * Fixed a rare issue which caused firmware's packet injector to cut off packets when the TX was congested.
      * Fixed an issue that caused the response to TX requests to take up to 10 mili-seconds in IEEE clause 72 Link Training.
      * Fixed a race between 2 iriscs which caused a QP to get stuck in burst control limit state.
      * When a QP was in error state, the firmware generated too many err CQEs at once, thus causing the cmdif responsiveness to be too slow. To prevent the above, the number of err CQEs was limited to 16 at a time.
      * Fixed an issue that caused the MAC address that was set from the OS using ifconfig to be not reflected in the OCBB buffer.
      * Fixed an issue where the ibdump got broken when running with loopback traffic.
      * Fixed an issue where the firmware took QP to firmware ownership and then released it to the hardware ownership without checking if another firmware flow owns the same QP.
      * Fixed an issue which occurred after disconnecting cable which showed the link type as IB even if the link type of the port is ETH.
      * Fixed an issue related to the HCA PoerXmitWait counter on port 2 (connected to port 2 on Switch-IB) where it started counting and reached 0xFF's regardless of connection to switch.
      * Fixed a completion error issue when ECN was enabled. The ECN usage caused ordering errors in completion queues (CQ).
      * Fixed the length calculation of UDP. The incorrect UDP length in the CNP packet caused miss-calculation of the ICRC.
      * Fixed a wrong returned status in cable info MAD when the cable was not connected
      * Fixed failure instances when initiating FLR in the Physical Function.
      * Disabled High Rate Steering mode in the INI to enable its compatibility with NC-SI over VLAN.
      * Fixed a default hardware configuration issue which caused RDP over IPv4 traffic to be dropped.
      * MLNX_OEM command GET_TEMP returned a wrong value in the max_temp field.
      * Fixed an issue which caused TX traffic to stop when the message MTU size was larger than QP.mtu.
      * Fixed an issue which caused NVCONFIG to fail when the number of sector was set to 1 and the sector was zeroed.
      * Fixed a race in handling a duplicated "read request from middle".
      * Fixed an issue which caused lack of IB traffic on SR-IOV VPI.
      * Fixed an issue which caused NVRAM to get stuck when it filled non-valid information in TLV.
      * Fixed an issue which caused an internal firmware error when APM changed the QPs port mapping. 
      * Fixed an issue which caused a firmware internal error when handling QP alternative context. 
      * Fixed an issue which caused packet transmission to get stuck when the software tried to send pause frames with dmac equal to one of the device's MAC addresses.
      * Fixed a wrong reporting of section 5 event 8 - LSO support.
      * Fixed a mistakenly dropped ETH packet with ethertype 0x600 by the NIC.
      * Fixed a case preventing broadcast traffic from arriving to their destination after detaching high priority broadcast rule on a port where NC-SI was enabled.
      * Fixed an issue where the port raised as SDR vs. InfiniScale IV QDR Switch
      * Fixed a rare case of completion Error with Bad Opcode sequence status which occurred when retransmitting read requests
      * Fixed a case where the actual bandwidth did not match the user settings in VM QoS.
      * Fixed a case where on rare cases, communication to BMC was lost during driver initialization.
      * Fixed an issue with cable reading, which caused the link not to raise.
      * Set the maximum EQN number to 1024.
      * Fixed a rare issue with VPD init flow which caused read failures.
      * Fixed an issue with RX size counter not being reported.
      * Fixed promiscuous mode compatibility with A0-DMFS steering.
      * Fixed promiscuous mode compatibility when NC-SI is enabled and configured.
      * Fixed sending/receiving OEM temp commands (set/get) with channel ID 0x1f failure.
      * Fixed an issue which caused packets to drop on a port when changing the interface state of the other port.
      * Fixed long management communication loss and SOL hang during reboot cycles.
      * Fixed wrong processing of inbound traffic towards BMC which caused communication loss.
      * Fixed management link loss upon closing port interface through the driver.
      * Fixed a false indication in firmware of an expander presence causing delay in EEPROM reading.
      * Fixed an issue which caused a link down on a port when the cable was removed from the other port.
      * Fixed a rare case where packet with length zero got stuck in hardware queues.
      * Fixed an issue which caused InfiniBand congestion control packet (CNP) to hang in hardware.
      * Fixed an issue which caused AEN to be sent after channel reset.
      * Fixed an issue which prevented the restoring of QoS setting to its default consequently causing bandwidth degradation.
      * Fixed an occasional long link up time with 10GbE based devices.
      * Fixed an issue preventing cable readings from i2c slave address 0x51
      * Fixed a wrong parity bit calculation when transmitting PCIe TS1 packets.
      * Fixed a possible deadlock in PM turnoff request transmission and ack acceptance flow.
      * Fixed a rare case with alignments state machines which caused occasional width degradation.
      * Fixed an issue where the transmit queues hanged while congestion control was enabled and operational (EQC/QCN)
      * Fixed an unexpected work completion syndrome with vendor syndrome 0x77 received when running RDMA SEN/WRITE traffic with retransmissions.
      * Fixed an issue which caused SetPortInfo to return a good status when receiving invalid LinkSpeedEnabled value.
      * Fixed an issue which caused dual port SFPP module cards to be automatically mapped with expander.
      * Fixed an issue where firmware overrides the steering mode that was chosen by the driver.
      * Fixed invalid return sensing results occurred when the link was up.
      * Fixed an issue causing the sensing result to be delayed when cable was unplugged.
      * Fixed an issue causing the link type to be displayed as ETH when set to AUTO.
      * Fixed an issue causing ARP not to reply when connected to Hyper-V vSwitch.
    
    **Fixes in 14.18.2030****:**
    
      * On rare occasions during UEFI boot cycles system got stuck while WinPE is loaded. (OS WinPE, system DL160).
      * Single FTE that catches both untagged and prio-tagged packets (by giving an FTE with match_value.vlan_tag = 0 and match_value.vid = 0) is currently not supported.
      * Flashing the firmware requires server reboot. Firmware cannot be flashed twice without server reboot after first flashing
      * If the vport state is DOWN and a packet is sent in local loopback, the sx_sniffer tool will not function.
      * Fixed an issue causing bubbles to appear as symbol errors when link raised FDR 1x.
      * When Clause 74 Fire-Code FEC is active, and there are FC corrected errors, both the FC_correctable counter and the FC_uncoreectable counter are increment.
      * Some Port Control Register do not return to the default value after the last port owner host restarts the driver.
      * Fixed an issue which caused RX to hang when the UDP packet had a reserved UDP destination port.
      * Fixed DMAC reporting mapping per host.
      * Fixed an EEH error from PCI which caused firmware to hang.
      * Fixed the default value of the PCIe target_link_speed to Gen3 in link control2.
      * Fixed an issue which prevented LEDs from blinking when the traffic was less than 0.1% of the link speed.
      * Fixed an issue which caused the mlxconfig configuration of VF_LOG_BAR_SIZE to be ignored and to be set to 5 (32MB).
      * A server getting into a Standby mode while Packet-Pacing is enabled might cause firmware to hang and driver call-trace.
      * Fixed an issue which caused unexpected QoS functionality in case of multiple sources to single destination traffic transmission.
      * Fixed an issue which occasionally caused the RX traffic to hang in DC when received a PCI error on WQE fetch.
      * Fixed OOB connection issue during Intel's ITP inject errors test.
      * Fixed an issue which prevented MAC address changes by to driver to be reflected in the OBCC and NC-SI interfaces.
      * Added protection from IOPX thermal diode destabilization to prevent UEFI IPv6 PXE boot failure on ConnectX-4 Lx 25GE cards.
      * Fixed an issue which caused a link down in Port 2 when unplugging the cable from Port 1.
      * In some cases, a Bit Error Rate is not optimal on 10G/40G links.
      * Instability of Link Training Flow occurs during 100G Auto-Negotiation.
      * Fixed a rare issue which caused the command to hang when moved the QP to RESET and back to RTS.
      * Improved RDMA READ bandwidth under packet lost scenario.
      * Added support for pnat = 1 in HCA access_reg command as required by the ibdiagnet tool.
      * Fixed the LLDP OCBB response: return value is now ascii.
      * Fixed a very rare NMI issue during PXE cycles.
      * Increased the steering hash tables static size from 128 to a maximum of 32K entries.
      * Prevented miscalculation of module temperature when using 100Gb/s cables (OPN: MFA1A00-Cxxx for 100GbE).
      * Reduced one hop for Unicast RX steering, steering pipes balancing.
      * Non-volatile configuration of Port Type TLV more than 50 times might cause system hang.
      * Enabled RoCE IPv4 Multicast. This prevents MCG command from failing when an IPv4 is mapped to an IPv6 address.
      * If the PF driver or the tool (e.g. ethtool) use PAOS DOWN command (e.g. by ifconfig down or ip link set down), loopback traffic is blocked for all functions on this port (PF&lt;-&gt;VFs / VF&lt;-&gt;VF) In Multihost loopback, the traffic will be blocked once the firmware receives the PAOS down command from all PFs. However, the loopback traffic will not be blocked when the port is down  due to the physical link (for example: cable plugged out, switch port down).
      * Fixed a 25G and 50G link issue when Clause 91 RS FEC was active.
      * Added a missing invalidation of eSwitch cache upon FLR which caused the upcoming driver load to either fail or not to be able to transmit.
      * Fixed a UEFI IPv6 PXE boot failure on ConnectX-4 Lx 25GbE OCP card.
      * Fixed an issue which prevented Vport counters from counting local loopback packets. Packets now are filter by the self-loopback prevention.
      * Reported INTx as unsupported to allow PFs Passthrough on PowerKVM.
      * SR-IOV Ethernet supports up to 18 VFs per port only.
      * Fixed and incident what allowed local (internal) loopbacked packets to be counted by the Vport counters, although Vport counters should count only traffic that crosses the Vport.
      * Fixed an issue preventing driver loading or TX traffic sending upon reboot, after ungraceful driver unload.
      * Fixed casting of BMC MAC before steering API.
      * Fixed the PCI write flow to take into consideration the PCI MTU. This fix eliminates the need for NOPs in the flow, which resulted from PPC larger PCI MTU.  
    The single queue limitation for READ is due to a hardware limitation of the
    number of READ request in a given time.
    
      * Fixed a case that caused FlexBoot to not work as expected with systems that run with "large bar" enabled (Above 4G Decoding) over Connect-IB or ConnectX-4 HCAs.
      * Fixed an issue which prevented link creation when connected to IXIA 25G.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1519905600">-     *Firmware for the following devices are updated to 2.42.5000:**  
      
    779799-B21 (HP Ethernet 10G 2-port 546FLR-SFP+ Adapter)  
    779793-B21 (HP Ethernet 10G 2-port 546SFP+ Adapter)
    
    **New features and changes in version 2.42.5000:**
    
      * Added support for the following features: 
        * TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
      * Enhanced the debug ability for command timeout cases.
      * Added a new field to "set port" command which notifies the firmware what is the user_mtu size.
    
    **Firmware for the following devices are updated to 14.21.2800****:**
    
    817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)  
    817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)
    
    **New features and changes in version 14.21.2800:**
    
      * Query vPort Environments (Debug Counters) - Debug counters are a group of counters that handle traffic performance issue related to firmware overhead in transport flow. The following are the additional counters added to this firmware version: 
        * current_q_under_processor_handle
        * total_q_under_processor_handle
        * qp_priority_update_flow</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1519992000">-     *Fixes submitted in version 2.42.5000:**
    
      * The PortRcvPkts counter was prevented from being cleared after resetting it.
      * Fixed an issue which caused a system Time Out on the configuration cycle of the VFs when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than  
    16 msec.
    
      * Fixed an issue that caused the server to hang and result in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * Fixed an issue in flow_steering where BMC could not receive a ping over IPV6 after running bmc_reboot.
      * Fixed an issue while closing the HCA, where RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * Fixed an issue where the masterSM LID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * Fixed an issue that prevented ibdump from capturing all MADs packets.
      * Fixed an issue that prevented the link to go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Fixed an issue that caused NC-SI not to work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes submitted in version 14.21.2800:**
    
      * Fixed an issue that caused QP connection timeout due to firmware not being able to handle duplicate packets with AckReq bit set. The fix stopped ignoring duplicate AckReq packets to avoid timeout on the sender side.
      * MPFS load balance (DUP_MAC_ACTION==LOAD_BALANCE(1)) is not working as long as IB_ROUTING_MODE/SRIOV_IB_ROUTING_MODE is configured to LID.
      * Fixed an issue that caused a SX engine deadlock (the SX engine handles software port/priority changes for a specific Send Queue) when more than a single SX engine handled the "prio diff" flow simultaneously, thus caused the hardware to get stuck.  
    The issue happened as the firmware releases the SX engine and waits for
    various operation to complete. However, due to a race that allows a different
    transaction to get into the SX engine and cause the lock to be taken by it,
    the SX engine release is prevented.
    
      * Fixed an issue that caused the system to hang while changing QPTS/QPDPM/QPDP parameters during traffic.
      * Fixed unfairness between senders in RoCE LAG while ECN is configured.
      * Fixed an issue which displayed diagnostic counters only on the adapter that was initialized first, which is the counters' owner. The owner received correct values, while the other adapter only received zeros.
      * Fixed an issue that caused the rdma_cm traffic to fail on the 2nd port when more than 32 VFs were configured, when the RoCE Dual Port vHCA (a.k.a Multi-Port vHCA: MPV) feature was enabled.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8-2.1" date="1526817600">-     *Firmware for the following devices are updated to 2.42.5000:**  
      
    779799-B21 (HP Ethernet 10G 2-port 546FLR-SFP+ Adapter)  
    779793-B21 (HP Ethernet 10G 2-port 546SFP+ Adapter)
    
    **New features and changes in version 2.42.5000:**
    
      * Added support for the following features: 
        * TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
      * Enhanced the debug ability for command timeout cases.
      * Added a new field to "set port" command which notifies the firmware what is the user_mtu size.
    
    **Firmware for the following devices are updated to 14.22.1414 :**
    
    817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)  
    817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)
    
    **New features and changes in version 14.22.1414:**
    
      * Transition from 4MB to 7M Firmware Image Banks.
      * **Software Reset Flow:** Software detection of a fatal error, automatic creations of an mstdump file for future debug by the software, and resetting of the device.
      * **Steering Discard Packet Counters:** The following counters were added to count the discard packets (per vport) 
        * nic_receive_steering_discard
        * receive_discard_vport_down
        * transmit_discard_vport_down
      * **Virtual Functions (VF): **Increased the number of VFs that can work with full VMQoS (8 TC) per PFs as follow 
        * in dual port devices to 20 VFs
        * in single port devices to 58 VFs
      * Increased the Pause Frame Duration and the XOFF Resend Time to the maximum value defined by the specification.
      * **PCI Relax Ordering:** mlxconfig configuration can now enable or disable forced PCI relaxed ordering in mkey_context.
      * **vport Mirroring:** Packets are mirrored based on certain mirroring policy. The policy is set using the "set FTE command" that supports forward action in the ACL tables (ingress/egress).
      * **Resiliency: Special Error Event: **Added support for 10GBaseT modules connected to a QSFP cage.
      * Accelerated QP's creation time.
      * SR-IOV default routing mode is now LID based. The configuration change is available via mlxconfig tool.
      * Added PXE and UEFI to additional ConnectX-4 Lx adapter cards. ConnectX-4 Lx now holds PXE, x86-UEFI and Arm-UEFI.
    
    **Firmware for the following device is updated to 12.22.1414 :**
    
    868779-B21 (HPE Synergy 6410C 25/50Gb Ethernet Adapter)
    
    **New features and changes in version 12.22.1414:**
    
      * Transition from 4MB to 7M Firmware Image Banks.
      * **Software Reset Flow:** Software detection of a fatal error, automatic creations of an mstdump file for future debug by the software, and resetting of the device.
      * **Steering Discard Packet Counters:** The following counters were added to count the discard packets (per vport) 
        * nic_receive_steering_discard
        * receive_discard_vport_down
        * transmit_discard_vport_down
      * **Virtual Functions (VF): **Increased the number of VFs that can work with full VMQoS (8 TC) per PFs as follow 
        * in dual port devices to 20 VFs
        * in single port devices to 58 VFs
      * Increased the Pause Frame Duration and the XOFF Resend Time to the maximum value defined by the specification.
      * **PCI Relax Ordering:** mlxconfig configuration can now enable or disable forced PCI relaxed ordering in mkey_context.
      * **vport Mirroring:** Packets are mirrored based on certain mirroring policy. The policy is set using the "set FTE command" that supports forward action in the ACL tables (ingress/egress).
      * **Resiliency: Special Error Event: **Added support for 10GBaseT modules connected to a QSFP cage.
      * Accelerated QP's creation time.
      * SR-IOV default routing mode is now LID based. The configuration change is available via mlxconfig tool.
      * Added PXE and UEFI to additional ConnectX-4 Lx adapter cards. ConnectX-4 Lx now holds PXE, x86-UEFI and Arm-UEFI.
    
    
    
    **Firmware for the following device is updated to 16.22.1414 :**
    
    874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)
    
    **New features and changes in version 16.22.1414:**
    
      * Transition from 4MB to 7M Firmware Image Banks.
      * **Software Reset Flow:** Software detection of a fatal error, automatic creations of an mstdump file for future debug by the software, and resetting of the device.
      * **Steering Discard Packet Counters:** The following counters were added to count the discard packets (per vport) 
        * nic_receive_steering_discard
        * receive_discard_vport_down
        * transmit_discard_vport_down
      * Increased the Pause Frame Duration and the XOFF Resend Time to the maximum value defined by the specification.
      * **PCI Relax Ordering:** mlxconfig configuration can now enable or disable forced PCI relaxed ordering in mkey_context.
      * Added support for Push/Pop VLAN, new FLOW TABLE ENTRY actions. These new actions are used by the driver to implement Q-in-Q functionality.
      *  Packet Pacing in ConnectX-5 adapter cards.
      * **vport Mirroring:** Packets are mirrored based on certain mirroring policy. The policy is set using the "set FTE command" that supports forward action in the ACL tables (ingress/egress).
      * **Resiliency: Special Error Event: **Added support for 10GBaseT modules connected to a QSFP cage.
      * Accelerated QP's creation time.
      * SR-IOV default routing mode is now LID based. The configuration change is available via mlxconfig tool.
      * Added PXE and UEFI to additional ConnectX-4 Lx adapter cards. ConnectX-4 Lx now holds PXE, x86-UEFI and Arm-UEFI.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8-2.1" date="1526904000">-     *Fixes submitted in version 2.42.5000 :**
    
      * The PortRcvPkts counter was prevented from being cleared after resetting it..
      * System Time Out on the configuration cycle of the VFs when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hung and resulted in NMI (Non-maskable interrupt) when run-ning "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a differ-ent thread). In this case, the downstream bridge over the device reported completion timeout error. 
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA (Host Channel Adapters), RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * Link could not go up after reboot.
      * A rare issue caused the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions. 
      * NC-SI (Network Controller Sideband Interface) did not work when adding the disable_stat-ic_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes submitted in version 14.22.1414 :**
    
      * A temperature normalization function calculation issue. Now the cable gain that is not pure integer is taken into account was fixed.
      * An issue related to the parser of object 0x8 in ASN that caused different structure in response was fixed.
      * Added the option to avoid unintentionally powering off the backplane port cage upon reboot when in standby mode.
      * An issue that caused the driver to return a wrong logical OR of the 2 physical ports, when querying the vport state when the LAG was enabled wre fixed.
      * Increased the Full Wire Speed (FWS) threshold value to improve EDR link results.
      * An issue that resulted in "Destroy LAG" command failure if a VFs received an FLR while its affinity QPs were open.
      * When RoCE Dual Port mode is enabled, tcpdump is not functional on the 2nd port.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9-2.1" date="1548158400">-     *Firmware for the following devices are updated to 2.42.5044 :**
    
       779799-B21 (HP Ethernet 10G 2-port 546FLR-SFP+ Adapter)  
       779793-B21 (HP Ethernet 10G 2-port 546SFP+ Adapter)
    
    **Firmware for the following device is updated to 12.23.8036 :**
    
       868779-B21 (HPE Synergy 6410C 25/50Gb Ethernet Adapter)
    
    **Firmware for the following devices are updated to 14.23.8052 :**
    
       817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)
    
    **Firmware for the following devices are updated to 14.23.8036 :**  
       817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)
    
    **Firmware for the following device is updated to 16.23.8036 :**
    
       874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)
    
    **New features and changes in version 12.23.8036 , 14.23.8036 and 16.23.8036 :**
    
      * Implemented DCi specification v.0.80. The specification defines the NIC behavior in case of restore factory default while the NIC does not support AUX power.
      * Added support for Abstract Syntax Notation One(ASN1) defaults v3.0 and NIC Discovery Configuration v.0.81
      * Added support for Management Component Transport Protocol (MCTP) over PCI.
      * Added support for Event Description Addendum 2.6.4.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9-2.1" date="1548244800">-     *Fixes submitted in version 2.42.5044 :**
    
      * Fixed an issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode
    
    **Fixes submitted in version 12.23.8036 :**
    
      * Fixed a Phase-Locked Loop(PLL) tuning issue by improving the tx_clk_phase lock mechanism.
      * The Link Layer Discovery Protocol(LLDP): Removed management MAC 0 address once a new address is received
      * Set the Port ID to be the MAC of the port
    
    **Fixes submitted in version 14.23.8052:**
    
      * The HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter was not linking in AUX power mode.
    
    **Fixes submitted in version 16.23.8036 :**
    
      * Fixed an Active Health System(AHS) packet over PCIe interface issue</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1562155200">-     *Firmware for the following devices are updated to 2.42.5044 :**
    
       779799-B21 (HP Ethernet 10G 2-port 546FLR-SFP+ Adapter)  
       779793-B21 (HP Ethernet 10G 2-port 546SFP+ Adapter)
    
    **Firmware for the following device is updated to 12.24.9000 :**
    
       868779-B21 (HPE Synergy 6410C 25/50Gb Ethernet Adapter)
    
    **Firmware for the following devices are updated to 14.24.9006 :**
    
       817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)
    
    **Firmware for the following devices are updated to 14.24.9000 :**  
       817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)
    
    **Firmware for the following device is updated to 16.24.9000 :**
    
       874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)
    
    **New features and changes in version 14.24.9000  :**
    
      * Implemented DCi specification v.0.80. The specification defines the NIC behavior in case of restore factory default while the NIC does not support AUX power.
      * Added support for Abstract Syntax Notation One(ASN1) defaults v3.0 and NIC Discovery Configuration v.0.81
      * Added support for Management Component Transport Protocol (MCTP) over PCI.
      * Added support for Event Description Addendum 2.6.4.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1562241600">-     *Fixes submitted in version 2.42.5044 :**
    
      * Fixed an issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode
    
    **Fixes submitted in version 14.24.9006:**
    
      * The HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter was not linking in AUX power mode.
    
    **Fixes submitted in version 16.24.9000 :**
    
      * Fixed an Active Health System(AHS) packet over PCIe interface issue</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1562328000">-     *Fixes submitted in version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **Fixes submitted in version 14.26.1040:**
    
      * A function was misbehaving when a PCIe TLP was set with a poisoned indication.
      * The "destroy mkey " command was getting stuck when rebooting the hypervisor.
      * The total firmware reset time is increased by 1 second.
    
    **Fixes submitted in version 16.26.1040:**
    
      * On rare occasions, when firmware coalesce Host stuck events occur, a async event might be delayed to be reported, and not be triggered until the next time the PCIe hangs on one of the hosts.
      * Unexpected queue pairs transitioned to error in lossy tests.
      * Limited the maximum amount of dumps created on a PF.
      * Renamed the GMP Mellanox Vendor Specific External Capability mask enum from IsDiagnosticCountersSupported to IsDiagnosticDataSupported.
      * Stability issues with RDMA over Converged Ethernet (RoCE) retransmissions under stress were affecting Zero-Touch-RoCE.
      * Fixed an issue that caused a function to misbehave when a PCIe Transaction Layer Packet (TLP) was set with a poisoned indication.
      * Large number of packets dropped when running Jumbo frames with TTL rewrite.
      * Limited the number of the elements in the Quality of Service (QoS) tree 2K.  
    Note: Creating more than 250 Vport_tc for every TC is not allowed.
    
      * Queue Pair (QP) flow query was always taking port 1, Firmware will now reply the proper port, 1 or 2, for the dual port RoCE net device.
      * The nack counters constantly reported as "0".
      * In a rare scenario when the driver is executing the "2err" command and the QP is in Send Queue (SQ) drain state, the firmware might post event of broken Work Queue (WQ) instead of sending error Completion Queue Element (CQEs) on all the Work Queue Entry (WQEs).</changelog>
  </package>
  <package pkgid="9bb2e822ad922a1ee2608c253d106bb0bc5305f036b8ea7298780637f95c4b1d" name="firmware-nic-mellanox-ib-cx4-cx5" arch="x86_64">
    <version epoch="0" ver="1.0.4" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.0" date="1519905600">-     *Firmware for the following device has been updated to 12.21.1000:**
    
    843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)
    
    **New features and changes in version 12.21.1000:**
    
      * Added support for the following features: 
        * InfiniBand native (No SR-IOV) dual port device (Function per port is disabled). In this mode virtualization is not supported and ISSI = 0.
        * 10G/40G on 100GbE AOC/transceivers vs. non Mellanox devices.
      * PTP packets time stamping is enabled upon packet's arrival to the port.
      * Explicit Congestion Notification (ECN) is enabled by default for all priorities on Ethernet ports.
      * DC CNAK improves sent CNAK performance and avoids back pressure in ConnectX-4 adapter cards.
      * Receiver Signal Integrity Improvements: 
        * Raised the link only with phase greater than 15 ticks to improve signal integrity.
        * Extended measurement test between two similar RX configurations.
        * Moved the data path to use the second input buffer to improve signal integrity.
      * RDMA over Converged Ethernet (RoCE) Dual Port Mode enables the usage of a dual port Virtual HCA (vHCA) to share RDMA resources (e.g., MR, CQ, SRQ, PDs) across the two Ethernet (RoCE) NIC network ports and display the NIC as a dual port device. For this feature to function properly, the following requirements must be met: 
        * Either the LAG or the Dual Port mode is enabled by the driver.
        * Dual port device: both ports must be set as ETH.
        * In ConnectX-4/ConnectX-4 Lx adapter cards, the maximum allowed number of VFs per PF is 32.
        * Function per port is enabled.
      * QPDPM register is added to support dynamic mapping between DSCP and priority.
      * Trust level for QoS prioritization is added according to the DSCP or PCP.
      * Ingress buffer management is added for: 
        * ingress traffic mapping to a buffer according to priority.
        * buffers sizes and lossless parameters.
      * Enhanced steering rules update rate to up to 50K rules per second.
      * Enabled Windows single root input/output virtualization (SR-IOV) Enhanced eIPoIB (without Secure Connection) for Windows-over-Windows setups.
      * crdump operation takes a snapshot of the device's crspace dword-by-dword. It enables the driver to collect debug information upon firmware failure.
      * Secure Firmware Updates provides devices with the ability to verify digital signatures of new firmware binaries, in order to ensure that only officially approved versions are installed on the devices.
      * Changed the default Forward Error Connection (FEC) mode for cables with attenuation 16 and below from Reed Solomon (RS) to FC.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.0" date="1519992000">-     *Fixes in version 12.21.1000:**
    
      * RDMA_CM driver was causing the Queue Pair (QP) Rate Limit to be activate unexpectedly and reduce the bandwidth significantly on this QP.
      * Low throughput when Eplicit Congestion Notification (ECN) was enabled in a many-to-one scenario.
      * A rare issue that caused the firmware to hang.
      * The maximum temperature in a setup was incorrectly reported as the current temperature regardless of the actual temperature.
      * Virtual Addressing Capability incorrect report in NC-SI (Sideband).
      * Enhanced RX sensitivity per Vcore.
      * Disabled the option to write to the protected modules to avoid receiving NACK upon module initialization.
      * Enabled cold_flicks reset when sending invalidate_all command to invalidate all the ECs.
      * SR-IOV min &amp; max rate limiter can only support up to 64 Virtual Functions (VFs) per port.
      * Explicit Congestion Notification (ECN) did not function as expected when the number of QPs &gt; ~500 per host.
      * When using Unreliable Datagram (UD) RDMA over Converged Ethernet (RoCE) multicast traffic over SR-IOV, packets were scattered to all the attached QPs in the e-sw (PF and its VFs) and not only on the vport that was specified in the e-se FDB.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.2" date="1524139200">-     *Firmware for the following devices are updated to 12.22.4030:**
    
    825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)  
    825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)
    
    **New features and changes in version 12.22.4030:**
    
      * **AS Notify:** AS Notify enables IBM's Power CPU architecture to boost performance by allowing the hardware to issue light weight "interrupts" to replace the traditional MSI interrupts.
      * **Dump Me Now (DMN):** Dump Me Now (DMN) generated dumps and traces from various components that are crucial for offline debugging. Once an issue is discovered, the dumps can provide useful information about the NIC's state at the time of the failure
      * Added support for DSCP mapping on QP RTS2RTS.
      * **Port Enable:** When set, the device supports emulating link down for all the associated functions using "ICMD_SET_VIRTUAL_PARAMETERS - Set Device Virtual Parameters".
      * **mlxfwreset:** Reduced and accelerated the mlxfwreset loading time of the firmware update flow.
      * **Virtual Functions (VF):** Increased the number of VFs that can work with full VMQoS (8 TC) per PFs as follow: 
        * in dual port devices to 20 VFs
        * in single port devices to 64 VFs
      * Extended the retry counter (extended_retry_count) to up to 255 instead of 7.
    
    **Firmware for the following devices are updated to 16.22.4030:**
    
    879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)  
    872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 841QSFP28 Adapter)
    
    **New features and changes in version 16.22.4030:**
    
      * **AS Notify:** AS Notify enables IBM's Power CPU architecture to boost performance by allowing the hardware to issue light weight "interrupts" to replace the traditional MSI interrupts.
      * **Dump Me Now (DMN):** Dump Me Now (DMN) generated dumps and traces from various components that are crucial for offline debugging. Once an issue is discovered, the dumps can provide useful information about the NIC's state at the time of the failure
      * Added support for DSCP mapping on QP RTS2RTS.
      * **Port Enable:** When set, the device supports emulating link down for all the associated functions using "ICMD_SET_VIRTUAL_PARAMETERS - Set Device Virtual Parameters".
      * **mlxfwreset:** Reduced and accelerated the mlxfwreset loading time of the firmware update flow.
      * **Virtual Functions (VF): **Increased the number of VFs that can work with full VMQoS (8 TC) per PFs as follow: 
        * in dual port devices to 20 VFs
        * in single port devices to 64 VFs
      * Extended the retry counter (extended_retry_count) to up to 255 instead of 7.
      * Added support for striding RQ in InfiniBand.
      * **QoS "Rate Limit":** Added support to limit the transmission rate of individual InfiniBand port Service Levels. This capability is configurable through a new vendor-specific MAD (QosConfigSL).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.2" date="1524225600">-     *Fixes in firmware version 12.22.4030 and 16.22.4030:**
    
      * In rare cases, where the width of the receiver's electrical eye is narrow, the link might raise with BER lower than 10^-12.
      * LRO timeout configuration is now taken from the TLV configuration instead of the static defined values.
      * Added a filter to ignore module temperature reads below -40C and above 125C.
      * Closed the vport as part of the fast teardown flow, to prevent Ack to be sent without been scatter to memory.
      * A rare scenario where the PERST# de-assertion arrived at a specific critical time period was handled.
      * Temperature normalization function calculation issue. Now the cable gain that is not pure integer is taken into account.
      * The parser of object 0x8 in ASN that caused different structure in response.
      * An issue that caused MSIX interrupt lost while the HCA performed an FLR was handled.
      * An issue that caused a race condition between the firmware boot process and the MSIX access from the PCIe, which resulted in lost writes into the MSIX vector was fixed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.3" date="1552219200">-     *Firmware for the following devices are updated to 12.24.1000:**
    
    843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)
    
    **Firmware for the following devices are updated to 16.24.1000:**
    
    872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)  
    872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)
    
    **Changes and New features in firmware version 12.24.1000 and 16.24.1000:**
    
      * Added support for the following: 
        * An additional layer (Layer 3) of packet processing at the hypervisor level that enables adding and removing protocol headers (e.g., the MAC address is removed during encapsulation, and added during decapsulation) for the encapsulated traffic.
        * Transmission histogram counter set as part of the Ethernet extended group counters.
        * TX steering rule on flow_table_metadata in WQE Ethernet segment.
        * Added L3 encapsulation/decapsulation support in the reformat context allocation. 
          * L3 encapsulation removes L2 headers and adds generic L3 tunnel encapsulation.
          * L3 decapsulation removes the generic L3 tunnel decapsulation and L2 header.
        * Flow steering header modification (header rewrite) for IPv4 TTL header for loopback traffic (VF-VF/VF-PF).  
    Note: TTL modification for traffic from the network is currently not
    supported.
    
        * Requester QP packet based on E2E credits mode. The new flow control supports HCA-to-switch RDMA traffic packet-based End-2-End.
        * IPoIB non-default Partition Keys (PKeys). Now the PKey values can be modified in the PKey table without the need of recreating the IPoIB (underlay) QPs.
        * [Beta] SR-IOV in Multi-Host/Socket-Direct.
        * QUERY_DRIVER_VERSION command. This command allows the PF driver to query its VFs driver version which was set by the SET_DRIVER_VERSION command.
        * New diagnostic counters to evaluate the number of ICMC hits and misses for particular resources.
      * Enabled the hardware to generate an event upon counter incrementation, in order to reduce an overhead from the software from reading rarely updated counters such as error counters.
      * Enabled NOIDNIC connectivity to the network through the e-switch and not directly to the physical port.
      * Enabled setting the QP and the Mkey values by the software upon these resources creation.
      * Enabled advanced PCIe atomic operations. The HCA will perform PCIe atomic operations as a requestor towards the host memory when receiving compatible atomic messages from the network, and according to the configuration of NV_SW_OFFLOAD_CONFIG pci_atomic_mode field and the PCI AtomicOp Requester Enable bit in the Device Control 2 register.
      * Enabled TTL modification in the Rx NIC steering. When modifying the TTL in the Rx NIC, the CQE checksum will not recalculated automatically.  
    Note: TTL modification in the FDB for traffic from the network is currently
    not supported.
    
      * Enabled a single TIR destination from the FDB.
      * Changed the WRED default mode to OFF for Multi-Host adapter cards.
      * [Developers only] Moved the fast teardown HCA cap bit to offset 0x1c.4:1.
      * Enabled Virtual Functions to read QPDPM/QPDP/QPTS.
      * Multi PCI RDMA IB: This capability enables the user to expose two PCI/IB devices per network port.
      * Reduced firmware's memory consumption to increase the supported number of VFs per PF to up to 100.
      * Shutting Down RDMA QPs with Excessive Retransmissions is a mechanism used to detect excessive retransmissions for an RC connection, and to close the connection in response to it. If the number of retransmissions due to a Local Ack Timeout, NAK-Sequence Error, or Implied NAK, during a specified period, exceeds the specified threshold, the QP will be handled as if the IB spec defined Retry Count was exceeded.
    
    **New features in firmware version 12.24.1000:**
    
      * Enabled e-switch steering rule in the NIC without matching it with the Directional MACs (DMAC) protocol. Now the rule is only according to the MC/UC bit.
      * The IB Sniffer utility provides the user the ability to capture the e-switch traffic directly to a hypervisor queue.
      * Increased the number of VFs that can work with full VMQoS (8 TC) per PFs as follow: 
        * in dual port devices to: 0-21, 33-45 VFs (22-32 VFs has single TC)
        * in single port devices to: 0-64 VFs
    
    **New features in firmware version 16.24.1000:**
    
      * Enabled QoS ETS for systems with 64 VFs to better allocate bandwidth in the NIC.
      * Enabled TTL modification for received packets.
      * Mirrors the traffic from/to one VF to a dedicate admin VF for monitoring and traffic analysis. Note that in this process packets are duplicated and different packet modifications apply to different duplications.
      * Enabled TTL modification in the Rx NIC steering. When modifying the TTL in the Rx NIC, the CQE checksum will not recalculated automatically.  
    Note: TTL modification in the FDB for traffic from the network is currently
    not supported.
    
      * Added support for Dynamically Connected Transport (DC) in RoCE in ConnectX-5 adapter cards.
      * Enabled Rx mini-CQE compressed format for striding RQ.
      * Enabled TX steering rule on the application meta-data from the WQE. This functionality implements meta-data Reg A steering and meta-data Reg A and Reg B rewriting.
      * Added MPLS over UDP and MPLS over GRE protocols for tunneling offload/steering match criteria.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.3" date="1552305600">-     *Fixes in version** **12.24.1000 and 16.24.1000:**
    
      * mlxconfig tool reported all possible expansion ROM images, instead of presenting only the existing images.
      * Modifying VMQoS rate limiter parameters during traffic caused transmission failure.
      * Aligned the default tuning type in PHY TEST MODE to the device protocol.
      * When a device is operating in Safe Mode state, and the user issues the mlxfwreset command, the device might fail to come-up correctly after the reset.  
    Note: Do not run mlxfwreset when operating in a Safe Mode state.
    
      * Fixed an issue related to PCIe "Surprise link down" event reporting capability.
      * Fixed an issue that resulted in the link partner experiencing false active linkup when plugging in a base-T cable to a closed port.
    
    **Fixes in version** **12.24.1000:**
    
      * Fixed an issue that caused the max_qp_retry_freq_exceeded counter (including a CQE with error syndrome 0x97, and the QP moving to error state) to be activated only after exceeding the NIC Vport context max_qp_retry_limit, and not when reaching it.
    
    **Fixes in version** **16.24.1000:**
    
      * PCIe bifurcation issue.
      * Deadlock in RX related to the "send-invalidate" flow, resulted in RX getting stuck.
      * Rare errors in RX that resulted in double completion.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1560081600">-     *Fixes submitted in version 12.26.1040:**
    
      * IPoIB could not to function when there were Dynamically Connected Transport (DC) CNAK Queue Pairs (QPs) active.
      * On rare occasions, when firmware coalesce Host stuck events occur, a async event might be delayed to be reported, and not be triggered until the next time the PCIe hangs on one of the hosts.
      * Renamed the GMP Mellanox Vendor Specific External Capability mask enum from IsDiagnosticCountersSupported to IsDiagnosticDataSupported.
      * Fixed an issue that caused a function to misbehave when a PCIe Transaction Layer Packet (TLP) was set with a poisoned indication.
    
    **Fixes submitted in version 16.26.1040:**
    
      * On rare occasions, when firmware coalesce Host stuck events occur, a async event might be delayed to be reported, and not be triggered until the next time the PCIe hangs on one of the hosts.
      * Unexpected queue pairs transitioned to error in lossy tests.
      * Limited the maximum amount of dumps created on a PF.
      * Renamed the GMP Mellanox Vendor Specific External Capability mask enum from IsDiagnosticCountersSupported to IsDiagnosticDataSupported.
      * Stability issues with RDMA over Converged Ethernet (RoCE) retransmissions under stress were affecting Zero-Touch-RoCE.
      * Fixed an issue that caused a function to misbehave when a PCIe Transaction Layer Packet (TLP) was set with a poisoned indication.
      * Large number of packets dropped when running Jumbo frames with TTL rewrite.
      * Limited the number of the elements in the Quality of Service (QoS) tree 2K.  
    Note: Creating more than 250 Vport_tc for every TC is not allowed.
    
      * Queue Pair (QP) flow query was always taking port 1, Firmware will now reply the proper port, 1 or 2, for the dual port RoCE net device.
      * The nack counters constantly reported as "0".
      * In a rare scenario when the driver is executing the "2err" command and the QP is in Send Queue (SQ) drain state, the firmware might post event of broken Work Queue (WQ) instead of sending error Completion Queue Element (CQEs) on all the Work Queue Entry (WQEs).</changelog>
  </package>
  <package pkgid="ede99a2c5d1605c5c9aa1d59941be6cade4bc0abff19b2587b2fc67c8fd122f4" name="firmware-nic-mellanox-nic-mft" arch="x86_64">
    <version epoch="0" ver="1.0.1" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.0" date="1560427200">-     *Firmware for the following device is updated to 14.24.9000 :**
    
    P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)
    
    **Changes and New features in firmware version 14.24.9000 :**
    
      * Changed the firmware version string format in the HII from xx.yy.vv.zz to xx.yy.zzzz.
      * Enabled Firmware Management protocol installation on the Controller handle instead of the child handle.
      * The MTU value is set to 1500 upon driver bring up.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.0" date="1560513600">-     *Fixes in version** **14.24.9000**
    
      * Fixed an issue that prevented the first iSCSI target parameters to be reset to their default values.
      * Fixed an issue which cause the link not to raise in the second port which was set as IB when the first port was ETH in PXE.
      * Fixed wrong default value of Boot-To-Target in FlexBoot configuration.
      * When connecting a pre-configured port with VLAN to an IB fabric, the port runs as Ethernet port with the VLAN tag.
      * Booting PXE using Grub2.X over HP G9/G8 servers results in system hang.
      * If the client gets "PXE boot menu" when contacting the DHCP, it will PXE boot first regardless of the boot priority.
      * If the PMM fails to allocate memory, the system hangs since FlexBoot cannot load from the expansion ROM.
      * In ConnectX-4, the PXE boot time measurement over TFTP Ethernet was 1:30 min for image size of 1GB, TFTP InfiniBand was 1:20 min, and iSCSI boot time measurement was 8 seconds for image size of 25 MB.
      * In hybrid BIOSes, if the BIOS loads legacy driver without closing the UEFI driver, the legacy driver fails to load.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.1" date="1562328000">-     *Fixes in version** **14.26.XXXX :**
    
      * Fixed an issue that caused a function to misbehave when a PCIe Transaction Layer Packet (TLP) was set with a poisoned indication.
      * Fixed a rare issue that resulted in "destroy mkey " command getting stuck when rebooting the hypervisor.
      * The total firmware reset time is increased by 1 second.</changelog>
  </package>
  <package pkgid="2a9eeb5326f1409f299ed095cc3368b513cdfeb1076c9d6510ce5d61f342a9da" name="firmware-nic-open-mellanox-eth-mft" arch="x86_64">
    <version epoch="0" ver="1.0.0" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.0" date="1573387200">-     *Fixes in version 14.26.2000 :**
    
      * Enabled the option to prevent clock and capture CPLD GPIOs glitch upon firmware reset.
    
    **Fixes in version 14.26.1040 :**
    
      * Fixed an issue that caused a function to misbehave when a PCIe Traffic Light Protocol(TLP) was set with a poisoned indication.
      * Fixed a rare issue that resulted in "destroy mkey " command getting stuck when rebooting the hypervisor.
    
    **Fixes in version 16.26.2000 :**
    
      * Enabled the option to prevent clock and capture CPLD GPIOs glitch upon firmware reset.
      * Fixed an issue that slowed the firmware flows when executing many destroy XRQ commands on an XRQ that supported DC transport service.
      * Fixed an issue that caused performance degradation when working in dual-port devices under bidirectional traffic stress.
    
    **Fixes in version 16.26.1040 :**
    
      * On rare occasions, when firmware coalesce Host stuck events occur, a async event might be delayed to be reported, and not be triggered until the next time the PCIe hangs on one of the hosts.
      * Fixed an issue that resulted in unexpected queue pairs transitioned to error in lossy tests.
      * Limited the maximum amount of dumps created on a Physical Function(PF).
      * Renamed the GMP Mellanox Vendor Specific External Capability mask enum from IsDiagnosticCountersSupported to IsDiagnosticDataSupported.
      * Fixed a stability issue in RoCE retransmissions under stress affecting Zero-Touch-RoCE.
      * Fixed an issue that caused a function to misbehave when a PCIe TLP was set with a poisoned indication.
      * Fixed an issue that caused large number of packet to drop when running Jumbo frames with Time to live (TTL) rewrite
      * Limited the number of the elements in the QoS tree 2K. Creating more than 250 Vport_tc for every TC was not allowed
      * Fixed the query QP flow. Instead of always taking port 1, FW will now reply the proper port, 1 or 2, for the dual port RDMA over Converged Ethernet(RoCE) net device.
      * Fixed an issue that caused the nack counters to constantly be reported as "0". 
      * In a rare scenario when the driver was executing the "2err" command and th Queue pair(QP) was in SQ drain state, the firmware might post event of broken Work Queue (WQ) instead of sending error CQEs on all the WQEs.</changelog>
  </package>
  <package pkgid="002a9a4905dab9ed062da7ef615104a1127fa8eb72fad0b2d77dfa702bf9bc18" name="firmware-nic-qlogic-flq" arch="x86_64">
    <version epoch="0" ver="1.8.12" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.14" date="1503489600">-     This product addresses an issue where the Wake-On-Lan setting on the second
    port isn't correctly enabled when the network adapter's configuration settings
    are restored to default in the 'System Utilities' (F9 on POST) under the
    'System Configuration' menu.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.3.12" date="1515672000">-      This product addresses an issue where the inlet temperature is incorrectly reported.
      * This product addresses an issue where the Wake-On-LAN setting is not properly set on the second port after the defaults are restored.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.4.24" date="1526644800">-      This product corrects an issue where booting to Preboot eXecution Environment (PXE) may not work after applying the OneView server profile when the System ROM is set to 'Legacy BIOS Mode'.
      * This product addresses an issue where the FCoE boot parameters cannot be configured in the adapter's configuration menu (under 'System Utilities'-&gt;'System Configuration' menu) when OneView profile with connections set to 'manually managed' is applied to the system.
      * This product corrects an issue where certain settings/changes (CHAP, boot mode etc) in the OneView server profile are not reflected in the adapters' configuration menu (under 'System Utilities'-&gt;'System Configuration' menu) after applying the OneView server profile.
      * This product corrects an issue where the virtual World Wide Port Name(WWPN)/World Wide Node Name(WWNN) are not programmed properly when applying the OneView server profile.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.4.65" date="1536321600">-     This product now supports SUSE Linux Enterprise Server 15.
    
    This product now supports the following network adapters:
    
      * HPE Synergy 4820C 10/25Gb Converged Network Adapter
      * HPE StoreFabric CN1200R-T Converged Network Adapter
      * HPE StoreFabric CN1300R Converged Network Adapter</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.5.0" date="1541419200">-     This product now supports Red Hat Enterprise Linux 6 Update 10.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.27" date="1549022400">-     This product corrects an issue where the WWPN information is missing in an
    adapter's FCoE configuration menu (under 'System Utilities'-&gt;'System
    Configuration' menu).  
    This product corrects an issue where server hangs during POST when a network
    adapter is connected to the HPE Synergy 20Gb Interconnect Link Module.  
    This product corrects an issue where the initiator does not stay logged into
    the target in an FCoE connection.  
    This product corrects an issue where the link status continues to show as UP
    on the switch side even after a network adapter is disabled in the OS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.50" date="1559563200">-     This product now supports the HPE Ethernet 10Gb 2-port 524SFP+ Adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.7.16" date="1565524800">-     This product now supports the HPE Synergy 6820C 25/50Gb Converged Network
    Adapter.
    
    This product now allows modification of the settings under the 'Port Level
    Configuration' sub-menu under the adapter's configuration menu (located at
    'System Utilities'(F9 at POST)-&gt;'System Configuration') when OneView Profile
    with 'manage manually' option is applied to the server.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.7.16" date="1565611200">-     This product corrects an issue where the firmware update fails when the first
    port is disabled on the network adapter.
    
    This product corrects an issue where not all devices are discovered as part of
    firmware update on a multi-root-complex platforms like Integrity, Superdome
    etc.
    
    This product corrects an issue where the system hangs during POST with red
    screen when iSCSI boot LUN is re-exported (after a previous unexport
    operation) from the iSCSI host (HPE 3PAR StoreServ Storage).
    
    This product corrects an issue where 'HPE Synergy 4820C 10/20/25Gb Converged
    Network Adapter' disappears after changing its link speed under its
    configuration menu (located at 'System Utilities'(F9 at POST)-&gt;'System
    Configuration').
    
    This product corrects an issue where the configuration settings of the
    adapter, connected to a server managed by OneView profile, may be reset to
    defaults after a system reboot.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.8.12" date="1573214400">-     This product addresses an issue where 2nd port reports "function type:
    disabled" with HPE Ethernet 10Gb 2-port 524SFP+ Adapter.</changelog>
  </package>
  <package pkgid="f200d54b50f74e690cdf54bc080feb1d2cde4ae35bc9522c6653a1ccccb1bcb8" name="firmware-nic-qlogic-nx2" arch="x86_64">
    <version epoch="0" ver="2.26.7" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20.5" date="1510660800">-     This product addresses an issue where the users see the error message "Server
    profile settings conflict with the server hardware configuration" in OneView
    when applying the Server Profile to a server with VMware (ESXi 6.x).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.21.15" date="1515585600">-      The default 'Boot Retry Count' has been increased from 'No Retry' to '6.'
      * Configuration settings are now localized.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.21.15" date="1515672000">-      This product corrects an issue where the Maximum Transmission Unit (MTU) setting value reverts to the default value after a system reboot.
      * This product corrects an issue where an adapter's configuration menu doesn't correctly prompt for reboot after changes are made that require a reboot.
      * This product corrects a high latency issue seen during high ping activity.
      * This product corrects an issue where OneView displays the error message "Server profile settings conflict with the server hardware configuration" when applying the server profile to a server running VMware ESXi 6.x.
      * This product corrects an issue where the iSCSI settings configured in the OneView Profile are not correctly applied to the adapter.
      * This product corrects an issue where an error message is seen when entering the 'MBA Configuration Menu' under the adapter's settings (under the 'System Utilities-&gt;System Configuration' menu) and attempting to restore the defaults. 
      * This product corrects an issue where the iSCSI multipath does not work correctly in 'Legacy BIOS Mode'.
      * This product corrects an issue where the virtual World Wide Port Name(WWPN)/World Wide Node Name(WWNN) are not programmed properly when applying the OneView Server Profile.
      * This product addresses an issue where the user sees the error message "Unable to find a FibreChannel boot source for server" in OneView when applying the Server Profile with Fibre Channel network paths configured.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.22.15" date="1526644800">-     This product corrects an issue where users may see an error message when they
    attempt to restore the adapter's configuration settings to defaults by
    pressing F7 under the 'System Utilities-&gt;System Configuration' menu.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.22.56" date="1534161600">-     This product now supports SUSE Linux Enterprise Server 15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.23.0" date="1541419200">-     This product now supports Red Hat Enterprise Linux 6 Update 10.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.24.15" date="1549022400">-     This product corrects an issue where a server does not boot via a network
    adapter in Legacy BIOS Mode.  
    This product corrects an issue where a server, across repeated reboots, is
    unable to boot into iSCSI LUN.  
    This product corrects an issue where a firmware update performed in UEFI fails
    when multiple adapters are connected to the system.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.24.16" date="1560945600">-     This product addresses an issue where the network adapter doesn't properly
    report increased temperatures, causing potential system shutdown.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.25.10" date="1565611200">-     This product corrects an issue where the link status is not updated
    immediately to the switch when network adapter interface is brought down in
    the Operating System.
    
    This product corrects an issue where not all devices are discovered as part of
    firmware update on a multi-root-complex platforms like Integrity, Superdome,
    etc.
    
    This product corrects an issue where the system hangs with red screen when
    attempting to update the firmware via 'Firmware Update' feature under the
    'System Utilities &gt; Embedded Applications' menu.
    
    This product corrects an issue where a firmware update fails.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.26.7" date="1573214400">-     This product addresses an incorrect local sequence number in the Link Layer
    Discovery Protocol (LLDP).
    
    This product addresses an issue where boot mode is not restored to the default
    value after a factory reset.</changelog>
  </package>
  <package pkgid="5cc7e450461183774dec2e5edd17af75ec30c6d42667c82b7bbe96eed01fbf24" name="firmware-nic-qlogic-nx2-bl" arch="x86_64">
    <version epoch="0" ver="1.0.9" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1573214400">-     This product addresses an incorrect local sequence number in the Link Layer
    Discovery Protocol (LLDP).
    
    This product addresses an issue where boot mode is not restored to the default
    value after a factory reset.
    
    This product addresses an issue where the F1 help messages "Number of VFs per
    PF" and "Legacy Boot Protocol" option display incorrectly in Japanese and
    Simplified Chinese languages.</changelog>
  </package>
  <package pkgid="77f622082b58f6280760f518ecac659ec8e5fa4b5e847594ffe14f5832ce0e9a" name="firmware-nvdimm-16gb" arch="x86_64">
    <version epoch="0" ver="1.04" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.04" date="1504785600">-     Initial release.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.04" date="1504872000">-     Initial release.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.04-1.1" date="1538740800">-     Initial release.</changelog>
  </package>
  <package pkgid="4a5f19e80bc335b6dccc616973d96d8a087213a5a0a8cc8b04b895704d0debd0" name="firmware-nvmebackplane" arch="i386">
    <version epoch="0" ver="8.4" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 8.4" date="1473768000">-     Initial release.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 8.4-2.1" date="1496232000">-      Updated to support Service Pack for ProLiant version 2017.07.0
    
              **Note:** If version 8.4 was previously installed, then it is not necessary to upgrade to version 8.4 (B).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 8.4-3.1" date="1515672000">-      Updated to support Service Pack for ProLiant version 2017.07.0
    
              **Note:** If version 8.4 was previously installed, then it is not necessary to upgrade to version 8.4 (C).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 8.4-4.1" date="1521115200">-</changelog>
  </package>
  <package pkgid="9fc4e927a95afc9f85de4c2ce36a7ff671c3494ff3651d2ed012db8211a5cf25" name="firmware-nvmebackplane-gen10" arch="x86_64">
    <version epoch="0" ver="1.20" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.18" date="1496750400">-     Initial release.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20-2.1" date="1503403200">-     Note: After running this component to update the NVMe Backplane PIC firmware,
    a server reboot is required for iLO to display the new NVMe Backplane PIC
    firmware version on iLO's Firmware Information page</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20-2.1" date="1503489600">-     Added support for the following Gen10 servers:
    
      * HPE ProLiant XL190r Gen10 Server
      * HPE ProLiant XL170r Gen10 Server
      * HPE ProLiant DL180 Gen10 Server
      * HPE ProLiant DL160 Gen10 Server
      * HPE ProLiant DL580 Gen10 Server
      * HPE ProLiant ML350 Gen10 Server
      * HPE ProLiant XL450 Gen10 Server
      * HPE ProLiant DL120 Gen10 Server</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20-3.1" date="1514980800">-     Note: After running this component to update the NVMe Backplane PIC firmware,
    a server reboot is required for iLO to display the new NVMe Backplane PIC
    firmware version on iLO's Firmware Information page</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20-3.1" date="1515067200">-     Added support for the following Gen10 server:
    
      * HPE ProLiant XL270d Gen10 Server</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20-4.1" date="1528545600">-     Note: After running this component to update the NVMe Backplane PIC firmware,
    a server reboot is required for iLO to display the new NVMe Backplane PIC
    firmware version on iLO's Firmware Information page</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20-4.1" date="1528632000">-     The following support was added in version 1.20(C). No new features were added
    in version 1.20(D).
    
      * Added support for the HPE ProLiant XL270d Gen10 Server</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20-4.1" date="1528718400">-     Firmware Package version 1.20(D) addressed the following issue:
    
      * When using OneView, attempts to upgrade firmware from version 1.18 to 1.20 failed.
    
    Note: If the target device was previously updated to firmware version 1.20, it
    is not necessary to apply firmware update 1.20(D).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20-5.1" date="1540641600">-</changelog>
  </package>
  <package pkgid="84c71e833604f593aa6903b5e505640d0d7c598d47bc3cb8bef612cf4d0add65" name="firmware-oa" arch="x86_64">
    <version epoch="0" ver="4.95" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.70" date="1496318400">-     *General**
    
      * Addressed an issue where OA "update iLO all" command fails in an enclosure with maximum Blades.
      * Addressed an issue where a Warning Alert  was wrongly sent when a fan is reseated in an enclosure
      * Addressed an issue where the port mapping information for 560M Izzy adapter Mezz controller was not displayed correctly.
      * Addressed an issue where Remote Syslog logging would fail when OA failover happened in an IPv6 only environment.
      * Enhanced OA to bring the server from a power throttled state back to normal power state upon an OA reboot to circumvent an unwarranted emergency brake.
      * Fixed an issue where the Active and Standby OAs can have the same IP address in some rare situations.
      * Resolved an issue where a Gen9 server's host name gets cleared when the blade is rebooted.
      * Addressed an issue where server blade Power ON will be delayed in enclosures with OA Firmware Version 4.60 and managed by HPE OneView, when the OA module is reset until OneView refreshes the servers.
    
    **Security**
    
    The following security vulnerabilities were fixed:
    
      * CVE-2016-5387- Addressed a vulnerability which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request.
      * CVE-2016-2183- Addressed a vulnerability against TLS ciphers with 64bit block size in which makes it easier for remote attackers to obtain cleartext data via an attack against a long-duration encrypted session
      * CVE-2016-6515 - Addressed a vulnerability in OpenSSH which did not limit password lengths for password authentication, which allows remote attackers to cause a denial of service via a long string.
      * CVE-2015-8215 - Addressed a vulnerability IPv6 stack which does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service.
      * Addressed issue where in Onboard Administrator was vulnerable to Buffer overflow.
      * Added the HSTS[HTTP strict transport security] support  in OA.
      * Addressed a memory corruption vulnerability in the post-authentication sshd process.
    
    **Issues and workarounds**
    
    **Browsers**
    
      * OA GUI is not accessible in Chrome versions 43.0.2357.10 to 44.0.2383.The issue was caused by a "regression" in Chrome (or WebKit). Customers should use an alternative browser like Firefox or Internet Explorer or try a different version of Chrome.
      * SSO-to-iLO connection from the OA using an iLO host name fails with Microsoft Internet Explorer11 on Windows 8.On a Windows 8 system with Internet Explorer 10 or Internet Explorer 11, if the OA web GUI session is loaded using a host name instead of an IP address, an attempt to open an iLO window using SSO from the OA web GUI might result in the iLO page loading in the OA web GUI window instead of the intended new window. This issue was determined to be a bug in Internet Explorer and is expected to be fixed in a future release or update for Internet Explorer. To work around this issue, either use an IP address to load the OA Web GUI, or turn off Protected Mode for the appropriate zone in Internet Explorer's settings. This issue occurs only on Internet Explorer browsers.
    
    **FIPS**
    
    Certificates smaller than 2048 bits in size are not compliant with FIPS
    requirements as enforced by the OA firmware starting with OA 4.20. When the OA
    running OA firmware version 4.40 or greater is operating in FIPS Mode ON/DEBUG
    and is configured with a 1024-bit LDAP certificate that was installed when
    running a previous version of OA firmware, FIPS Mode ON/DEBUG is considered to
    be operating in a degraded state due to the presence of the non-compliant
    certificate. While operating in this FIPS-Degraded Mode operational state,
    attempts to set FIPS Mode OFF from the OA GUI Network Access&gt;FIPS tab will
    fail and show the error message The selected FIPS mode is already enabled.
    When the non-compliant certificate is removed, the FIPS-Degraded operational
    status is cleared, FIPS Mode can then be successfully set to OFF from the GUI
    interface. Note that the OA CLI command SET FIPS MODE OFF can be successfully
    used to set FIPS Mode OFF even with non-compliant 1024-bit LDAP certificates
    installed in the OA.
    
    **IRC**
    
    Unable to open .net IRC console for Gen10 Blades, Gen9 Blades also have the
    same issue. The Java applet and Webstart however, loads but the virtual media
    mounting fails. The work around is to launch the IRC through IRC Application
    (HP Lights-Out Stand Alone Remote Console) which is installed on terminal
    client.
    
    **EFM **
    
    To use EFM on Gen 10 Blades, please select options/filters "_Make Bootable ISO
    file" and _"_Enclosure Firmware Management"_ while creating custom SPP ISO on
    HPSUM 8.0.0. Please refer to HPSUM 8.0.0 User guide for further details.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.71" date="1516017600">-     Onboard Administrator 4.71 provides support for the following enhancements:
    
    ** Security **
    
         CAC Feature: The authentication mechanism in Onboard Administrator has been enhanced to support DoD  
         Common Access Card Personal Identification Verification devices. This feature enhances security by  
         supporting multi factor authentication and below are the core elements of the new Authorization mechanism  
         listed below:
    
      * During Authentication (occurs during SSL session establishment): Verifying revocation status using Online  
    Certificate Status Protocol (OCSP) or Offline Certificate Revocation List
    (CRL).
    
      * During Authentication (after SSL session establishment): The certificate's Subject Alternate Name (SAN)  
    or the Subject is validated against the User Principal Name (UPN) of the
    corresponding principal in Active Directory.
    
      * It is important to note that the local user accounts in OA are disabled in CAC mode.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.71" date="1516104000">-     *Security**
    
    The following security issues were fixed:
    
      * Removed the support to generate keys with SHA1 in FIPS mode, as per the latest FIPS standards SHA1 is no longer allowed.
      * Removed the support for 1024 DH primes in FIPS mode, as per the latest FIPS standards.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.80" date="1516190400">-     Onboard Administrator 4.71 provides support for the following enhancements:
    
    **Hardware additions**
    
      * BL460c Gen 10.
      * HPE 10GbE Pass-Thru Module.
      * Qualified support for HPE Integrity BL8x0c i6 Server Blade.
    
    Features**: additions and changes**
    
    **General**
    
      * Added support for Gen 10 Server and iLO5 features.
      * Added support for the enhanced KVM functionality in iLO5
      * Added support for HTTP boot option in the server boot options
      * Add support for HPE 10GbE Pass-Thru interconnect module.
      * Added support for HPE Integrity BL8x0c i6 Server Blade.
      * GUI, CLI, Smart components, help files, URLs, and product names rebranded to align with HPE branding guidelines.
      * Added a new SNMP trap to indicate that the power redundancy is restored in the enclosure.
      * Enhanced "SHOW ENCLOSURE TEMP" command output, to display the temperature readings like Current, Caution and Critical temperature threshold values for interconnect modules.
      * Added a provision to make sysName field to be set to DNS host name for the traps sent from Onboard Administrator.
    
    ** Security **
    
      * Adding support for CNSA approved algorithms and a new security mode - TOP_SECRET.
      * Added the ability to Enable/Disable cipher/protocol in FIPS OFF mode.
      * Added support for secured communication between HPE Embedded Remote Support functionality and the HPE Support Datacenters with the use of SHA-2 certificates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.80" date="1516276800">-     *General**
    
      * Addressed an issue where OA "update iLO all" command fails in an enclosure with maximum Blades.
      * Addressed an issue where a Warning Alert  was wrongly sent when a fan is reseated in an enclosure
      * Addressed an issue where Remote Syslog logging would fail when OA failover happened in an IPv6 only environment.
      * Enhanced OA to bring the server from a power throttled state back to normal power state upon an OA reboot to circumvent an unwarranted emergency brake.
      * Fixed an issue where the Active and Standby OAs can have the same IP address in some rare situations.
      * Resolved an issue where a Gen9 server's host name gets cleared when the blade is rebooted.
      * Addressed an issue where server blade Power ON will be delayed in enclosures with OA Firmware Version 4.60 and managed by HPE OneView, when the OA module is reset until OneView refreshes the servers.
    
    **Security**
    
    The following security vulnerabilities were fixed:
    
      * CVE-2016-5387- Addressed a vulnerability which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request.
      * CVE-2016-2183- Addressed a vulnerability against TLS ciphers with 64bit block size in which makes it easier for remote attackers to obtain cleartext data via an attack against a long-duration encrypted session
      * CVE-2016-6515 - Addressed a vulnerability in OpenSSH which did not limit password lengths for password authentication, which allows remote attackers to cause a denial of service via a long string.
      * CVE-2015-8215 - Addressed a vulnerability IPv6 stack which does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service.
      * Addressed issue where in Onboard Administrator was vulnerable to Buffer overflow.
      * Added the HSTS[HTTP strict transport security] support  in OA.
      * Addressed a memory corruption vulnerability in the post-authentication sshd process.
    
    **Issues and workarounds**
    
    **Browsers**
    
      * OA GUI is not accessible in Chrome versions 43.0.2357.10 to 44.0.2383.The issue was caused by a "regression" in Chrome (or WebKit). Customers should use an alternative browser like Firefox or Internet Explorer or try a different version of Chrome.
      * SSO-to-iLO connection from the OA using an iLO host name fails with Microsoft Internet Explorer11 on Windows 8.On a Windows 8 system with Internet Explorer 10 or Internet Explorer 11, if the OA web GUI session is loaded using a host name instead of an IP address, an attempt to open an iLO window using SSO from the OA web GUI might result in the iLO page loading in the OA web GUI window instead of the intended new window. This issue was determined to be a bug in Internet Explorer and is expected to be fixed in a future release or update for Internet Explorer. To work around this issue, either use an IP address to load the OA Web GUI, or turn off Protected Mode for the appropriate zone in Internet Explorer's settings. This issue occurs only on Internet Explorer browsers.
    
    **FIPS**
    
    Certificates smaller than 2048 bits in size are not compliant with FIPS
    requirements as enforced by the OA firmware starting with OA 4.20. When the OA
    running OA firmware version 4.40 or greater is operating in FIPS Mode ON/DEBUG
    and is configured with a 1024-bit LDAP certificate that was installed when
    running a previous version of OA firmware, FIPS Mode ON/DEBUG is considered to
    be operating in a degraded state due to the presence of the non-compliant
    certificate. While operating in this FIPS-Degraded Mode operational state,
    attempts to set FIPS Mode OFF from the OA GUI Network Access&gt;FIPS tab will
    fail and show the error message The selected FIPS mode is already enabled.
    When the non-compliant certificate is removed, the FIPS-Degraded operational
    status is cleared, FIPS Mode can then be successfully set to OFF from the GUI
    interface. Note that the OA CLI command SET FIPS MODE OFF can be successfully
    used to set FIPS Mode OFF even with non-compliant 1024-bit LDAP certificates
    installed in the OA.
    
    **IRC**
    
    Unable to open .net IRC console for Gen10 Blades, Gen9 Blades also have the
    same issue. The Java applet and Webstart however, loads but the virtual media
    mounting fails. The work around is to launch the IRC through IRC Application
    (HP Lights-Out Stand Alone Remote Console) which is installed on terminal
    client.
    
    **EFM **
    
    To use EFM on Gen 10 Blades, please select options/filters "_Make Bootable ISO
    file" and _"_Enclosure Firmware Management"_ while creating custom SPP ISO on
    HPSUM 8.0.0. Please refer to HPSUM 8.0.0 User guide for further details.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.85" date="1526472000">-     Onboard Administrator 4.85 provides support for the following enhancements:
    
    **Hardware additions**
    
      * HPE D2500sb Storage Blade
    
    Features**: additions and changes**
    
    **General**
    
      * Onboard Administrator has been enhanced to allow configuring an IPv6 address as SNMP EngineID.
      * Onboard Administrator has been enhanced to allow configuring a user defined SSH port number. This will allow users to configure a non-standard SSH port instead of the default SSH port 22.
    
    ** Security**
    
    General Data Protection Requirements (GDPR) support added in Onboard
    Administrator for HPE Embedded Remote Support solution. The HPE passport
    username will now be stored in an encrypted form.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.85" date="1526558400">-     *General**
    
      * Addressed an issue where SNMP trap cpqRackEnclosureManagerLinkUp was not sent after an Onboard Administrator failover.
      * Addressed online help content issues seen in the previous version of Onboard Administrator.
    
    **Security**
    
       The following security vulnerabilities were fixed:
    
      * CVE-2017-8105 - Addressed a memory corruption vulnerability caused by a buffer overflow.
      * CVE-2016-10244 - Addressed a vulnerability which might allow a remote attacker to cause denial-of-service via a crafted file.
    
    **Issues and workarounds**
    
    **Browsers**
    
      * OA GUI is not accessible in Chrome versions 43.0.2357.10 to 44.0.2383.The issue was caused by a "regression" in Chrome (or WebKit). Customers should use an alternative browser like Firefox or Internet Explorer or try a different version of Chrome.
      * SSO-to-iLO connection from the OA using an iLO host name fails with Microsoft Internet Explorer11 on Windows 8. On a Windows 8 system with Internet Explorer 10 or Internet Explorer 11, if the OA web GUI session is loaded using a host name instead of an IP address, an attempt to open an iLO window using SSO from the OA web GUI might result in the iLO page loading in the OA web GUI window instead of the intended new window. This issue was determined to be a bug in Internet Explorer and is expected to be fixed in a future release or update for Internet Explorer. To work around this issue, either use an IP address to load the OA Web GUI, or turn off Protected Mode for the appropriate zone in Internet Explorer's settings. This issue occurs only on Internet Explorer browsers.
    
    **FIPS**
    
    Certificates smaller than 2048 bits in size are not compliant with FIPS
    requirements as enforced by the OA firmware starting with OA 4.20. When the OA
    running OA firmware version 4.40 or greater is operating in FIPS Mode ON/DEBUG
    and is configured with a 1024-bit LDAP certificate that was installed when
    running a previous version of OA firmware, FIPS Mode ON/DEBUG is considered to
    be operating in a degraded state due to the presence of the non-compliant
    certificate. While operating in this FIPS-Degraded Mode operational state,
    attempts to set FIPS Mode OFF from the OA GUI Network Access&gt;FIPS tab will
    fail and show the error message The selected FIPS mode is already enabled.
    When the non-compliant certificate is removed, the FIPS-Degraded operational
    status is cleared, FIPS Mode can then be successfully set to OFF from the GUI
    interface. Note that the OA CLI command SET FIPS MODE OFF can be successfully
    used to set FIPS Mode OFF even with non-compliant 1024-bit LDAP certificates
    installed in the OA.
    
    **IRC**
    
    Unable to open .net IRC console for Gen10 Blades, Gen9 Blades also have the
    same issue. The Java applet and Webstart however, loads but the virtual media
    mounting fails. The work around is to launch the IRC through IRC Application
    (HP Lights-Out Stand Alone Remote Console) which is installed on terminal
    client.
    
    **EFM**
    
    To use EFM on Gen 10 Blades, please select options/filters "_Make Bootable ISO
    file" and _"_Enclosure Firmware Management"_ while creating custom SPP ISO on
    HPSUM 8.0.0. Please refer to HPSUM 8.0.0 User guide for further details.
    
    **CAC**
    
      * In the CAC mode SSH, Telnet and XML Reply protocols will be disabled.
      * Linked enclosure login will not work if the linked enclosure in CAC mode.
      * If accurate Service account details are not provided, LDAP user login with certificate will fail.
      * It is highly recommended to establish a recovery plan before getting started with CAC.  If something goes wrong with the OA configuration, the OA may be recovered through the serial port or Insight Display panel and USB KEY. Both methods require physical access to the OA.  However, if an LCD PIN has been configured (and forgotten) and local accounts have been disabled or CAC has been incorrectly configured then, the only way to recover is through a serial port. The two most common situations where OA recovery is needed are when LDAP has been configured incorrectly with local accounts disabled or when CAC has been configured without certificate access.
    
    **Configurable SSH Port Number                                               **
    
    If a Standby OA is running firmware version less than 4.85 and it is updated
    to firmware version greater than or equal to 4.85 using synchronize firmware
    feature from Active OA, after the firmware update and reboot of the Standby
    OA, SSH port will not open in the configured port number. The work around is
    to reboot the Standby OA and SSH port will open in the configured port in next
    boot. This issue will not occur in the case where SSH port is configured to
    default port 22 in the Active OA.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.90" date="1548936000">-     Onboard Administrator 4.90 provides support for the following enhancements:
    
    **Hardware additions**
    
      * None
    
    Features**: additions and changes**
    
    **General**
    
      * On SNMP user add/delete, Onboard Administrator has been enhanced to resync with the new configuration instead of restarting SNMP service.
      * The SCEXE package support has been removed in the Onboard Administrator firmware update and EFM. OA now uses only the RPM package.
      * The Single Sign-On (SSO) feature has been enhanced to support the Password Complexity feature in the iLO 5 firmware.
      * The AlertMail feature has been enhanced to include subsystems status in the AlertMail messages.
      * Onboard Administrator has been enhanced for better debugging of issues.
    
    ** Security**
    
      * None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.90" date="1549022400">-     *General**
    
      * Addressed an issue where Onboard Administrator is not reachable when the port speed changes from 100M to 1000M in auto-negotiation mode. This issue is described by Customer Advisory : [https://support.hpe.com/hpsc/doc/public/display?sp4ts.oid=1844065&amp;docLocale=en_US&amp;docId=emr_na-c04866545](https://support.hpe.com/hpsc/doc/public/display?sp4ts.oid=1844065&amp;docLocale=en_US&amp;docId=emr_na-c04866545)
      * Addressed an issue where the DHCPv6 service does not start after an Onboard Administrator reboots causing it to reboot again after 15 minutes.
      * Addressed an issue related to ssl protocols enable or disable in the Onboard Administrator Command Line Interface (CLI) where proper error message is displayed. When the password entered is less than eight characters, the ambient temperature of the BL460c Gen10 blade is not displayed.
      *  Addressed issues in Onboard Administrator GUI pages related to: 
        1. Power management
        2. Front view display of BL460c Gen10 blade
    
        3. Login feature into linked enclosure and Two-factor authentication
    
      * Addressed an issue where syslog messages were not added for dynamic dns setting and LDAP group access changes.
      * Addressed an issue where SNMP GET for Onboard Administrator system description OID displays a wrong value.
      * Addressed an issue where Blade Switch 6125G firmware version is not displayed after rebooting OA.
      * Addressed an issue where Onboard Administrator responds to internal private IP ping requests from management interface.
      * Addressed the issue of delay in the powering of the blades after an enclosure power cycle in a VCM managed enclosure.
      * Addressed an issue in the SNMP where power supply OK traps are not sent out after an enclosure power cycle.
      * Addressed the issues related to user certificate usage in the Onboard Administrator where the same certificate cannot be used for multiple users and checking the syntax of IPv6 address if used in the certificate.
      * Addressed the issues present in the previous versions of the Onboard Administrator online help.
      * Addressed an issue in FIPS ON mode where Onboard Administrator CLI will display information about the password requirements when an invalid password in entered by the user.
      * Fixed an issue related to ambient temperature display of Gen10 blades in Command Line Interface (CLI).
      * Fixed an issue in First Time Setup Wizard page in GUI where in FIPS ON mode, user will not able to set DEBUG to ON.
      * Addressed an issue where messages are not logged in syslog when Device and Interconnects bay access are updated for a LDAP group.
      * Fixed an issue related to Blade part number display in OA GUI and CLI.
    
    **Security**
    
      The following security vulnerabilities are fixed:
    
      * CVE-2018-0732- Addressed the issue where the possibility of a malicious server sending a large prime value to the client from DH (E) based ciphersuite during the key agreement in a TLS handshake resulting in the client to take a long time to generate a key with the prime and exploited in a Denial Of Service attack.
      * CVE-2018-0737- Addressed the issue of vulnerability of the OpenSSL RSA Key generation algorithm to the cache timing side channel attack.
    
    **Issues and workarounds**
    
    **Browsers**
    
      * OA GUI is not accessible in Chrome versions 43.0.2357.10 to 44.0.2383.The issue was caused by a "regression" in Chrome (or WebKit). Customers should use an alternative browser like Firefox or Internet Explorer or try a different version of Chrome.
      * SSO-to-iLO connection from the OA using an iLO host name fails with Microsoft Internet Explorer11 on Windows 8. On a Windows 8 system with Internet Explorer 10 or Internet Explorer 11, if the OA web GUI session is loaded using a host name instead of an IP address, an attempt to open an iLO window using SSO from the OA web GUI might result in the iLO page loading in the OA web GUI window instead of the intended new window. This issue was determined to be a bug in Internet Explorer and is expected to be fixed in a future release or update for Internet Explorer. To work around this issue, either use an IP address to load the OA Web GUI, or turn off Protected Mode for the appropriate zone in Internet Explorer's settings. This issue occurs only on Internet Explorer browsers.
    
    **FIPS**
    
    Certificates smaller than 2048 bits in size are not compliant with FIPS
    requirements as enforced by the OA firmware starting with OA 4.20. When the OA
    running OA firmware version 4.40 or greater is operating in FIPS Mode ON/DEBUG
    and is configured with a 1024-bit LDAP certificate that was installed when
    running a previous version of OA firmware, FIPS Mode ON/DEBUG is considered to
    be operating in a degraded state due to the presence of the non-compliant
    certificate. While operating in this FIPS-Degraded Mode operational state,
    attempts to set FIPS Mode OFF from the OA GUI Network Access&gt;FIPS tab will
    fail and show the error message The selected FIPS mode is already enabled.
    When the non-compliant certificate is removed, the FIPS-Degraded operational
    status is cleared, FIPS Mode can then be successfully set to OFF from the GUI
    interface. Note that the OA CLI command SET FIPS MODE OFF can be successfully
    used to set FIPS Mode OFF even with non-compliant 1024-bit LDAP certificates
    installed in the OA.
    
    **IRC**
    
    Unable to open .net IRC console for Gen10 Blades, Gen9 Blades also have the
    same issue. The Java applet and Webstart however, loads but the virtual media
    mounting fails. The work around is to launch the IRC through IRC Application
    (HPE Lights-Out Stand Alone Remote Console) which is installed on terminal
    client.
    
    **EFM**
    
    To use EFM on Gen 10 Blades, please select options/filters "_Make Bootable ISO
    file" and _"_Enclosure Firmware Management"_ while creating custom SPP ISO on
    HPE SUM 8.0.0. Please refer to HPE SUM 8.0.0 User guide for further details.
    
    **CAC**
    
      * In the CAC mode SSH, Telnet and XML Reply protocols will be disabled.
      * Linked enclosure login will not work if the linked enclosure in CAC mode.
      * If accurate Service account details are not provided, LDAP user login with certificate will fail.
      * It is highly recommended to establish a recovery plan before getting started with CAC.  If something goes wrong with the OA configuration, the OA may be recovered through the serial port or Insight Display panel and USB KEY. Both methods require physical access to the OA.  However, if an LCD PIN has been configured (and forgotten) and local accounts have been disabled or CAC has been incorrectly configured then, the only way to recover is through a serial port. The two most common situations where OA recovery is needed are when LDAP has been configured incorrectly with local accounts disabled or when CAC has been configured without certificate access.
    
    **Configurable SSH Port Number                                               **
    
    If a Standby OA is running firmware version less than 4.85 and it is updated
    to firmware version greater than or equal to 4.85 using synchronize firmware
    feature from Active OA, after the firmware update and reboot of the Standby
    OA, SSH port will not open in the configured port number. The work around is
    to reboot the Standby OA and SSH port will open in the configured port in next
    boot. This issue will not occur in the case where SSH port is configured to
    default port 22 in the Active OA.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.95" date="1554465600">-     *General**
    
      * Addressed an issue where SNMP queries to Onboard Administrator OIDs were not successfully completed when VLAN is configured for Blades and Interconnects.
      * Addressed an issue in the Device and Rack Summary GUI page to eliminate the duplicate display of FLB and Mezz adapters information.
      * Addressed an issue where Interconnects were not receiving IP address from EBIPA (or) external DHCP server.
      * Addressed an issue where Blade Location information was not displayed correctly in SHOW SERVER STATUS ALL CLI command.
      * Addressed an issue where DNS record update was getting delayed in DNS server when a user configured a domain name in Onboard Administrator.
    
    **Security**
    
      * None
    
    **Issues and workarounds**
    
    **Browsers**
    
      * OA GUI is not accessible in Chrome versions 43.0.2357.10 to 44.0.2383.The issue was caused by a "regression" in Chrome (or WebKit). Customers should use an alternative browser like Firefox or Internet Explorer or try a different version of Chrome.
      * SSO-to-iLO connection from the OA using an iLO host name fails with Microsoft Internet Explorer11 on Windows 8. On a Windows 8 system with Internet Explorer 10 or Internet Explorer 11, if the OA web GUI session is loaded using a host name instead of an IP address, an attempt to open an iLO window using SSO from the OA web GUI might result in the iLO page loading in the OA web GUI window instead of the intended new window. This issue was determined to be a bug in Internet Explorer and is expected to be fixed in a future release or update for Internet Explorer. To work around this issue, either use an IP address to load the OA Web GUI, or turn off Protected Mode for the appropriate zone in Internet Explorer's settings. This issue occurs only on Internet Explorer browsers.
    
    **FIPS**
    
    Certificates smaller than 2048 bits in size are not compliant with FIPS
    requirements as enforced by the OA firmware starting with OA 4.20. When the OA
    running OA firmware version 4.40 or greater is operating in FIPS Mode ON/DEBUG
    and is configured with a 1024-bit LDAP certificate that was installed when
    running a previous version of OA firmware, FIPS Mode ON/DEBUG is considered to
    be operating in a degraded state due to the presence of the non-compliant
    certificate. While operating in this FIPS-Degraded Mode operational state,
    attempts to set FIPS Mode OFF from the OA GUI Network Access&gt;FIPS tab will
    fail and show the error message The selected FIPS mode is already enabled.
    When the non-compliant certificate is removed, the FIPS-Degraded operational
    status is cleared, FIPS Mode can then be successfully set to OFF from the GUI
    interface. Note that the OA CLI command SET FIPS MODE OFF can be successfully
    used to set FIPS Mode OFF even with non-compliant 1024-bit LDAP certificates
    installed in the OA.
    
    **IRC**
    
    Unable to open .net IRC console for Gen10 Blades, Gen9 Blades also have the
    same issue. The Java applet and Webstart however, loads but the virtual media
    mounting fails. The work around is to launch the IRC through IRC Application
    (HPE Lights-Out Stand Alone Remote Console) which is installed on terminal
    client.
    
    **EFM**
    
    To use EFM on Gen 10 Blades, please select options/filters "_Make Bootable ISO
    file" and _"_Enclosure Firmware Management"_ while creating custom SPP ISO on
    HPE SUM 8.0.0. Please refer to HPE SUM 8.0.0 User guide for further details.
    
    **CAC**
    
      * In the CAC mode SSH, Telnet and XML Reply protocols will be disabled.
      * Linked enclosure login will not work if the linked enclosure in CAC mode.
      * If accurate Service account details are not provided, LDAP user login with certificate will fail.
      * It is highly recommended to establish a recovery plan before getting started with CAC.  If something goes wrong with the OA configuration, the OA may be recovered through the serial port or Insight Display panel and USB KEY. Both methods require physical access to the OA.  However, if an LCD PIN has been configured (and forgotten) and local accounts have been disabled or CAC has been incorrectly configured then, the only way to recover is through a serial port. The two most common situations where OA recovery is needed are when LDAP has been configured incorrectly with local accounts disabled or when CAC has been configured without certificate access.
    
    **Configurable SSH Port Number                                               **
    
    If a Standby OA is running firmware version less than 4.85 and it is updated
    to firmware version greater than or equal to 4.85 using synchronize firmware
    feature from Active OA, after the firmware update and reboot of the Standby
    OA, SSH port will not open in the configured port number. The work around is
    to reboot the Standby OA and SSH port will open in the configured port in next
    boot. This issue will not occur in the case where SSH port is configured to
    default port 22 in the Active OA.</changelog>
  </package>
  <package pkgid="41a742fa20dc243766fbb9f7a9bb530229e9dc05d3177290d4c6a26a4cdab3d4" name="firmware-powerpic-gen10" arch="x86_64">
    <version epoch="0" ver="1.0.7" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.2" date="1496750400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1503489600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM version
    1.20 or later
    
    **Enhancements/New Features:**
    
    Added support for Dynamic Power Capping. For proper operation, please ensure
    that Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM
    version 1.20 or later are updated on the server.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-2.1" date="1541419200">-     *Important Notes:**
    
    Ver. 1.0.4 (B) contains support for new server products.  It is functionally
    equivalent to ver. 1.0.4.  It is not necessary to upgrade with Revision (B) if
    a previous component revision was used to upgrade the firmware to ver. 1.0.4.
    
    **Firmware Dependencies:**
    
    Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM version
    1.20 or later
    
    **Enhancements/New Features:**
    
    Added support for Dynamic Power Capping. For proper operation, please ensure
    that Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM
    version 1.20 or later are updated on the server.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-4.1" date="1548936000">-     *Important Notes:**
    
    Ver. 1.0.4 (D) contains updates to the component packaging and is functionally
    equivalent to ver. 1.0.4.  It is not necessary to upgrade with Revision (D) if
    a previous component revision was used to upgrade the firmware to ver. 1.0.4.
    
    **Firmware Dependencies:**
    
    Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM version
    1.20 or later
    
    **Enhancements/New Features:**
    
    Added support for Dynamic Power Capping. For proper operation, please ensure
    that Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM
    version 1.20 or later are updated on the server.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1565265600">-</changelog>
  </package>
  <package pkgid="591326781465852cf7d9cbe17a1715abfc85cc915489379a754a5126cabb4653" name="firmware-powerpic-gen9" arch="i386">
    <version epoch="0" ver="1.0.9" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1410782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7-2.1" date="1410868800">-     *Important Notes:**  
      
    Ver. 1.0.7(B) addresses a minor issue in the online flashing mechanism. The
    actual firmware contained within version 1.0.7(B) did not change as compared
    to version 1.0.7 and therefore it is not necessary to upgrade if version 1.0.7
    has already been installed.  
      
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1421409600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addresses an issue in which the minimum power capping value was incorrectly
    being calculated on certain systems. This fix increases the accuracy of the
    minimum capping value set during POST.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9-3.1" date="1443441600">-     *Important Notes:**
    
    Ver. 1.0.9 (C) contains support for new server products and a change to the
    Firmware RPM install command name from "cpqsetup" to "hpsetup".  It is
    functionally equivalent to ver. 1.0.9.  It is not necessary to upgrade with
    Revision C if a previous component revision was used to upgrade the firmware
    to ver. 1.0.9.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addresses an issue in which the minimum power capping value was incorrectly
    being calculated on certain systems. This fix increases the accuracy of the
    minimum capping value set during POST.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9-4.1" date="1456488000">-     *Important Notes:**
    
    Ver. 1.0.9(D) contains updates to the component packaging and is functionally
    equivalent to ver. 1.0.9.  It is not necessary to upgrade with Revision D if a
    previous component Revision was used to upgrade the firmware to version 1.0.9.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addresses an issue in which the minimum power capping value was incorrectly
    being calculated on certain systems. This fix increases the accuracy of the
    minimum capping value set during POST.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9-6.1" date="1477051200">-     *Important Notes:**
    
    Ver. 1.0.9 (F) contains support for new server products.  It is functionally
    equivalent to ver. 1.0.9.  It is not necessary to upgrade with Revision F if a
    previous component revision was used to upgrade the firmware to ver. 1.0.9.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addresses an issue in which the minimum power capping value was incorrectly
    being calculated on certain systems. This fix increases the accuracy of the
    minimum capping value set during POST.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9-7.1" date="1489492800">-     None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9-7.1" date="1489579200">-     *Important Notes:**
    
    Ver. 1.0.9 (G) contains a change to the Firmware RPM file name.  It is
    functionally equivalent to ver. 1.0.9.  It is not necessary to upgrade with
    Revision G if a previous component revision was used to upgrade the firmware
    to ver. 1.0.9.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addresses an issue in which the minimum power capping value was incorrectly
    being calculated on certain systems. This fix increases the accuracy of the
    minimum capping value set during POST.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9-9.1" date="1541419200">-     *Important Notes:**
    
    Ver. 1.0.9(I) contains updates to the component packaging and is functionally
    equivalent to ver. 1.0.9. It is not necessary to upgrade with Revision I if a
    previous component Revision was used to upgrade the firmware to version 1.0.9.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addresses an issue in which the minimum power capping value was incorrectly
    being calculated on certain systems. This fix increases the accuracy of the
    minimum capping value set during POST.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9-10.1" date="1550145600">-     *Important Notes:**
    
    Ver. 1.0.9(J) contains updates to the component packaging and is functionally
    equivalent to ver. 1.0.9. It is not necessary to upgrade with Revision J if a
    previous component Revision was used to upgrade the firmware to version 1.0.9.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addresses an issue in which the minimum power capping value was incorrectly
    being calculated on certain systems. This fix increases the accuracy of the
    minimum capping value set during POST.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="ff4e81a156ec302c1fe02363d3808f7238e91e889a1f6af8afd9081e18669b83" name="firmware-smartarray-112204add8" arch="x86_64">
    <version epoch="0" ver="5.02" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80" date="1440417600">-      HP Smart Array Px3x controller with HP SmartCache enabled on boot volume could potentially encounter file corruption when booting the system if the Super-cap is not fully charged due to being replaced or being in a power down condition for several days (Example 7 days). File corruption is less likely to occur on non-boot volumes than on boot volumes. For additional information please refer to the customer advisory # [c04719000](http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04719000)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.02" date="1447934400">-      A physical drive configured as a spare drive might indicate predictive failure sooner than expected.
      * Controller might stop responding during run-time (POST Lockup 0x13).
      * After hot-plug replacement of a hard disk drive, incorrect hard disk drive firmware version and upgrade recommendation were displayed by HP Smart Storage Administrator.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.54" date="1459944000">-      Detection of all direct-attached physical drives might fail if a single drive did not spin up.
      * Servers now power up faster due to improvements in the UEFI controller driver.
      * Reduced likelihood of POST Lockup 0x13 occurrence due to intermittent memory errors.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.04" date="1474545600">-      Increased performance of SATA drives by increasing command queue depth.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.04" date="1474632000">-      System might hang at POST following a reboot.
      * System fans might go to 100% if connected drives were spun down.
      * SATA SSD's were incorrectly marked as worn out.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.08" date="1493294400">-      Intermittent memory errors might cause the controller to stop responding. (POST Lockup 0x13)
    
      * System might stop responding if a parity error is found during surface scan of a RAID6 volume. (POST Lockup 0x13)
    
      * In rare cases, the controller might stop responding while running IO without displaying a lockup code.
    
      * Non-Maskable Interrupt (NMI) might occur on systems with a Windows OS and HPE Gen9 Smart Array or Smart HBA adapters and performing continuous reboot testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.10" date="1497009600">-      If and unexpected power outage occurred, the system might stop operating during Power-On Self Test
    
      * Controller could stop responding when Smart Cache is performing a read-ahead after finishing a read-fill for a pending flush operation</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.54" date="1523880000">-      DDR cache could be randomly disabled after several boots
      * A hot-inserted replacement drive might show as a predictive failure if the original drive was identified as a predictive failure.
      * Controller cache module might be marked as permanently disabled if the Smart Storage Battery is removed or failed while the system is online, even if SSA was previously used to enable write caching without a backup power source.
      * Controller can become unresponsive due to a SmartCache pending flush operation when a read-ahead and a read-fill are performed in sequent.
      * System might stop responding if a parity error is found during surface scan of a RAID6 volume. (POST Lockup 0x13)
      * System fans might go to 100% if connected drives were spun down
      * Issue where a controller crash dump may not be collected after a controller failure</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.54-2.1" date="1526904000">-      DDR cache could be randomly disabled after several boots
      * A hot-inserted replacement drive might show as a predictive failure if the original drive was identified as a predictive failure.
      * Controller cache module might be marked as permanently disabled if the Smart Storage Battery is removed or failed while the system is online, even if SSA was previously used to enable write caching without a backup power source.
      * Controller can become unresponsive due to a SmartCache pending flush operation when a read-ahead and a read-fill are performed in sequent.
      * System might stop responding if a parity error is found during surface scan of a RAID6 volume. (POST Lockup 0x13)
      * System fans might go to 100% if connected drives were spun down
      * Issue where a controller crash dump may not be collected after a controller failure</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.02" date="1557403200">-      The firmware updates could fail while SmartCache is enabled due to active I/O in the Smart Cache.
      * The serial output of the expander could fail to be populated in the controller logs due to the buffer not being handled appropriately by the controller</changelog>
  </package>
  <package pkgid="e14bcf13d7a114828b47f38bfcb91755a6fe37fd6a3fa22488bf2e043656b04a" name="firmware-smartarray-1d0696d939" arch="x86_64">
    <version epoch="0" ver="2.00" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.00-1.1" date="1536494400">-     *Note:** If version 2.00 was previously installed, then it is not necessary to upgrade to version 2.00 (A).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.00-1.1" date="1536580800">-     Updated to support Service Pack for ProLiant version 2018.09.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.00-2.1" date="1540382400">-</changelog>
  </package>
  <package pkgid="5fbd7617953c528574f2572a40455b2e56facc5509bc784797fdef68001924af" name="firmware-smartarray-2de15b6882" arch="x86_64">
    <version epoch="0" ver="4.22" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.80" date="1432814400">-      A rare race condition in a system with SAS and SATA drives, where SATA drives were not discovered during server power-on.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.07" date="1439899200">-      While performing a firmware upgrade on an HP 12Gb/s SAS Expander card, an issue infrequently occurred that caused the card to become unusable. HP 12Gb/s SAS Expander firmware version 2.07 resolved this issue.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.09" date="1446552000">-      The HPE 12Gb/s SAS Expander firmware version 2.09 resolves an issue where an incorrect SAS address was returned by the Device Identification Inquiry for Vital Product Data page. As a result, applications using this information may report incorrect data about the storage system topology.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10" date="1474545600">-      Rebranded the controller information from HP 12G SAS Expander card to HPE 12G SAS Expander card.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.01" date="1487073600">-      Enhanced debug capabilities.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.14" date="1496404800">-      Added support for ML350, DL380, and DL560 Gen10 servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.17" date="1501761600">-      SATA hard disk drives connected to the HPE 12Gb/s SAS Expander card may not be detected when cold booting a HPE ProLiant server with a HPE Smart Array SR Gen10 controller</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.02" date="1513771200">-      Changed the Enclosure's Target and LUN address to the appropriate unique values. Previously these addresses would conflict with the SATA drive in bay #1 which interfered with software defined storage solutions such as Storage Spaces Direct.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.21" date="1537444800">-     The following issues are resolved in version 4.21:
    
      * Expander may reset during heavy SSACLI polling
      * SATA drives may take longer to spin up, not be initially detected, and then hot add later. This can prevent system boot or affect the logical drive status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.22" date="1565870400">-      Fixes an issue where false Smart Carrier authenication errors may happen.</changelog>
  </package>
  <package pkgid="b6c7d326028b30e106bc33f180fbaf0581738aa4082d6759021c5615f14c14a5" name="firmware-smartarray-3bf7ece88e" arch="x86_64">
    <version epoch="0" ver="1.00" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00" date="1432641600">-      1.00 is the initial firmware release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00-2.1" date="1502625600">-      Customers who already installed firmware version 1.00 do not need to update to 1.00 (B).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00-2.1" date="1502712000">-      Improved integration with Smart Update Manager.
    
    Note: Upgrading to version 1.00(B) is not necessary if the Apollo 2000 SAS
    Expander was previously updated to version 1.00.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00-3.1" date="1521115200">-</changelog>
  </package>
  <package pkgid="6c98db85ddfb3409d0faf62cd0e911c0f1e6761edb45a301377ac718259b3fdd" name="firmware-smartarray-7bdfcd246b" arch="x86_64">
    <version epoch="0" ver="2.50" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.03" date="1434024000">-      Please un-plug and re-plug the power cord to the server for firmware upgrade from version 1.03 or earlier to take effect.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.03" date="1434110400">-      1.03 is the initial firmware release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.04" date="1440417600">-      HP Apollo 45xx Gen9 Backplane Expander firmware version 1.04 provides enhanced functionality so that upgrades from version 1.04 to a later version no longer requires a power cycle/cold reboot of the server after the firmware is flashed.  
    NOTE: Upgrading from a firmware version older than version 1.04 to version
    1.04 or later still requires a power cycle/cold reboot to complete the upgrade
    process.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.49" date="1446724800">-      Adds support for the HPE Apollo 4520 Gen9</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50" date="1458820800">-      Adds support for the HPE Apollo 4520 Gen9</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.04" date="1488196800">-      Enhanced debug capabilities.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.08" date="1495022400">-      Enhanced debug capabilities.
      * Improved integration with Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.08-2.1" date="1540209600">-     Customers who already have firmware version 2.08 installed do not need to
    update to 2.08(B).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.08-2.1" date="1540296000">-      Added support for SUSE Linux Enterprise Server 15</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50" date="1543665600">-       Expander may reset during heavy SSACLI polling
      * SATA drives may take longer to spin up, not be initially detected, and then hot add later. This can prevent system boot or affect the logical drive status.</changelog>
  </package>
  <package pkgid="11987792f8b3a1e8638c019551350096d2aa497299df0347c2c1f834bee048a4" name="firmware-smartarray-815b1ae26d" arch="x86_64">
    <version epoch="0" ver="1.56" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00" date="1502884800">-     Initial Release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56" date="1526558400">-           Supports Drive Zoning</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56-2.1" date="1540209600">-     *Note:** If version 1.56 was previously installed, then it is not necessary to upgrade to version 1.56 (B).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56-2.1" date="1540296000">-      Added support for SUSE Linux Enterprise Server 15 OS</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56-3.1" date="1541246400">-</changelog>
  </package>
  <package pkgid="858d39c6c6ef5f03cb23e9259ab153440c6be8ad6ea8c0f5f57ecd655bee4625" name="firmware-smartarray-94189dca85" arch="x86_64">
    <version epoch="0" ver="1.78" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72" date="1432728000">-     *Enhancements/New Features:**
    
      * 1.72 is the initial firmware release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72-2.1" date="1440331200">-      Power cycle/ cold reboot is required after installation for updates to take effect.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72-2.1" date="1440417600">-     *Enhancements/New Features:**
    
      * 1.72 is the initial firmware release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.73" date="1443787200">-      When the server hardware inventory was displayed in the Device Manager, the NVMe drives were not included in the lists.
    
    Firmware version 1.73 allows all NVMe supported drives to be recognized and
    displayed in the server hardware inventory lists.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.73-2.1" date="1446206400">-     *Problems Fixed in version 1.73 (B):**
    
      * The component installer did not detect the HPE Express Bay Enablement Switch Card, when it was configured in an HP ProLiant DL580 Gen9 Server, and would not proceed with firmware update.
    
    **Problems Fixed in version 1.73:**
    
      * When the server hardware inventory was displayed in the Device Manager, the NVMe drives were not included in the lists.
    
    Firmware version 1.73 allows all NVMe supported drives to be recognized and
    displayed in the server hardware inventory lists.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.73-3.1" date="1469448000">-     *Problems Fixed in version 1.73 (C):**
    
      * During component installation on a system configured with NVIDIA Tesla M2090 GPU, an uncorrectable PCIe error might occur.
    
    **Problems Fixed in version 1.73 (B):**
    
      * The component installer did not detect the HPE Express Bay Enablement Switch Card, when it was configured in an HP ProLiant DL580 Gen9 Server, and would not proceed with firmware update.
    
    **Problems Fixed in version 1.73:**
    
      * When the server hardware inventory was displayed in the Device Manager, the NVMe drives were not included in the lists.
    
    Firmware version 1.73 allows all NVMe supported drives to be recognized and
    displayed in the server hardware inventory lists.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.73-4.1" date="1496318400">-      Updated to support Service Pack for ProLiant version 2017.07.0
    
              **Note:** If any version 1.73 was previously installed, then it is not necessary to upgrade to version 1.73 (D).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.73-4.1" date="1496404800">-     .</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.78" date="1516104000">-      Corrected the temperature status of Seagate NVMe hard drives.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.78-2.1" date="1521115200">-</changelog>
  </package>
  <package pkgid="8a640ddb3b3bee9511d08ea6931588a918b5dfac9b66733c62568ca751450b46" name="firmware-smartarray-9f082dffb4" arch="x86_64">
    <version epoch="0" ver="1.00" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00" date="1526558400">-     Initial Release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00-2.1" date="1539345600">-</changelog>
  </package>
  <package pkgid="e7c302726bcc20d8b543cc113a8c7b1ef7f051032a28331100c7c64008f4bf7f" name="firmware-smartarray-ea3138d8e8" arch="x86_64">
    <version epoch="0" ver="7.00" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 6.06" date="1502712000">-      Under the following conditions, the controller might stop responding: 
        * During POST following an unexpected power event if there was data in the controller cache.
        * When running I/O to SATA drives. (POST Lockup 0x13)
        * When using a RAID configuration with strip size of 1024KiB. (POST Lockup 0x13)
        * When a WRITE SAME command is sent with a buffer size greater than 512 bytes. (POST Lockup 0x13)
      * In a multi-path environment with nested expanders, the active path to a device might be incorrect following a path failure or restoration.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 6.30" date="1509624000">-     Fixes the following issues:
    
      * DDR cache could be randomly disabled after several boots
      * The controller could become unresponsive while in HBA mode during the creation of a partition/file system
    
    .</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 6.60" date="1526817600">-      Added support for larger SmartCache capacity size</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 6.60" date="1526904000">-      Issue where the QueryAsynchronousEvent could potentially provide incorrect response data
      * Issue where the Cache could potentially get disable after several reboots</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 6.60-2.1" date="1534075200">-     Customers who already installed firmware version 6.60 do not need to update to
    6.60 (B).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 6.60-2.1" date="1534161600">-      Releasing support for SUSE LINUX Enterprise Server 15 OS</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 6.84" date="1542196800">-     .</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 6.84" date="1542283200">-      Decrease in Performanceseen in Firmware versions after 4.52</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 6.88" date="1548936000">-     Fixes the following Issues
    
      * SATA drive could stop responding  while on HBA mode when non-NCQ commands are executed
      * Controller could stop responding when upgrading due to the DDR Cache Module exceeding its limitations
      * SSD Cache module could become disable while upgrading FW
      * Data from the HPE Smart Drive Backplane could potentially become corrupted if a non-HPE carrier is present</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 7.00" date="1561809600">-      Occasionally  the drive will not accept any IO's after running Sanitize command for a period of time due to the FW being out of sync with the drive during that time
      * Non-HPE drives could report "Task Set Full" due to the drives reaching the qdepth limit during heavy workload
      * Raid volume is not discovered due to a bad drive consuming two slots during hotplug
      * Data could become inaccessible when upgrading from firmware versions prior to 4.5x
      * The controller could stop responding when executing a SCSI verify command due to a CPU exception
      * The system could stop communicating due to an I/O command timeout
      * While on HBA mode, a drive could stop responding due to an early allocated buffer release
      * A SAS drive WWN is reported inaccuratelyy due to an incorrect report causing the driver to be out of sync with the device
      * If using a 4G module, the controller could stop responding due to the SSD Cache metadata exceeding its limits during a Backup
      * SSD Smart Cache module become disabled due to a reduction in usable cache space</changelog>
  </package>
  <package pkgid="5de53b6cab6652df7c36a55f44095af7456b95248867e16fa8f652d3c2cc06fd" name="firmware-smartarray-f18fdefd0b" arch="x86_64">
    <version epoch="0" ver="1.78" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.25" date="1446638400">-      Added support for new 6 HDD SFF backplane.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.26" date="1474459200">-      Added support for new 6 SFF HDD backplane.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.26" date="1474545600">-      In rare circumstances after multiple, successive reboots, a system with 28 large form factor drives might become unresponsive. Firmware v1.26 resolves the issue.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.26-2.1" date="1496145600">-      **Customers who already installed firmware version 1.26 do not need to update to 1.26 (B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.26-2.1" date="1496232000">-      Updated to support Service Pack for ProLiant version 2017.07.0
    
              **Note:** If version 1.26 was previously installed, then it is not necessary to upgrade to version 1.26 (B).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50" date="1523448000">-      Enhanced debug capabilities</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50-2.1" date="1526558400">-      Enhanced debug capabilities</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.76" date="1541160000">-      Added support for the HPE Apollo 4200 Gen10 Server</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.78" date="1544097600">-      Added support for the HPE Apollo 4200 Gen10 Server</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.78-1.1" date="1550923200">-</changelog>
  </package>
  <package pkgid="fbe5e5c4b28fe0c7f3c8198659f91fa0008cdeb27016940f29ef6f4602d1d648" name="firmware-smartarray-f7c07bdbbd" arch="x86_64">
    <version epoch="0" ver="2.62" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60" date="1531915200">-      Increased SmartCache maximum logical volume size.
      * Added support for SmartCache in UEFI configuration tools.
      * Added the ability to control drive write cache settings.
      * Added the ability to select the drive erase pattern.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60" date="1532001600">-      Connectivity to HPE D6020 disk enclosures might be lost if connected to multiple servers.
      * In rare cases, data could become unavailable on a RAID 6 (ADG) volume during a rebuild or parity consistency check.
      * Inability to configure unassigned drives if a failed RAID volume was present.
      * After multiple reboots, unassigned drives might be erroneously assigned as spares for configured RAID volumes.
      * System might continuously reboot after splitting a mirrored volume.
      * Volume transformation might fail or not resume after a system reboot.
      * Maximum command queue depth for SATA drives was limited.
      * Controller might stop responding: 
        * During power up device discovery. (POST Lockup 0x1ABD or 0x20227)
        * If multiple completions are received for an IO command. (POST Lockup 0x1BE0)
        * If a drive enclosure is power cycled while IO is running. (POST Lockup 0x1C50 or 0x27006)
        * If a drive enclosure is power cycled while a drive is sanitizing. (POST Lockup 0x1E30)
        * When attempting to modify the controller cache settings while IO is running. (POST Lockup 0x1E30)
        * If a drive failed. (POST Lockup 0x27006)
        * When adding or removing drives from a RAID 5 or RAID 50 volume during a rebuild. (POST Lockup 0xFFFFF001)
        * During POST prior to loading an operating system.
        * When Unrecoverable Read Errors (URE's) are found on drives.
        * When deleting volumes while a rebuild is occurring and URE's and found.
        * Following completion of Rapid Parity Initialization (RPI) of a new RAID volume.
        * During a volume transformation.
      * A drive undergoing RPI might be presented to the operating system.
      * Controller slot ID might be shown incorrectly in management tools.
      * Incorrect drive bay numbers might be shown in a dual domain configuration.
      * Drive sanitize might report incorrect status information.
      * Status of the Smart Storage Battery might be reported incorrectly.
      * Incorrect POST message 1831 indicating loss of SmartCache data.
      * Incorrect text in POST message 1786.
      * Various scenarios where drive LEDs might not be displayed correctly.
      * The RESTful management interface might fail when attempting to: 
        * Change drive write cache configuration.
        * Configure a new RAID volume.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.65" date="1533902400">-      System might stop responding at POST and fail to load an OS. This issue is more likely to occur if System BIOS version is 1.40 or later. However, systems running older BIOS versions could experience this issue also.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.66" date="1538049600">-      A failing drive might take up to an hour to be marked as failed, during which time the host system is unresponsive.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.98" date="1548936000">-     Fixes the following issues:
    
      * Controller could stop responding with a 0x1A91 message during active path failure
      * Controller could stop responding during I/O processing and Smart Cache flush process
      * When predictive spare rebuild is triggered on Smart Cache, the rebuilding process could fail to start.
      * Data could become corrupted when a SATA drive overruns a data transfer
      * Controller memory corruption could occur when the response to an Identify Device command (IDD) is received from a drive
      * Communication between the host system and a RAID5/6 volume could potentially fail after an I/O timeout on one of the drives in the array.
      * System could stop responding with a 0x1E30 message when discovering an ATA locked drive
      * Controller could stop responding during a drive sanitize operation</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.99" date="1558267200">-     .</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.99" date="1558353600">-     Fixes the following issues
    
      * Customer could encounter a data coherencey issue that will cause the system to return a Purple Screen Of Death (PSOD) when system fails to complete I/O's</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.02" date="1558440000">-      The "Auto Replace Drives" setting could cause the spare drives to become inaccessible due to drives becoming part of the new logical drives and not being reported to iLO
      * Logical volumes could become unresponsive after a controller reset due to OS driver not receiving the "OK "
      * The controller could become unresponsive after a server reboot due to the driver receiving an incorrect controller state
      * The system could become unresponsive when a DVD/CD-ROM is attached to the system due to an Interrupt Flag been set erroneously</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.03" date="1558526400">-     Controller could stop responding while processing a larger size of I/O than
    the RAID volume size.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62" date="1558612800">-</changelog>
  </package>
  <package pkgid="393fc8d628441bd5f31902fd38a13726a14bdb243477811ff430c1b0c063b2ce" name="firmware-solex6gb-solex" arch="i586">
    <version epoch="0" ver="4.3.6.0" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.0.1.0" date="1392379200">-     ***Firmware Dependency:** **
    
         The devices listed below require minimum FW deliverables with HP Storage Manager version 4.0.1.0:
    
    **Device, Minimum Recommended Version**
    
      * HP D2600/D2700 Disk Enclosure, 0147
      * HP 600 Modular Disk System, 3.60
      * HP D6000 Disk Enclosure, 2.38
      * HP P2000 MSA Array System, TS230P06
      * HP Smart Array P711m/P712m Controller, 5.70
      * HP Smart Array P721m Controller, 3.54
    **Problems Fixed:**  
    
      * Fixed issue in which the "Create and Assign Zone Group" operation did not display an error message if the required zone group name was blank.
      * Fixed a rare issue where repeatedly rebooting the switch may cause some drives in the storage enclosure to not be detected.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.1.1.0" date="1408968000">-     *Problems Fixed:**  
    The following issues are now resolved:
    
      * If the switch was assigned a static IP address using the Onboard Administrator EBIPA feature, then the switch might generate continuous Cold Start SNMP traps and overfill logs.
      * A storage enclosure flash operation might fail when run from Virtual Storage Manager (VSM) CLI while the GUI was open.
      * Link rate of a disk was incorrectly displayed in VSM GUI and CLI.
      * In rare cases, multiple resets of a switch would cause the Smart Array to lockup 0xAB.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.1.1.0-2.1" date="1424088000">-      **Customers who already installed firmware version 4.1.1.0 do not need to update to 4.1.1.0(B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.1.1.0-2.1" date="1424174400">-     *Enhancements/New Features for FW version 4.1.1.0(B):**
    
      * Added component support for x64 operating systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.1.1.0-2.1" date="1424260800">-     *Problems Fixed:**  
    The following issues are now resolved:
    
      * If the switch was assigned a static IP address using the Onboard Administrator EBIPA feature, then the switch might generate continuous Cold Start SNMP traps and overfill logs.
      * A storage enclosure flash operation might fail when run from Virtual Storage Manager (VSM) CLI while the GUI was open.
      * Link rate of a disk was incorrectly displayed in VSM GUI and CLI.
      * In rare cases, multiple resets of a switch would cause the Smart Array to lockup 0xAB.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.2.1.0" date="1436788800">-      When a HP 6Gb SAS BL Switch  is configured with a very large number of physical drive bays (such as, 400 or more) and/or a large number of zone groups (such as, 16 or more), the switch manager GUI may not be able to load the configuration and show enclosure information.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.2.2.0" date="1460548800">-      Made changes to firmware to capture more debug information.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.2.2.0" date="1460635200">-      Firmware was changed to make it more robust and resilient to handle possible unresponsiveness due to a potential deadlock between multiple processes. If deadlock was to occur, it might cause an inability to establish an SSH session with the switch.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.3.6.0" date="1526904000">-      Initial drop for Snap3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.3.6.0-2.1" date="1540382400">-</changelog>
  </package>
  <package pkgid="c4595792cb34d707ae8b8a56fd821c19fa61c5da264c73f61169a0d9bec0f7ab" name="firmware-spsgen10" arch="x86_64">
    <version epoch="0" ver="04.01.04.339" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.00.03.211" date="1496836800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.00.03.219" date="1504872000">-     *Important Notes:**
    
     None  
    
    **Firmware Dependencies:**
    
     None  
    
    **Enhancements/New Features:**
    
    Updated to the latest Intel supported version 04.00.03.219 of the Server
    Platform Services Firmware.
    
    **Known Issues:**
    
     None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.00.04.288-2.1" date="1510833600">-     *Important Notes:**
    
    System ROM version 1.26 or later must first be installed. Then update HPE
    Gen10 Innovation Engine (IE) Firmware to version 0.1.4.4 or later before
    updating HPE Gen10 Server Platform Services (SPS) Firmware to version
    04.00.04.288.
    
    This is a new release of the Intel Platform Service (SPS) Firmware revision
    04.00.04.288. This revision has mitigated security vulnerability CVE-2017-5706
    (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and
    CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709).
    It is anticipated that details regarding these security vulnerabilities will
    be published to these links on November 20,2017. These security
    vulnerabilities are not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    HPE Gen10 system ROM version 1.26 or later
    
    HPE Gen10 Innovation Engine (IE) Firmware version 0.1.4.4 or later
    
    **Problems Fixed:**
    
    System ROM version 1.26 or later must first be installed. Then update HPE
    Gen10 Innovation Engine (IE) Firmware to version 0.1.4.4 or later before
    updating HPE Gen10 Server Platform Services (SPS) Firmware to version
    04.00.04.288.
    
    This is a new release of the Intel Platform Service (SPS) Firmware revision
    04.00.04.288. This revision has mitigated security vulnerability CVE-2017-5706
    (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and
    CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709).
    It is anticipated that details regarding these security vulnerabilities will
    be published to these links on November 20,2017. These security
    vulnerabilities are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.00.04.381" date="1533729600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    HPE Gen10 system ROM version 1.26 or later
    
    HPE Gen10 Innovation Engine (IE) Firmware version 0.1.5.2 or later
    
    **Problems Fixed:**
    
    This is a new release of the Intel Platform Service (SPS) Firmware revision
    04.00.04.381.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.00.04.393" date="1536753600">-     *Important Notes:**
    
    This revision has mitigated security vulnerability CVE-2018-3643
    (https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3643) and CVE-2018-3655
    (https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3655). It is anticipated
    that details regarding these security vulnerabilities will be published to
    these links on September 11,2018. These security vulnerabilities are not
    unique to HPE servers.
    
    **Firmware Dependencies:**
    
    HPE Gen10 system ROM version 1.26 or later
    
    HPE Gen10 Innovation Engine (IE) Firmware version 0.1.5.2 or later
    
    **Problems Fixed:**
    
    This revision has mitigated security vulnerability CVE-2018-3643
    (https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3643) and CVE-2018-3655
    (https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3655). It is anticipated
    that details regarding these security vulnerabilities will be published to
    these links on September 11, 2018. These security vulnerabilities are not
    unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.251" date="1550145600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for Intel Xeon Scalable Performance 3200, 4200, 5200, 6200 and
    8200 series processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.296" date="1561982400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an intermittent issue where an optional PCIe device may not properly
    report its thermal data or other telemetry data as seen through the Integrated
    Lights-Out (iLO) interface. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.339" date="1567339200">-</changelog>
  </package>
  <package pkgid="9e023d8fdd17c03f7e94c60247214c8819756dbeea0409d1f406f1ad3244b767" name="firmware-system-a40" arch="x86_64">
    <version epoch="0" ver="2.30_2019_10_18" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.34_10-02-2018" date="1540987200">-     Added RBSU option to allow customers to disable Page Table Entry Speculative
    Lock Scheduling. Disabling this feature decreases performance so it should
    only be done in very rare instances. Systems running Microsoft Windows 10 RS3
    or RS4 may experience unexpected system behavior when this feature is enabled.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.34_10-02-2018" date="1541073600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue with rare occurrences of unpredictable system behavior.
    This issue is NOT unique to HPE servers and would impact any systems using AMD
    EPYC 7000 Series processors.
    
    Addressed an issue with NVMe drives becoming unavailable to an operating
    system when updating the backplane firmware.
    
    Addressed a rare issue where NVMe drives may not be available to an operating
    system when installing two or more NVMe drives simultaneously.
    
    Addressed an issue with the RBSU setting for AMD Core Performance Boost not
    being correctly applied in all instances.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.40_01-25-2019" date="1549022400">-     Added support for HPE One button secure erase. This option can be launched
    from the HPE Intelligent Provisioning application or through the HPE RESTful
    API to securely restore the system back to a default configuration. This
    option also requires iLO firmware 1.40 or later, and Intelligent Provisioning
    3.30 or later.
    
    Added Secure Configuration Lock feature. This feature can be enabled to detect
    system hardware, security configuration, or firmware revision changes to
    protect against malicious or unintended modifications to the server. This
    protection can be enabled for systems in transit from the factory to the
    customer site, in transit from one customer site to another, or can be left
    enabled on a deployed server. A new BIOS/Platform Configuration (RBSU) Server
    Configuration Lock menu in the Server Security Options is available to enable
    and configure this functionality.
    
    Added a new BIOS/Platform Configuration (RBSU) Backup and Restore Settings
    menu to System Default Options. This option can be used to backup (save off)
    the current BIOS configurations settings to a USB storage device for migration
    to another server.
    
    Updated the system thermal logic to support the latest GPU adapters.
    
    Updated the language translations (non-English modes) for System Utilities.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.40_01-25-2019" date="1549108800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    Addressed an issue in which the system may not properly boot to the HPE 8GB
    Dual microSD Flash USB Drive when an SD card is installed on the internal SD
    slot when the system is configured for Legacy Boot Mode. This issue does not
    impact systems in UEFI Boot Mode.
    
    Addressed an issue where certain 3rd party USB drive keys may not function
    properly after a system reset when the system is configured in UEFI Boot Mode.
    
    Addressed an issue where the HPE CN1000E-T adapter may not boot properly in
    Legacy Boot Mode. This issue does not impact systems configured in UEFI Boot
    Mode.
    
    Addressed an issue where firmware updates staged through the HPE RESTful API
    may fail to properly execute on a subsequent boot and be marked with an
    exception in the iLO firmware installation queue.
    
    Addressed an issue where iLO virtual media may not boot properly after setting
    the Boot on Next Reset option in the iLO Remote Console and Media - Virtual
    Media settings.
    
    Addressed an issue where the AHS Download application from the System
    Utilities Embedded Applications or UEFI Shell may fail to work properly with
    iLO firmware 1.30 or later.
    
    Addressed an issue where the UEFI Shell sysconfig command may fail to set an
    option or become unresponsive.
    
    Addressed an issue where an optional SATA DVD drive may not unlock and allow
    media to be ejected after an operating system reboot.
    
    Addressed an issue where the system may become unresponsive during boot and
    experience a Red Screen (RSOD) when booting in Legacy Boot mode with a SATA
    M.2 drive installed. This issue does not impact systems in UEFI Boot Mode.
    
    Addressed an issue where a USB KVM, such as the HP AF611A KVM, may not
    function properly after a system reboot.
    
    Addressed an issue where Core Performance Boost may remain enabled even when
    disabled in BIOS/Platform Configuration (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.44_06-24-2019" date="1561723200">-     *Important Notes:**
    
    This revision of the System ROM provides mitigation for a new AMD Secure
    Encrypted Virtualization vulnerability. This includes support for mitigating
    the following vulnerability: CVE-2019-9836.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a Secure Encryption Virtualization encryption key
    could be compromised by manipulating the encryption technology's behavior when
    using AMD's secure encryption feature on a virtual machine running the Linux
    operating system. The following vulnerability has been addressed in this
    System ROM release: CVE-2019-9836.These security vulnerabilities are not
    unique to HPE servers.
    
    **Known Issues:**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.46_07-10-2019" date="1564574400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue with rare occurrences of unpredictable system behavior.
    This issue is NOT unique to HPE servers and would impact any systems using AMD
    EPYC 7001 Series processors that do not contain latest AMD microcode. Note:
    this does not address any security vulnerability mitigations.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.00_07-20-2019" date="1567080000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for AMD EPYC 7002 processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_09-17-2019" date="1569326400">-     Added setup option to disable Periodic Directory Rinse. Disabling this
    processor feature can improve performance in certain workloads. This option is
    only applicable when using AMD EPYC 7002 Series processors and does not apply
    to AMD EPYC 7000 Series processors.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_09-17-2019" date="1569412800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue with rare occurrences of unpredictable system behavior.
    This issue is NOT unique to HPE servers and may impact any systems using AMD
    EPYC 7002 Series processors that do not contain a BIOS update for this issue.
    This issue does not affect AMD EPYC 7000 Series processors.
    
    Addressed an issue where systems may fail to boot if configured with AMD EPYC
    7002 Series processors and 2400 MT/s memory.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.30_10-18-2019" date="1572436800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where PCIe root ports were incorrectly indicating they
    supported PCIe Gen4. In rare cases this could cause a PCIe device to attempt
    to train at Gen4. Only PCIe Gen1, Gen2, and Gen3 are supported on the ProLiant
    DL385 Gen10. Without this resolution devices may run slower than their optimal
    frequency.
    
    Addressed an issue where core counts for some processors such as AMD EPYC 7282
    would be incorrectly displayed in iLO and some pre-boot pages. This was not a
    functional issue and only affected the count of enabled cores as displayed to
    the user. The cores would have been active even without this resolution.
    
    Addressed an issue where the system may fail to boot if the RBSU Bifurcate
    option was set to anything other than Auto when using AMD EPYC 7002 series
    processors.
    
    Addressed an issue where the system may immediately power on after issuing
    shutdown while running VMware ESXi.
    
    Addressed an issue where some PCIe cards may not be available due to PCIe
    training issues.
    
    Addressed an issue where some rare system configurations using LRDIMMs would
    incorrectly flag a memory training error during boot. The iml would be logged
    every boot on the system.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="6d8406bbde45b12aad56b85bd61a58a29e52fd0ef67f7b0c5cc01d2a972babe9" name="firmware-system-a41" arch="x86_64">
    <version epoch="0" ver="2.30_2019_10_18" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.34_10-02-2018" date="1541073600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue with rare occurrences of unpredictable system behavior.
    This issue is NOT unique to HPE servers and would impact any systems using AMD
    EPYC 7000 Series processors.
    
    Addressed an issue with NVMe drives becoming unavailable to an operating
    system when updating the backplane firmware.
    
    Addressed a rare issue where NVMe drives may not be available to an operating
    system when installing two or more NVMe drives simultaneously.
    
    Addressed an issue with the RBSU setting for AMD Core Performance Boost not
    being correctly applied in all instances.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.40_01-25-2019" date="1549022400">-     Added support for HPE One button secure erase. This option can be launched
    from the HPE Intelligent Provisioning application or through the HPE RESTful
    API to securely restore the system back to a default configuration. This
    option also requires iLO firmware 1.40 or later, and Intelligent Provisioning
    3.30 or later.
    
    Added Secure Configuration Lock feature. This feature can be enabled to detect
    system hardware, security configuration, or firmware revision changes to
    protect against malicious or unintended modifications to the server. This
    protection can be enabled for systems in transit from the factory to the
    customer site, in transit from one customer site to another, or can be left
    enabled on a deployed server. A new BIOS/Platform Configuration (RBSU) Server
    Configuration Lock menu in the Server Security Options is available to enable
    and configure this functionality.
    
    Added a new BIOS/Platform Configuration (RBSU) Backup and Restore Settings
    menu to System Default Options. This option can be used to backup (save off)
    the current BIOS configurations settings to a USB storage device for migration
    to another server.
    
    Updated the system thermal logic to support the latest GPU adapters.
    
    Updated the language translations (non-English modes) for System Utilities.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.40_01-25-2019" date="1549108800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    Addressed an issue in which the system may not properly boot to the HPE 8GB
    Dual microSD Flash USB Drive when an SD card is installed on the internal SD
    slot when the system is configured for Legacy Boot Mode. This issue does not
    impact systems in UEFI Boot Mode.
    
    Addressed an issue where certain 3rd party USB drive keys may not function
    properly after a system reset when the system is configured in UEFI Boot Mode.
    
    Addressed an issue where the HPE CN1000E-T adapter may not boot properly in
    Legacy Boot Mode. This issue does not impact systems configured in UEFI Boot
    Mode.
    
    Addressed an issue where firmware updates staged through the HPE RESTful API
    may fail to properly execute on a subsequent boot and be marked with an
    exception in the iLO firmware installation queue.
    
    Addressed an issue where iLO virtual media may not boot properly after setting
    the Boot on Next Reset option in the iLO Remote Console and Media - Virtual
    Media settings.
    
    Addressed an issue where the AHS Download application from the System
    Utilities Embedded Applications or UEFI Shell may fail to work properly with
    iLO firmware 1.30 or later.
    
    Addressed an issue where the UEFI Shell sysconfig command may fail to set an
    option or become unresponsive.
    
    Addressed an issue where an optional SATA DVD drive may not unlock and allow
    media to be ejected after an operating system reboot.
    
    Addressed an issue where the system may become unresponsive during boot and
    experience a Red Screen (RSOD) when booting in Legacy Boot mode with a SATA
    M.2 drive installed. This issue does not impact systems in UEFI Boot Mode.
    
    Addressed an issue where a USB KVM, such as the HP AF611A KVM, may not
    function properly after a system reboot.
    
    Addressed an issue where Core Performance Boost may remain enabled even when
    disabled in BIOS/Platform Configuration (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.42_04-16-2019" date="1561636800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Trusted Platform Module (TPM) Firmware update does
    not complete successfully.
    
    Addressed an issue where systems configured for SATA RAID may incorrectly
    report that fan 1 and/or fan 7 are missing. These fans are not required for
    this configuration.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.44_06-24-2019" date="1561723200">-     *Important Notes:**
    
    This revision of the System ROM provides mitigation for a new AMD Secure
    Encrypted Virtualization vulnerability. This includes support for mitigating
    the following vulnerability: CVE-2019-9836.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a Secure Encryption Virtualization encryption key
    could be compromised by manipulating the encryption technology's behavior when
    using AMD's secure encryption feature on a virtual machine running the Linux
    operating system. The following vulnerability has been addressed in this
    System ROM release: CVE-2019-9836.These security vulnerabilities are not
    unique to HPE servers.
    
    **Known Issues:**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.46_07-10-2019" date="1564574400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue with rare occurrences of unpredictable system behavior.
    This issue is NOT unique to HPE servers and would impact any systems using AMD
    EPYC 7001 Series processors that do not contain latest AMD microcode. Note:
    this does not address any security vulnerability mitigations.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.00_07-20-2019" date="1567080000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for AMD EPYC 7002 processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_09-17-2019" date="1569326400">-     Added setup option to disable Periodic Directory Rinse. Disabling this
    processor feature can improve performance in certain workloads. This option is
    only applicable when using AMD EPYC 7002 Series processors and does not apply
    to AMD EPYC 7000 Series processors.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_09-17-2019" date="1569412800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue with rare occurrences of unpredictable system behavior.
    This issue is NOT unique to HPE servers and may impact any systems using AMD
    EPYC 7002 Series processors that do not contain a BIOS update for this issue.
    This issue does not affect AMD EPYC 7000 Series processors.
    
    Addressed an issue where systems may fail to boot if configured with AMD EPYC
    7002 Series processors and 2400 MT/s memory.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.30_10-18-2019" date="1572436800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where PCIe root ports were incorrectly indicating they
    supported PCIe Gen4. In rare cases this could cause a PCIe device to attempt
    to train at Gen4. Only PCIe Gen1, Gen2, and Gen3 are supported on the ProLiant
    DL385 Gen10. Without this resolution devices may run slower than their optimal
    frequency.
    
    Addressed an issue where core counts for some processors such as AMD EPYC 7282
    would be incorrectly displayed in iLO and some pre-boot pages. This was not a
    functional issue and only affected the count of enabled cores as displayed to
    the user. The cores would have been active even without this resolution.
    
    Addressed an issue where the system may fail to boot if the RBSU Bifurcate
    option was set to anything other than Auto when using AMD EPYC 7002 series
    processors.
    
    Addressed an issue where the system may immediately power on after issuing
    shutdown while running VMware ESXi.
    
    Addressed an issue where some PCIe cards may not be available due to PCIe
    training issues.
    
    Addressed an issue where some rare system configurations using LRDIMMs would
    incorrectly flag a memory training error during boot. The iml would be logged
    every boot on the system.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="69d1b4647517d9829ca9c906cd1ccd5d6558cfcf8771e0bd8b802b3a079aa28b" name="firmware-system-a42" arch="x86_64">
    <version epoch="0" ver="1.10_2019_10_29" rel="1.1"/>
  </package>
  <package pkgid="6738a5ed6e34b5f2ceae282c38cfaca5a9c5d978d8ebe3f4b46832854cd61557" name="firmware-system-a43" arch="x86_64">
    <version epoch="0" ver="1.10_2019_10_29" rel="1.1"/>
  </package>
  <package pkgid="e632c6654c8a407a9933d7b46933a53106aa20bd5beebe68a21200c942e40dec" name="firmware-system-i36" arch="i386">
    <version epoch="0" ver="2.76_2019_10_21" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541419200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541505600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1543924800">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1544011200">-     *Important Notes:**
    
    Ver. 2.64(B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.64. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 2.64.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue is not unique to HPE servers. Please consult
    the following advisory for additional details.
    &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00060570en_us&gt;
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70_12-29-2018" date="1552564800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_03-25-2019" date="1556712000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_03-25-2019-2.1" date="1561982400">-     *Important Notes:**
    
    Ver. 2.72 (B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.72.  It is not necessary to upgrade with Revision (B) if
    a previous component revision was used to upgrade the firmware to ver. 2.72.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system and/or hypervisor
    updates, provides mitigation for a new group of side channel vulnerabilities
    known as Microarchitectural Data Sampling (MDS).  This includes support for
    mitigating the following vulnerabilities:  CVE-2018-12126 - Microarchitectural
    Store Buffer Data Sampling, CVE-2018-12130 - Microarchitectural Fill Buffer
    Data Sampling, CVE-2018-12127 - Microarchitectural Load Port Data Sampling,
    and CVE-2019-11091 - Microarchitectural Data Sampling Uncacheable Memory.
    These issues are not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system and/or hypervisor
    updates, provides mitigation for a new group of side channel vulnerabilities
    known as Microarchitectural Data Sampling (MDS).  This includes support for
    mitigating the following vulnerabilities:  CVE-2018-12126 - Microarchitectural
    Store Buffer Data Sampling, CVE-2018-12130 - Microarchitectural Fill Buffer
    Data Sampling, CVE-2018-12127 - Microarchitectural Load Port Data Sampling,
    and CVE-2019-11091 - Microarchitectural Data Sampling Uncacheable Memory.
    These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565006400">-     This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where the system may
    experience a machine check after updating to the latest System ROM which
    contained a fix for an Intel TSX (Transactional Synchronizations Extensions)
    sightings. The previous microcode was first introduced in the v2.70 System
    ROM. This issue only impacts systems configured with Intel Xeon v4 Series
    processors. This issue is not unique to HPE servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565092800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where a system booting to VMware may
    experience a PSOD in legacy boot mode. This issue does not impact systems in
    UEFI boot mode or other operating systems.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_10-21-2019" date="1575028800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled (TXT is disabled
    by default). This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigation for CVE-2019-11137. This issue
    is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="53f6533915146f96644b10f7bbaf95bac28f40123d36264bf63b9689b0abee52" name="firmware-system-i38" arch="i386">
    <version epoch="0" ver="2.76_2019_10_21" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018" date="1528459200">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    Addressed an issue where uncorrectable Quick Path Interlink (QPI) errors would
    not be reported properly and logged to the Integrated Management Log.
    Previously, the system would become unresponsive during boot with no
    indication of a failure.
    
    Addressed an issue where systems configured Intel Xeon E5-2600 v4 processors
    and 64GB LRDIMMs may experience a Machine Check Exception or NMI event when
    under heavy stress. This issue is not unique to HPE Servers.
    
    Addressed an issue where the HPE RESTful settings for Software Initiator iSCSI
    may not be available in the resource registry.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541419200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541505600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 4600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548763200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548849600">-     *Important Notes:**
    
    Ver. 2.64(B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.64. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 2.64.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue is not unique to HPE servers. Please consult
    the following advisory for additional details.
    &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00060570en_us&gt;
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 4600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70_12-29-2018" date="1552564800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_03-25-2019" date="1556712000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565006400">-     This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where the system may
    experience a machine check after updating to the latest System ROM which
    contained a fix for an Intel TSX (Transactional Synchronizations Extensions)
    sightings. The previous microcode was first introduced in the v2.70 System
    ROM. This issue only impacts systems configured with Intel Xeon v4 Series
    processors. This issue is not unique to HPE servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565092800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where a system booting to VMware may
    experience a PSOD in legacy boot mode. This issue does not impact systems in
    UEFI boot mode or other operating systems.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_10-21-2019" date="1575028800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled (TXT is disabled
    by default). This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigation for CVE-2019-11137. This issue
    is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="339673b1cbc38e839f86f519e63f9bf5c7c1777dc92f19ddd259918f07b560d7" name="firmware-system-i41" arch="x86_64">
    <version epoch="0" ver="2.22_2019_11_13" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50_12-29-2018" date="1548849600">-     *Important Notes:**
    
    This revision of the System ROM contains enhancements to the HPE memory
    support to improve memory resiliency. Please consult the following Customer
    Advisory for additional details:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00064444en_us
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Improved the memory resiliency of the server with enhanced support for HPE
    Fast Fault Tolerant Memory (ADDDC) capabilities. This System ROM will now
    configure the Advanced Memory Protection mode of the server to HPE Fast Fault
    Tolerant (ADDDC) memory mode for all Workload Profiles except Low Latency and
    Custom if the feature is supported by the server's DIMM configuration. Note
    that if the Advanced Memory Protection mode had previously been configured for
    Mirroring or Online Spare, the setting will NOT be automatically changed to
    HPE Fast Fault Tolerant Memory (ADDDC) mode. Also, if the DIMM configuration
    does not support HPE Fast Fault Tolerant Memory (ADDDC) mode, then the
    Advanced Memory Protection Mode will remain Advanced ECC Mode. Note that if
    the current BIOS configuration settings are queried via Redfish or the RESTful
    API, the setting for the Advanced Memory Protection Mode will indicate this
    change.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.02_03-19-2019" date="1553774400">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.  
    
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This system ROM contains the latest Intel microcode that addresses an issue
    where the system may experience an Uncorrected Machine Check Exception in Bank
    0 with Status containing 000F0150. This update may not address all Bank 0
    machine check events with a Status containing 000F0150 but should be used
    before any other further service actions for issues resulting in this
    Integrated Management Log (IML) entry. This issue is not unique to HPE
    servers. This issue was incorrectly documented as being addressed in the v2.00
    System ROMs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.04_04-18-2019" date="1556798400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    Addressed an issue where the system may experience a higher rate of
    Uncorrectable Memory errors or boot time Memory training issues with Intel
    Xeon Scalable Performance Bronze and Silver processors. This issue was first
    introduced with System ROM version 2.00. HPE recommends that any customer
    experiencing a memory issue immediately update to this version of the system
    ROM before replacing any components. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561896000">-     Added a new BIOS/Platform Configuration (RBSU) option called Intel Priority
    Based Frequency to support enabling Intel Speed Select - Base Frequency
    support on select 2nd Generation Xeon Scalable Family Processors that are
    optimized for NFV workloads. This option, which is disabled by default, is
    located in the Processor Options menu and visible only when NFV optimized SKUs
    are installed (denoted by the N in the SKU model). On supported Operating
    Systems, Intel Speed Select - Based Frequency functionality allows high
    priority cores to operate at a higher frequency than the nominal base
    frequency while lower priority cores will run at a slower frequency.
    
    Added a new BIOS/Platform Configuration (RBSU) I/O Direct Cache (IODC) menu to
    the Power and Performance Menu. This option allows for tuning the policy for
    which I/O transactions interact with the processor cache. The caching policy
    may have a slight impact on cross socket latency. Workloads where this option
    would need to be modified from its default value for optimum performance are
    extremely rare.
    
    Added support for HPE Fast Fault Tolerant Memory (ADDDC) to operate when a
    single memory rank is only available on a given memory channel. Previous
    versions of the System ROM required two or more memory ranks to be available
    on each memory channel. After updating to this version of the System ROM the
    server will automatically configure the system for HPE Fast Fault Tolerant
    Memory Mode if the memory configuration supports this option.
    
    Updated the UEFI OpenSSL support to version 1.0.2r to address security
    vulnerability CVE-2019-1559.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561982400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Server Backup and Restore functionality may not
    work properly if initiated through the HPE RESTful API returning a message "An
    internal error occurred during RIS operation".
    
    Addressed an issue where configuring memory to run at 2x refresh rate would
    still actually operate memory at 1x refresh rate. This issue was introduced
    with the v2.00 System ROM and did not impact earlier versions of the System
    ROM. This issue is not unique to HPE servers.
    
    Addressed an issue where the NVMe PCIe Resource Padding option in
    BIOS/Platform Configuration (RBSU) would not properly allocated sufficient
    resources to support a NVMe hot add event. In certain configurations, an
    insufficient amount of resources would have been reserved and a reboot would
    have been required to detect the presence of the newly added drive.
    
    Addressed an issue where the system would not boot to a USB drive when a non-
    bootable (non-formatted) drive was also present in the system. This issue only
    impacts systems configured in Legacy Boot Mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.14_09-05-2019" date="1568808000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where certain 2933Mhz LRDIMMs (HPE part number P03054-091,
    P03055-091 and P11057-0A1) may experience an uncorrectable memory error when
    operating with a Second Generation Intel Xeon Scalable Processor. This issue
    can be seen when processor c-states are enabled on the platform. This issue
    does not impact 2666Mhz LRDIMMs or any speed RDIMM. HPE recommends that
    customers experiencing an uncorrectable memory error in one of these
    configurations update to this version of the System ROM before replacing any
    memory. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.16_09-12-2019" date="1569499200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system may experience an
    unexpected machine check exception. This issue would be logged to the
    Integrated Management Log (IML) as a Bank 0x03 or Bank 0x04 with status
    0xBE000000'00800400 or 0xFE000000'00800400 Machine Check Exception. This issue
    is not unique to HPE servers.
    
    This version of the System ROM includes the latest version of the Intel
    microcode which addresses an issue where under complex microarchitectural
    conditions involving branch instructions that span multiple 64 byte
    boundaries, unpredictable system behavior may occur. This issue is not unique
    to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573128000">-     Updated to the latest thermal support for the platform.
    
    Updated the language translations (non-English modes) for System Utilities.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573214400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.22_11-13-2019" date="1576411200">-     *Important Notes:**
    
    This version of the System ROM replaces the previously published v2.20 System
    ROM. The v2.20 System ROM introduced an issue where a small subset LRDIMMs
    could experience an uncorrectable memory error. This issue had been previously
    fixed in the v2.14 ROM of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="11d9b034c0a23fd778566b24d6cbe10271e2c95cbc42be61621c7ecf1f1fddae" name="firmware-system-p85" arch="i386">
    <version epoch="0" ver="2.76_2019_10_21" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018" date="1528459200">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    Addressed an issue where uncorrectable Quick Path Interlink (QPI) errors would
    not be reported properly and logged to the Integrated Management Log.
    Previously, the system would become unresponsive during boot with no
    indication of a failure.
    
    Addressed an issue where systems configured Intel Xeon E5-2600 v4 processors
    and 64GB LRDIMMs may experience a Machine Check Exception or NMI event when
    under heavy stress. This issue is not unique to HPE Servers.
    
    Addressed an issue where the HPE RESTful settings for Software Initiator iSCSI
    may not be available in the resource registry.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541419200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541505600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 4600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548763200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548849600">-     *Important Notes:**
    
    Ver. 2.64(B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.64. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 2.64.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue is not unique to HPE servers. Please consult
    the following advisory for additional details.
    &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00060570en_us&gt;
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 4600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70_12-29-2018" date="1552564800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_03-25-2019" date="1556712000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565006400">-     This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where the system may
    experience a machine check after updating to the latest System ROM which
    contained a fix for an Intel TSX (Transactional Synchronizations Extensions)
    sightings. The previous microcode was first introduced in the v2.70 System
    ROM. This issue only impacts systems configured with Intel Xeon v4 Series
    processors. This issue is not unique to HPE servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565092800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where a system booting to VMware may
    experience a PSOD in legacy boot mode. This issue does not impact systems in
    UEFI boot mode or other operating systems.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_10-21-2019" date="1574683200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigation for CVE-2019-11137. This issue
    is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="21fda0cf06cfbedc01f7ca88728706f746d46852686d9c67f5b0c1dc3a6c30b5" name="firmware-system-p86" arch="i386">
    <version epoch="0" ver="2.76_2019_10_21" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018" date="1528459200">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    Addressed an issue where uncorrectable Quick Path Interlink (QPI) errors would
    not be reported properly and logged to the Integrated Management Log.
    Previously, the system would become unresponsive during boot with no
    indication of a failure.
    
    Addressed an issue where systems configured Intel Xeon E5-2600 v4 processors
    and 64GB LRDIMMs may experience a Machine Check Exception or NMI event when
    under heavy stress. This issue is not unique to HPE Servers.
    
    Addressed an issue where the HPE RESTful settings for Software Initiator iSCSI
    may not be available in the resource registry.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541419200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541505600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548763200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548849600">-     *Important Notes:**
    
    Ver. 2.64(B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.64. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 2.64.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue is not unique to HPE servers. Please consult
    the following advisory for additional details.
    &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00060570en_us&gt;
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70_12-29-2018" date="1552564800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_03-25-2019" date="1556884800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565006400">-     This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where the system may
    experience a machine check after updating to the latest System ROM which
    contained a fix for an Intel TSX (Transactional Synchronizations Extensions)
    sightings. The previous microcode was first introduced in the v2.70 System
    ROM. This issue only impacts systems configured with Intel Xeon v4 Series
    processors. This issue is not unique to HPE servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565092800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where a system booting to VMware may
    experience a PSOD in legacy boot mode. This issue does not impact systems in
    UEFI boot mode or other operating systems.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_10-21-2019" date="1574942400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigation for CVE-2019-11137. This issue
    is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="e702a47b691c9d337fcc0ce3a0e008eedcdcb0161e2208e22069e7f37d1089a9" name="firmware-system-p89" arch="i386">
    <version epoch="0" ver="2.76_2019_10_21" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541419200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541505600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1544443200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1544529600">-     *Important Notes:**
    
    Ver. 2.64(B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.64. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 2.64.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue is not unique to HPE servers. Please consult
    the following advisory for additional details.
    &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00060570en_us&gt;
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70_12-29-2018" date="1552564800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_03-25-2019" date="1556884800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_03-25-2019-2.1" date="1561982400">-     *Important Notes:**
    
    Ver. 2.72 (B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.72.  It is not necessary to upgrade with Revision (B) if
    a previous component revision was used to upgrade the firmware to ver. 2.72.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system and/or hypervisor
    updates, provides mitigation for a new group of side channel vulnerabilities
    known as Microarchitectural Data Sampling (MDS).  This includes support for
    mitigating the following vulnerabilities:  CVE-2018-12126 - Microarchitectural
    Store Buffer Data Sampling, CVE-2018-12130 - Microarchitectural Fill Buffer
    Data Sampling, CVE-2018-12127 - Microarchitectural Load Port Data Sampling,
    and CVE-2019-11091 - Microarchitectural Data Sampling Uncacheable Memory.
    These issues are not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system and/or hypervisor
    updates, provides mitigation for a new group of side channel vulnerabilities
    known as Microarchitectural Data Sampling (MDS).  This includes support for
    mitigating the following vulnerabilities:  CVE-2018-12126 - Microarchitectural
    Store Buffer Data Sampling, CVE-2018-12130 - Microarchitectural Fill Buffer
    Data Sampling, CVE-2018-12127 - Microarchitectural Load Port Data Sampling,
    and CVE-2019-11091 - Microarchitectural Data Sampling Uncacheable Memory.
    These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565006400">-     This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where the system may
    experience a machine check after updating to the latest System ROM which
    contained a fix for an Intel TSX (Transactional Synchronizations Extensions)
    sightings. The previous microcode was first introduced in the v2.70 System
    ROM. This issue only impacts systems configured with Intel Xeon v4 Series
    processors. This issue is not unique to HPE servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565092800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where a system booting to VMware may
    experience a PSOD in legacy boot mode. This issue does not impact systems in
    UEFI boot mode or other operating systems.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_10-21-2019" date="1574683200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigation for CVE-2019-11137. This issue
    is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="2e8cacae963a1ff4ae1da0b780b311b9473a3e46e12783e6e4941377e6716fc4" name="firmware-system-p92" arch="i386">
    <version epoch="0" ver="2.76_2019_10_21" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018" date="1528459200">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    Addressed an issue where uncorrectable Quick Path Interlink (QPI) errors would
    not be reported properly and logged to the Integrated Management Log.
    Previously, the system would become unresponsive during boot with no
    indication of a failure.
    
    Addressed an issue where systems configured Intel Xeon E5-2600 v4 processors
    and 64GB LRDIMMs may experience a Machine Check Exception or NMI event when
    under heavy stress. This issue is not unique to HPE Servers.
    
    Addressed an issue where the HPE RESTful settings for Software Initiator iSCSI
    may not be available in the resource registry.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541419200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541505600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548763200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548849600">-     *Important Notes:**
    
    Ver. 2.64(B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.64. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 2.64.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue is not unique to HPE servers. Please consult
    the following advisory for additional details.
    &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00060570en_us&gt;
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70_12-29-2018" date="1552564800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_03-25-2019" date="1556712000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565006400">-     This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where the system may
    experience a machine check after updating to the latest System ROM which
    contained a fix for an Intel TSX (Transactional Synchronizations Extensions)
    sightings. The previous microcode was first introduced in the v2.70 System
    ROM. This issue only impacts systems configured with Intel Xeon v4 Series
    processors. This issue is not unique to HPE servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565092800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where a system booting to VMware may
    experience a PSOD in legacy boot mode. This issue does not impact systems in
    UEFI boot mode or other operating systems.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_10-21-2019" date="1574596800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigation for CVE-2019-11137. This issue
    is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="f72decb5b99796e9e10cac98cd55dcd21bcc0d92a3b5695e34b4448e987e7d1f" name="firmware-system-p95" arch="i386">
    <version epoch="0" ver="2.76_2019_10_21" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018" date="1528459200">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    Addressed an issue where uncorrectable Quick Path Interlink (QPI) errors would
    not be reported properly and logged to the Integrated Management Log.
    Previously, the system would become unresponsive during boot with no
    indication of a failure.
    
    Addressed an issue where systems configured Intel Xeon E5-2600 v4 processors
    and 64GB LRDIMMs may experience a Machine Check Exception or NMI event when
    under heavy stress. This issue is not unique to HPE Servers.
    
    Addressed an issue where the HPE RESTful settings for Software Initiator iSCSI
    may not be available in the resource registry.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541419200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541505600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548763200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548849600">-     *Important Notes:**
    
    Ver. 2.64(B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.64. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 2.64.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue is not unique to HPE servers. Please consult
    the following advisory for additional details.
    &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00060570en_us&gt;
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70_12-29-2018" date="1552564800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_03-25-2019" date="1556712000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565006400">-     This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where the system may
    experience a machine check after updating to the latest System ROM which
    contained a fix for an Intel TSX (Transactional Synchronizations Extensions)
    sightings. The previous microcode was first introduced in the v2.70 System
    ROM. This issue only impacts systems configured with Intel Xeon v4 Series
    processors. This issue is not unique to HPE servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565092800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where a system booting to VMware may
    experience a PSOD in legacy boot mode. This issue does not impact systems in
    UEFI boot mode or other operating systems.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_10-21-2019" date="1574942400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigation for CVE-2019-11137. This issue
    is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="cd394e0b9f2f5bc87c3218dc586dc2c08242edda53377bbbd96e6426165205e2" name="firmware-system-p99" arch="i386">
    <version epoch="0" ver="2.76_2019_10_21" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018" date="1528459200">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    Addressed an issue where uncorrectable Quick Path Interlink (QPI) errors would
    not be reported properly and logged to the Integrated Management Log.
    Previously, the system would become unresponsive during boot with no
    indication of a failure.
    
    Addressed an issue where systems configured Intel Xeon E5-2600 v4 processors
    and 64GB LRDIMMs may experience a Machine Check Exception or NMI event when
    under heavy stress. This issue is not unique to HPE Servers.
    
    Addressed an issue where the HPE RESTful settings for Software Initiator iSCSI
    may not be available in the resource registry.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541419200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541505600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548763200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548849600">-     *Important Notes:**
    
    Ver. 2.64(B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.64. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 2.64.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue is not unique to HPE servers. Please consult
    the following advisory for additional details.
    &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00060570en_us&gt;
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70_12-29-2018" date="1552564800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_03-25-2019" date="1556712000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565006400">-     This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where the system may
    experience a machine check after updating to the latest System ROM which
    contained a fix for an Intel TSX (Transactional Synchronizations Extensions)
    sightings. The previous microcode was first introduced in the v2.70 System
    ROM. This issue only impacts systems configured with Intel Xeon v4 Series
    processors. This issue is not unique to HPE servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565092800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where a system booting to VMware may
    experience a PSOD in legacy boot mode. This issue does not impact systems in
    UEFI boot mode or other operating systems.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_10-21-2019" date="1575028800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled (TXT is disabled
    by default). This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigation for CVE-2019-11137. This issue
    is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="639862ecfa2509b64644ba1b62dbc70f099f360461552b78afcf490614f2a1ed" name="firmware-system-u13" arch="i386">
    <version epoch="0" ver="2.76_2019_10_21" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018" date="1528459200">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    Addressed an issue where uncorrectable Quick Path Interlink (QPI) errors would
    not be reported properly and logged to the Integrated Management Log.
    Previously, the system would become unresponsive during boot with no
    indication of a failure.
    
    Addressed an issue where systems configured Intel Xeon E5-2600 v4 processors
    and 64GB LRDIMMs may experience a Machine Check Exception or NMI event when
    under heavy stress. This issue is not unique to HPE Servers.
    
    Addressed an issue where the HPE RESTful settings for Software Initiator iSCSI
    may not be available in the resource registry.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541419200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541505600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548763200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548849600">-     *Important Notes:**
    
    Ver. 2.64(B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.64. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 2.64.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue is not unique to HPE servers. Please consult
    the following advisory for additional details.
    &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00060570en_us&gt;
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70_12-29-2018" date="1552564800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_03-25-2019" date="1556712000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565006400">-     This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where the system may
    experience a machine check after updating to the latest System ROM which
    contained a fix for an Intel TSX (Transactional Synchronizations Extensions)
    sightings. The previous microcode was first introduced in the v2.70 System
    ROM. This issue only impacts systems configured with Intel Xeon v4 Series
    processors. This issue is not unique to HPE servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565092800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where a system booting to VMware may
    experience a PSOD in legacy boot mode. This issue does not impact systems in
    UEFI boot mode or other operating systems.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_10-21-2019" date="1574683200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigation for CVE-2019-11137. This issue
    is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="8386d0fd4af4d8c562a5f23ecc6722176d72d8370963f338215cf15e72a6d4ff" name="firmware-system-u14" arch="i386">
    <version epoch="0" ver="2.76_2019_10_21" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-22-2018" date="1528459200">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    Addressed an issue where uncorrectable Quick Path Interlink (QPI) errors would
    not be reported properly and logged to the Integrated Management Log.
    Previously, the system would become unresponsive during boot with no
    indication of a failure.
    
    Addressed an issue where systems configured Intel Xeon E5-2600 v4 processors
    and 64GB LRDIMMs may experience a Machine Check Exception or NMI event when
    under heavy stress. This issue is not unique to HPE Servers.
    
    Addressed an issue where the HPE RESTful settings for Software Initiator iSCSI
    may not be available in the resource registry.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541419200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541505600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548763200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548849600">-     *Important Notes:**
    
    Ver. 2.64(B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.64. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 2.64.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue is not unique to HPE servers. Please consult
    the following advisory for additional details.
    &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00060570en_us&gt;
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70_12-29-2018" date="1552564800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_03-25-2019" date="1556884800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565006400">-     This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where the system may
    experience a machine check after updating to the latest System ROM which
    contained a fix for an Intel TSX (Transactional Synchronizations Extensions)
    sightings. The previous microcode was first introduced in the v2.70 System
    ROM. This issue only impacts systems configured with Intel Xeon v4 Series
    processors. This issue is not unique to HPE servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565092800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where a system booting to VMware may
    experience a PSOD in legacy boot mode. This issue does not impact systems in
    UEFI boot mode or other operating systems.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_10-21-2019" date="1574683200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigation for CVE-2019-11137. This issue
    is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="a83d8a2e39ca31769ec1e99d3a3c70dab840bbe5a76a6f5a9013cd796a9aac5d" name="firmware-system-u15" arch="i386">
    <version epoch="0" ver="2.76_2019_10_21" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018" date="1528459200">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    Addressed an issue where uncorrectable Quick Path Interlink (QPI) errors would
    not be reported properly and logged to the Integrated Management Log.
    Previously, the system would become unresponsive during boot with no
    indication of a failure.
    
    Addressed an issue where systems configured Intel Xeon E5-2600 v4 processors
    and 64GB LRDIMMs may experience a Machine Check Exception or NMI event when
    under heavy stress. This issue is not unique to HPE Servers.
    
    Addressed an issue where the HPE RESTful settings for Software Initiator iSCSI
    may not be available in the resource registry.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541419200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541505600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548763200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548849600">-     *Important Notes:**
    
    Ver. 2.64(B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.64. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 2.64.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue is not unique to HPE servers. Please consult
    the following advisory for additional details.
    &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00060570en_us&gt;
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70_12-29-2018" date="1552564800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_03-25-2019" date="1556884800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565006400">-     This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where the system may
    experience a machine check after updating to the latest System ROM which
    contained a fix for an Intel TSX (Transactional Synchronizations Extensions)
    sightings. The previous microcode was first introduced in the v2.70 System
    ROM. This issue only impacts systems configured with Intel Xeon v4 Series
    processors. This issue is not unique to HPE servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565092800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where a system booting to VMware may
    experience a PSOD in legacy boot mode. This issue does not impact systems in
    UEFI boot mode or other operating systems.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_10-21-2019" date="1575028800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigation for CVE-2019-11137. This issue
    is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="b3b73d0ec0de5e93fff9be601a9fc04a04419d2ffe1520d876a2480598ac7817" name="firmware-system-u17" arch="i386">
    <version epoch="0" ver="2.76_2019_10_21" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_01-22-2018" date="1519992000">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for Variant 2 of the Side Channel Analysis vulnerability, also
    known as Spectre. The revision of the microcode included in this System ROM
    addresses issues with more frequent reboots and unpredictable system behavior
    which impacted the previous Intel microcode which was part of the Spectre
    Variant 2 mitigation. Additional information is available from Intel's
    Security Exploit Newsroom, &lt;https://newsroom.intel.com/press-kits/security-
    exploits-intel-products/&gt;.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-23-2018" date="1528372800">-     Added support to allow for the ROM Based Setup Utility (RBSU) Power Regulator
    setting to be set to Static Low or OS Control Mode when the Processor Power
    and Utilization Support was disabled. Previous ROMs required the Power
    Regulator to be configured for Static High Mode only.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-23-2018" date="1528459200">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    Addressed an issue where uncorrectable Quick Path Interlink (QPI) errors would
    not be reported properly and logged to the Integrated Management Log.
    Previously, the system would become unresponsive during boot with no
    indication of a failure.
    
    Addressed an issue where systems configured Intel Xeon E5-2600 v4 processors
    and 64GB LRDIMMs may experience a Machine Check Exception or NMI event when
    under heavy stress. This issue is not unique to HPE Servers.
    
    Addressed an issue where the HPE RESTful settings for Software Initiator iSCSI
    may not be available in the resource registry.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_10-11-2018" date="1541505600">-     *Important Notes:**
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_10-11-2018-2.1" date="1548849600">-     *Important Notes:**
    
    Ver. 2.62(B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.62. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 2.62.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70_12-29-2018" date="1552564800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_03-25-2019" date="1556884800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565006400">-     This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where the system may
    experience a machine check after updating to the latest System ROM which
    contained a fix for an Intel TSX (Transactional Synchronizations Extensions)
    sightings. The previous microcode was first introduced in the v2.70 System
    ROM. This issue only impacts systems configured with Intel Xeon v4 Series
    processors. This issue is not unique to HPE servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565092800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where a system booting to VMware may
    experience a PSOD in legacy boot mode. This issue does not impact systems in
    UEFI boot mode or other operating systems.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_10-21-2019" date="1574942400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigation for CVE-2019-11137. This issue
    is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="2d03abc1335e9b0c80acd30a58e7b61f2958f1937da874f36a4db9601e1c9d0f" name="firmware-system-u18" arch="i386">
    <version epoch="0" ver="2.76_2019_10_21" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018" date="1528459200">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    Addressed an issue where uncorrectable Quick Path Interlink (QPI) errors would
    not be reported properly and logged to the Integrated Management Log.
    Previously, the system would become unresponsive during boot with no
    indication of a failure.
    
    Addressed an issue where systems configured Intel Xeon E5-2600 v4 processors
    and 64GB LRDIMMs may experience a Machine Check Exception or NMI event when
    under heavy stress. This issue is not unique to HPE Servers.
    
    Addressed an issue where the HPE RESTful settings for Software Initiator iSCSI
    may not be available in the resource registry.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541419200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541505600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548763200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548849600">-     *Important Notes:**
    
    Ver. 2.64(B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.64. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 2.64.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue is not unique to HPE servers. Please consult
    the following advisory for additional details.
    &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00060570en_us&gt;
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70_12-29-2018" date="1552564800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_03-25-2019" date="1556712000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565006400">-     This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where the system may
    experience a machine check after updating to the latest System ROM which
    contained a fix for an Intel TSX (Transactional Synchronizations Extensions)
    sightings. The previous microcode was first introduced in the v2.70 System
    ROM. This issue only impacts systems configured with Intel Xeon v4 Series
    processors. This issue is not unique to HPE servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565092800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where a system booting to VMware may
    experience a PSOD in legacy boot mode. This issue does not impact systems in
    UEFI boot mode or other operating systems.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_10-21-2019" date="1574683200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigation for CVE-2019-11137. This issue
    is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="84bf7eaf284d91f9da9ff87237b57d56b111126fbebc73bb00ab4ef95d89ef44" name="firmware-system-u19" arch="i386">
    <version epoch="0" ver="2.76_2019_10_21" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018" date="1528459200">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    Addressed an issue where uncorrectable Quick Path Interlink (QPI) errors would
    not be reported properly and logged to the Integrated Management Log.
    Previously, the system would become unresponsive during boot with no
    indication of a failure.
    
    Addressed an issue where systems configured Intel Xeon E5-2600 v4 processors
    and 64GB LRDIMMs may experience a Machine Check Exception or NMI event when
    under heavy stress. This issue is not unique to HPE Servers.
    
    Addressed an issue where the HPE RESTful settings for Software Initiator iSCSI
    may not be available in the resource registry.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541419200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541505600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548763200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548849600">-     *Important Notes:**
    
    Ver. 2.64(B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.64. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 2.64.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue is not unique to HPE servers. Please consult
    the following advisory for additional details.
    &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00060570en_us&gt;
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70_12-29-2018" date="1552564800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_03-25-2019" date="1556712000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565006400">-     This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where the system may
    experience a machine check after updating to the latest System ROM which
    contained a fix for an Intel TSX (Transactional Synchronizations Extensions)
    sightings. The previous microcode was first introduced in the v2.70 System
    ROM. This issue only impacts systems configured with Intel Xeon v4 Series
    processors. This issue is not unique to HPE servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565092800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where a system booting to VMware may
    experience a PSOD in legacy boot mode. This issue does not impact systems in
    UEFI boot mode or other operating systems.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_10-21-2019" date="1575028800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled (TXT is disabled
    by default). This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigation for CVE-2019-11137. This issue
    is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="051fcd73ed950eae4d1649193d24dfc13e67f6c2156edb559c09c461fca165b7" name="firmware-system-u20" arch="i386">
    <version epoch="0" ver="2.76_2019_10_21" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018" date="1528459200">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    Addressed an issue where uncorrectable Quick Path Interlink (QPI) errors would
    not be reported properly and logged to the Integrated Management Log.
    Previously, the system would become unresponsive during boot with no
    indication of a failure.
    
    Addressed an issue where systems configured Intel Xeon E5-2600 v4 processors
    and 64GB LRDIMMs may experience a Machine Check Exception or NMI event when
    under heavy stress. This issue is not unique to HPE Servers.
    
    Addressed an issue where the HPE RESTful settings for Software Initiator iSCSI
    may not be available in the resource registry.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541419200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541505600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548763200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548849600">-     *Important Notes:**
    
    Ver. 2.64(B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.64. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 2.64.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue is not unique to HPE servers. Please consult
    the following advisory for additional details.
    &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00060570en_us&gt;
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70_12-29-2018" date="1552564800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_03-25-2019" date="1556712000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565006400">-     This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where the system may
    experience a machine check after updating to the latest System ROM which
    contained a fix for an Intel TSX (Transactional Synchronizations Extensions)
    sightings. The previous microcode was first introduced in the v2.70 System
    ROM. This issue only impacts systems configured with Intel Xeon v4 Series
    processors. This issue is not unique to HPE servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565092800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where a system booting to VMware may
    experience a PSOD in legacy boot mode. This issue does not impact systems in
    UEFI boot mode or other operating systems.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_10-21-2019" date="1574683200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigation for CVE-2019-11137. This issue
    is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="e07173c4237640d72cc44c6082a65202da78d56f48af271d0dd32f2c2d56ec5e" name="firmware-system-u21" arch="i386">
    <version epoch="0" ver="2.76_2019_10_21" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018" date="1528459200">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    Addressed an issue where uncorrectable Quick Path Interlink (QPI) errors would
    not be reported properly and logged to the Integrated Management Log.
    Previously, the system would become unresponsive during boot with no
    indication of a failure.
    
    Addressed an issue where systems configured Intel Xeon E5-2600 v4 processors
    and 64GB LRDIMMs may experience a Machine Check Exception or NMI event when
    under heavy stress. This issue is not unique to HPE Servers.
    
    Addressed an issue where the HPE RESTful settings for Software Initiator iSCSI
    may not be available in the resource registry.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541419200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541505600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548763200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548849600">-     *Important Notes:**
    
    Ver. 2.64(B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.64. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 2.64.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue is not unique to HPE servers. Please consult
    the following advisory for additional details.
    &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00060570en_us&gt;
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70_12-29-2018" date="1552564800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_03-25-2019" date="1556712000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565006400">-     This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where the system may
    experience a machine check after updating to the latest System ROM which
    contained a fix for an Intel TSX (Transactional Synchronizations Extensions)
    sightings. The previous microcode was first introduced in the v2.70 System
    ROM. This issue only impacts systems configured with Intel Xeon v4 Series
    processors. This issue is not unique to HPE servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565092800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where a system booting to VMware may
    experience a PSOD in legacy boot mode. This issue does not impact systems in
    UEFI boot mode or other operating systems.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_10-21-2019" date="1574683200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigation for CVE-2019-11137. This issue
    is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="cf193e3d5e18043cda02ec960d82f4f1787f98157c52474d50af7d384caa50a0" name="firmware-system-u22" arch="i386">
    <version epoch="0" ver="2.84_2019_11_07" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_10-02-2017" date="1507636800">-     Added support for Trusted Platform Module (TPM) 2.0 Firmware flash updates.
    For systems configured with the optional TPM 2.0 device, this is the minimum
    revision of the System ROM required to update TPM firmware.
    
    Updated the HPE RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_10-02-2017" date="1507723200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue with Intel processors in which a complex number of
    concurrent micro-architectural conditions may result in unpredictable system
    behavior. This revision of the System ROM contains an updated version of
    Intel's microcode for these processors that addresses this issue. This issue
    is not unique to HPE ProLiant servers and could impact any system utilizing
    affected processors that do not include the updated microcode. Due to the
    potential severity of the issue addressed in this revision of the System ROM,
    this System ROM upgrade is considered a critical fix.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_12-12-2017" date="1514980800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_01-22-2018" date="1519732800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for Variant 2 of the Side Channel Analysis vulnerability, also
    known as Spectre. The revision of the microcode included in this System ROM
    addresses issues with more frequent reboots and unpredictable system behavior
    which impacted the previous Intel microcode which was part of the Spectre
    Variant 2 mitigation. Additional information is available from Intel's
    Security Exploit Newsroom, &lt;https://newsroom.intel.com/press-kits/security-
    exploits-intel-products/&gt;.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018" date="1528718400">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018-2.1" date="1548849600">-     *Important Notes:**
    
    Ver. 2.60(B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.60. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 2.60.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system and hypervisor updates,
    provides mitigation for the L1 Terminal Fault - OS/SMM (CVE-2018-3620) and L1
    Terminal Fault - VMM (CVE-2018-3646) security vulnerabilities.  These
    vulnerabilities may allow unauthorized disclosure of information residing in
    the L1 data cache to an attacker with local user access via a side-channel
    analysis.  These security vulnerabilities are not unique to HPE servers and
    impact any servers utilizing impacted processors.  Note that this server is
    NOT vulnerable to L1 Terminal Fault - SGX (CVE-2018-3615), also known as
    Foreshadow, because this server does NOT support SGX.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system and hypervisor updates,
    provides mitigation for the L1 Terminal Fault - OS/SMM (CVE-2018-3620) and L1
    Terminal Fault - VMM (CVE-2018-3646) security vulnerabilities.  These
    vulnerabilities may allow unauthorized disclosure of information residing in
    the L1 data cache to an attacker with local user access via a side-channel
    analysis.  These security vulnerabilities are not unique to HPE servers and
    impact any servers utilizing impacted processors.  Note that this server is
    NOT vulnerable to L1 Terminal Fault - SGX (CVE-2018-3615), also known as
    Foreshadow, because this server does NOT support SGX.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_12-18-2018" date="1549022400">-     Added support to allow for the ROM Based Setup Utility (RBSU) Power Regulator
    setting to be set to Static Low or OS Control Mode when the Processor Power
    and Utilization Support was disabled. Previous ROMs required the Power
    Regulator to be configured for Static High Mode only.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_12-18-2018" date="1549108800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    Addressed an issue where certain PCIe option cards may not train properly and
    cause the system to hang during POST. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.82_04-04-2019" date="1556712000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.84_11-07-2019" date="1576152000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for CVE-2017-5715, CVE-2019-11135,
    CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and CVE-2018-11091. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="53fd50f29e0afe3bfbc7b9dda0f3cd1e0bbd23413b4909a68d146213562e97a6" name="firmware-system-u23" arch="i386">
    <version epoch="0" ver="2.84_2019_11_07" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_12-12-2017" date="1514980800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_01-22-2018" date="1519732800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for Variant 2 of the Side Channel Analysis vulnerability, also
    known as Spectre. The revision of the microcode included in this System ROM
    addresses issues with more frequent reboots and unpredictable system behavior
    which impacted the previous Intel microcode which was part of the Spectre
    Variant 2 mitigation. Additional information is available from Intel's
    Security Exploit Newsroom, &lt;https://newsroom.intel.com/press-kits/security-
    exploits-intel-products/&gt;.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018" date="1528632000">-     Added support to allow for the ROM Based Setup Utility (RBSU) Power Regulator
    setting to be set to Static Low or OS Control Mode when the Processor Power
    and Utilization Support was disabled. Previous ROMs required the Power
    Regulator to be configured for Static High Mode only.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018" date="1528718400">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018-2.1" date="1548763200">-     Added support to allow for the ROM Based Setup Utility (RBSU) Power Regulator
    setting to be set to Static Low or OS Control Mode when the Processor Power
    and Utilization Support was disabled. Previous ROMs required the Power
    Regulator to be configured for Static High Mode only.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018-2.1" date="1548849600">-     *Important Notes:**
    
    Ver. 2.60(B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.60. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 2.60.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system and hypervisor updates,
    provides mitigation for the L1 Terminal Fault - OS/SMM (CVE-2018-3620) and L1
    Terminal Fault - VMM (CVE-2018-3646) security vulnerabilities.  These
    vulnerabilities may allow unauthorized disclosure of information residing in
    the L1 data cache to an attacker with local user access via a side-channel
    analysis.  These security vulnerabilities are not unique to HPE servers and
    impact any servers utilizing impacted processors.  Note that this server is
    NOT vulnerable to L1 Terminal Fault - SGX (CVE-2018-3615), also known as
    Foreshadow, because this server does NOT support SGX.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system and hypervisor updates,
    provides mitigation for the L1 Terminal Fault - OS/SMM (CVE-2018-3620) and L1
    Terminal Fault - VMM (CVE-2018-3646) security vulnerabilities.  These
    vulnerabilities may allow unauthorized disclosure of information residing in
    the L1 data cache to an attacker with local user access via a side-channel
    analysis.  These security vulnerabilities are not unique to HPE servers and
    impact any servers utilizing impacted processors.  Note that this server is
    NOT vulnerable to L1 Terminal Fault - SGX (CVE-2018-3615), also known as
    Foreshadow, because this server does NOT support SGX.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_12-18-2018" date="1549022400">-     Added support to allow for the ROM Based Setup Utility (RBSU) Power Regulator
    setting to be set to Static Low or OS Control Mode when the Processor Power
    and Utilization Support was disabled. Previous ROMs required the Power
    Regulator to be configured for Static High Mode only.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_12-18-2018" date="1549108800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    Addressed an issue where certain PCIe option cards may not train properly and
    cause the system to hang during POST. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.82_04-04-2019" date="1556712000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.84_11-07-2019" date="1576152000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for CVE-2017-5715, CVE-2019-11135,
    CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and CVE-2018-11091. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="82601621a04ca2f547d9833c007e86a4b7bc54db3c8830790fa33db979d13356" name="firmware-system-u24" arch="i386">
    <version epoch="0" ver="1.60_2018_01_22" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22_04-06-2017" date="1492776000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.40_08-08-2017" date="1506427200">-     Added support for the HPE Dynamic SmartArray B140i Option in the BIOS/Platform
    Configuration (RBSU) Configuration Menu.
    
    Added support for Cluster Model and On-Package High-Bandwidth Memory Cache
    Size menus to the Memory Options in the BIOS/Platform Configuration (RBSU)
    Configuration Menu.
    
    Added support for Intel Xeon Phi processors with Integrated Intel Omni-Path
    Fabric.
    
    Added support for XL2x260w Server.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.40_08-08-2017" date="1506513600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where the system may become unresponsive on
    a subsequent boot after an uncorrectable Machine Check Error.
    
    Addressed an issue where the system may experience correctable memory errors
    on some boots. It is recommended that users seeing a high rate of corrected
    memory errors update to this version of the System ROM before replacing any
    hardware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50_09-25-2017" date="1507809600">-     Added support for Trusted Platform Module (TPM) 2.0 Firmware flash updates.
    For systems configured with the optional TPM 2.0 device, this is the minimum
    revision of the System ROM required to update TPM firmware.
    
    Updated the HPE RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50_09-25-2017" date="1507896000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a system may experience unpredictable system behavior
    when the embedded memory (MCDRAM) is configured in Cache or Hybrid Memory
    modes. This issue does not impact systems configured in Flat Memory mode. This
    issue is not unique to Hewlett Packard Enterprise systems.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_01-22-2018" date="1519646400">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for Variant 2 of the Side Channel Analysis vulnerability, also
    known as Spectre. The revision of the microcode included in this System ROM
    does NOT have issues with more frequent reboots and unpredictable system
    behavior which impacted the previous Intel microcode which was part of the
    Spectre Variant 2 mitigation. Additional information is available from Intel's
    Security Exploit Newsroom, &lt;https://newsroom.intel.com/press-kits/security-
    exploits-intel-products/&gt;.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_01-22-2018-2.1" date="1550836800">-     *Important Notes:**
    
    Ver. 1.60(B) contains updates to the component packaging and is functionally
    equivalent to ver. 1.60. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 1.60.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for Variant 2 of the Side Channel Analysis vulnerability, also
    known as Spectre. The revision of the microcode included in this System ROM
    does NOT have issues with more frequent reboots and unpredictable system
    behavior which impacted the previous Intel microcode which was part of the
    Spectre Variant 2 mitigation. Additional information is available from Intel's
    Security Exploit Newsroom, &lt;https://newsroom.intel.com/press-kits/security-
    exploits-intel-products/&gt;.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="82dea6103e10acbdbfd523c053ecb6c6c0b65011af21bea83bd7f862aa94accd" name="firmware-system-u25" arch="i386">
    <version epoch="0" ver="2.76_2019_10_21" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018" date="1528459200">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    Addressed an issue where uncorrectable Quick Path Interlink (QPI) errors would
    not be reported properly and logged to the Integrated Management Log.
    Previously, the system would become unresponsive during boot with no
    indication of a failure.
    
    Addressed an issue where systems configured Intel Xeon E5-2600 v4 processors
    and 64GB LRDIMMs may experience a Machine Check Exception or NMI event when
    under heavy stress. This issue is not unique to HPE Servers.
    
    Addressed an issue where the HPE RESTful settings for Software Initiator iSCSI
    may not be available in the resource registry.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541419200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018" date="1541505600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548763200">-     Added support for Microsoft Windows 2019. This System ROM is the minimum
    recommended version for use with this operating system version. This revision
    of the System ROM contains updated support for Windows 2019 when using the
    optional HPE TPM Module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-17-2018-2.1" date="1548849600">-     *Important Notes:**
    
    Ver. 2.64(B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.64. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 2.64.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue is not unique to HPE servers. Please consult
    the following advisory for additional details.
    &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00060570en_us&gt;
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML). This issue only impacts systems configured with Intel
    Xeon 2600 v4 series processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system could experience an
    unexpected reset or shutdown with no errors logged to the Integrated
    Management Log (IML) when processor C-states are enabled. This issue does not
    exist when processor C-states are disabled. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70_12-29-2018" date="1552564800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_03-25-2019" date="1556712000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565006400">-     This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where the system may
    experience a machine check after updating to the latest System ROM which
    contained a fix for an Intel TSX (Transactional Synchronizations Extensions)
    sightings. The previous microcode was first introduced in the v2.70 System
    ROM. This issue only impacts systems configured with Intel Xeon v4 Series
    processors. This issue is not unique to HPE servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74_07-21-2019" date="1565092800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where a system booting to VMware may
    experience a PSOD in legacy boot mode. This issue does not impact systems in
    UEFI boot mode or other operating systems.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_10-21-2019" date="1574683200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigation for CVE-2019-11137. This issue
    is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="7c61d87b1165785dc48abf5cc3256fba9e005e611f4313490829abe5359590d0" name="firmware-system-u26" arch="i386">
    <version epoch="0" ver="2.66_2019_07_19" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-25-2017" date="1508760000">-     *Important Notes:**
    
    This System ROM revision replaces the 2.50 revision. An issue was found with
    the 2.50 revision of the System ROM that may result in a system hang during
    boot with a messaging indicating "Memory Initialization - complete" with
    certain memory configurations. The 2.50 revision of the System ROM has been
    removed from the HPE Support Site. It is highly recommended that any customers
    using the 2.50 revision of the System ROM upgrade to the 2.52 revision or
    later.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for Trusted Platform Module (TPM) 2.0 Firmware flash updates.
    For systems configured with the optional TPM 2.0 device, this is the minimum
    revision of the System ROM required to update TPM firmware.
    
    Addressed an issue where Processor Core Disable may not function properly,
    such as disabling the wrong number of cores.
    
    Updated the HPE RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_01-22-2018" date="1519646400">-     None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_01-22-2018" date="1519732800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for Variant 2 of the Side Channel Analysis vulnerability, also
    known as Spectre.  The revision of the microcode included in this System ROM
    does NOT have issues with more frequent reboots and unpredictable system
    behavior which impacted the previous Intel microcode which was part of the
    Spectre Variant 2 mitigation.  Additional information is available from
    Intel's Security Exploit Newsroom, &lt;https://newsroom.intel.com/press-kits
    /security-exploits-intel-products/&gt;.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018" date="1530446400">-     None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018" date="1530532800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018-2.1" date="1548763200">-     None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_05-21-2018-2.1" date="1548849600">-     *Important Notes:**
    
    Ver. 2.60(B) contains updates to the component packaging and is functionally
    equivalent to ver. 2.60. It is not necessary to upgrade with Revision B if a
    previous component Revision was used to upgrade the firmware to version 2.60.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system and hypervisor updates,
    provides mitigation for the L1 Terminal Fault - OS/SMM (CVE-2018-3620) and L1
    Terminal Fault - VMM (CVE-2018-3646) security vulnerabilities.  These
    vulnerabilities may allow unauthorized disclosure of information residing in
    the L1 data cache to an attacker with local user access via a side-channel
    analysis.  These security vulnerabilities are not unique to HPE servers and
    impact any servers utilizing impacted processors.  Note that this server is
    NOT vulnerable to L1 Terminal Fault - SGX (CVE-2018-3615), also known as
    Foreshadow, because this server does NOT support SGX.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system and hypervisor updates,
    provides mitigation for the L1 Terminal Fault - OS/SMM (CVE-2018-3620) and L1
    Terminal Fault - VMM (CVE-2018-3646) security vulnerabilities.  These
    vulnerabilities may allow unauthorized disclosure of information residing in
    the L1 data cache to an attacker with local user access via a side-channel
    analysis.  These security vulnerabilities are not unique to HPE servers and
    impact any servers utilizing impacted processors.  Note that this server is
    NOT vulnerable to L1 Terminal Fault - SGX (CVE-2018-3615), also known as
    Foreshadow, because this server does NOT support SGX.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which, in combination with operating system updates, provides
    mitigation for the Speculative Store Bypass (also known as Variant 4) security
    vulnerability. A Medium level CVE has been assigned to this issue with ID
    CVE-2018-3639. Systems with microprocessors utilizing speculative execution
    and speculative execution of memory reads before the addresses of all prior
    memory writes are known may allow unauthorized disclosure of information to an
    attacker with local user access via a side-channel analysis. This security
    vulnerability is not unique to HPE servers and impacts any systems utilizing
    impacted processors.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for the Rogue Register Read (also known as
    Variant 3a) security vulnerability. A Medium level CVE has been assigned to
    this issue with ID CVE-2018-3640. Systems with microprocessors utilizing
    speculative execution and that perform speculative reads of system registers
    may allow unauthorized disclosure of system parameters to an attacker with
    local user access via a side-channel analysis. This security vulnerability is
    not unique to HPE servers and impacts any systems utilizing impacted
    processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_02-20-2019" date="1552564800">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_04-04-2019" date="1556884800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_07-19-2019" date="1566648000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where the system may
    experience a machine check after updating to the latest System ROM which
    contained a fix for an Intel TSX (Transactional Synchronizations Extensions)
    sightings. The previous microcode was first introduced in the v2.62 System
    ROM. This issue only impacts systems configured with Intel Xeon D-1500
    processors. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="756605b0bf1f9ec1fdaeb396b777b96c86ff719ff734fe87cc466e515d843c74" name="firmware-system-u30" arch="x86_64">
    <version epoch="0" ver="2.22_2019_11_13" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.02_03-19-2019" date="1553774400">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This system ROM contains the latest Intel microcode that addresses an issue
    where the system may experience an Uncorrected Machine Check Exception in Bank
    0 with Status containing 000F0150. This update may not address all Bank 0
    machine check events with a Status containing 000F0150 but should be used
    before any other further service actions for issues resulting in this
    Integrated Management Log (IML) entry. This issue is not unique to HPE
    servers. This issue was incorrectly documented as being addressed in the v2.00
    System ROMs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.04_04-18-2019" date="1556798400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    Addressed an issue where the system may experience a higher rate of
    Uncorrectable Memory errors or boot time Memory training issues with Intel
    Xeon Scalable Performance Bronze and Silver processors. This issue was first
    introduced with System ROM version 2.00. HPE recommends that any customer
    experiencing a memory issue immediately update to this version of the system
    ROM before replacing any components. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561896000">-     Added support for HPE Persistent Memory featuring Intel Optane DC Persistent
    Memory.
    
    Added a new BIOS/Platform Configuration (RBSU) option called Intel Priority
    Based Frequency to support enabling Intel Speed Select - Base Frequency
    support on select 2nd Generation Xeon Scalable Family Processors that are
    optimized for NFV workloads. This option, which is disabled by default, is
    located in the Processor Options menu and visible only when NFV optimized SKUs
    are installed (denoted by the N in the SKU model). On supported Operating
    Systems, Intel Speed Select - Based Frequency functionality allows high
    priority cores to operate at a higher frequency than the nominal base
    frequency while lower priority cores will run at a slower frequency.
    
    Added a new BIOS/Platform Configuration (RBSU) I/O Direct Cache (IODC) menu to
    the Power and Performance Menu. This option allows for tuning the policy for
    which I/O transactions interact with the processor cache. The caching policy
    may have a slight impact on cross socket latency. Workloads where this option
    would need to be modified from its default value for optimum performance are
    extremely rare.
    
    Added support for HPE Fast Fault Tolerant Memory (ADDDC) to operate when a
    single memory rank is only available on a given memory channel. Previous
    versions of the System ROM required two or more memory ranks to be available
    on each memory channel. After updating to this version of the System ROM the
    server will automatically configure the system for HPE Fast Fault Tolerant
    Memory Mode if the memory configuration supports this option.
    
    Updated the UEFI OpenSSL support to version 1.0.2r to address security
    vulnerability CVE-2019-1559.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561982400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Server Backup and Restore functionality may not
    work properly if initiated through the HPE RESTful API returning a message "An
    internal error occurred during RIS operation".
    
    Addressed an issue where configuring memory to run at 2x refresh rate would
    still actually operate memory at 1x refresh rate. This issue was introduced
    with the v2.00 System ROM and did not impact earlier versions of the System
    ROM. This issue is not unique to HPE servers.
    
    Addressed an issue where the NVMe PCIe Resource Padding option in
    BIOS/Platform Configuration (RBSU) would not properly allocated sufficient
    resources to support a NVMe hot add event. In certain configurations, an
    insufficient amount of resources would have been reserved and a reboot would
    have been required to detect the presence of the newly added drive.
    
    Addressed an issue where the system would not boot to a USB drive when a non-
    bootable (non-formatted) drive was also present in the system. This issue only
    impacts systems configured in Legacy Boot Mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.12_07-03-2019" date="1568289600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for Network Choice (NC) SKUs of the HPE ProLiant DL380 Gen10
    Server. These server SKUs do not include the embedded NIC. This revision of
    the System ROM supports all SKUs of the HPE ProLiant DL380 Gen10 Server, but
    does not include any new functionality or issue fixes for non-NC SKUs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.14_09-05-2019" date="1568721600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where certain 2933Mhz LRDIMMs (HPE part number P03054-091,
    P03055-091 and P11057-0A1) may experience an uncorrectable memory error when
    operating with a Second Generation Intel Xeon Scalable Processor. This issue
    can be seen when processor c-states are enabled on the platform. This issue
    does not impact 2666Mhz LRDIMMs or any speed RDIMM. HPE recommends that
    customers experiencing an uncorrectable memory error in one of these
    configurations update to this version of the System ROM before replacing any
    memory. This issue is not unique to HPE servers.
    
    Addressed an issue where NVIDIA V100 GPUs may experience a thermal shutdown or
    Unexpected PCIe Uncorrectable error to the GPU. This issue only impacts the
    NVIDIA V100 GPU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.16_09-12-2019" date="1569499200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system may experience an
    unexpected machine check exception. This issue would be logged to the
    Integrated Management Log (IML) as a Bank 0x03 or Bank 0x04 with status
    0xBE000000'00800400 or 0xFE000000'00800400 Machine Check Exception. This issue
    is not unique to HPE servers.
    
    This version of the System ROM includes the latest version of the Intel
    microcode which addresses an issue where under complex microarchitectural
    conditions involving branch instructions that span multiple 64 byte
    boundaries, unpredictable system behavior may occur. This issue is not unique
    to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573473600">-     Updated to the latest thermal support for the platform.
    
    Updated the language translations (non-English modes) for System Utilities.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573560000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.22_11-13-2019" date="1576411200">-     *Important Notes:**
    
    This version of the System ROM replaces the previously published v2.20 System
    ROM. The v2.20 System ROM introduced an issue where a small subset LRDIMMs
    could experience an uncorrectable memory error. This issue had been previously
    fixed in the v2.14 ROM of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="8635d3857f6f1a9c77fbb32a29869887c28ddb1a9e3b52c0635ce151ab5ef9d4" name="firmware-system-u31" arch="x86_64">
    <version epoch="0" ver="2.22_2019_11_13" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50_12-29-2018" date="1548849600">-     *Important Notes:**
    
    This revision of the System ROM contains enhancements to the HPE memory
    support to improve memory resiliency. Please consult the following Customer
    Advisory for additional details:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00064444en_us
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Improved the memory resiliency of the server with enhanced support for HPE
    Fast Fault Tolerant Memory (ADDDC) capabilities. This System ROM will now
    configure the Advanced Memory Protection mode of the server to HPE Fast Fault
    Tolerant (ADDDC) memory mode for all Workload Profiles except Low Latency and
    Custom if the feature is supported by the server's DIMM configuration. Note
    that if the Advanced Memory Protection mode had previously been configured for
    Mirroring or Online Spare, the setting will NOT be automatically changed to
    HPE Fast Fault Tolerant Memory (ADDDC) mode. Also, if the DIMM configuration
    does not support HPE Fast Fault Tolerant Memory (ADDDC) mode, then the
    Advanced Memory Protection Mode will remain Advanced ECC Mode. Note that if
    the current BIOS configuration settings are queried via Redfish or the RESTful
    API, the setting for the Advanced Memory Protection Mode will indicate this
    change.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.02_03-19-2019" date="1553774400">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This system ROM contains the latest Intel microcode that addresses an issue
    where the system may experience an Uncorrected Machine Check Exception in Bank
    0 with Status containing 000F0150. This update may not address all Bank 0
    machine check events with a Status containing 000F0150 but should be used
    before any other further service actions for issues resulting in this
    Integrated Management Log (IML) entry. This issue is not unique to HPE
    servers. This issue was incorrectly documented as being addressed in the v2.00
    System ROMs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.04_04-18-2019" date="1556798400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    Addressed an issue where the system may experience a higher rate of
    Uncorrectable Memory errors or boot time Memory training issues with Intel
    Xeon Scalable Performance Bronze and Silver processors. This issue was first
    introduced with System ROM version 2.00. HPE recommends that any customer
    experiencing a memory issue immediately update to this version of the system
    ROM before replacing any components. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561896000">-     Added a new BIOS/Platform Configuration (RBSU) option called Intel Priority
    Based Frequency to support enabling Intel Speed Select - Base Frequency
    support on select 2nd Generation Xeon Scalable Family Processors that are
    optimized for NFV workloads. This option, which is disabled by default, is
    located in the Processor Options menu and visible only when NFV optimized SKUs
    are installed (denoted by the N in the SKU model). On supported Operating
    Systems, Intel Speed Select - Based Frequency functionality allows high
    priority cores to operate at a higher frequency than the nominal base
    frequency while lower priority cores will run at a slower frequency.
    
    Added a new BIOS/Platform Configuration (RBSU) I/O Direct Cache (IODC) menu to
    the Power and Performance Menu. This option allows for tuning the policy for
    which I/O transactions interact with the processor cache. The caching policy
    may have a slight impact on cross socket latency. Workloads where this option
    would need to be modified from its default value for optimum performance are
    extremely rare.
    
    Added support for HPE Fast Fault Tolerant Memory (ADDDC) to operate when a
    single memory rank is only available on a given memory channel. Previous
    versions of the System ROM required two or more memory ranks to be available
    on each memory channel. After updating to this version of the System ROM the
    server will automatically configure the system for HPE Fast Fault Tolerant
    Memory Mode if the memory configuration supports this option.
    
    Updated the UEFI OpenSSL support to version 1.0.2r to address security
    vulnerability CVE-2019-1559.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561982400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Server Backup and Restore functionality may not
    work properly if initiated through the HPE RESTful API returning a message "An
    internal error occurred during RIS operation".
    
    Addressed an issue where configuring memory to run at 2x refresh rate would
    still actually operate memory at 1x refresh rate. This issue was introduced
    with the v2.00 System ROM and did not impact earlier versions of the System
    ROM. This issue is not unique to HPE servers.
    
    Addressed an issue where the NVMe PCIe Resource Padding option in
    BIOS/Platform Configuration (RBSU) would not properly allocated sufficient
    resources to support a NVMe hot add event. In certain configurations, an
    insufficient amount of resources would have been reserved and a reboot would
    have been required to detect the presence of the newly added drive.
    
    Addressed an issue where the system would not boot to a USB drive when a non-
    bootable (non-formatted) drive was also present in the system. This issue only
    impacts systems configured in Legacy Boot Mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.14_09-05-2019" date="1568721600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where certain 2933Mhz LRDIMMs (HPE part number P03054-091,
    P03055-091 and P11057-0A1) may experience an uncorrectable memory error when
    operating with a Second Generation Intel Xeon Scalable Processor. This issue
    can be seen when processor c-states are enabled on the platform. This issue
    does not impact 2666Mhz LRDIMMs or any speed RDIMM. HPE recommends that
    customers experiencing an uncorrectable memory error in one of these
    configurations update to this version of the System ROM before replacing any
    memory. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.16_09-12-2019" date="1569499200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system may experience an
    unexpected machine check exception. This issue would be logged to the
    Integrated Management Log (IML) as a Bank 0x03 or Bank 0x04 with status
    0xBE000000'00800400 or 0xFE000000'00800400 Machine Check Exception. This issue
    is not unique to HPE servers.
    
    This version of the System ROM includes the latest version of the Intel
    microcode which addresses an issue where under complex microarchitectural
    conditions involving branch instructions that span multiple 64 byte
    boundaries, unpredictable system behavior may occur. This issue is not unique
    to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573473600">-     Updated to the latest thermal support for the platform.
    
    Updated the language translations (non-English modes) for System Utilities.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573560000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.22_11-13-2019" date="1576411200">-     *Important Notes:**
    
    This version of the System ROM replaces the previously published v2.20 System
    ROM. The v2.20 System ROM introduced an issue where a small subset LRDIMMs
    could experience an uncorrectable memory error. This issue had been previously
    fixed in the v2.14 ROM of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="9e64396c937944108b8669a9d6ea4fccfdb6b3b84561d838be4458105495be23" name="firmware-system-u32" arch="x86_64">
    <version epoch="0" ver="2.22_2019_11_13" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.02_03-19-2019" date="1553774400">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This system ROM contains the latest Intel microcode that addresses an issue
    where the system may experience an Uncorrected Machine Check Exception in Bank
    0 with Status containing 000F0150. This update may not address all Bank 0
    machine check events with a Status containing 000F0150 but should be used
    before any other further service actions for issues resulting in this
    Integrated Management Log (IML) entry. This issue is not unique to HPE
    servers. This issue was incorrectly documented as being addressed in the v2.00
    System ROMs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.04_04-18-2019" date="1556798400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    Addressed an issue where the system may experience a higher rate of
    Uncorrectable Memory errors or boot time Memory training issues with Intel
    Xeon Scalable Performance Bronze and Silver processors. This issue was first
    introduced with System ROM version 2.00. HPE recommends that any customer
    experiencing a memory issue immediately update to this version of the system
    ROM before replacing any components. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561896000">-     Added support for HPE Persistent Memory featuring Intel Optane DC Persistent
    Memory.
    
    Added a new BIOS/Platform Configuration (RBSU) option called Intel Priority
    Based Frequency to support enabling Intel Speed Select - Base Frequency
    support on select 2nd Generation Xeon Scalable Family Processors that are
    optimized for NFV workloads. This option, which is disabled by default, is
    located in the Processor Options menu and visible only when NFV optimized SKUs
    are installed (denoted by the N in the SKU model). On supported Operating
    Systems, Intel Speed Select - Based Frequency functionality allows high
    priority cores to operate at a higher frequency than the nominal base
    frequency while lower priority cores will run at a slower frequency.
    
    Added a new BIOS/Platform Configuration (RBSU) I/O Direct Cache (IODC) menu to
    the Power and Performance Menu. This option allows for tuning the policy for
    which I/O transactions interact with the processor cache. The caching policy
    may have a slight impact on cross socket latency. Workloads where this option
    would need to be modified from its default value for optimum performance are
    extremely rare.
    
    Added support for HPE Fast Fault Tolerant Memory (ADDDC) to operate when a
    single memory rank is only available on a given memory channel. Previous
    versions of the System ROM required two or more memory ranks to be available
    on each memory channel. After updating to this version of the System ROM the
    server will automatically configure the system for HPE Fast Fault Tolerant
    Memory Mode if the memory configuration supports this option.
    
    Updated the UEFI OpenSSL support to version 1.0.2r to address security
    vulnerability CVE-2019-1559.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561982400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Server Backup and Restore functionality may not
    work properly if initiated through the HPE RESTful API returning a message "An
    internal error occurred during RIS operation".
    
    Addressed an issue where configuring memory to run at 2x refresh rate would
    still actually operate memory at 1x refresh rate. This issue was introduced
    with the v2.00 System ROM and did not impact earlier versions of the System
    ROM. This issue is not unique to HPE servers.
    
    Addressed an issue where the NVMe PCIe Resource Padding option in
    BIOS/Platform Configuration (RBSU) would not properly allocated sufficient
    resources to support a NVMe hot add event. In certain configurations, an
    insufficient amount of resources would have been reserved and a reboot would
    have been required to detect the presence of the newly added drive.
    
    Addressed an issue where the system would not boot to a USB drive when a non-
    bootable (non-formatted) drive was also present in the system. This issue only
    impacts systems configured in Legacy Boot Mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.12_07-03-2019" date="1568289600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for Network Choice (NC) SKUs of the HPE ProLiant DL360 Gen10
    Server. These server SKUs do not include the embedded NIC. This revision of
    the System ROM supports all SKUs of the HPE ProLiant DL360 Gen10 Server, but
    does not include any new functionality or issue fixes for non-NC SKUs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.14_09-05-2019" date="1568721600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where certain 2933Mhz LRDIMMs (HPE part number P03054-091,
    P03055-091 and P11057-0A1) may experience an uncorrectable memory error when
    operating with a Second Generation Intel Xeon Scalable Processor. This issue
    can be seen when processor c-states are enabled on the platform. This issue
    does not impact 2666Mhz LRDIMMs or any speed RDIMM. HPE recommends that
    customers experiencing an uncorrectable memory error in one of these
    configurations update to this version of the System ROM before replacing any
    memory. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.16_09-12-2019" date="1569499200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system may experience an
    unexpected machine check exception. This issue would be logged to the
    Integrated Management Log (IML) as a Bank 0x03 or Bank 0x04 with status
    0xBE000000'00800400 or 0xFE000000'00800400 Machine Check Exception. This issue
    is not unique to HPE servers.
    
    This version of the System ROM includes the latest version of the Intel
    microcode which addresses an issue where under complex microarchitectural
    conditions involving branch instructions that span multiple 64 byte
    boundaries, unpredictable system behavior may occur. This issue is not unique
    to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573473600">-     Updated to the latest thermal support for the platform.
    
    Updated the language translations (non-English modes) for System Utilities.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573560000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.22_11-13-2019" date="1576411200">-     *Important Notes:**
    
    This version of the System ROM replaces the previously published v2.20 System
    ROM. The v2.20 System ROM introduced an issue where a small subset LRDIMMs
    could experience an uncorrectable memory error. This issue had been previously
    fixed in the v2.14 ROM of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="6dba620d1f274f796135f1c27ba39ae173d3fd604514f0d98b29a836ed4e2206" name="firmware-system-u33" arch="x86_64">
    <version epoch="0" ver="2.22_2019_11_13" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.02_03-19-2019" date="1553774400">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This system ROM contains the latest Intel microcode that addresses an issue
    where the system may experience an Uncorrected Machine Check Exception in Bank
    0 with Status containing 000F0150. This update may not address all Bank 0
    machine check events with a Status containing 000F0150 but should be used
    before any other further service actions for issues resulting in this
    Integrated Management Log (IML) entry. This issue is not unique to HPE
    servers. This issue was incorrectly documented as being addressed in the v2.00
    System ROMs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.04_04-18-2019" date="1556798400">-     *Important Notes:**
    
    None  
    
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    Addressed an issue where the system may experience a higher rate of
    Uncorrectable Memory errors or boot time Memory training issues with Intel
    Xeon Scalable Performance Bronze and Silver processors. This issue was first
    introduced with System ROM version 2.00. HPE recommends that any customer
    experiencing a memory issue immediately update to this version of the system
    ROM before replacing any components. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561896000">-     Added a new BIOS/Platform Configuration (RBSU) option called Intel Priority
    Based Frequency to support enabling Intel Speed Select - Base Frequency
    support on select 2nd Generation Xeon Scalable Family Processors that are
    optimized for NFV workloads. This option, which is disabled by default, is
    located in the Processor Options menu and visible only when NFV optimized SKUs
    are installed (denoted by the N in the SKU model). On supported Operating
    Systems, Intel Speed Select - Based Frequency functionality allows high
    priority cores to operate at a higher frequency than the nominal base
    frequency while lower priority cores will run at a slower frequency.
    
    Added a new BIOS/Platform Configuration (RBSU) I/O Direct Cache (IODC) menu to
    the Power and Performance Menu. This option allows for tuning the policy for
    which I/O transactions interact with the processor cache. The caching policy
    may have a slight impact on cross socket latency. Workloads where this option
    would need to be modified from its default value for optimum performance are
    extremely rare.
    
    Added support for HPE Fast Fault Tolerant Memory (ADDDC) to operate when a
    single memory rank is only available on a given memory channel. Previous
    versions of the System ROM required two or more memory ranks to be available
    on each memory channel. After updating to this version of the System ROM the
    server will automatically configure the system for HPE Fast Fault Tolerant
    Memory Mode if the memory configuration supports this option.
    
    Updated the UEFI OpenSSL support to version 1.0.2r to address security
    vulnerability CVE-2019-1559.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561982400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Server Backup and Restore functionality may not
    work properly if initiated through the HPE RESTful API returning a message "An
    internal error occurred during RIS operation".
    
    Addressed an issue where configuring memory to run at 2x refresh rate would
    still actually operate memory at 1x refresh rate. This issue was introduced
    with the v2.00 System ROM and did not impact earlier versions of the System
    ROM. This issue is not unique to HPE servers.
    
    Addressed an issue where the NVMe PCIe Resource Padding option in
    BIOS/Platform Configuration (RBSU) would not properly allocated sufficient
    resources to support a NVMe hot add event. In certain configurations, an
    insufficient amount of resources would have been reserved and a reboot would
    have been required to detect the presence of the newly added drive.
    
    Addressed an issue where the system would not boot to a USB drive when a non-
    bootable (non-formatted) drive was also present in the system. This issue only
    impacts systems configured in Legacy Boot Mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.12_07-09-2019" date="1564488000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for the NVIDIA Quardo RTX4000
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.14_09-05-2019" date="1568808000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where certain 2933Mhz LRDIMMs (HPE part number P03054-091,
    P03055-091 and P11057-0A1) may experience an uncorrectable memory error when
    operating with a Second Generation Intel Xeon Scalable Processor. This issue
    can be seen when processor c-states are enabled on the platform. This issue
    does not impact 2666Mhz LRDIMMs or any speed RDIMM. HPE recommends that
    customers experiencing an uncorrectable memory error in one of these
    configurations update to this version of the System ROM before replacing any
    memory. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.16_09-12-2019" date="1569499200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system may experience an
    unexpected machine check exception. This issue would be logged to the
    Integrated Management Log (IML) as a Bank 0x03 or Bank 0x04 with status
    0xBE000000'00800400 or 0xFE000000'00800400 Machine Check Exception. This issue
    is not unique to HPE servers.
    
    This version of the System ROM includes the latest version of the Intel
    microcode which addresses an issue where under complex microarchitectural
    conditions involving branch instructions that span multiple 64 byte
    boundaries, unpredictable system behavior may occur. This issue is not unique
    to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573128000">-     Updated to the latest thermal support for the platform.
    
    Updated the language translations (non-English modes) for System Utilities.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573214400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.22_11-13-2019" date="1576411200">-     *Important Notes:**
    
    This version of the System ROM replaces the previously published v2.20 System
    ROM. The v2.20 System ROM introduced an issue where a small subset LRDIMMs
    could experience an uncorrectable memory error. This issue had been previously
    fixed in the v2.14 ROM of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="fc5aa2c720fe4d3b48ee0e914ba48ea6b3ef3366becc7c9951be8f474aebb775" name="firmware-system-u34" arch="x86_64">
    <version epoch="0" ver="2.22_2019_11_13" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50_12-29-2018" date="1548849600">-     *Important Notes:**
    
    This revision of the System ROM contains enhancements to the HPE memory
    support to improve memory resiliency. Please consult the following Customer
    Advisory for additional details:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00064444en_us
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Improved the memory resiliency of the server with enhanced support for HPE
    Fast Fault Tolerant Memory (ADDDC) capabilities. This System ROM will now
    configure the Advanced Memory Protection mode of the server to HPE Fast Fault
    Tolerant (ADDDC) memory mode for all Workload Profiles except Low Latency and
    Custom if the feature is supported by the server's DIMM configuration. Note
    that if the Advanced Memory Protection mode had previously been configured for
    Mirroring or Online Spare, the setting will NOT be automatically changed to
    HPE Fast Fault Tolerant Memory (ADDDC) mode. Also, if the DIMM configuration
    does not support HPE Fast Fault Tolerant Memory (ADDDC) mode, then the
    Advanced Memory Protection Mode will remain Advanced ECC Mode. Note that if
    the current BIOS configuration settings are queried via Redfish or the RESTful
    API, the setting for the Advanced Memory Protection Mode will indicate this
    change.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.02_03-19-2019" date="1553774400">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.  
    
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This system ROM contains the latest Intel microcode that addresses an issue
    where the system may experience an Uncorrected Machine Check Exception in Bank
    0 with Status containing 000F0150. This update may not address all Bank 0
    machine check events with a Status containing 000F0150 but should be used
    before any other further service actions for issues resulting in this
    Integrated Management Log (IML) entry. This issue is not unique to HPE
    servers. This issue was incorrectly documented as being addressed in the v2.00
    System ROMs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.04_04-18-2019" date="1556798400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    Addressed an issue where the system may experience a higher rate of
    Uncorrectable Memory errors or boot time Memory training issues with Intel
    Xeon Scalable Performance Bronze and Silver processors. This issue was first
    introduced with System ROM version 2.00. HPE recommends that any customer
    experiencing a memory issue immediately update to this version of the system
    ROM before replacing any components. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561896000">-     Added support for HPE Persistent Memory featuring Intel Optane DC Persistent
    Memory.
    
    Added a new BIOS/Platform Configuration (RBSU) option called Intel Priority
    Based Frequency to support enabling Intel Speed Select - Base Frequency
    support on select 2nd Generation Xeon Scalable Family Processors that are
    optimized for NFV workloads. This option, which is disabled by default, is
    located in the Processor Options menu and visible only when NFV optimized SKUs
    are installed (denoted by the N in the SKU model). On supported Operating
    Systems, Intel Speed Select - Based Frequency functionality allows high
    priority cores to operate at a higher frequency than the nominal base
    frequency while lower priority cores will run at a slower frequency.
    
    Added a new BIOS/Platform Configuration (RBSU) I/O Direct Cache (IODC) menu to
    the Power and Performance Menu. This option allows for tuning the policy for
    which I/O transactions interact with the processor cache. The caching policy
    may have a slight impact on cross socket latency. Workloads where this option
    would need to be modified from its default value for optimum performance are
    extremely rare.
    
    Added support for HPE Fast Fault Tolerant Memory (ADDDC) to operate when a
    single memory rank is only available on a given memory channel. Previous
    versions of the System ROM required two or more memory ranks to be available
    on each memory channel. After updating to this version of the System ROM the
    server will automatically configure the system for HPE Fast Fault Tolerant
    Memory Mode if the memory configuration supports this option.
    
    Updated the UEFI OpenSSL support to version 1.0.2r to address security
    vulnerability CVE-2019-1559.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561982400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Server Backup and Restore functionality may not
    work properly if initiated through the HPE RESTful API returning a message "An
    internal error occurred during RIS operation".
    
    Addressed an issue where configuring memory to run at 2x refresh rate would
    still actually operate memory at 1x refresh rate. This issue was introduced
    with the v2.00 System ROM and did not impact earlier versions of the System
    ROM. This issue is not unique to HPE servers.
    
    Addressed an issue where the NVMe PCIe Resource Padding option in
    BIOS/Platform Configuration (RBSU) would not properly allocated sufficient
    resources to support a NVMe hot add event. In certain configurations, an
    insufficient amount of resources would have been reserved and a reboot would
    have been required to detect the presence of the newly added drive.
    
    Addressed an issue where the system would not boot to a USB drive when a non-
    bootable (non-formatted) drive was also present in the system. This issue only
    impacts systems configured in Legacy Boot Mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.14_09-05-2019" date="1568808000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where certain 2933Mhz LRDIMMs (HPE part number P03054-091,
    P03055-091 and P11057-0A1) may experience an uncorrectable memory error when
    operating with a Second Generation Intel Xeon Scalable Processor. This issue
    can be seen when processor c-states are enabled on the platform. This issue
    does not impact 2666Mhz LRDIMMs or any speed RDIMM. HPE recommends that
    customers experiencing an uncorrectable memory error in one of these
    configurations update to this version of the System ROM before replacing any
    memory. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.16_09-12-2019" date="1569499200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system may experience an
    unexpected machine check exception. This issue would be logged to the
    Integrated Management Log (IML) as a Bank 0x03 or Bank 0x04 with status
    0xBE000000'00800400 or 0xFE000000'00800400 Machine Check Exception. This issue
    is not unique to HPE servers.
    
    This version of the System ROM includes the latest version of the Intel
    microcode which addresses an issue where under complex microarchitectural
    conditions involving branch instructions that span multiple 64 byte
    boundaries, unpredictable system behavior may occur. This issue is not unique
    to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573128000">-     Updated to the latest thermal support for the platform.
    
    Updated the language translations (non-English modes) for System Utilities.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573214400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.22_11-13-2019" date="1576411200">-     *Important Notes:**
    
    This version of the System ROM replaces the previously published v2.20 System
    ROM. The v2.20 System ROM introduced an issue where a small subset LRDIMMs
    could experience an uncorrectable memory error. This issue had been previously
    fixed in the v2.14 ROM of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="143fb87cbdae2b4759d6d28c7f232f95b2c03cbb3612204c9362e88931e3bb8f" name="firmware-system-u37" arch="x86_64">
    <version epoch="0" ver="2.22_2019_11_13" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50_12-29-2018" date="1548849600">-     *Important Notes:**
    
    This revision of the System ROM contains enhancements to the HPE memory
    support to improve memory resiliency. Please consult the following Customer
    Advisory for additional details:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00064444en_us
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Improved the memory resiliency of the server with enhanced support for HPE
    Fast Fault Tolerant Memory (ADDDC) capabilities. This System ROM will now
    configure the Advanced Memory Protection mode of the server to HPE Fast Fault
    Tolerant (ADDDC) memory mode for all Workload Profiles except Low Latency and
    Custom if the feature is supported by the server's DIMM configuration. Note
    that if the Advanced Memory Protection mode had previously been configured for
    Mirroring or Online Spare, the setting will NOT be automatically changed to
    HPE Fast Fault Tolerant Memory (ADDDC) mode. Also, if the DIMM configuration
    does not support HPE Fast Fault Tolerant Memory (ADDDC) mode, then the
    Advanced Memory Protection Mode will remain Advanced ECC Mode. Note that if
    the current BIOS configuration settings are queried via Redfish or the RESTful
    API, the setting for the Advanced Memory Protection Mode will indicate this
    change.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.02_03-19-2019" date="1553774400">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.  
    
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This system ROM contains the latest Intel microcode that addresses an issue
    where the system may experience an Uncorrected Machine Check Exception in Bank
    0 with Status containing 000F0150. This update may not address all Bank 0
    machine check events with a Status containing 000F0150 but should be used
    before any other further service actions for issues resulting in this
    Integrated Management Log (IML) entry. This issue is not unique to HPE
    servers. This issue was incorrectly documented as being addressed in the v2.00
    System ROMs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.04_04-18-2019" date="1556798400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    Addressed an issue where the system may experience a higher rate of
    Uncorrectable Memory errors or boot time Memory training issues with Intel
    Xeon Scalable Performance Bronze and Silver processors. This issue was first
    introduced with System ROM version 2.00. HPE recommends that any customer
    experiencing a memory issue immediately update to this version of the system
    ROM before replacing any components. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561896000">-     Added a new BIOS/Platform Configuration (RBSU) option called Intel Priority
    Based Frequency to support enabling Intel Speed Select - Base Frequency
    support on select 2nd Generation Xeon Scalable Family Processors that are
    optimized for NFV workloads. This option, which is disabled by default, is
    located in the Processor Options menu and visible only when NFV optimized SKUs
    are installed (denoted by the N in the SKU model). On supported Operating
    Systems, Intel Speed Select - Based Frequency functionality allows high
    priority cores to operate at a higher frequency than the nominal base
    frequency while lower priority cores will run at a slower frequency.
    
    Added a new BIOS/Platform Configuration (RBSU) I/O Direct Cache (IODC) menu to
    the Power and Performance Menu. This option allows for tuning the policy for
    which I/O transactions interact with the processor cache. The caching policy
    may have a slight impact on cross socket latency. Workloads where this option
    would need to be modified from its default value for optimum performance are
    extremely rare.
    
    Added support for HPE Fast Fault Tolerant Memory (ADDDC) to operate when a
    single memory rank is only available on a given memory channel. Previous
    versions of the System ROM required two or more memory ranks to be available
    on each memory channel. After updating to this version of the System ROM the
    server will automatically configure the system for HPE Fast Fault Tolerant
    Memory Mode if the memory configuration supports this option.
    
    Updated the UEFI OpenSSL support to version 1.0.2r to address security
    vulnerability CVE-2019-1559.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561982400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Server Backup and Restore functionality may not
    work properly if initiated through the HPE RESTful API returning a message "An
    internal error occurred during RIS operation".
    
    Addressed an issue where configuring memory to run at 2x refresh rate would
    still actually operate memory at 1x refresh rate. This issue was introduced
    with the v2.00 System ROM and did not impact earlier versions of the System
    ROM. This issue is not unique to HPE servers.
    
    Addressed an issue where the NVMe PCIe Resource Padding option in
    BIOS/Platform Configuration (RBSU) would not properly allocated sufficient
    resources to support a NVMe hot add event. In certain configurations, an
    insufficient amount of resources would have been reserved and a reboot would
    have been required to detect the presence of the newly added drive.
    
    Addressed an issue where the system would not boot to a USB drive when a non-
    bootable (non-formatted) drive was also present in the system. This issue only
    impacts systems configured in Legacy Boot Mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.14_09-05-2019" date="1568808000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where certain 2933Mhz LRDIMMs (HPE part number P03054-091,
    P03055-091 and P11057-0A1) may experience an uncorrectable memory error when
    operating with a Second Generation Intel Xeon Scalable Processor. This issue
    can be seen when processor c-states are enabled on the platform. This issue
    does not impact 2666Mhz LRDIMMs or any speed RDIMM. HPE recommends that
    customers experiencing an uncorrectable memory error in one of these
    configurations update to this version of the System ROM before replacing any
    memory. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.16_09-12-2019" date="1569499200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system may experience an
    unexpected machine check exception. This issue would be logged to the
    Integrated Management Log (IML) as a Bank 0x03 or Bank 0x04 with status
    0xBE000000'00800400 or 0xFE000000'00800400 Machine Check Exception. This issue
    is not unique to HPE servers.
    
    This version of the System ROM includes the latest version of the Intel
    microcode which addresses an issue where under complex microarchitectural
    conditions involving branch instructions that span multiple 64 byte
    boundaries, unpredictable system behavior may occur. This issue is not unique
    to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573128000">-     Updated to the latest thermal support for the platform.
    
    Updated the language translations (non-English modes) for System Utilities.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573214400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.22_11-13-2019" date="1576411200">-     *Important Notes:**
    
    This version of the System ROM replaces the previously published v2.20 System
    ROM. The v2.20 System ROM introduced an issue where a small subset LRDIMMs
    could experience an uncorrectable memory error. This issue had been previously
    fixed in the v2.14 ROM of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="ab753680cfbd2da501a2eb4c90d8268edfa92edefbfd9fe8c4f7429e883546b7" name="firmware-system-u38" arch="x86_64">
    <version epoch="0" ver="2.22_2019_11_13" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.02_03-19-2019" date="1553774400">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This system ROM contains the latest Intel microcode that addresses an issue
    where the system may experience an Uncorrected Machine Check Exception in Bank
    0 with Status containing 000F0150. This update may not address all Bank 0
    machine check events with a Status containing 000F0150 but should be used
    before any other further service actions for issues resulting in this
    Integrated Management Log (IML) entry. This issue is not unique to HPE
    servers. This issue was incorrectly documented as being addressed in the v2.00
    System ROMs.
    
    Addressed an extremely rare issue where systems configured with the v2.00
    System ROM may experience a 389-Unexpected Shutdown error in the Integrated
    Management Log (IML) when running a memory intensive workload. This issue did
    not exist in the v1.50 versions of the System ROMs or earlier.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.04_04-18-2019" date="1556798400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    Addressed an issue where the system may experience a higher rate of
    Uncorrectable Memory errors or boot time Memory training issues with Intel
    Xeon Scalable Performance Bronze and Silver processors. This issue was first
    introduced with System ROM version 2.00. HPE recommends that any customer
    experiencing a memory issue immediately update to this version of the system
    ROM before replacing any components. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.08_05-23-2019" date="1561896000">-     Added a new BIOS/Platform Configuration (RBSU) option called Intel Priority
    Based Frequency to support enabling Intel Speed Select - Base Frequency
    support on select 2nd Generation Xeon Scalable Family Processors that are
    optimized for NFV workloads. This option, which is disabled by default, is
    located in the Processor Options menu and visible only when NFV optimized SKUs
    are installed (denoted by the N in the SKU model). On supported Operating
    Systems, Intel Speed Select - Based Frequency functionality allows high
    priority cores to operate at a higher frequency than the nominal base
    frequency while lower priority cores will run at a slower frequency.
    
    Added a new BIOS/Platform Configuration (RBSU) I/O Direct Cache (IODC) menu to
    the Power and Performance Menu. This option allows for tuning the policy for
    which I/O transactions interact with the processor cache. The caching policy
    may have a slight impact on cross socket latency. Workloads where this option
    would need to be modified from its default value for optimum performance are
    extremely rare.
    
    Added support for HPE Fast Fault Tolerant Memory (ADDDC) to operate when a
    single memory rank is only available on a given memory channel. Previous
    versions of the System ROM required two or more memory ranks to be available
    on each memory channel. After updating to this version of the System ROM the
    server will automatically configure the system for HPE Fast Fault Tolerant
    Memory Mode if the memory configuration supports this option.
    
    Updated the UEFI OpenSSL support to version 1.0.2r to address security
    vulnerability CVE-2019-1559.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.08_05-23-2019" date="1561982400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Server Backup and Restore functionality may not
    work properly if initiated through the HPE RESTful API returning a message "An
    internal error occurred during RIS operation".
    
    Addressed an issue where configuring memory to run at 2x refresh rate would
    still actually operate memory at 1x refresh rate. This issue was introduced
    with the v2.00 System ROM and did not impact earlier versions of the System
    ROM. This issue is not unique to HPE servers.
    
    Addressed an issue where the NVMe PCIe Resource Padding option in
    BIOS/Platform Configuration (RBSU) would not properly allocated sufficient
    resources to support a NVMe hot add event. In certain configurations, an
    insufficient amount of resources would have been reserved and a reboot would
    have been required to detect the presence of the newly added drive.
    
    Addressed an issue where the system would not boot to a USB drive when a non-
    bootable (non-formatted) drive was also present in the system. This issue only
    impacts systems configured in Legacy Boot Mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1565006400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for HPE Persistent Memory featuring Intel Optane DC Persistent
    Memory.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.14_09-05-2019" date="1568721600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where certain 2933Mhz LRDIMMs (HPE part number P03054-091,
    P03055-091 and P11057-0A1) may experience an uncorrectable memory error when
    operating with a Second Generation Intel Xeon Scalable Processor. This issue
    can be seen when processor c-states are enabled on the platform. This issue
    does not impact 2666Mhz LRDIMMs or any speed RDIMM. HPE recommends that
    customers experiencing an uncorrectable memory error in one of these
    configurations update to this version of the System ROM before replacing any
    memory. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.16_09-12-2019" date="1569499200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system may experience an
    unexpected machine check exception. This issue would be logged to the
    Integrated Management Log (IML) as a Bank 0x03 or Bank 0x04 with status
    0xBE000000'00800400 or 0xFE000000'00800400 Machine Check Exception. This issue
    is not unique to HPE servers.
    
    This version of the System ROM includes the latest version of the Intel
    microcode which addresses an issue where under complex microarchitectural
    conditions involving branch instructions that span multiple 64 byte
    boundaries, unpredictable system behavior may occur. This issue is not unique
    to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573473600">-     Updated to the latest thermal support for the platform.
    
    Updated the language translations (non-English modes) for System Utilities.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573560000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.22_11-13-2019" date="1576411200">-     *Important Notes:**
    
    This version of the System ROM replaces the previously published v2.20 System
    ROM. The v2.20 System ROM introduced an issue where a small subset LRDIMMs
    could experience an uncorrectable memory error. This issue had been previously
    fixed in the v2.14 ROM of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="4972789264eed9f564fd7d39030fe0d09551bd1b0290129663d511666cc22143" name="firmware-system-u39" arch="x86_64">
    <version epoch="0" ver="2.22_2019_11_13" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50_12-29-2018" date="1548849600">-     *Important Notes:**
    
    This revision of the System ROM contains enhancements to the HPE memory
    support to improve memory resiliency. Please consult the following Customer
    Advisory for additional details:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00064444en_us
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Improved the memory resiliency of the server with enhanced support for HPE
    Fast Fault Tolerant Memory (ADDDC) capabilities. This System ROM will now
    configure the Advanced Memory Protection mode of the server to HPE Fast Fault
    Tolerant (ADDDC) memory mode for all Workload Profiles except Low Latency and
    Custom if the feature is supported by the server's DIMM configuration. Note
    that if the Advanced Memory Protection mode had previously been configured for
    Mirroring or Online Spare, the setting will NOT be automatically changed to
    HPE Fast Fault Tolerant Memory (ADDDC) mode. Also, if the DIMM configuration
    does not support HPE Fast Fault Tolerant Memory (ADDDC) mode, then the
    Advanced Memory Protection Mode will remain Advanced ECC Mode. Note that if
    the current BIOS configuration settings are queried via Redfish or the RESTful
    API, the setting for the Advanced Memory Protection Mode will indicate this
    change.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.02_03-19-2019" date="1553774400">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This system ROM contains the latest Intel microcode that addresses an issue
    where the system may experience an Uncorrected Machine Check Exception in Bank
    0 with Status containing 000F0150. This update may not address all Bank 0
    machine check events with a Status containing 000F0150 but should be used
    before any other further service actions for issues resulting in this
    Integrated Management Log (IML) entry. This issue is not unique to HPE
    servers. This issue was incorrectly documented as being addressed in the v2.00
    System ROMs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.04_04-18-2019" date="1556798400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    Addressed an issue where the system may experience a higher rate of
    Uncorrectable Memory errors or boot time Memory training issues with Intel
    Xeon Scalable Performance Bronze and Silver processors. This issue was first
    introduced with System ROM version 2.00. HPE recommends that any customer
    experiencing a memory issue immediately update to this version of the system
    ROM before replacing any components. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561896000">-     Added a new BIOS/Platform Configuration (RBSU) option called Intel Priority
    Based Frequency to support enabling Intel Speed Select - Base Frequency
    support on select 2nd Generation Xeon Scalable Family Processors that are
    optimized for NFV workloads. This option, which is disabled by default, is
    located in the Processor Options menu and visible only when NFV optimized SKUs
    are installed (denoted by the N in the SKU model). On supported Operating
    Systems, Intel Speed Select - Based Frequency functionality allows high
    priority cores to operate at a higher frequency than the nominal base
    frequency while lower priority cores will run at a slower frequency.
    
    Added a new BIOS/Platform Configuration (RBSU) I/O Direct Cache (IODC) menu to
    the Power and Performance Menu. This option allows for tuning the policy for
    which I/O transactions interact with the processor cache. The caching policy
    may have a slight impact on cross socket latency. Workloads where this option
    would need to be modified from its default value for optimum performance are
    extremely rare.
    
    Added support for HPE Fast Fault Tolerant Memory (ADDDC) to operate when a
    single memory rank is only available on a given memory channel. Previous
    versions of the System ROM required two or more memory ranks to be available
    on each memory channel. After updating to this version of the System ROM the
    server will automatically configure the system for HPE Fast Fault Tolerant
    Memory Mode if the memory configuration supports this option.
    
    Updated the UEFI OpenSSL support to version 1.0.2r to address security
    vulnerability CVE-2019-1559.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561982400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Server Backup and Restore functionality may not
    work properly if initiated through the HPE RESTful API returning a message "An
    internal error occurred during RIS operation".
    
    Addressed an issue where configuring memory to run at 2x refresh rate would
    still actually operate memory at 1x refresh rate. This issue was introduced
    with the v2.00 System ROM and did not impact earlier versions of the System
    ROM. This issue is not unique to HPE servers.
    
    Addressed an issue where the NVMe PCIe Resource Padding option in
    BIOS/Platform Configuration (RBSU) would not properly allocated sufficient
    resources to support a NVMe hot add event. In certain configurations, an
    insufficient amount of resources would have been reserved and a reboot would
    have been required to detect the presence of the newly added drive.
    
    Addressed an issue where the system would not boot to a USB drive when a non-
    bootable (non-formatted) drive was also present in the system. This issue only
    impacts systems configured in Legacy Boot Mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.14_09-05-2019" date="1568721600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where certain 2933Mhz LRDIMMs (HPE part number P03054-091,
    P03055-091 and P11057-0A1) may experience an uncorrectable memory error when
    operating with a Second Generation Intel Xeon Scalable Processor. This issue
    can be seen when processor c-states are enabled on the platform. This issue
    does not impact 2666Mhz LRDIMMs or any speed RDIMM. HPE recommends that
    customers experiencing an uncorrectable memory error in one of these
    configurations update to this version of the System ROM before replacing any
    memory. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.16_09-12-2019" date="1569499200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system may experience an
    unexpected machine check exception. This issue would be logged to the
    Integrated Management Log (IML) as a Bank 0x03 or Bank 0x04 with status
    0xBE000000'00800400 or 0xFE000000'00800400 Machine Check Exception. This issue
    is not unique to HPE servers.
    
    This version of the System ROM includes the latest version of the Intel
    microcode which addresses an issue where under complex microarchitectural
    conditions involving branch instructions that span multiple 64 byte
    boundaries, unpredictable system behavior may occur. This issue is not unique
    to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573473600">-     Added support for HPE Persistent Memory featuring Intel Optane DC Persistent
    Memory.
    
    Updated to the latest thermal support for the platform.
    
    Updated the language translations (non-English modes) for System Utilities.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573560000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.22_11-13-2019" date="1576411200">-     *Important Notes:**
    
    This version of the System ROM replaces the previously published v2.20 System
    ROM. The v2.20 System ROM introduced an issue where a small subset LRDIMMs
    could experience an uncorrectable memory error. This issue had been previously
    fixed in the v2.14 ROM of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="51f17980032110b4dc9de4d0fcaa073409c940759ec0197ebfebb88b62a95921" name="firmware-system-u40" arch="x86_64">
    <version epoch="0" ver="2.22_2019_11_13" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50_12-29-2018" date="1548849600">-     *Important Notes:**
    
    This revision of the System ROM contains enhancements to the HPE memory
    support to improve memory resiliency. Please consult the following Customer
    Advisory for additional details:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00064444en_us
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Improved the memory resiliency of the server with enhanced support for HPE
    Fast Fault Tolerant Memory (ADDDC) capabilities. This System ROM will now
    configure the Advanced Memory Protection mode of the server to HPE Fast Fault
    Tolerant (ADDDC) memory mode for all Workload Profiles except Low Latency and
    Custom if the feature is supported by the server's DIMM configuration. Note
    that if the Advanced Memory Protection mode had previously been configured for
    Mirroring or Online Spare, the setting will NOT be automatically changed to
    HPE Fast Fault Tolerant Memory (ADDDC) mode. Also, if the DIMM configuration
    does not support HPE Fast Fault Tolerant Memory (ADDDC) mode, then the
    Advanced Memory Protection Mode will remain Advanced ECC Mode. Note that if
    the current BIOS configuration settings are queried via Redfish or the RESTful
    API, the setting for the Advanced Memory Protection Mode will indicate this
    change.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.02_03-19-2019" date="1553774400">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This system ROM contains the latest Intel microcode that addresses an issue
    where the system may experience an Uncorrected Machine Check Exception in Bank
    0 with Status containing 000F0150. This update may not address all Bank 0
    machine check events with a Status containing 000F0150 but should be used
    before any other further service actions for issues resulting in this
    Integrated Management Log (IML) entry. This issue is not unique to HPE
    servers. This issue was incorrectly documented as being addressed in the v2.00
    System ROMs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.04_04-18-2019" date="1556798400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    Addressed an issue where the system may experience a higher rate of
    Uncorrectable Memory errors or boot time Memory training issues with Intel
    Xeon Scalable Performance Bronze and Silver processors. This issue was first
    introduced with System ROM version 2.00. HPE recommends that any customer
    experiencing a memory issue immediately update to this version of the system
    ROM before replacing any components. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561896000">-     Added a new BIOS/Platform Configuration (RBSU) option called Intel Priority
    Based Frequency to support enabling Intel Speed Select - Base Frequency
    support on select 2nd Generation Xeon Scalable Family Processors that are
    optimized for NFV workloads. This option, which is disabled by default, is
    located in the Processor Options menu and visible only when NFV optimized SKUs
    are installed (denoted by the N in the SKU model). On supported Operating
    Systems, Intel Speed Select - Based Frequency functionality allows high
    priority cores to operate at a higher frequency than the nominal base
    frequency while lower priority cores will run at a slower frequency.
    
    Added a new BIOS/Platform Configuration (RBSU) I/O Direct Cache (IODC) menu to
    the Power and Performance Menu. This option allows for tuning the policy for
    which I/O transactions interact with the processor cache. The caching policy
    may have a slight impact on cross socket latency. Workloads where this option
    would need to be modified from its default value for optimum performance are
    extremely rare.
    
    Added support for HPE Fast Fault Tolerant Memory (ADDDC) to operate when a
    single memory rank is only available on a given memory channel. Previous
    versions of the System ROM required two or more memory ranks to be available
    on each memory channel. After updating to this version of the System ROM the
    server will automatically configure the system for HPE Fast Fault Tolerant
    Memory Mode if the memory configuration supports this option.
    
    Updated the UEFI OpenSSL support to version 1.0.2r to address security
    vulnerability CVE-2019-1559.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561982400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Server Backup and Restore functionality may not
    work properly if initiated through the HPE RESTful API returning a message "An
    internal error occurred during RIS operation".
    
    Addressed an issue where configuring memory to run at 2x refresh rate would
    still actually operate memory at 1x refresh rate. This issue was introduced
    with the v2.00 System ROM and did not impact earlier versions of the System
    ROM. This issue is not unique to HPE servers.
    
    Addressed an issue where the NVMe PCIe Resource Padding option in
    BIOS/Platform Configuration (RBSU) would not properly allocated sufficient
    resources to support a NVMe hot add event. In certain configurations, an
    insufficient amount of resources would have been reserved and a reboot would
    have been required to detect the presence of the newly added drive.
    
    Addressed an issue where the system would not boot to a USB drive when a non-
    bootable (non-formatted) drive was also present in the system. This issue only
    impacts systems configured in Legacy Boot Mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.14_09-05-2019" date="1568721600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where certain 2933Mhz LRDIMMs (HPE part number P03054-091,
    P03055-091 and P11057-0A1) may experience an uncorrectable memory error when
    operating with a Second Generation Intel Xeon Scalable Processor. This issue
    can be seen when processor c-states are enabled on the platform. This issue
    does not impact 2666Mhz LRDIMMs or any speed RDIMM. HPE recommends that
    customers experiencing an uncorrectable memory error in one of these
    configurations update to this version of the System ROM before replacing any
    memory. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.16_09-12-2019" date="1569499200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system may experience an
    unexpected machine check exception. This issue would be logged to the
    Integrated Management Log (IML) as a Bank 0x03 or Bank 0x04 with status
    0xBE000000'00800400 or 0xFE000000'00800400 Machine Check Exception. This issue
    is not unique to HPE servers.
    
    This version of the System ROM includes the latest version of the Intel
    microcode which addresses an issue where under complex microarchitectural
    conditions involving branch instructions that span multiple 64 byte
    boundaries, unpredictable system behavior may occur. This issue is not unique
    to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573473600">-     Updated to the latest thermal support for the platform.
    
    Updated the language translations (non-English modes) for System Utilities.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573560000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.22_11-13-2019" date="1576324800">-     *Important Notes:**
    
    This version of the System ROM replaces the previously published v2.20 System
    ROM. The v2.20 System ROM introduced an issue where a small subset LRDIMMs
    could experience an uncorrectable memory error. This issue had been previously
    fixed in the v2.14 ROM of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="7f44222632312e571ead86403db314dd4dd6d278d909ad5e1155de688a1efdf0" name="firmware-system-u41" arch="x86_64">
    <version epoch="0" ver="2.22_2019_11_13" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50_12-29-2018" date="1548849600">-     *Important Notes:**
    
    This revision of the System ROM contains enhancements to the HPE memory
    support to improve memory resiliency. Please consult the following Customer
    Advisory for additional details:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00064444en_us
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Improved the memory resiliency of the server with enhanced support for HPE
    Fast Fault Tolerant Memory (ADDDC) capabilities. This System ROM will now
    configure the Advanced Memory Protection mode of the server to HPE Fast Fault
    Tolerant (ADDDC) memory mode for all Workload Profiles except Low Latency and
    Custom if the feature is supported by the server's DIMM configuration. Note
    that if the Advanced Memory Protection mode had previously been configured for
    Mirroring or Online Spare, the setting will NOT be automatically changed to
    HPE Fast Fault Tolerant Memory (ADDDC) mode. Also, if the DIMM configuration
    does not support HPE Fast Fault Tolerant Memory (ADDDC) mode, then the
    Advanced Memory Protection Mode will remain Advanced ECC Mode. Note that if
    the current BIOS configuration settings are queried via Redfish or the RESTful
    API, the setting for the Advanced Memory Protection Mode will indicate this
    change.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.02_03-19-2019" date="1553774400">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This system ROM contains the latest Intel microcode that addresses an issue
    where the system may experience an Uncorrected Machine Check Exception in Bank
    0 with Status containing 000F0150. This update may not address all Bank 0
    machine check events with a Status containing 000F0150 but should be used
    before any other further service actions for issues resulting in this
    Integrated Management Log (IML) entry. This issue is not unique to HPE
    servers. This issue was incorrectly documented as being addressed in the v2.00
    System ROMs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.04_04-18-2019" date="1556798400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    Addressed an issue where the system may experience a higher rate of
    Uncorrectable Memory errors or boot time Memory training issues with Intel
    Xeon Scalable Performance Bronze and Silver processors. This issue was first
    introduced with System ROM version 2.00. HPE recommends that any customer
    experiencing a memory issue immediately update to this version of the system
    ROM before replacing any components. This issue is not unique to HPE servers.
    
    Addressed an issue where the HPE RESTful Firmware update manager may fail to
    update a component or experience a boot time Red Screen (RSOD) after the HPE
    369i Integrated NIC firmware was updated to the latest revision.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561896000">-     Added a new BIOS/Platform Configuration (RBSU) option called Intel Priority
    Based Frequency to support enabling Intel Speed Select - Base Frequency
    support on select 2nd Generation Xeon Scalable Family Processors that are
    optimized for NFV workloads. This option, which is disabled by default, is
    located in the Processor Options menu and visible only when NFV optimized SKUs
    are installed (denoted by the N in the SKU model). On supported Operating
    Systems, Intel Speed Select - Based Frequency functionality allows high
    priority cores to operate at a higher frequency than the nominal base
    frequency while lower priority cores will run at a slower frequency.
    
    Added a new BIOS/Platform Configuration (RBSU) I/O Direct Cache (IODC) menu to
    the Power and Performance Menu. This option allows for tuning the policy for
    which I/O transactions interact with the processor cache. The caching policy
    may have a slight impact on cross socket latency. Workloads where this option
    would need to be modified from its default value for optimum performance are
    extremely rare.
    
    Added support for HPE Fast Fault Tolerant Memory (ADDDC) to operate when a
    single memory rank is only available on a given memory channel. Previous
    versions of the System ROM required two or more memory ranks to be available
    on each memory channel. After updating to this version of the System ROM the
    server will automatically configure the system for HPE Fast Fault Tolerant
    Memory Mode if the memory configuration supports this option.
    
    Updated the UEFI OpenSSL support to version 1.0.2r to address security
    vulnerability CVE-2019-1559.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561982400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Server Backup and Restore functionality may not
    work properly if initiated through the HPE RESTful API returning a message "An
    internal error occurred during RIS operation".
    
    Addressed an issue where configuring memory to run at 2x refresh rate would
    still actually operate memory at 1x refresh rate. This issue was introduced
    with the v2.00 System ROM and did not impact earlier versions of the System
    ROM. This issue is not unique to HPE servers.
    
    Addressed an issue where the NVMe PCIe Resource Padding option in
    BIOS/Platform Configuration (RBSU) would not properly allocated sufficient
    resources to support a NVMe hot add event. In certain configurations, an
    insufficient amount of resources would have been reserved and a reboot would
    have been required to detect the presence of the newly added drive.
    
    Addressed an issue where the system would not boot to a USB drive when a non-
    bootable (non-formatted) drive was also present in the system. This issue only
    impacts systems configured in Legacy Boot Mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.14_09-05-2019" date="1568721600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where certain 2933Mhz LRDIMMs (HPE part number P03054-091,
    P03055-091 and P11057-0A1) may experience an uncorrectable memory error when
    operating with a Second Generation Intel Xeon Scalable Processor. This issue
    can be seen when processor c-states are enabled on the platform. This issue
    does not impact 2666Mhz LRDIMMs or any speed RDIMM. HPE recommends that
    customers experiencing an uncorrectable memory error in one of these
    configurations update to this version of the System ROM before replacing any
    memory. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.16_09-12-2019" date="1569499200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system may experience an
    unexpected machine check exception. This issue would be logged to the
    Integrated Management Log (IML) as a Bank 0x03 or Bank 0x04 with status
    0xBE000000'00800400 or 0xFE000000'00800400 Machine Check Exception. This issue
    is not unique to HPE servers.
    
    This version of the System ROM includes the latest version of the Intel
    microcode which addresses an issue where under complex microarchitectural
    conditions involving branch instructions that span multiple 64 byte
    boundaries, unpredictable system behavior may occur. This issue is not unique
    to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573473600">-     Updated to the latest thermal support for the platform.
    
    Updated the language translations (non-English modes) for System Utilities.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573560000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.22_11-13-2019" date="1576411200">-     *Important Notes:**
    
    This version of the System ROM replaces the previously published v2.20 System
    ROM. The v2.20 System ROM introduced an issue where a small subset LRDIMMs
    could experience an uncorrectable memory error. This issue had been previously
    fixed in the v2.14 ROM of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="dc955cf3c85f5cc60703c8182d1be055f4fec3806d50d61581085b31c3413914" name="firmware-system-u43" arch="x86_64">
    <version epoch="0" ver="2.10_2019_09_12" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00_08-15-2018" date="1540900800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.02_10-02-2018" date="1540987200">-     Added support for flashing the firmware of the optional HPE Trusted Platform
    Module (TPM). This is the minimum revision of the System ROM that should be
    used if updating the firmware on the optional HPE TPM module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.02_10-02-2018" date="1541073600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the X2APIC Processor Option setting in the
    BIOS/Platform Configuration (RBSU) is not properly enabling the feature. This
    may result in non-optimal operating system performance.
    
    Addressed an issue where early server video output, on a locally attached
    monitor, may not show correctly when the monitor is attached to the server
    through a KVM. This issue does not impact systems that are not using a KVM or
    video output through the iLO Remote Console application.
    
    Addressed an issue where firmware flashing through the RESTful API could
    periodically fail and the task being marked with an exception in the iLO
    firmware page. This issue could impact flashing firmware such as the HPE
    Innovation Engine, Intel SPS Firmware or the optional HPE Trusted Platform
    Module (TPM).
    
    Addressed an issue where a PCIe card would not properly train to its maximum
    speed when the PCIe Bifurcation option was enabled. This issue does not impact
    PCIe cards that do not require bifurcation.
    
    Addressed an extremely rare issue where a system configured with an optional
    SATA DVD drive and an HPE SmartArray controller may become unresponsive during
    boot, usually with a Red Screen (RSOD), when in legacy boot mode. This issue
    does not impact systems in UEFI Boot Mode.
    
    Addressed an issue where an optional PCIe card's legacy option ROM may not
    properly display its legacy setup menu prompt during boot when in legacy boot
    mode. This issue does not impact systems in UEFI Boot Mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20_02-02-2019" date="1550059200">-     Added support for HPE One button secure erase. This option can be launched
    from the HPE Intelligent Provisioning application or through the HPE RESTful
    API to securely restore the system back to a default configuration. This
    option also requires iLO firmware 1.40 or later, and Intelligent Provisioning
    3.30 or later.
    
    Added Secure Configuration Lock feature. This feature can be enabled to detect
    system hardware, security configuration, or firmware revision changes to
    protect against malicious or unintended modifications to the server. This
    protection can be enabled for systems in transit from the factory to the
    customer site, in transit from one customer site to another, or can be left
    enabled on a deployed server. A new BIOS/Platform Configuration (RBSU) Server
    Configuration Lock menu in the Server Security Options is available to enable
    and configure this functionality.
    
    Added a new BIOS/Platform Configuration (RBSU) Backup and Restore Settings
    menu to System Default Options. This option can be used to backup (save off)
    the current BIOS configurations settings to a USB storage device for migration
    to another server.
    
    Updated the language translations (non-English modes) for System Utilities.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20_02-02-2019" date="1550145600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    Addressed an issue where certain processors (i3, Pentium, or Celeron) were
    incorrectly showing support for SGX in BIOS/Platform Configuration (RBSU) when
    they should not. Customers using an i3, Pentium, or Celeron processor with SGX
    enabled need to back up any SGX protected data before updating to the DL20
    Gen10 1.20_01_28_2019 or later BIOS versions. Failure to do so will result in
    any SGX protected data becoming inaccessible. This issue is not unique to HPE
    servers.
    
    Addressed an issue where certain PCIe option cards may not train properly and
    cause the system to hang during POST. This issue is not unique to HPE servers.
    
    Addressed an issue in which the system may not properly boot to the HPE 8GB
    Dual microSD Flash USB Drive when an SD card is installed on the internal SD
    slot when the system is configured for Legacy Boot Mode. This issue does not
    impact systems in UEFI Boot Mode.
    
    Addressed an issue where certain 3rd party USB drive keys may not function
    properly after a system reset when the system is configured in UEFI Boot Mode.
    
    Addressed an issue where the HPE CN1000E-T adapter may not boot properly in
    Legacy Boot Mode. This issue does not impact systems configured in UEFI Boot
    Mode.
    
    Addressed an issue where firmware updates staged through the HPE RESTful API
    may fail to properly execute on a subsequent boot and be marked with an
    exception in the iLO firmware installation queue.
    
    Addressed an issue where iLO virtual media may not boot properly after setting
    the Boot on Next Reset option in the iLO Remote Console and Media - Virtual
    Media settings.
    
    Addressed an issue where the AHS Download application from the System
    Utilities Embedded Applications or UEFI Shell may fail to work properly with
    iLO firmware 1.30 or later.
    
    Addressed an issue where the UEFI Shell sysconfig command may fail to set an
    option or become unresponsive.
    
    Addressed an issue where an optional SATA DVD drive may not unlock and allow
    media to be ejected after an operating system reboot.
    
    Addressed an issue where the system may become unresponsive during boot and
    experience a Red Screen (RSOD) when booting in Legacy Boot mode with a SATA
    M.2 drive installed. This issue does not impact systems in UEFI Boot Mode.
    
    Addressed an issue where a USB KVM, such as the HP AF611A KVM, may not
    function properly after a system reboot.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22_04-04-2019" date="1556798400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_09-12-2019" date="1571313600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for CVE-2017-5715, CVE-2019-11135,
    CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and CVE-2018-11091. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="576f7da6a2ef6de343cbcded831ff95c5039f40daad55cb6271869c3fd60f12c" name="firmware-system-u44" arch="x86_64">
    <version epoch="0" ver="2.10_2019_09_12" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00_08-15-2018" date="1540900800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.02_10-02-2018" date="1540987200">-     Added support for flashing the firmware of the optional HPE Trusted Platform
    Module (TPM). This is the minimum revision of the System ROM that should be
    used if updating the firmware on the optional HPE TPM module.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.02_10-02-2018" date="1541073600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the X2APIC Processor Option setting in the
    BIOS/Platform Configuration (RBSU) is not properly enabling the feature. This
    may result in non-optimal operating system performance.
    
    Addressed an issue where early server video output, on a locally attached
    monitor, may not show correctly when the monitor is attached to the server
    through a KVM. This issue does not impact systems that are not using a KVM or
    video output through the iLO Remote Console application.
    
    Addressed an issue where firmware flashing through the RESTful API could
    periodically fail and the task being marked with an exception in the iLO
    firmware page. This issue could impact flashing firmware such as the HPE
    Innovation Engine, Intel SPS Firmware or the optional HPE Trusted Platform
    Module (TPM).
    
    Addressed an issue where a PCIe card would not properly train to its maximum
    speed when the PCIe Bifurcation option was enabled. This issue does not impact
    PCIe cards that do not require bifurcation.
    
    Addressed an extremely rare issue where a system configured with an optional
    SATA DVD drive and an HPE SmartArray controller may become unresponsive during
    boot, usually with a Red Screen (RSOD), when in legacy boot mode. This issue
    does not impact systems in UEFI Boot Mode.
    
    Addressed an issue where an optional PCIe card's legacy option ROM may not
    properly display its legacy setup menu prompt during boot when in legacy boot
    mode. This issue does not impact systems in UEFI Boot Mode
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20_02-02-2019" date="1550059200">-     Added support for HPE One button secure erase. This option can be launched
    from the HPE Intelligent Provisioning application or through the HPE RESTful
    API to securely restore the system back to a default configuration. This
    option also requires iLO firmware 1.40 or later, and Intelligent Provisioning
    3.30 or later.
    
    Added Secure Configuration Lock feature. This feature can be enabled to detect
    system hardware, security configuration, or firmware revision changes to
    protect against malicious or unintended modifications to the server. This
    protection can be enabled for systems in transit from the factory to the
    customer site, in transit from one customer site to another, or can be left
    enabled on a deployed server. A new BIOS/Platform Configuration (RBSU) Server
    Configuration Lock menu in the Server Security Options is available to enable
    and configure this functionality.
    
    Added a new BIOS/Platform Configuration (RBSU) Backup and Restore Settings
    menu to System Default Options. This option can be used to backup (save off)
    the current BIOS configurations settings to a USB storage device for migration
    to another server.
    
    Updated the language translations (non-English modes) for System Utilities.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20_02-02-2019" date="1550145600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the UEFI EDK2
    support that provides mitigations for a variety of security vulnerabilities.
    The following vulnerabilities have been addressed in this System ROM release:
    CVE-2018-3613 CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734,
    CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180,
    CVE-2018-12181, CVE-2018-12182 and CVE-2018-12183. These security
    vulnerabilities are not unique to HPE servers.
    
    Addressed an issue where certain processors (i3, Pentium, or Celeron) were
    incorrectly showing support for SGX in BIOS/Platform Configuration (RBSU) when
    they should not. Customers using an i3, Pentium, or Celeron processor with SGX
    enabled need to back up any SGX protected data before updating to the ML30
    Gen10 1.20_01_28_2019 or later BIOS versions. Failure to do so will result in
    any SGX protected data becoming inaccessible. This issue is not unique to HPE
    servers.
    
    Addressed an issue where certain PCIe option cards may not train properly and
    cause the system to hang during POST. This issue is not unique to HPE servers.
    
    Addressed an issue in which the system may not properly boot to the HPE 8GB
    Dual microSD Flash USB Drive when an SD card is installed on the internal SD
    slot when the system is configured for Legacy Boot Mode. This issue does not
    impact systems in UEFI Boot Mode.
    
    Addressed an issue where certain 3rd party USB drive keys may not function
    properly after a system reset when the system is configured in UEFI Boot Mode.
    
    Addressed an issue where the HPE CN1000E-T adapter may not boot properly in
    Legacy Boot Mode. This issue does not impact systems configured in UEFI Boot
    Mode.
    
    Addressed an issue where firmware updates staged through the HPE RESTful API
    may fail to properly execute on a subsequent boot and be marked with an
    exception in the iLO firmware installation queue.
    
    Addressed an issue where iLO virtual media may not boot properly after setting
    the Boot on Next Reset option in the iLO Remote Console and Media - Virtual
    Media settings.
    
    Addressed an issue where the AHS Download application from the System
    Utilities Embedded Applications or UEFI Shell may fail to work properly with
    iLO firmware 1.30 or later.
    
    Addressed an issue where the UEFI Shell sysconfig command may fail to set an
    option or become unresponsive.
    
    Addressed an issue where an optional SATA DVD drive may not unlock and allow
    media to be ejected after an operating system reboot.
    
    Addressed an issue where the system may become unresponsive during boot and
    experience a Red Screen (RSOD) when booting in Legacy Boot mode with a SATA
    M.2 drive installed. This issue does not impact systems in UEFI Boot Mode.
    
    Addressed an issue where a USB KVM, such as the HP AF611A KVM, may not
    function properly after a system reboot.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22_04-04-2019" date="1556798400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_09-12-2019" date="1571313600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for CVE-2017-5715, CVE-2019-11135,
    CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and CVE-2018-11091. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="4accb860d781a6c61f9c001aade1223873cae8e42d8bb9b0d3cf4174192e33f1" name="firmware-system-u45" arch="x86_64">
    <version epoch="0" ver="2.22_2019_11_13" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50_12-29-2018" date="1548849600">-     *Important Notes:**
    
    This revision of the System ROM contains enhancements to the HPE memory
    support to improve memory resiliency. Please consult the following Customer
    Advisory for additional details:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00064444en_us
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Improved the memory resiliency of the server with enhanced support for HPE
    Fast Fault Tolerant Memory (ADDDC) capabilities. This System ROM will now
    configure the Advanced Memory Protection mode of the server to HPE Fast Fault
    Tolerant (ADDDC) memory mode for all Workload Profiles except Low Latency and
    Custom if the feature is supported by the server's DIMM configuration. Note
    that if the Advanced Memory Protection mode had previously been configured for
    Mirroring or Online Spare, the setting will NOT be automatically changed to
    HPE Fast Fault Tolerant Memory (ADDDC) mode. Also, if the DIMM configuration
    does not support HPE Fast Fault Tolerant Memory (ADDDC) mode, then the
    Advanced Memory Protection Mode will remain Advanced ECC Mode. Note that if
    the current BIOS configuration settings are queried via Redfish or the RESTful
    API, the setting for the Advanced Memory Protection Mode will indicate this
    change.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.02_03-19-2019" date="1553774400">-     *Important Notes:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    microarchitectural conditions, software using Intel TSX (Transactional
    Synchronizations Extensions) may result in unpredictable system behavior.
    Intel has only seen this under synthetic testing conditions and is not aware
    of any commercially available software exhibiting this behavior. This issue is
    not unique to HPE servers.
    
    This system ROM contains the latest Intel microcode that addresses an issue
    where the system may experience an Uncorrected Machine Check Exception in Bank
    0 with Status containing 000F0150. This update may not address all Bank 0
    machine check events with a Status containing 000F0150 but should be used
    before any other further service actions for issues resulting in this
    Integrated Management Log (IML) entry. This issue is not unique to HPE
    servers. This issue was incorrectly documented as being addressed in the v2.00
    System ROMs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.04_04-18-2019" date="1556798400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Updated the Intel processor microcode to the latest version.
    
    Addressed an issue where the system may experience a higher rate of
    Uncorrectable Memory errors or boot time Memory training issues with Intel
    Xeon Scalable Performance Bronze and Silver processors. This issue was first
    introduced with System ROM version 2.00. HPE recommends that any customer
    experiencing a memory issue immediately update to this version of the system
    ROM before replacing any components. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561896000">-     Added a new BIOS/Platform Configuration (RBSU) option called Intel Priority
    Based Frequency to support enabling Intel Speed Select - Base Frequency
    support on select 2nd Generation Xeon Scalable Family Processors that are
    optimized for NFV workloads. This option, which is disabled by default, is
    located in the Processor Options menu and visible only when NFV optimized SKUs
    are installed (denoted by the N in the SKU model). On supported Operating
    Systems, Intel Speed Select - Based Frequency functionality allows high
    priority cores to operate at a higher frequency than the nominal base
    frequency while lower priority cores will run at a slower frequency.
    
    Added a new BIOS/Platform Configuration (RBSU) I/O Direct Cache (IODC) menu to
    the Power and Performance Menu. This option allows for tuning the policy for
    which I/O transactions interact with the processor cache. The caching policy
    may have a slight impact on cross socket latency. Workloads where this option
    would need to be modified from its default value for optimum performance are
    extremely rare.
    
    Added support for HPE Fast Fault Tolerant Memory (ADDDC) to operate when a
    single memory rank is only available on a given memory channel. Previous
    versions of the System ROM required two or more memory ranks to be available
    on each memory channel. After updating to this version of the System ROM the
    server will automatically configure the system for HPE Fast Fault Tolerant
    Memory Mode if the memory configuration supports this option.
    
    Updated the UEFI OpenSSL support to version 1.0.2r to address security
    vulnerability CVE-2019-1559.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.10_05-21-2019" date="1561982400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Server Backup and Restore functionality may not
    work properly if initiated through the HPE RESTful API returning a message "An
    internal error occurred during RIS operation".
    
    Addressed an issue where configuring memory to run at 2x refresh rate would
    still actually operate memory at 1x refresh rate. This issue was introduced
    with the v2.00 System ROM and did not impact earlier versions of the System
    ROM. This issue is not unique to HPE servers.
    
    Addressed an issue where the NVMe PCIe Resource Padding option in
    BIOS/Platform Configuration (RBSU) would not properly allocated sufficient
    resources to support a NVMe hot add event. In certain configurations, an
    insufficient amount of resources would have been reserved and a reboot would
    have been required to detect the presence of the newly added drive.
    
    Addressed an issue where the system would not boot to a USB drive when a non-
    bootable (non-formatted) drive was also present in the system. This issue only
    impacts systems configured in Legacy Boot Mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.14_09-05-2019" date="1568721600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where certain 2933Mhz LRDIMMs (HPE part number P03054-091,
    P03055-091 and P11057-0A1) may experience an uncorrectable memory error when
    operating with a Second Generation Intel Xeon Scalable Processor. This issue
    can be seen when processor c-states are enabled on the platform. This issue
    does not impact 2666Mhz LRDIMMs or any speed RDIMM. HPE recommends that
    customers experiencing an uncorrectable memory error in one of these
    configurations update to this version of the System ROM before replacing any
    memory. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.16_09-12-2019" date="1569499200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version of the System ROM includes the latest revision of the Intel
    microcode which addresses an issue where the system may experience an
    unexpected machine check exception. This issue would be logged to the
    Integrated Management Log (IML) as a Bank 0x03 or Bank 0x04 with status
    0xBE000000'00800400 or 0xFE000000'00800400 Machine Check Exception. This issue
    is not unique to HPE servers.
    
    This version of the System ROM includes the latest version of the Intel
    microcode which addresses an issue where under complex microarchitectural
    conditions involving branch instructions that span multiple 64 byte
    boundaries, unpredictable system behavior may occur. This issue is not unique
    to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573473600">-     Updated to the latest thermal support for the platform.
    
    Updated the language translations (non-English modes) for System Utilities.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-31-2019" date="1573560000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.22_11-13-2019" date="1576411200">-     *Important Notes:**
    
    This version of the System ROM replaces the previously published v2.20 System
    ROM. The v2.20 System ROM introduced an issue where a small subset LRDIMMs
    could experience an uncorrectable memory error. This issue had been previously
    fixed in the v2.14 ROM of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest support for Intel Trusted
    eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This
    mitigation is only needed for systems that have TXT enabled. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code support that provides mitigations for the multiple security
    vulnerabilities. The following vulnerabilities have been addressed in this
    System ROM release: CVE-2019-11137, CVE-2019-152, and CVE-2019-11136. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an CVE-2017-5715, CVE-2019-11135 and
    CVE-2019-11139. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigation for an Intel sighting where under complex
    micro-architectural conditions, executing X87 or AVX or integer divide
    instructions may results in unpredictable system behavior. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the system may become unresponsive during POST when
    both iLO and the server are reset simultaneously.
    
    Addressed an issue where the server may experience a Red Screen (RSOD) during
    boot when a Matrox GPU is present and the server is booting in Legacy Boot
    Mode. This problem could occur with other optional PCIe graphics adapters.
    This issue is not intermittent and will occur on every boot with impacted
    optional PCIe graphics adapters with previous System ROM revisions. This issue
    is not seen with servers configured in UEFI Boot Mode or when using the
    embedded graphics controller.
    
    Addressed an issue where the system may incorrectly report that a DIMM has
    been mapped out after a memory training failure in the Integrated Management
    Log (IML) when the DIMM is still present in the system memory map. The IML
    will now correctly indicate the memory training failure, but will not indicate
    that the DIMM has been mapped out. This change only impacts the IML logging of
    the error and does not impact the operation of the system.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="ae41164b05b0e0bdfc4716199ff8ed423ad53025831a02df181bd82e7181ab5e" name="firmware-vceth" arch="x86_64">
    <version epoch="0" ver="4.80" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.61" date="1505217600">-     The latest list of issues resolved can be found in the HPE Virtual Connect
    Release Notes that can be found in the following URL**:
    **[http://www.hpe.com/info/vc/manuals](http://www.hpE.com/info/vc/manuals)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.62" date="1519560000">-     The list of enhancements in 4.62 version can be found in the HPE Virtual
    Connect Release Notes at URL**: **&lt;http://www.hpe.com/info/vc/manuals&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.62" date="1519646400">-     The list of issues resolved in 4.62 version can be found in the HPE Virtual
    Connect Release Notes at URL**: **&lt;http://www.hpe.com/info/vc/manuals&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.63" date="1538913600">-     The list of enhancements in 4.63 version can be found in the HPE Virtual
    Connect Release Notes at URL**: **&lt;http://www.hpe.com/info/vc/manuals&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.63" date="1539000000">-     The list of issues resolved in 4.63 version can be found in the HPE Virtual
    Connect Release Notes at URL**: **&lt;http://www.hpe.com/info/vc/manuals&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.75" date="1554897600">-     The list of enhancements in 4.75 version can be found in the HPE Virtual
    Connect Release Notes at URL**: **&lt;http://www.hpe.com/info/vc/manuals&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.75" date="1554984000">-     The list of issues resolved in 4.75 version can be found in the HPE Virtual
    Connect Release Notes at URL**: **&lt;http://www.hpe.com/info/vc/manuals&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.75-1.1" date="1555070400">-     The list of enhancements in 4.75 version can be found in the HPE Virtual
    Connect Release Notes at URL**: **&lt;http://www.hpe.com/info/vc/manuals&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.75-1.1" date="1555156800">-     The list of issues resolved in 4.75 version can be found in the HPE Virtual
    Connect Release Notes at URL**: **&lt;http://www.hpe.com/info/vc/manuals&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.80" date="1555243200">-     The list of issues resolved in 4.80 version can be found in the HPE Virtual
    Connect Release Notes at URL**: **&lt;http://www.hpe.com/info/vc/manuals&gt;</changelog>
  </package>
  <package pkgid="b9d0f1c6b5497cdb3390661f45af7f9d750650220f2ec509cea636e040a69f5f" name="hp-ams" arch="x86_64">
    <version epoch="0" ver="2.9.1" rel="842.14.sles15"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.9.1-842.14" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="92fa06bb74d930f20a9efbafb9db6aa793a9b1a541c181965866f5118abed4ff" name="hp-ams" arch="x86_64">
    <version epoch="0" ver="2.9.1" rel="842.8.rhel8"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.9.1-842.8.rhel8" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="e87ba5321baec1c55ad59fe9673727a3887fa93004a0e17a18265866fa936115" name="hp-ams" arch="x86_64">
    <version epoch="0" ver="2.9.1" rel="843.15.rhel7"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.9.1-843.15.rhel7" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="0b31b78cf149b80907eaf8ee9577f86e25df92fadb1380ebe30996acebaf18d8" name="hp-ams" arch="x86_64">
    <version epoch="0" ver="2.9.1" rel="843.16.sles12"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.9.1-843.16" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="fe203f9ccf6a83bb0671f87e5a5c64e7089e8f605edc0dba561c920892a1e386" name="hp-firmware-d2600-d2700" arch="x86_64">
    <version epoch="0" ver="0150" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0150-2.1" date="1447934400">-     *The following fix is added in this version:-**
    
    -Removed action over FAULT_SENSED bit due to incorrect algorithm.</changelog>
  </package>
  <package pkgid="236db06bfe92a119ac2e1911fb7b824f04d56dde53b20c2a9e86b798a4608e1c" name="hp-firmware-powerpic-dl580" arch="i386">
    <version epoch="0" ver="4.1" rel="5"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.1" date="1391515200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.1-2" date="1406548800">-     *Important Notes:**  
      
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**  
      
    Ver. 4.1(B) includes minor documentation updates. The Power Management
    Controller Firmware contained within ver. 4.1(B) is equivalent to the Firmware
    contained within ver. 4.1. Therefore, it is not necessary to upgrade with ver.
    4.1(B), if the Power Management Controller firmware version is 4.1.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.1-4" date="1421409600">-     *Important Notes:**  
    Ver. 4.1(D) contains updates to the OS installation support for HP Smart
    Update Manager. The Power Management Controller Firmware contained within Ver.
    4.1(D) is Ver. 4.1. Therefore, it is not necessary to upgrade with ver.
    4.1(D), if the Power Management Controller firmware version is 4.1.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**  
    This is the initial version of the firmware.  
    **Known Issues:**
    
    The smart component prompts for reboot unnecessarily when the installation
    procedure is completed. Reboot is not required after installation for updates
    to take effect and hardware stability to be maintained.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.1-5" date="1440763200">-</changelog>
  </package>
  <package pkgid="cf9bcfacb5fdab9ccc577c5612a31ce24f98cb96c42185717c72edc50077cba4" name="hp-firmware-smartarray-46a4d957a7" arch="x86_64">
    <version epoch="0" ver="8.32" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 7.02-2.1" date="1451822400">-     *Problems Fixed in 7.02:**
    
      * A physical drive configured as a spare drive might indicate predictive failure sooner than expected.
      * Controller might stop responding during run-time (POST Lockup 0x13).
      * When drive write-cache is enabled, protocol errors are observed.
      * After hot-plug replacement of a hard disk drive, incorrect hard disk drive firmware version and upgrade recommendation were displayed by HP Smart Storage Administrator.
    
    **Problems Fixed in 7.02 (B):**
    
      * Component would fail to install firmware in a system configured with two or more external drive enclosures attached to an HPE Host Bus Adapter H22x. The following message would be reported - "Device appears more than once in tree". The firmware installation failure was not observed in configurations having only one external drive enclosure attached to an HPE Host Bus Adapter H22x.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 7.04" date="1451908800">-      Disable controller lockup (lockup 0x13) that was caused by rare correctable errors in the controller on-chip memory.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 7.50" date="1462363200">-     Drive temperatures for SATA drives might not be reported after hot-inserting
    the drive.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 7.54" date="1472040000">-      Added more troubleshooting capability, especially for Bloomberg.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 8.00" date="1474545600">-       Increased performance of SATA drives by increasing command queue depth.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 8.00" date="1474632000">-      Drive temperatures for SATA drives might not be reported after hot-inserting the drive.
      * System might hang at POST following a reboot.
      * System fans might go to 100% if connected drives were spun down.
      * SATA SSD's were incorrectly marked as worn out.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 8.00-2.1" date="1496145600">-      **Customers who already installed firmware version 8.00 do not need to update to 8.00 (B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 8.00-2.1" date="1496232000">-      Updated to support Service Pack for ProLiant version 2017.07.0
    
              **Note:** If version 8.00 was previously installed, then it is not necessary to upgrade to version 8.00 (B).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 8.00-3.1" date="1502884800">-      Updated to support Service Pack for ProLiant version 2017.07.1
    
              **Note:** If version 8.00 was previously installed, then it is not necessary to upgrade to version 8.00 (C).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 8.32" date="1507982400">-     System can potentially stop responding with no lockup code due to livelock
    condition where the RAID Stack thread is polling a queue for a completion to
    be returned by the base code firmware</changelog>
  </package>
  <package pkgid="a812a68391732d8dcb4813a2e017afd1dcf0fa1f68e73b2a2260f0adbd5d1b17" name="hp-health" arch="x86_64">
    <version epoch="0" ver="10.90" rel="1860.5.sles15"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.3.0" date="1252929600">- ENHANCEMENTS
- hpasmlited now supports long IML messages. 
- Added "show powermeter" command in hpasmcli. It shows the aggregate power consumption of the server. 

- FIXES
- Fixed the following issues: 
       1.hpasmcli -s "show server" command showed the L2 and L3 cache information incorrectly on multi processor systems. 
       2.hpasmcli showed incorrect fan numbers on HP ProLiant G6 servers. 
       3.hpasmxld segmentation fault when the HP Integrated Lights Out 2 (iLO 2)  broadcast storm occurs.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.3.1" date="1256212800">- FIXES
- Fixed hp-health daemon to prevent soft lockups from occurring when the HP Integrated Lights-Out (iLO) controller becomes un  responsive due to network storm.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.3.2" date="1258027200">- FIXES
- Fixed a problem where if ambient temperature is very low, hpasmlited can incorrectly determine the system is over a tempera  ture threshold and improperly shut the system down.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.4.0" date="1268049600">- ENHANCEMENTS
- Added support for Integrated Lights-Out 3 (iLO 3). 
- Added 'SHOW SEL' option in hpasmcli to display the System Event Log (SEL) contents on HP ProLiant 100 series servers. 
- Updated libcpqci.so, which take advantage of upstream changes to hpilo, to provide better performance to applications, such  as SNMP agents like cmasm2d from hp-snmp-agents. 
- Added 64-bit hpbootcfg utility.

- FIXES
- The Intel processor hyperthreading configuration can be enabled and disabled using hpasmcli on HP ProLiant G6 servers. 
- Fix POSIX-compliancy issue with initscript. 
- Avoid sending a SIGKILL to the health daemon, preventing ASRs that may occur on platforms (e.g. DL785) where hp-health shu   tdowns may take an extended amount of time.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.5.0" date="1280232000">- ENHANCEMENTS
- Split Advanced Server Recovery functionality into standalone hp-asrd service. For more information, execute 'man hp-asrd'.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.6.0" date="1284120000">- ENHNCEMENTS
 - Prevent logging of the debug messages to the console.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.6.3" date="1299153600">- ENHANCEMENTS
- Initial release to support Red Hat Enterprise Linux 5 Update 6.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.7.0" date="1299844800">- ENHANCEMENTS
- hpasm interface redesigned to use sockets in order to remove timeout related issues caused by message queue interface when   the system is in stress.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.0.0" date="1401364800">- ENHANCEMENTS
- Added support for HP ProLiant Gen9 Servers.

- FIXES
- HP Health may skip few lengthy POST error messages due to limitation of IPMI packet.</changelog>
    <changelog author="HPE Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.5.0" date="1466596800">- ENHANCEMENTS

- FIXES
- iLO hpasmlited daemon crash after 2 iLO resets loops.
- hpasmcli command fails to read the embedded NIC status shows as UNKNOWN.
- Error logs seen in service hp-asrd status.</changelog>
  </package>
  <package pkgid="0d9a2ac71002789481ff1be0c693f2acdd255d718d98353d3cf60a658de11361" name="hp-health" arch="x86_64">
    <version epoch="0" ver="10.90" rel="1873.3.sles12"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.3.0" date="1252929600">- ENHANCEMENTS
- hpasmlited now supports long IML messages. 
- Added "show powermeter" command in hpasmcli. It shows the aggregate power consumption of the server. 

- FIXES
- Fixed the following issues: 
       1.hpasmcli -s "show server" command showed the L2 and L3 cache information incorrectly on multi processor systems. 
       2.hpasmcli showed incorrect fan numbers on HP ProLiant G6 servers. 
       3.hpasmxld segmentation fault when the HP Integrated Lights Out 2 (iLO 2)  broadcast storm occurs.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.3.1" date="1256212800">- FIXES
- Fixed hp-health daemon to prevent soft lockups from occurring when the HP Integrated Lights-Out (iLO) controller becomes un  responsive due to network storm.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.3.2" date="1258027200">- FIXES
- Fixed a problem where if ambient temperature is very low, hpasmlited can incorrectly determine the system is over a tempera  ture threshold and improperly shut the system down.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.4.0" date="1268049600">- ENHANCEMENTS
- Added support for Integrated Lights-Out 3 (iLO 3). 
- Added 'SHOW SEL' option in hpasmcli to display the System Event Log (SEL) contents on HP ProLiant 100 series servers. 
- Updated libcpqci.so, which take advantage of upstream changes to hpilo, to provide better performance to applications, such  as SNMP agents like cmasm2d from hp-snmp-agents. 
- Added 64-bit hpbootcfg utility.

- FIXES
- The Intel processor hyperthreading configuration can be enabled and disabled using hpasmcli on HP ProLiant G6 servers. 
- Fix POSIX-compliancy issue with initscript. 
- Avoid sending a SIGKILL to the health daemon, preventing ASRs that may occur on platforms (e.g. DL785) where hp-health shu   tdowns may take an extended amount of time.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.5.0" date="1280232000">- ENHANCEMENTS
- Split Advanced Server Recovery functionality into standalone hp-asrd service. For more information, execute 'man hp-asrd'.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.6.0" date="1284120000">- ENHNCEMENTS
 - Prevent logging of the debug messages to the console.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.6.3" date="1299153600">- ENHANCEMENTS
- Initial release to support Red Hat Enterprise Linux 5 Update 6.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.7.0" date="1299844800">- ENHANCEMENTS
- hpasm interface redesigned to use sockets in order to remove timeout related issues caused by message queue interface when   the system is in stress.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.0.0" date="1401364800">- ENHANCEMENTS
- Added support for HP ProLiant Gen9 Servers.

- FIXES
- HP Health may skip few lengthy POST error messages due to limitation of IPMI packet.</changelog>
    <changelog author="HPE Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.5.0" date="1466596800">- ENHANCEMENTS

- FIXES
- iLO hpasmlited daemon crash after 2 iLO resets loops.
- hpasmcli command fails to read the embedded NIC status shows as UNKNOWN.
- Error logs seen in service hp-asrd status.</changelog>
  </package>
  <package pkgid="6fe3a09f8dd341277be69be137d4fc1ee907dc6627aa97989dea997463a6aab9" name="hp-health" arch="x86_64">
    <version epoch="0" ver="10.90" rel="1873.8.rhel7"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.3.0" date="1252929600">- ENHANCEMENTS
- hpasmlited now supports long IML messages. 
- Added "show powermeter" command in hpasmcli. It shows the aggregate power consumption of the server. 

- FIXES
- Fixed the following issues: 
       1.hpasmcli -s "show server" command showed the L2 and L3 cache information incorrectly on multi processor systems. 
       2.hpasmcli showed incorrect fan numbers on HP ProLiant G6 servers. 
       3.hpasmxld segmentation fault when the HP Integrated Lights Out 2 (iLO 2)  broadcast storm occurs.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.3.1" date="1256212800">- FIXES
- Fixed hp-health daemon to prevent soft lockups from occurring when the HP Integrated Lights-Out (iLO) controller becomes un  responsive due to network storm.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.3.2" date="1258027200">- FIXES
- Fixed a problem where if ambient temperature is very low, hpasmlited can incorrectly determine the system is over a tempera  ture threshold and improperly shut the system down.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.4.0" date="1268049600">- ENHANCEMENTS
- Added support for Integrated Lights-Out 3 (iLO 3). 
- Added 'SHOW SEL' option in hpasmcli to display the System Event Log (SEL) contents on HP ProLiant 100 series servers. 
- Updated libcpqci.so, which take advantage of upstream changes to hpilo, to provide better performance to applications, such  as SNMP agents like cmasm2d from hp-snmp-agents. 
- Added 64-bit hpbootcfg utility.

- FIXES
- The Intel processor hyperthreading configuration can be enabled and disabled using hpasmcli on HP ProLiant G6 servers. 
- Fix POSIX-compliancy issue with initscript. 
- Avoid sending a SIGKILL to the health daemon, preventing ASRs that may occur on platforms (e.g. DL785) where hp-health shu   tdowns may take an extended amount of time.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.5.0" date="1280232000">- ENHANCEMENTS
- Split Advanced Server Recovery functionality into standalone hp-asrd service. For more information, execute 'man hp-asrd'.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.6.0" date="1284120000">- ENHNCEMENTS
 - Prevent logging of the debug messages to the console.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.6.3" date="1299153600">- ENHANCEMENTS
- Initial release to support Red Hat Enterprise Linux 5 Update 6.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.7.0" date="1299844800">- ENHANCEMENTS
- hpasm interface redesigned to use sockets in order to remove timeout related issues caused by message queue interface when   the system is in stress.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.0.0" date="1401364800">- ENHANCEMENTS
- Added support for HP ProLiant Gen9 Servers.

- FIXES
- HP Health may skip few lengthy POST error messages due to limitation of IPMI packet.</changelog>
    <changelog author="HPE Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.5.0" date="1466596800">- ENHANCEMENTS

- FIXES
- iLO hpasmlited daemon crash after 2 iLO resets loops.
- hpasmcli command fails to read the embedded NIC status shows as UNKNOWN.
- Error logs seen in service hp-asrd status.</changelog>
  </package>
  <package pkgid="79abbc6891eeb5f379d65394a6e9572bcfb6bc2f16c2a171eda91f57ea8a87d0" name="hp-health" arch="x86_64">
    <version epoch="0" ver="10.91" rel="1878.11.rhel8"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.3.0" date="1252929600">- ENHANCEMENTS
- hpasmlited now supports long IML messages. 
- Added "show powermeter" command in hpasmcli. It shows the aggregate power consumption of the server. 

- FIXES
- Fixed the following issues: 
       1.hpasmcli -s "show server" command showed the L2 and L3 cache information incorrectly on multi processor systems. 
       2.hpasmcli showed incorrect fan numbers on HP ProLiant G6 servers. 
       3.hpasmxld segmentation fault when the HP Integrated Lights Out 2 (iLO 2)  broadcast storm occurs.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.3.1" date="1256212800">- FIXES
- Fixed hp-health daemon to prevent soft lockups from occurring when the HP Integrated Lights-Out (iLO) controller becomes un  responsive due to network storm.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.3.2" date="1258027200">- FIXES
- Fixed a problem where if ambient temperature is very low, hpasmlited can incorrectly determine the system is over a tempera  ture threshold and improperly shut the system down.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.4.0" date="1268049600">- ENHANCEMENTS
- Added support for Integrated Lights-Out 3 (iLO 3). 
- Added 'SHOW SEL' option in hpasmcli to display the System Event Log (SEL) contents on HP ProLiant 100 series servers. 
- Updated libcpqci.so, which take advantage of upstream changes to hpilo, to provide better performance to applications, such  as SNMP agents like cmasm2d from hp-snmp-agents. 
- Added 64-bit hpbootcfg utility.

- FIXES
- The Intel processor hyperthreading configuration can be enabled and disabled using hpasmcli on HP ProLiant G6 servers. 
- Fix POSIX-compliancy issue with initscript. 
- Avoid sending a SIGKILL to the health daemon, preventing ASRs that may occur on platforms (e.g. DL785) where hp-health shu   tdowns may take an extended amount of time.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.5.0" date="1280232000">- ENHANCEMENTS
- Split Advanced Server Recovery functionality into standalone hp-asrd service. For more information, execute 'man hp-asrd'.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.6.0" date="1284120000">- ENHNCEMENTS
 - Prevent logging of the debug messages to the console.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.6.3" date="1299153600">- ENHANCEMENTS
- Initial release to support Red Hat Enterprise Linux 5 Update 6.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.7.0" date="1299844800">- ENHANCEMENTS
- hpasm interface redesigned to use sockets in order to remove timeout related issues caused by message queue interface when   the system is in stress.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.0.0" date="1401364800">- ENHANCEMENTS
- Added support for HP ProLiant Gen9 Servers.

- FIXES
- HP Health may skip few lengthy POST error messages due to limitation of IPMI packet.</changelog>
    <changelog author="HPE Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.5.0" date="1466596800">- ENHANCEMENTS

- FIXES
- iLO hpasmlited daemon crash after 2 iLO resets loops.
- hpasmcli command fails to read the embedded NIC status shows as UNKNOWN.
- Error logs seen in service hp-asrd status.</changelog>
  </package>
  <package pkgid="15e3a6a41c83b4907ad9c0046633b34138a6d3eacf951fe3f0393cbf4029fa31" name="hp-i40e-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.10.19.30_k4.12.14_195" rel="2.sles15sp1"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.0.19-2[rhel6u9], 2.0.19-1[For other OSs]" date="1490097600">- Fix for configuration of RSS table with DCB
- Enabled VF trust on RHEL 7.3
- Added support for HPE Ethernet 10Gb 2-port 568i Adapter
- Added SLES12SP2 support
- Added RHEL7.3 support
- Feature implementation for speading out interrupts and to use all rx queues and all cpus
- Fix for NVM update process hangs on Linux at 88%</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.0.29-3" date="1501243200">- Added support for HPE Ethernet 1Gb 2-port 368i Adapter
- Added support for HPE Ethernet 1Gb 4-port 369i Adapter
- Added support for HPE Ethernet 1Gb 2-port 368FLR-MMT Adapter
- Added support for HPE Ethernet 10Gb 2-port 568FLR-MMT Adapter
- Added support for HPE Ethernet 10Gb 2-port 568FLR-MMSFP+ Adapter
- Added SLES12SP3 support
- Added RHEL7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.3.6-1" date="1509451200">- This driver addresses an issue with branding string in RHEL7.4
- This driver now fix the issue of LIS prevents switching back to the VF path in RHEL 7.3 guest
- This driver now alllows to use ethtool -m on DAC with or without NPAR
- This driver fixes the supported autoneg for devices with CRT_RETIMER
- This driver now ignores locality when spreading vectors over CPUs
- This driver now allows to change VLAN Tag Stripping
- This driver now throws an error after attempt to advertise unsupported link mode
- This driver now allows to set MTU value to more than 1500 in SLES12SP3 with Intel NICs
- This driver fixes the issue of ethtool not showing up dual-speed modules advertisements
- This driver fixes the issue of memory leak related to filter programming status
- This driver fixes the issue of Flow Director Sideband rules do not update as expected
- This driver fixes the issue of Could not change device features with Adapter Type SR-IOV passthrough and VSwitch VLAN Tagging Mode
- This driver fixes the issue of VxLAN checksum offload counter increments without VxLAN tunnels present
- This driver fixes the issue of kdump failure
- Feature implemention for split PCI error reset handler
- Feature implementation to return an error message when module that does not meet thermal requirements is plugged.
- Feature implementation to add some hw_csum rx offload counters
- Feature implementation to add wrap recovery mode.
- Feature implementation to add ethtool_intersect_link_masks.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.6.1-4" date="1526472000">- This driver fixes the issue of TX driver on SLES12SP2
- This driver fixes the issue of Flow Director User documentation - README.TXT is not current
- This driver fixes the issue of submodules updating
- This driver fixes the issue of client close on Netdev down causing RDMA dev to unregister? 
- This driver fixes the issue of unexpected queue selection messages observed during tx_timeout recovery? 
- This driver now preserves promiscuous mode across resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.6.1-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.11-0[rhel6.10, rhel7u5], 2.4.6.1-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-2.sles15sp1" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-2.sles15sp1" date="1570190400">* Wed Aug 08 2018 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1
- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
  </package>
  <package pkgid="4e713598cb059ae7bd6bec6ca8cdea80f431a3e681d66cf1fb2bf71defe9c77e" name="hp-i40e-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.10.19.30_k4.12.14_23" rel="2.sles15sp0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.0.19-2[rhel6u9], 2.0.19-1[For other OSs]" date="1490097600">- Fix for configuration of RSS table with DCB
- Enabled VF trust on RHEL 7.3
- Added support for HPE Ethernet 10Gb 2-port 568i Adapter
- Added SLES12SP2 support
- Added RHEL7.3 support
- Feature implementation for speading out interrupts and to use all rx queues and all cpus
- Fix for NVM update process hangs on Linux at 88%</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.0.29-3" date="1501243200">- Added support for HPE Ethernet 1Gb 2-port 368i Adapter
- Added support for HPE Ethernet 1Gb 4-port 369i Adapter
- Added support for HPE Ethernet 1Gb 2-port 368FLR-MMT Adapter
- Added support for HPE Ethernet 10Gb 2-port 568FLR-MMT Adapter
- Added support for HPE Ethernet 10Gb 2-port 568FLR-MMSFP+ Adapter
- Added SLES12SP3 support
- Added RHEL7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.3.6-1" date="1509451200">- This driver addresses an issue with branding string in RHEL7.4
- This driver now fix the issue of LIS prevents switching back to the VF path in RHEL 7.3 guest
- This driver now alllows to use ethtool -m on DAC with or without NPAR
- This driver fixes the supported autoneg for devices with CRT_RETIMER
- This driver now ignores locality when spreading vectors over CPUs
- This driver now allows to change VLAN Tag Stripping
- This driver now throws an error after attempt to advertise unsupported link mode
- This driver now allows to set MTU value to more than 1500 in SLES12SP3 with Intel NICs
- This driver fixes the issue of ethtool not showing up dual-speed modules advertisements
- This driver fixes the issue of memory leak related to filter programming status
- This driver fixes the issue of Flow Director Sideband rules do not update as expected
- This driver fixes the issue of Could not change device features with Adapter Type SR-IOV passthrough and VSwitch VLAN Tagging Mode
- This driver fixes the issue of VxLAN checksum offload counter increments without VxLAN tunnels present
- This driver fixes the issue of kdump failure
- Feature implemention for split PCI error reset handler
- Feature implementation to return an error message when module that does not meet thermal requirements is plugged.
- Feature implementation to add some hw_csum rx offload counters
- Feature implementation to add wrap recovery mode.
- Feature implementation to add ethtool_intersect_link_masks.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.6.1-4" date="1526472000">- This driver fixes the issue of TX driver on SLES12SP2
- This driver fixes the issue of Flow Director User documentation - README.TXT is not current
- This driver fixes the issue of submodules updating
- This driver fixes the issue of client close on Netdev down causing RDMA dev to unregister? 
- This driver fixes the issue of unexpected queue selection messages observed during tx_timeout recovery? 
- This driver now preserves promiscuous mode across resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.6.1-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.11-0[rhel6.10, rhel7u5], 2.4.6.1-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-2.sles15sp0" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-2.sles15sp0" date="1570190400">* Wed Aug 08 2018 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1
- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
  </package>
  <package pkgid="b288b2df40acdbd3b6b2a9caf1e1666de57f8363f4457c0c826e59b5126e07f4" name="hp-i40e-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.10.19.30_k4.12.14_94.41" rel="2.sles12sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.0.19-2[rhel6u9], 2.0.19-1[For other OSs]" date="1490097600">- Fix for configuration of RSS table with DCB
- Enabled VF trust on RHEL 7.3
- Added support for HPE Ethernet 10Gb 2-port 568i Adapter
- Added SLES12SP2 support
- Added RHEL7.3 support
- Feature implementation for speading out interrupts and to use all rx queues and all cpus
- Fix for NVM update process hangs on Linux at 88%</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.0.29-3" date="1501243200">- Added support for HPE Ethernet 1Gb 2-port 368i Adapter
- Added support for HPE Ethernet 1Gb 4-port 369i Adapter
- Added support for HPE Ethernet 1Gb 2-port 368FLR-MMT Adapter
- Added support for HPE Ethernet 10Gb 2-port 568FLR-MMT Adapter
- Added support for HPE Ethernet 10Gb 2-port 568FLR-MMSFP+ Adapter
- Added SLES12SP3 support
- Added RHEL7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.3.6-1" date="1509451200">- This driver addresses an issue with branding string in RHEL7.4
- This driver now fix the issue of LIS prevents switching back to the VF path in RHEL 7.3 guest
- This driver now alllows to use ethtool -m on DAC with or without NPAR
- This driver fixes the supported autoneg for devices with CRT_RETIMER
- This driver now ignores locality when spreading vectors over CPUs
- This driver now allows to change VLAN Tag Stripping
- This driver now throws an error after attempt to advertise unsupported link mode
- This driver now allows to set MTU value to more than 1500 in SLES12SP3 with Intel NICs
- This driver fixes the issue of ethtool not showing up dual-speed modules advertisements
- This driver fixes the issue of memory leak related to filter programming status
- This driver fixes the issue of Flow Director Sideband rules do not update as expected
- This driver fixes the issue of Could not change device features with Adapter Type SR-IOV passthrough and VSwitch VLAN Tagging Mode
- This driver fixes the issue of VxLAN checksum offload counter increments without VxLAN tunnels present
- This driver fixes the issue of kdump failure
- Feature implemention for split PCI error reset handler
- Feature implementation to return an error message when module that does not meet thermal requirements is plugged.
- Feature implementation to add some hw_csum rx offload counters
- Feature implementation to add wrap recovery mode.
- Feature implementation to add ethtool_intersect_link_masks.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.6.1-4" date="1526472000">- This driver fixes the issue of TX driver on SLES12SP2
- This driver fixes the issue of Flow Director User documentation - README.TXT is not current
- This driver fixes the issue of submodules updating
- This driver fixes the issue of client close on Netdev down causing RDMA dev to unregister? 
- This driver fixes the issue of unexpected queue selection messages observed during tx_timeout recovery? 
- This driver now preserves promiscuous mode across resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.6.1-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.11-0[rhel6.10, rhel7u5], 2.4.6.1-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-2.sles12sp4" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-2.sles12sp4" date="1570190400">* Wed Aug 08 2018 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1
- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
  </package>
  <package pkgid="2bd671b6205bc37e02ff291a1486c8a8b7d078fc503c9f7403f61be86f121137" name="hp-i40e-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.10.19.30_k4.4.73_5" rel="2.sles12sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.0.19-2[rhel6u9], 2.0.19-1[For other OSs]" date="1490097600">- Fix for configuration of RSS table with DCB
- Enabled VF trust on RHEL 7.3
- Added support for HPE Ethernet 10Gb 2-port 568i Adapter
- Added SLES12SP2 support
- Added RHEL7.3 support
- Feature implementation for speading out interrupts and to use all rx queues and all cpus
- Fix for NVM update process hangs on Linux at 88%</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.0.29-3" date="1501243200">- Added support for HPE Ethernet 1Gb 2-port 368i Adapter
- Added support for HPE Ethernet 1Gb 4-port 369i Adapter
- Added support for HPE Ethernet 1Gb 2-port 368FLR-MMT Adapter
- Added support for HPE Ethernet 10Gb 2-port 568FLR-MMT Adapter
- Added support for HPE Ethernet 10Gb 2-port 568FLR-MMSFP+ Adapter
- Added SLES12SP3 support
- Added RHEL7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.3.6-1" date="1509451200">- This driver addresses an issue with branding string in RHEL7.4
- This driver now fix the issue of LIS prevents switching back to the VF path in RHEL 7.3 guest
- This driver now alllows to use ethtool -m on DAC with or without NPAR
- This driver fixes the supported autoneg for devices with CRT_RETIMER
- This driver now ignores locality when spreading vectors over CPUs
- This driver now allows to change VLAN Tag Stripping
- This driver now throws an error after attempt to advertise unsupported link mode
- This driver now allows to set MTU value to more than 1500 in SLES12SP3 with Intel NICs
- This driver fixes the issue of ethtool not showing up dual-speed modules advertisements
- This driver fixes the issue of memory leak related to filter programming status
- This driver fixes the issue of Flow Director Sideband rules do not update as expected
- This driver fixes the issue of Could not change device features with Adapter Type SR-IOV passthrough and VSwitch VLAN Tagging Mode
- This driver fixes the issue of VxLAN checksum offload counter increments without VxLAN tunnels present
- This driver fixes the issue of kdump failure
- Feature implemention for split PCI error reset handler
- Feature implementation to return an error message when module that does not meet thermal requirements is plugged.
- Feature implementation to add some hw_csum rx offload counters
- Feature implementation to add wrap recovery mode.
- Feature implementation to add ethtool_intersect_link_masks.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.6.1-4" date="1526472000">- This driver fixes the issue of TX driver on SLES12SP2
- This driver fixes the issue of Flow Director User documentation - README.TXT is not current
- This driver fixes the issue of submodules updating
- This driver fixes the issue of client close on Netdev down causing RDMA dev to unregister? 
- This driver fixes the issue of unexpected queue selection messages observed during tx_timeout recovery? 
- This driver now preserves promiscuous mode across resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.6.1-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.11-0[rhel6.10, rhel7u5], 2.4.6.1-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-2.sles12sp3" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-2.sles12sp3" date="1570190400">* Wed Aug 08 2018 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1
- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
  </package>
  <package pkgid="5e2f17a89ed9b853fa762161e18d55e88f3cc137f71df408bd3f656a9af914d9" name="hp-iavf-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.7.61.20_k4.12.14_195" rel="1.sles15sp1"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20-1.sles15sp1" date="1569326400">- Initial package which is renamed from i40evf driver</changelog>
  </package>
  <package pkgid="48ec84416d13474e81bf13032d4c9f8873960e6cd2d34780071de9f2a16460b2" name="hp-iavf-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.7.61.20_k4.12.14_23" rel="1.sles15sp0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20-1.sles15sp0" date="1569326400">- Initial package which is renamed from i40evf driver</changelog>
  </package>
  <package pkgid="cdab9c2c9d9f5dca3bab996002f15710d156a2e7acf0532c96d817a3ec3323de" name="hp-iavf-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.7.61.20_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20-1.sles12sp4" date="1569326400">- Initial package which is renamed from i40evf driver</changelog>
  </package>
  <package pkgid="dedcbc8fbf95edbbdb6a6936b1d640c5d4e5801c3ffc458de879dc97257ed375" name="hp-iavf-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.7.61.20_k4.4.73_5" rel="1.sles12sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20-1.sles12sp3" date="1569326400">- Initial package which is renamed from i40evf driver</changelog>
  </package>
  <package pkgid="9c67f1c80d7c7f649953bad7ce3bbd29f9eb674dcbdd67c01f4cae831da1f8e0" name="hp-igb-kmp-default" arch="x86_64">
    <version epoch="0" ver="6.2.1_k4.12.14_195" rel="1.sles15sp1"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.17-11" date="1436270400">- Added SLES11SP4 support
 - Added RHEL 6.7 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3.2-7" date="1447156800">- Added SLES12SP1 support
 - Added RHEL 7.2 support
 - Fix queue allocation method to accomodate changing during runtime
 - Use skb_vlan_tag_* functions instead of old name vlan_tx_tag
 - This driver addresses an issue where the link speed reported by the HPE Active Health System (AHS) is incorrect.
 - This driver can now correctly change the queue allocation method during runtime.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.1-1.sles15sp1" date="1569326400">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
  </package>
  <package pkgid="47c3c44bb961c66ab2492d984902aedde368a252f427aa0cb0d7d838c0f3970c" name="hp-igb-kmp-default" arch="x86_64">
    <version epoch="0" ver="6.2.1_k4.12.14_23" rel="1.sles15sp0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.17-11" date="1436270400">- Added SLES11SP4 support
 - Added RHEL 6.7 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3.2-7" date="1447156800">- Added SLES12SP1 support
 - Added RHEL 7.2 support
 - Fix queue allocation method to accomodate changing during runtime
 - Use skb_vlan_tag_* functions instead of old name vlan_tx_tag
 - This driver addresses an issue where the link speed reported by the HPE Active Health System (AHS) is incorrect.
 - This driver can now correctly change the queue allocation method during runtime.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.1-1.sles15sp0" date="1569326400">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
  </package>
  <package pkgid="db9ca854afecb73da2db16594c47f3da17f521ed5b28f29a2b50b45ba6937b2a" name="hp-igb-kmp-default" arch="x86_64">
    <version epoch="0" ver="6.2.1_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.17-11" date="1436270400">- Added SLES11SP4 support
 - Added RHEL 6.7 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3.2-7" date="1447156800">- Added SLES12SP1 support
 - Added RHEL 7.2 support
 - Fix queue allocation method to accomodate changing during runtime
 - Use skb_vlan_tag_* functions instead of old name vlan_tx_tag
 - This driver addresses an issue where the link speed reported by the HPE Active Health System (AHS) is incorrect.
 - This driver can now correctly change the queue allocation method during runtime.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.1-1.sles12sp4" date="1569326400">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
  </package>
  <package pkgid="aec8c308b25e295ddcd0ad99572ca2c8adc55455c1ae0f2ebd8eb59518ee3ae5" name="hp-igb-kmp-default" arch="x86_64">
    <version epoch="0" ver="6.2.1_k4.4.73_5" rel="1.sles12sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.17-11" date="1436270400">- Added SLES11SP4 support
 - Added RHEL 6.7 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3.2-7" date="1447156800">- Added SLES12SP1 support
 - Added RHEL 7.2 support
 - Fix queue allocation method to accomodate changing during runtime
 - Use skb_vlan_tag_* functions instead of old name vlan_tx_tag
 - This driver addresses an issue where the link speed reported by the HPE Active Health System (AHS) is incorrect.
 - This driver can now correctly change the queue allocation method during runtime.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.1-1.sles12sp3" date="1569326400">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
  </package>
  <package pkgid="2c184bc37987af283bf416c054ea62b9ff8ad5b1eacd0231708758cff1ba24ce" name="hp-ixgbe-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.6.4_k4.12.14_195" rel="2.sles15sp1"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.4.6-1" date="1466510400">- Added RHEL 6.8 support
- Fix the issue of unable to dynamically detect SFP module
- Added support for Marvell PHY devices
- Added new netdev operation to trust the Virtual Function
- Added support to check and set the RSS hash and indirection table via ethtool -x/-X parameters	
- Added new netdev op to allow user to enable/disable the ability of a specific VF to query its RSS Indirection Table and an RSS Hash Key
- Fix the issue of packets being dropped as spoofed packets in SR-IOV mode
- Fix the issue of macvlan interfaces not being able to get link, ixgbevf parent loses link
- Fix the issue of ixgbe installation getting corrupted the system's ability to boot from SLES11SP4</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.0.7-2[rhel6u9], 5.0.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fix the issue of Vlan interface in RHEL 6.8 VM on RHEL6.8 host fails to get IP
- Fix the issue of PHY stack trace and OS crash creating / allocating VFs.
- Fix the issue of Transmit queue stuck [DCB enabled]
- Fix the issue of NULL pointer dereference when enabling SRIOV
- Fix the issue of cannot set MACVLAN if MAC is set by PF, when VF is trusted</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs
- Fix the issue of RHEL6.9 64 bit is not able to create Virtual Functions with the sysfs command</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3-1" date="1509969600">- This driver updated branding strings from HP to HPE for legacy adapters 
- This driver fixes the issue of Unable to automatically get link after swapping SFP+ modules of different speeds 
- This driver fixes the issue of IPV6 magic packet can't wake up
- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs
- This driver fixes linux Kernel panic occurs when assigning an IP address on HVL system with non existing PHY</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-5" date="1526472000">- This driver updated the kernel version infor for SLES12sP3</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-2.sles15sp1" date="1570190400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="a4b200ca23c7cfc251459185f1597cf62f5667bc5b695a031ebc9e85ab0d407c" name="hp-ixgbe-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.6.4_k4.12.14_23" rel="2.sles15sp0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.4.6-1" date="1466510400">- Added RHEL 6.8 support
- Fix the issue of unable to dynamically detect SFP module
- Added support for Marvell PHY devices
- Added new netdev operation to trust the Virtual Function
- Added support to check and set the RSS hash and indirection table via ethtool -x/-X parameters	
- Added new netdev op to allow user to enable/disable the ability of a specific VF to query its RSS Indirection Table and an RSS Hash Key
- Fix the issue of packets being dropped as spoofed packets in SR-IOV mode
- Fix the issue of macvlan interfaces not being able to get link, ixgbevf parent loses link
- Fix the issue of ixgbe installation getting corrupted the system's ability to boot from SLES11SP4</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.0.7-2[rhel6u9], 5.0.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fix the issue of Vlan interface in RHEL 6.8 VM on RHEL6.8 host fails to get IP
- Fix the issue of PHY stack trace and OS crash creating / allocating VFs.
- Fix the issue of Transmit queue stuck [DCB enabled]
- Fix the issue of NULL pointer dereference when enabling SRIOV
- Fix the issue of cannot set MACVLAN if MAC is set by PF, when VF is trusted</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs
- Fix the issue of RHEL6.9 64 bit is not able to create Virtual Functions with the sysfs command</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3-1" date="1509969600">- This driver updated branding strings from HP to HPE for legacy adapters 
- This driver fixes the issue of Unable to automatically get link after swapping SFP+ modules of different speeds 
- This driver fixes the issue of IPV6 magic packet can't wake up
- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs
- This driver fixes linux Kernel panic occurs when assigning an IP address on HVL system with non existing PHY</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-5" date="1526472000">- This driver updated the kernel version infor for SLES12sP3</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-2.sles15sp0" date="1570190400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="29457cd816b81ed12c10081df224062ad6860c568e5c41c72aa83efe94aede89" name="hp-ixgbe-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.6.4_k4.12.14_94.41" rel="2.sles12sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.4.6-1" date="1466510400">- Added RHEL 6.8 support
- Fix the issue of unable to dynamically detect SFP module
- Added support for Marvell PHY devices
- Added new netdev operation to trust the Virtual Function
- Added support to check and set the RSS hash and indirection table via ethtool -x/-X parameters	
- Added new netdev op to allow user to enable/disable the ability of a specific VF to query its RSS Indirection Table and an RSS Hash Key
- Fix the issue of packets being dropped as spoofed packets in SR-IOV mode
- Fix the issue of macvlan interfaces not being able to get link, ixgbevf parent loses link
- Fix the issue of ixgbe installation getting corrupted the system's ability to boot from SLES11SP4</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.0.7-2[rhel6u9], 5.0.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fix the issue of Vlan interface in RHEL 6.8 VM on RHEL6.8 host fails to get IP
- Fix the issue of PHY stack trace and OS crash creating / allocating VFs.
- Fix the issue of Transmit queue stuck [DCB enabled]
- Fix the issue of NULL pointer dereference when enabling SRIOV
- Fix the issue of cannot set MACVLAN if MAC is set by PF, when VF is trusted</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs
- Fix the issue of RHEL6.9 64 bit is not able to create Virtual Functions with the sysfs command</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3-1" date="1509969600">- This driver updated branding strings from HP to HPE for legacy adapters 
- This driver fixes the issue of Unable to automatically get link after swapping SFP+ modules of different speeds 
- This driver fixes the issue of IPV6 magic packet can't wake up
- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs
- This driver fixes linux Kernel panic occurs when assigning an IP address on HVL system with non existing PHY</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-5" date="1526472000">- This driver updated the kernel version infor for SLES12sP3</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-2.sles12sp4" date="1570190400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="da0a4dff3dac043121a0ef28049da9d564aa936a4587ea6d1297c6a98cf7b2f3" name="hp-ixgbe-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.6.4_k4.4.73_5" rel="2.sles12sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.4.6-1" date="1466510400">- Added RHEL 6.8 support
- Fix the issue of unable to dynamically detect SFP module
- Added support for Marvell PHY devices
- Added new netdev operation to trust the Virtual Function
- Added support to check and set the RSS hash and indirection table via ethtool -x/-X parameters	
- Added new netdev op to allow user to enable/disable the ability of a specific VF to query its RSS Indirection Table and an RSS Hash Key
- Fix the issue of packets being dropped as spoofed packets in SR-IOV mode
- Fix the issue of macvlan interfaces not being able to get link, ixgbevf parent loses link
- Fix the issue of ixgbe installation getting corrupted the system's ability to boot from SLES11SP4</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.0.7-2[rhel6u9], 5.0.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fix the issue of Vlan interface in RHEL 6.8 VM on RHEL6.8 host fails to get IP
- Fix the issue of PHY stack trace and OS crash creating / allocating VFs.
- Fix the issue of Transmit queue stuck [DCB enabled]
- Fix the issue of NULL pointer dereference when enabling SRIOV
- Fix the issue of cannot set MACVLAN if MAC is set by PF, when VF is trusted</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs
- Fix the issue of RHEL6.9 64 bit is not able to create Virtual Functions with the sysfs command</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3-1" date="1509969600">- This driver updated branding strings from HP to HPE for legacy adapters 
- This driver fixes the issue of Unable to automatically get link after swapping SFP+ modules of different speeds 
- This driver fixes the issue of IPV6 magic packet can't wake up
- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs
- This driver fixes linux Kernel panic occurs when assigning an IP address on HVL system with non existing PHY</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-5" date="1526472000">- This driver updated the kernel version infor for SLES12sP3</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-2.sles12sp3" date="1570190400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="75371facaf7c95def40a147a4d4f0219cbc4db50442e77af2ad5b8878e7f1dbc" name="hp-ixgbe_bl-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.6.4_k4.12.14_195" rel="1.sles15sp1"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups" date="1460548800">.hp.com&gt; 4.3.13-2
 - Fix the issue of First Virtual Function(VF) receiving a copy of Physical Function(PF)'s traffic
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.4.6-1" date="1466510400">- Added RHEL 6.8 support
- Fix the issue of unable to dynamically detect SFP module
- Added support for Marvell PHY devices
- Added new netdev operation to trust the Virtual Function
- Added support to check and set the RSS hash and indirection table via ethtool -x/-X parameters	
- Added new netdev op to allow user to enable/disable the ability of a specific VF to query its RSS Indirection Table and an RSS Hash Key
- Fix the issue of packets being dropped as spoofed packets in SR-IOV mode
- Fix the issue of macvlan interfaces not being able to get link, ixgbevf parent loses link
- Fix the issue of ixgbe installation getting corrupted the system's ability to boot from SLES11SP4</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.0.7-2[rhel6u9], 5.0.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fix the issue of Vlan interface in RHEL 6.8 VM on RHEL6.8 host fails to get IP
- Fix the issue of PHY stack trace and OS crash creating / allocating VFs.
- Fix the issue of Transmit queue stuck [DCB enabled]
- Fix the issue of NULL pointer dereference when enabling SRIOV
- Fix the issue of cannot set MACVLAN if MAC is set by PF, when VF is trusted</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs
- Fix the issue of RHEL6.9 64 bit is not able to create Virtual Functions with the sysfs command</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3-1" date="1509969600">- This driver updated branding strings from HP to HPE for legacy adapters 
- This driver fixes the issue of Unable to automatically get link after swapping SFP+ modules of different speeds 
- This driver fixes the issue of IPV6 magic packet can't wake up
- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs
- This driver fixes linux Kernel panic occurs when assigning an IP address on HVL system with non existing PHY</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-5" date="1526472000">- This driver updated the kernel version infor for SLES12sP3</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1.sles15sp1" date="1569412800">- This driver fixes the issue of an infinite recursion in device shutdown path due to a corner case when PCIe link was down.
- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.
- Added RHEL7u7 Support.
- Added RHEL8u0 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="67c413b9b186c9870620753e2e4c23d9b536225fd92efc7dd2804572dbfad5cd" name="hp-ixgbe_bl-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.6.4_k4.12.14_23" rel="1.sles15sp0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups" date="1460548800">.hp.com&gt; 4.3.13-2
 - Fix the issue of First Virtual Function(VF) receiving a copy of Physical Function(PF)'s traffic
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.4.6-1" date="1466510400">- Added RHEL 6.8 support
- Fix the issue of unable to dynamically detect SFP module
- Added support for Marvell PHY devices
- Added new netdev operation to trust the Virtual Function
- Added support to check and set the RSS hash and indirection table via ethtool -x/-X parameters	
- Added new netdev op to allow user to enable/disable the ability of a specific VF to query its RSS Indirection Table and an RSS Hash Key
- Fix the issue of packets being dropped as spoofed packets in SR-IOV mode
- Fix the issue of macvlan interfaces not being able to get link, ixgbevf parent loses link
- Fix the issue of ixgbe installation getting corrupted the system's ability to boot from SLES11SP4</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.0.7-2[rhel6u9], 5.0.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fix the issue of Vlan interface in RHEL 6.8 VM on RHEL6.8 host fails to get IP
- Fix the issue of PHY stack trace and OS crash creating / allocating VFs.
- Fix the issue of Transmit queue stuck [DCB enabled]
- Fix the issue of NULL pointer dereference when enabling SRIOV
- Fix the issue of cannot set MACVLAN if MAC is set by PF, when VF is trusted</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs
- Fix the issue of RHEL6.9 64 bit is not able to create Virtual Functions with the sysfs command</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3-1" date="1509969600">- This driver updated branding strings from HP to HPE for legacy adapters 
- This driver fixes the issue of Unable to automatically get link after swapping SFP+ modules of different speeds 
- This driver fixes the issue of IPV6 magic packet can't wake up
- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs
- This driver fixes linux Kernel panic occurs when assigning an IP address on HVL system with non existing PHY</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-5" date="1526472000">- This driver updated the kernel version infor for SLES12sP3</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1.sles15sp0" date="1569412800">- This driver fixes the issue of an infinite recursion in device shutdown path due to a corner case when PCIe link was down.
- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.
- Added RHEL7u7 Support.
- Added RHEL8u0 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="d9c4e3322e35212744a22b5eb5869a1832855698beabb90bb47521716311a31b" name="hp-ixgbe_bl-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.6.4_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups" date="1460548800">.hp.com&gt; 4.3.13-2
 - Fix the issue of First Virtual Function(VF) receiving a copy of Physical Function(PF)'s traffic
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.4.6-1" date="1466510400">- Added RHEL 6.8 support
- Fix the issue of unable to dynamically detect SFP module
- Added support for Marvell PHY devices
- Added new netdev operation to trust the Virtual Function
- Added support to check and set the RSS hash and indirection table via ethtool -x/-X parameters	
- Added new netdev op to allow user to enable/disable the ability of a specific VF to query its RSS Indirection Table and an RSS Hash Key
- Fix the issue of packets being dropped as spoofed packets in SR-IOV mode
- Fix the issue of macvlan interfaces not being able to get link, ixgbevf parent loses link
- Fix the issue of ixgbe installation getting corrupted the system's ability to boot from SLES11SP4</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.0.7-2[rhel6u9], 5.0.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fix the issue of Vlan interface in RHEL 6.8 VM on RHEL6.8 host fails to get IP
- Fix the issue of PHY stack trace and OS crash creating / allocating VFs.
- Fix the issue of Transmit queue stuck [DCB enabled]
- Fix the issue of NULL pointer dereference when enabling SRIOV
- Fix the issue of cannot set MACVLAN if MAC is set by PF, when VF is trusted</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs
- Fix the issue of RHEL6.9 64 bit is not able to create Virtual Functions with the sysfs command</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3-1" date="1509969600">- This driver updated branding strings from HP to HPE for legacy adapters 
- This driver fixes the issue of Unable to automatically get link after swapping SFP+ modules of different speeds 
- This driver fixes the issue of IPV6 magic packet can't wake up
- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs
- This driver fixes linux Kernel panic occurs when assigning an IP address on HVL system with non existing PHY</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-5" date="1526472000">- This driver updated the kernel version infor for SLES12sP3</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1.sles12sp4" date="1569412800">- This driver fixes the issue of an infinite recursion in device shutdown path due to a corner case when PCIe link was down.
- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.
- Added RHEL7u7 Support.
- Added RHEL8u0 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="ea269b5cc0fe7202aa78315d3c9f4dcf2f238b6c8aee328b214c9e0078440a3b" name="hp-ixgbe_bl-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.6.4_k4.4.73_5" rel="1.sles12sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups" date="1460548800">.hp.com&gt; 4.3.13-2
 - Fix the issue of First Virtual Function(VF) receiving a copy of Physical Function(PF)'s traffic
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.4.6-1" date="1466510400">- Added RHEL 6.8 support
- Fix the issue of unable to dynamically detect SFP module
- Added support for Marvell PHY devices
- Added new netdev operation to trust the Virtual Function
- Added support to check and set the RSS hash and indirection table via ethtool -x/-X parameters	
- Added new netdev op to allow user to enable/disable the ability of a specific VF to query its RSS Indirection Table and an RSS Hash Key
- Fix the issue of packets being dropped as spoofed packets in SR-IOV mode
- Fix the issue of macvlan interfaces not being able to get link, ixgbevf parent loses link
- Fix the issue of ixgbe installation getting corrupted the system's ability to boot from SLES11SP4</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.0.7-2[rhel6u9], 5.0.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fix the issue of Vlan interface in RHEL 6.8 VM on RHEL6.8 host fails to get IP
- Fix the issue of PHY stack trace and OS crash creating / allocating VFs.
- Fix the issue of Transmit queue stuck [DCB enabled]
- Fix the issue of NULL pointer dereference when enabling SRIOV
- Fix the issue of cannot set MACVLAN if MAC is set by PF, when VF is trusted</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs
- Fix the issue of RHEL6.9 64 bit is not able to create Virtual Functions with the sysfs command</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3-1" date="1509969600">- This driver updated branding strings from HP to HPE for legacy adapters 
- This driver fixes the issue of Unable to automatically get link after swapping SFP+ modules of different speeds 
- This driver fixes the issue of IPV6 magic packet can't wake up
- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs
- This driver fixes linux Kernel panic occurs when assigning an IP address on HVL system with non existing PHY</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-5" date="1526472000">- This driver updated the kernel version infor for SLES12sP3</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1.sles12sp3" date="1569412800">- This driver fixes the issue of an infinite recursion in device shutdown path due to a corner case when PCIe link was down.
- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.
- Added RHEL7u7 Support.
- Added RHEL8u0 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="0561d5bfc095fb21eb8933b97643e50f15d988f8f70b0ed37e5c181cc8d562b4" name="hp-ixgbevf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.6.2_k4.12.14_195" rel="2.sles15sp1"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1.2-2" date="1460548800">- Fix the issue of packet loss in Virtual Functions(VF) in cases where Physical Function(PF) interface is brought up after VF.
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.5-2[rhel6u9], 4.0.5-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fixed the issue of installing ixgbevf corrupts ability of virtual machine to boot from SLES 11 SP4

 Tue Jun 21 2016 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2.2-1
- Added RHEL 6.8 support
- Fix the issue of setting of invalid MTU
- Added support for ethtool RSS get/set functionality
- Fix the issue of No error generated if untrusted VM user tries to set user defined VF MAC address</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.2-1" date="1509969600">- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.2-2.sles15sp1" date="1570190400">- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="d9dfb6647f396d927797eafc32801ffd4a44a1b010df39f6dffe9a8ae78b57f3" name="hp-ixgbevf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.6.2_k4.12.14_23" rel="2.sles15sp0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1.2-2" date="1460548800">- Fix the issue of packet loss in Virtual Functions(VF) in cases where Physical Function(PF) interface is brought up after VF.
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.5-2[rhel6u9], 4.0.5-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fixed the issue of installing ixgbevf corrupts ability of virtual machine to boot from SLES 11 SP4

 Tue Jun 21 2016 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2.2-1
- Added RHEL 6.8 support
- Fix the issue of setting of invalid MTU
- Added support for ethtool RSS get/set functionality
- Fix the issue of No error generated if untrusted VM user tries to set user defined VF MAC address</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.2-1" date="1509969600">- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.2-2.sles15sp0" date="1570190400">- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="4b1fe8810ba1a6b8944ba8133e15d391fd9a2ef21c37eed1497c4010cf0d03e5" name="hp-ixgbevf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.6.2_k4.12.14_94.41" rel="2.sles12sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1.2-2" date="1460548800">- Fix the issue of packet loss in Virtual Functions(VF) in cases where Physical Function(PF) interface is brought up after VF.
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.5-2[rhel6u9], 4.0.5-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fixed the issue of installing ixgbevf corrupts ability of virtual machine to boot from SLES 11 SP4

 Tue Jun 21 2016 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2.2-1
- Added RHEL 6.8 support
- Fix the issue of setting of invalid MTU
- Added support for ethtool RSS get/set functionality
- Fix the issue of No error generated if untrusted VM user tries to set user defined VF MAC address</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.2-1" date="1509969600">- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.2-2.sles12sp4" date="1570190400">- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="79c242ee1ec455ddfaa9455991fa52139dace05c9fd2ac472d8897bff923bf47" name="hp-ixgbevf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.6.2_k4.4.73_5" rel="2.sles12sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1.2-2" date="1460548800">- Fix the issue of packet loss in Virtual Functions(VF) in cases where Physical Function(PF) interface is brought up after VF.
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.5-2[rhel6u9], 4.0.5-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fixed the issue of installing ixgbevf corrupts ability of virtual machine to boot from SLES 11 SP4

 Tue Jun 21 2016 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2.2-1
- Added RHEL 6.8 support
- Fix the issue of setting of invalid MTU
- Added support for ethtool RSS get/set functionality
- Fix the issue of No error generated if untrusted VM user tries to set user defined VF MAC address</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.2-1" date="1509969600">- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.2-2.sles12sp3" date="1570190400">- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="9b5200e97578044ee78251f0ecfbe80e77549b1226be809b9334eaaff217e16a" name="hp-ixgbevf_bl-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.6.2_k4.12.14_195" rel="1.sles15sp1"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.16.4-6" date="1447156800">- Added SLES12SP1 support
 - Added RHEL 7.2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1.2-2" date="1460548800">- Fix the issue of packet loss in Virtual Functions(VF) in cases where Physical Function(PF) interface is brought up after VF.
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.5-2[rhel6u9], 4.0.5-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fixed the issue of installing ixgbevf corrupts ability of virtual machine to boot from SLES 11 SP4

 Tue Jun 21 2016 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2.2-1
- Added RHEL 6.8 support
- Fix the issue of setting of invalid MTU
- Added support for ethtool RSS get/set functionality
- Fix the issue of No error generated if untrusted VM user tries to set user defined VF MAC address</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.2-1" date="1509969600">- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.2-1.sles15sp1" date="1569412800">- This driver fixes the issue of an infinite recursion in device shutdown path due to a corner case when PCIe link was down.
- This driver fixes the issue of Link lost in VM on ixgbevf when restoring from freeze or suspend.
- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.
- Added RHEL7u7 Support.
- Added RHEL8u0 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="fec13715beba6c9fe4441413051cffc88c3cbd927366661795a60d51cf963f52" name="hp-ixgbevf_bl-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.6.2_k4.12.14_23" rel="1.sles15sp0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.16.4-6" date="1447156800">- Added SLES12SP1 support
 - Added RHEL 7.2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1.2-2" date="1460548800">- Fix the issue of packet loss in Virtual Functions(VF) in cases where Physical Function(PF) interface is brought up after VF.
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.5-2[rhel6u9], 4.0.5-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fixed the issue of installing ixgbevf corrupts ability of virtual machine to boot from SLES 11 SP4

 Tue Jun 21 2016 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2.2-1
- Added RHEL 6.8 support
- Fix the issue of setting of invalid MTU
- Added support for ethtool RSS get/set functionality
- Fix the issue of No error generated if untrusted VM user tries to set user defined VF MAC address</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.2-1" date="1509969600">- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.2-1.sles15sp0" date="1569412800">- This driver fixes the issue of an infinite recursion in device shutdown path due to a corner case when PCIe link was down.
- This driver fixes the issue of Link lost in VM on ixgbevf when restoring from freeze or suspend.
- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.
- Added RHEL7u7 Support.
- Added RHEL8u0 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="f8e2b700febb29c945bbbb61d8d987ff83a6dbef07ffb5f0341c62cfbe738f11" name="hp-ixgbevf_bl-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.6.2_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.16.4-6" date="1447156800">- Added SLES12SP1 support
 - Added RHEL 7.2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1.2-2" date="1460548800">- Fix the issue of packet loss in Virtual Functions(VF) in cases where Physical Function(PF) interface is brought up after VF.
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.5-2[rhel6u9], 4.0.5-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fixed the issue of installing ixgbevf corrupts ability of virtual machine to boot from SLES 11 SP4

 Tue Jun 21 2016 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2.2-1
- Added RHEL 6.8 support
- Fix the issue of setting of invalid MTU
- Added support for ethtool RSS get/set functionality
- Fix the issue of No error generated if untrusted VM user tries to set user defined VF MAC address</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.2-1" date="1509969600">- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.2-1.sles12sp4" date="1569412800">- This driver fixes the issue of an infinite recursion in device shutdown path due to a corner case when PCIe link was down.
- This driver fixes the issue of Link lost in VM on ixgbevf when restoring from freeze or suspend.
- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.
- Added RHEL7u7 Support.
- Added RHEL8u0 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="ee4344d9f56851a48ec200186e4306222b9532eab3cc6dde8109ab763d06fe21" name="hp-ixgbevf_bl-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.6.2_k4.4.73_5" rel="1.sles12sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.16.4-6" date="1447156800">- Added SLES12SP1 support
 - Added RHEL 7.2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1.2-2" date="1460548800">- Fix the issue of packet loss in Virtual Functions(VF) in cases where Physical Function(PF) interface is brought up after VF.
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.5-2[rhel6u9], 4.0.5-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fixed the issue of installing ixgbevf corrupts ability of virtual machine to boot from SLES 11 SP4

 Tue Jun 21 2016 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2.2-1
- Added RHEL 6.8 support
- Fix the issue of setting of invalid MTU
- Added support for ethtool RSS get/set functionality
- Fix the issue of No error generated if untrusted VM user tries to set user defined VF MAC address</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.2-1" date="1509969600">- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.2-1.sles12sp3" date="1569412800">- This driver fixes the issue of an infinite recursion in device shutdown path due to a corner case when PCIe link was down.
- This driver fixes the issue of Link lost in VM on ixgbevf when restoring from freeze or suspend.
- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.
- Added RHEL7u7 Support.
- Added RHEL8u0 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="61ce2b1a73cbfb8790d9ea03a55cb8009102963c0b2458c566cb7bfb2ad8af46" name="hp-ocsbbd" arch="x86_64">
    <version epoch="0" ver="1.1.83.0" rel="1"/>
    <changelog author="Mark Rustad &lt;mark.d.rustad@intel.com&gt; 1.1.73-1" date="1440806400">- Modify SLES init script to report status 7 as skipped</changelog>
    <changelog author="Mark Rustad &lt;mark.d.rustad@intel.com&gt; 1.1.74-1" date="1441324800">- Added X550T recognition to common code</changelog>
    <changelog author="Mark Rustad &lt;mark.d.rustad@intel.com&gt; 1.1.75-1" date="1441324801">- Added X550T thermal sensor support
- Minor Makefile fixup to properly depend on destintion directory creation</changelog>
    <changelog author="Mark Rustad &lt;mark.d.rustad@intel.com&gt; 1.1.76-1" date="1442016000">- Use Provides instead of Supplements for compatibility with older rpm</changelog>
    <changelog author="Mark Rustad &lt;mark.d.rustad@intel.com&gt; 1.1.77-1" date="1442016001">- Use new common code with X550T support</changelog>
    <changelog author="Mark Rustad &lt;mark.d.rustad@intel.com&gt; 1.1.79-1" date="1452816000">- Report firmware version on igb devices the same as with ixgbe</changelog>
    <changelog author="Mark Rustad &lt;mark.d.rustad@intel.com&gt; 1.1.80-1" date="1453852800">- Start ocsbbd as part of installation</changelog>
    <changelog author="Tony Nguyen &lt;anthony.l.nguyen@intel.com&gt; 1.1.81-1" date="1466726400">- Accommodate changes to hwmon API</changelog>
    <changelog author="Mark Rustad &lt;mark.d.rustad@intel.com&gt; 1.1.82-1" date="1485475200">- Remove Sageville device IDs from spec file</changelog>
    <changelog author="Mark Rustad &lt;mark.d.rustad@intel.com&gt; 1.1.83-1" date="1490140800">- Add changelog to rpm</changelog>
  </package>
  <package pkgid="7f25462127fdb0e806533be881b1a38406e56d54cf3bc2f033330fe5879633fb" name="hp-smh-templates" arch="noarch">
    <version epoch="0" ver="10.8.1" rel="1487.3"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.4.0" date="1261180800">- 8.4.0 release (Severity: Medium)
- ENHANCEMENTS
- Added support for Integrated Lights-Out 3 (iLO 3)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.0.0" date="1401408000">- ENHANCEMENTS
- Added support for HP ProLiant Gen9 Servers.

- FIXES
- When SNMP community string is configured as other than public in snmpd.conf file, all the webapp data is now populating in HP System Management Homepage (SMH) for Red Hat Enterprise Linux (RHEL) 6.5.</changelog>
    <changelog author="HPE Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.5.0" date="1446163200">- ENHANCEMENTS

- FIXES</changelog>
  </package>
  <package pkgid="90671b020b0a0abc164e69200cffa90e52e7c717f086b885106b7fcea1cb2187" name="hp-snmp-agents" arch="x86_64">
    <version epoch="0" ver="10.90" rel="2995.10.sles12"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.2.6" date="1250078400">- FIXES
- Fixed an issue where cmahealthd agent may terminate while polling memory on some.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.3.0" date="1252929600">- ENHANCEMENTS
- Added new 6069 trap upon AC Power loss. Also, the MIB cpqHeFltTolPowerSupplyErrorCondition will show the error information   if the power supply supports error reporting. 
- The agents now retrieve the Power supply Serial number from Type 39 SMBIOS record if it is present. 
- The agents now display the negative temperature readings correctly if it is reported by the temperature sensors. 
- The cmahostd agent now updates the PowerPIC firmware version information in the cpHoFwVerTable. 
- Updated the SIM event severity to .informational. after the secure erase is completed. 
- Added support for HP NC362i Integrated Dual Port. 

- FIXES
- The cmapeerd agent logs the error .sendto() failed. to cma.log file. 
- The DIMM type displayed incorrectly on HP ProLiant BL460c G5. 
- The cmahealthd agent sent the 6036 trap instead of 6035 trap upon fan failure. 
- The port numbers displayed incorrectly for HP NC532i Dual Port 10GbE Multifunction BL-c Adapter. 
- The Part Number displayed incorrectly. 
- The cmanicd crashed after creation of multiple VLAN, disconnect/connect of NIC link. 
- The System Id displayed incorrectly on the System Management Homepage (SMH). 
- The blink drive LED feature for HP Smart Array B110i SATA RAID Controller. 
- The embedded Broadcom SATA controller was not detected on System Management Homepage (SMH). 
- The multipath status was displayed as "unknown" when a drive failed. 
- The failed logical drive status displayed incorrectly during an array move, expansion or shrink.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.4.0" date="1268049600">- ENHANCEMENTS
- Added support for HP ProLiant  G7 Servers. 
- Added support for Integrated Lights-Out 3 (iLO 3). 
- Included a document called  HP_SNMP_Trap_Guide.txt  that  describes the Linux SNMP trap ID messages generated by the agent 
- Improvements to distribution identification including more consistent output and increased support for community and region  al   distributions. 
- Added support for Solid State Drives. 
- Added support for HP StorageWorks 2000sa Modular Storage Array and HP StorageWorks MSA2012sa/ MSA2312sa/  MSA2324sa when co  nnected to HP SC08Ge Host Bus Adapter.
- Added support and trap support (link up/down message) for the following HP NC-Series:
     .	HP NC542m Dual Port Flex-10 10GbE BL-c Adapter 
     .	HP StorageWorks CN1000E Dual Port Converged Network Adapter 
     .	HP NC550m Dual Port Flex-10 10GbE BL-c Adapter 
     .	HP NC551m Dual Port FlexFabric 10Gb Converged Network Adapter 
     .	HP NC551i Dual Port FlexFabric 10Gb Network Adapter 
     .	HP NC362i Integrated Dual Port Gigabit Server Adapter 
     .	HP NC362i Integrated Dual Port BL-c Gigabit Server Adapter 

- FIXES
- Modified the 6064 trap implementation to reflect the correct error. 
- Removed unnecessary information in cmahostd related to bonding driver, in order to improve performance. 
- Fixed an issue to display the Port number of Physical drives connected to Fiber Channel controller. 
- Fixed an issue to display Parity group count for RAID 50 and RAID 60 Logical drives. 
- Modified the script to get the NIC ports details from /sys/class/net. 
- Fixed an issue where wrong physical address is displayed on SMH, resolution was provided by checking for pcidevice informat  ion instead of subsytem device information.  
- Fixed an issue where SNMP Alerts/IMA trap were not received by HP SIM. 
- Fixed an issue where junk characters and misalignment on the console during reboot by adding new line in stop section.  
- Fixed an issue where Linux SMH shows incorrect bay/port information by adding support for virtual port. 
- Fixed an issue where cmanicd is filling /var/log/messages via setroublesoot, resolved by modified selinux policy package (H  Pcmanic.pp).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.5.0" date="1280318400">- ENHANCEMENTS
- Enhanced HP SNMP Agents to retain default permission and ownership of snmpd.conf file.
- Added support and trap support (link up/down message) for the following HP NC-Series:
       . HP NC551m Dual Port FlexFabric 10Gb Adapter 
       . HP NC551i Dual Port FlexFabric 10Gb Adapter 
       . HP NC365T 4-port Ethernet Server Adapter 
       . HP NC543i 10Gb 2-port  4X Flex-10  QDR Server Adapter 
       . HP NC553m 10Gb 2 port FlexFabric Converged Network  Adapter 
       . HP NC552m 10Gb 2 port FlexFabric Converged Network Adapter 
       . HP NC553i 10Gb 2 port FlexFabric Converged Network Adapter 
       . HP NC552SFP 2-port 10Gb Server Adapter 
       . HP StorageWorks CN1000Q Dual Port Converged Network Adapter 
       . HP NC525m 10Gb 2 port FlexFabric Converged Network Adapter    

- FIXES
- Fixed an issue where unwanted messages getting logged in the cma.log was resolved by removing the fprintf for virtual port. 
- Fixed an issue where cmanicd leaves trail of zombie lspci processes by modifying lspci usage in port_map.c and redirected o  utput to /dev/null. 
- Fixed issue not to display driver messages on console for HP B110i Smart Array controller. 
- Fixed issue on CmaX, which displayed parsing error message on the syslog during agents reboot</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.6.0" date="1280318401">- ENHANCEMENTS
- Added support for the MIBs in the Power Supply Table.
- Added support for the MIB that specifies the version of Insight Management Agents running on the system.
- Added support for the HP NC552m 10Gb 2-port FlexFabric Converged Network adapter.

- FIXES
- Addressed the tape drive not being displayed on the SMH on few configurations.
- Displayed the placement correctly for the failed drive after reboot.
- On Cmax, net-snmp displayed duplicate registration message on the syslog.
- Modifications are done in code to support the HP NC542m for which PCIID information is the same for both the ports.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.6.3" date="1299153600">- ENHANCEMENTS
- Initial release to support Red Hat Enterprise Linux 5 Update 6.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.7.0" date="1299844800">- ENHANCEMENTS
- Added support to display "N/A" for non reactive thermal sensors instead of "0" value. 
- Added support to expose firmware version details for FMP, FPGA and cPLD (XNC) firmware. 
- Added support to report USB key/SD card information. 
- Provided greater than 2TB physical disk support for smart array and dumb SATA chipsets. 
- Added new accelerator error code: "Flash Backed Cache Erasing Flash Memory". 
- Added Physical Disk Temperature support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.0.0" date="1401364800">- ENHANCEMENTS
- Added support for HP ProLiant Gen9 Servers.

- FIXES
- cmafcad daemon appears to cause segmentation fault.
- cmastdeqd daemon appears to cause segmentation fault when removing USB key.</changelog>
    <changelog author="HPE Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.4.0" date="1414584000">- ENHANCEMENTS

- FIXES</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.5.0" date="1472472000">- FIXES
- Cmahostd does not ignore nfs4 mount points.
- cmahostd triggers NFS auto-mounting and resulted in performance problem.
- Files in directories under /var/spool/compaq/hpasm/registry/ have SGID bit set removed.</changelog>
  </package>
  <package pkgid="99ed6021af230904ebbbd67e3c3ec82d3ee1907aee43f901eda1f0adfd3090f4" name="hp-snmp-agents" arch="x86_64">
    <version epoch="0" ver="10.90" rel="2995.4.rhel7"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.2.6" date="1250078400">- FIXES
- Fixed an issue where cmahealthd agent may terminate while polling memory on some.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.3.0" date="1252929600">- ENHANCEMENTS
- Added new 6069 trap upon AC Power loss. Also, the MIB cpqHeFltTolPowerSupplyErrorCondition will show the error information   if the power supply supports error reporting. 
- The agents now retrieve the Power supply Serial number from Type 39 SMBIOS record if it is present. 
- The agents now display the negative temperature readings correctly if it is reported by the temperature sensors. 
- The cmahostd agent now updates the PowerPIC firmware version information in the cpHoFwVerTable. 
- Updated the SIM event severity to .informational. after the secure erase is completed. 
- Added support for HP NC362i Integrated Dual Port. 

- FIXES
- The cmapeerd agent logs the error .sendto() failed. to cma.log file. 
- The DIMM type displayed incorrectly on HP ProLiant BL460c G5. 
- The cmahealthd agent sent the 6036 trap instead of 6035 trap upon fan failure. 
- The port numbers displayed incorrectly for HP NC532i Dual Port 10GbE Multifunction BL-c Adapter. 
- The Part Number displayed incorrectly. 
- The cmanicd crashed after creation of multiple VLAN, disconnect/connect of NIC link. 
- The System Id displayed incorrectly on the System Management Homepage (SMH). 
- The blink drive LED feature for HP Smart Array B110i SATA RAID Controller. 
- The embedded Broadcom SATA controller was not detected on System Management Homepage (SMH). 
- The multipath status was displayed as "unknown" when a drive failed. 
- The failed logical drive status displayed incorrectly during an array move, expansion or shrink.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.4.0" date="1268049600">- ENHANCEMENTS
- Added support for HP ProLiant  G7 Servers. 
- Added support for Integrated Lights-Out 3 (iLO 3). 
- Included a document called  HP_SNMP_Trap_Guide.txt  that  describes the Linux SNMP trap ID messages generated by the agent 
- Improvements to distribution identification including more consistent output and increased support for community and region  al   distributions. 
- Added support for Solid State Drives. 
- Added support for HP StorageWorks 2000sa Modular Storage Array and HP StorageWorks MSA2012sa/ MSA2312sa/  MSA2324sa when co  nnected to HP SC08Ge Host Bus Adapter.
- Added support and trap support (link up/down message) for the following HP NC-Series:
     .	HP NC542m Dual Port Flex-10 10GbE BL-c Adapter 
     .	HP StorageWorks CN1000E Dual Port Converged Network Adapter 
     .	HP NC550m Dual Port Flex-10 10GbE BL-c Adapter 
     .	HP NC551m Dual Port FlexFabric 10Gb Converged Network Adapter 
     .	HP NC551i Dual Port FlexFabric 10Gb Network Adapter 
     .	HP NC362i Integrated Dual Port Gigabit Server Adapter 
     .	HP NC362i Integrated Dual Port BL-c Gigabit Server Adapter 

- FIXES
- Modified the 6064 trap implementation to reflect the correct error. 
- Removed unnecessary information in cmahostd related to bonding driver, in order to improve performance. 
- Fixed an issue to display the Port number of Physical drives connected to Fiber Channel controller. 
- Fixed an issue to display Parity group count for RAID 50 and RAID 60 Logical drives. 
- Modified the script to get the NIC ports details from /sys/class/net. 
- Fixed an issue where wrong physical address is displayed on SMH, resolution was provided by checking for pcidevice informat  ion instead of subsytem device information.  
- Fixed an issue where SNMP Alerts/IMA trap were not received by HP SIM. 
- Fixed an issue where junk characters and misalignment on the console during reboot by adding new line in stop section.  
- Fixed an issue where Linux SMH shows incorrect bay/port information by adding support for virtual port. 
- Fixed an issue where cmanicd is filling /var/log/messages via setroublesoot, resolved by modified selinux policy package (H  Pcmanic.pp).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.5.0" date="1280318400">- ENHANCEMENTS
- Enhanced HP SNMP Agents to retain default permission and ownership of snmpd.conf file.
- Added support and trap support (link up/down message) for the following HP NC-Series:
       . HP NC551m Dual Port FlexFabric 10Gb Adapter 
       . HP NC551i Dual Port FlexFabric 10Gb Adapter 
       . HP NC365T 4-port Ethernet Server Adapter 
       . HP NC543i 10Gb 2-port  4X Flex-10  QDR Server Adapter 
       . HP NC553m 10Gb 2 port FlexFabric Converged Network  Adapter 
       . HP NC552m 10Gb 2 port FlexFabric Converged Network Adapter 
       . HP NC553i 10Gb 2 port FlexFabric Converged Network Adapter 
       . HP NC552SFP 2-port 10Gb Server Adapter 
       . HP StorageWorks CN1000Q Dual Port Converged Network Adapter 
       . HP NC525m 10Gb 2 port FlexFabric Converged Network Adapter    

- FIXES
- Fixed an issue where unwanted messages getting logged in the cma.log was resolved by removing the fprintf for virtual port. 
- Fixed an issue where cmanicd leaves trail of zombie lspci processes by modifying lspci usage in port_map.c and redirected o  utput to /dev/null. 
- Fixed issue not to display driver messages on console for HP B110i Smart Array controller. 
- Fixed issue on CmaX, which displayed parsing error message on the syslog during agents reboot</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.6.0" date="1280318401">- ENHANCEMENTS
- Added support for the MIBs in the Power Supply Table.
- Added support for the MIB that specifies the version of Insight Management Agents running on the system.
- Added support for the HP NC552m 10Gb 2-port FlexFabric Converged Network adapter.

- FIXES
- Addressed the tape drive not being displayed on the SMH on few configurations.
- Displayed the placement correctly for the failed drive after reboot.
- On Cmax, net-snmp displayed duplicate registration message on the syslog.
- Modifications are done in code to support the HP NC542m for which PCIID information is the same for both the ports.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.6.3" date="1299153600">- ENHANCEMENTS
- Initial release to support Red Hat Enterprise Linux 5 Update 6.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.7.0" date="1299844800">- ENHANCEMENTS
- Added support to display "N/A" for non reactive thermal sensors instead of "0" value. 
- Added support to expose firmware version details for FMP, FPGA and cPLD (XNC) firmware. 
- Added support to report USB key/SD card information. 
- Provided greater than 2TB physical disk support for smart array and dumb SATA chipsets. 
- Added new accelerator error code: "Flash Backed Cache Erasing Flash Memory". 
- Added Physical Disk Temperature support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.0.0" date="1401364800">- ENHANCEMENTS
- Added support for HP ProLiant Gen9 Servers.

- FIXES
- cmafcad daemon appears to cause segmentation fault.
- cmastdeqd daemon appears to cause segmentation fault when removing USB key.</changelog>
    <changelog author="HPE Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.4.0" date="1414584000">- ENHANCEMENTS

- FIXES</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.5.0" date="1472472000">- FIXES
- Cmahostd does not ignore nfs4 mount points.
- cmahostd triggers NFS auto-mounting and resulted in performance problem.
- Files in directories under /var/spool/compaq/hpasm/registry/ have SGID bit set removed.</changelog>
  </package>
  <package pkgid="a9719165b7d46571e8bef110fe9040acbbd54537f75e4698d024ea9042aaf546" name="hp-snmp-agents" arch="x86_64">
    <version epoch="0" ver="10.90" rel="2996.5.rhel8"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.2.6" date="1250078400">- FIXES
- Fixed an issue where cmahealthd agent may terminate while polling memory on some.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.3.0" date="1252929600">- ENHANCEMENTS
- Added new 6069 trap upon AC Power loss. Also, the MIB cpqHeFltTolPowerSupplyErrorCondition will show the error information   if the power supply supports error reporting. 
- The agents now retrieve the Power supply Serial number from Type 39 SMBIOS record if it is present. 
- The agents now display the negative temperature readings correctly if it is reported by the temperature sensors. 
- The cmahostd agent now updates the PowerPIC firmware version information in the cpHoFwVerTable. 
- Updated the SIM event severity to .informational. after the secure erase is completed. 
- Added support for HP NC362i Integrated Dual Port. 

- FIXES
- The cmapeerd agent logs the error .sendto() failed. to cma.log file. 
- The DIMM type displayed incorrectly on HP ProLiant BL460c G5. 
- The cmahealthd agent sent the 6036 trap instead of 6035 trap upon fan failure. 
- The port numbers displayed incorrectly for HP NC532i Dual Port 10GbE Multifunction BL-c Adapter. 
- The Part Number displayed incorrectly. 
- The cmanicd crashed after creation of multiple VLAN, disconnect/connect of NIC link. 
- The System Id displayed incorrectly on the System Management Homepage (SMH). 
- The blink drive LED feature for HP Smart Array B110i SATA RAID Controller. 
- The embedded Broadcom SATA controller was not detected on System Management Homepage (SMH). 
- The multipath status was displayed as "unknown" when a drive failed. 
- The failed logical drive status displayed incorrectly during an array move, expansion or shrink.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.4.0" date="1268049600">- ENHANCEMENTS
- Added support for HP ProLiant  G7 Servers. 
- Added support for Integrated Lights-Out 3 (iLO 3). 
- Included a document called  HP_SNMP_Trap_Guide.txt  that  describes the Linux SNMP trap ID messages generated by the agent 
- Improvements to distribution identification including more consistent output and increased support for community and region  al   distributions. 
- Added support for Solid State Drives. 
- Added support for HP StorageWorks 2000sa Modular Storage Array and HP StorageWorks MSA2012sa/ MSA2312sa/  MSA2324sa when co  nnected to HP SC08Ge Host Bus Adapter.
- Added support and trap support (link up/down message) for the following HP NC-Series:
     .	HP NC542m Dual Port Flex-10 10GbE BL-c Adapter 
     .	HP StorageWorks CN1000E Dual Port Converged Network Adapter 
     .	HP NC550m Dual Port Flex-10 10GbE BL-c Adapter 
     .	HP NC551m Dual Port FlexFabric 10Gb Converged Network Adapter 
     .	HP NC551i Dual Port FlexFabric 10Gb Network Adapter 
     .	HP NC362i Integrated Dual Port Gigabit Server Adapter 
     .	HP NC362i Integrated Dual Port BL-c Gigabit Server Adapter 

- FIXES
- Modified the 6064 trap implementation to reflect the correct error. 
- Removed unnecessary information in cmahostd related to bonding driver, in order to improve performance. 
- Fixed an issue to display the Port number of Physical drives connected to Fiber Channel controller. 
- Fixed an issue to display Parity group count for RAID 50 and RAID 60 Logical drives. 
- Modified the script to get the NIC ports details from /sys/class/net. 
- Fixed an issue where wrong physical address is displayed on SMH, resolution was provided by checking for pcidevice informat  ion instead of subsytem device information.  
- Fixed an issue where SNMP Alerts/IMA trap were not received by HP SIM. 
- Fixed an issue where junk characters and misalignment on the console during reboot by adding new line in stop section.  
- Fixed an issue where Linux SMH shows incorrect bay/port information by adding support for virtual port. 
- Fixed an issue where cmanicd is filling /var/log/messages via setroublesoot, resolved by modified selinux policy package (H  Pcmanic.pp).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.5.0" date="1280318400">- ENHANCEMENTS
- Enhanced HP SNMP Agents to retain default permission and ownership of snmpd.conf file.
- Added support and trap support (link up/down message) for the following HP NC-Series:
       . HP NC551m Dual Port FlexFabric 10Gb Adapter 
       . HP NC551i Dual Port FlexFabric 10Gb Adapter 
       . HP NC365T 4-port Ethernet Server Adapter 
       . HP NC543i 10Gb 2-port  4X Flex-10  QDR Server Adapter 
       . HP NC553m 10Gb 2 port FlexFabric Converged Network  Adapter 
       . HP NC552m 10Gb 2 port FlexFabric Converged Network Adapter 
       . HP NC553i 10Gb 2 port FlexFabric Converged Network Adapter 
       . HP NC552SFP 2-port 10Gb Server Adapter 
       . HP StorageWorks CN1000Q Dual Port Converged Network Adapter 
       . HP NC525m 10Gb 2 port FlexFabric Converged Network Adapter    

- FIXES
- Fixed an issue where unwanted messages getting logged in the cma.log was resolved by removing the fprintf for virtual port. 
- Fixed an issue where cmanicd leaves trail of zombie lspci processes by modifying lspci usage in port_map.c and redirected o  utput to /dev/null. 
- Fixed issue not to display driver messages on console for HP B110i Smart Array controller. 
- Fixed issue on CmaX, which displayed parsing error message on the syslog during agents reboot</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.6.0" date="1280318401">- ENHANCEMENTS
- Added support for the MIBs in the Power Supply Table.
- Added support for the MIB that specifies the version of Insight Management Agents running on the system.
- Added support for the HP NC552m 10Gb 2-port FlexFabric Converged Network adapter.

- FIXES
- Addressed the tape drive not being displayed on the SMH on few configurations.
- Displayed the placement correctly for the failed drive after reboot.
- On Cmax, net-snmp displayed duplicate registration message on the syslog.
- Modifications are done in code to support the HP NC542m for which PCIID information is the same for both the ports.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.6.3" date="1299153600">- ENHANCEMENTS
- Initial release to support Red Hat Enterprise Linux 5 Update 6.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.7.0" date="1299844800">- ENHANCEMENTS
- Added support to display "N/A" for non reactive thermal sensors instead of "0" value. 
- Added support to expose firmware version details for FMP, FPGA and cPLD (XNC) firmware. 
- Added support to report USB key/SD card information. 
- Provided greater than 2TB physical disk support for smart array and dumb SATA chipsets. 
- Added new accelerator error code: "Flash Backed Cache Erasing Flash Memory". 
- Added Physical Disk Temperature support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.0.0" date="1401364800">- ENHANCEMENTS
- Added support for HP ProLiant Gen9 Servers.

- FIXES
- cmafcad daemon appears to cause segmentation fault.
- cmastdeqd daemon appears to cause segmentation fault when removing USB key.</changelog>
    <changelog author="HPE Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.4.0" date="1414584000">- ENHANCEMENTS

- FIXES</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.5.0" date="1472472000">- FIXES
- Cmahostd does not ignore nfs4 mount points.
- cmahostd triggers NFS auto-mounting and resulted in performance problem.
- Files in directories under /var/spool/compaq/hpasm/registry/ have SGID bit set removed.</changelog>
  </package>
  <package pkgid="2b294c7da5987982550bff068e173795d2c0765854477d5771be3d4b7743894f" name="hp-snmp-agents" arch="x86_64">
    <version epoch="0" ver="10.90" rel="2998.49.sles15"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.2.6" date="1250078400">- FIXES
- Fixed an issue where cmahealthd agent may terminate while polling memory on some.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.3.0" date="1252929600">- ENHANCEMENTS
- Added new 6069 trap upon AC Power loss. Also, the MIB cpqHeFltTolPowerSupplyErrorCondition will show the error information   if the power supply supports error reporting. 
- The agents now retrieve the Power supply Serial number from Type 39 SMBIOS record if it is present. 
- The agents now display the negative temperature readings correctly if it is reported by the temperature sensors. 
- The cmahostd agent now updates the PowerPIC firmware version information in the cpHoFwVerTable. 
- Updated the SIM event severity to .informational. after the secure erase is completed. 
- Added support for HP NC362i Integrated Dual Port. 

- FIXES
- The cmapeerd agent logs the error .sendto() failed. to cma.log file. 
- The DIMM type displayed incorrectly on HP ProLiant BL460c G5. 
- The cmahealthd agent sent the 6036 trap instead of 6035 trap upon fan failure. 
- The port numbers displayed incorrectly for HP NC532i Dual Port 10GbE Multifunction BL-c Adapter. 
- The Part Number displayed incorrectly. 
- The cmanicd crashed after creation of multiple VLAN, disconnect/connect of NIC link. 
- The System Id displayed incorrectly on the System Management Homepage (SMH). 
- The blink drive LED feature for HP Smart Array B110i SATA RAID Controller. 
- The embedded Broadcom SATA controller was not detected on System Management Homepage (SMH). 
- The multipath status was displayed as "unknown" when a drive failed. 
- The failed logical drive status displayed incorrectly during an array move, expansion or shrink.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.4.0" date="1268049600">- ENHANCEMENTS
- Added support for HP ProLiant  G7 Servers. 
- Added support for Integrated Lights-Out 3 (iLO 3). 
- Included a document called  HP_SNMP_Trap_Guide.txt  that  describes the Linux SNMP trap ID messages generated by the agent 
- Improvements to distribution identification including more consistent output and increased support for community and region  al   distributions. 
- Added support for Solid State Drives. 
- Added support for HP StorageWorks 2000sa Modular Storage Array and HP StorageWorks MSA2012sa/ MSA2312sa/  MSA2324sa when co  nnected to HP SC08Ge Host Bus Adapter.
- Added support and trap support (link up/down message) for the following HP NC-Series:
     .	HP NC542m Dual Port Flex-10 10GbE BL-c Adapter 
     .	HP StorageWorks CN1000E Dual Port Converged Network Adapter 
     .	HP NC550m Dual Port Flex-10 10GbE BL-c Adapter 
     .	HP NC551m Dual Port FlexFabric 10Gb Converged Network Adapter 
     .	HP NC551i Dual Port FlexFabric 10Gb Network Adapter 
     .	HP NC362i Integrated Dual Port Gigabit Server Adapter 
     .	HP NC362i Integrated Dual Port BL-c Gigabit Server Adapter 

- FIXES
- Modified the 6064 trap implementation to reflect the correct error. 
- Removed unnecessary information in cmahostd related to bonding driver, in order to improve performance. 
- Fixed an issue to display the Port number of Physical drives connected to Fiber Channel controller. 
- Fixed an issue to display Parity group count for RAID 50 and RAID 60 Logical drives. 
- Modified the script to get the NIC ports details from /sys/class/net. 
- Fixed an issue where wrong physical address is displayed on SMH, resolution was provided by checking for pcidevice informat  ion instead of subsytem device information.  
- Fixed an issue where SNMP Alerts/IMA trap were not received by HP SIM. 
- Fixed an issue where junk characters and misalignment on the console during reboot by adding new line in stop section.  
- Fixed an issue where Linux SMH shows incorrect bay/port information by adding support for virtual port. 
- Fixed an issue where cmanicd is filling /var/log/messages via setroublesoot, resolved by modified selinux policy package (H  Pcmanic.pp).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.5.0" date="1280318400">- ENHANCEMENTS
- Enhanced HP SNMP Agents to retain default permission and ownership of snmpd.conf file.
- Added support and trap support (link up/down message) for the following HP NC-Series:
       . HP NC551m Dual Port FlexFabric 10Gb Adapter 
       . HP NC551i Dual Port FlexFabric 10Gb Adapter 
       . HP NC365T 4-port Ethernet Server Adapter 
       . HP NC543i 10Gb 2-port  4X Flex-10  QDR Server Adapter 
       . HP NC553m 10Gb 2 port FlexFabric Converged Network  Adapter 
       . HP NC552m 10Gb 2 port FlexFabric Converged Network Adapter 
       . HP NC553i 10Gb 2 port FlexFabric Converged Network Adapter 
       . HP NC552SFP 2-port 10Gb Server Adapter 
       . HP StorageWorks CN1000Q Dual Port Converged Network Adapter 
       . HP NC525m 10Gb 2 port FlexFabric Converged Network Adapter    

- FIXES
- Fixed an issue where unwanted messages getting logged in the cma.log was resolved by removing the fprintf for virtual port. 
- Fixed an issue where cmanicd leaves trail of zombie lspci processes by modifying lspci usage in port_map.c and redirected o  utput to /dev/null. 
- Fixed issue not to display driver messages on console for HP B110i Smart Array controller. 
- Fixed issue on CmaX, which displayed parsing error message on the syslog during agents reboot</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.6.0" date="1280318401">- ENHANCEMENTS
- Added support for the MIBs in the Power Supply Table.
- Added support for the MIB that specifies the version of Insight Management Agents running on the system.
- Added support for the HP NC552m 10Gb 2-port FlexFabric Converged Network adapter.

- FIXES
- Addressed the tape drive not being displayed on the SMH on few configurations.
- Displayed the placement correctly for the failed drive after reboot.
- On Cmax, net-snmp displayed duplicate registration message on the syslog.
- Modifications are done in code to support the HP NC542m for which PCIID information is the same for both the ports.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.6.3" date="1299153600">- ENHANCEMENTS
- Initial release to support Red Hat Enterprise Linux 5 Update 6.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 8.7.0" date="1299844800">- ENHANCEMENTS
- Added support to display "N/A" for non reactive thermal sensors instead of "0" value. 
- Added support to expose firmware version details for FMP, FPGA and cPLD (XNC) firmware. 
- Added support to report USB key/SD card information. 
- Provided greater than 2TB physical disk support for smart array and dumb SATA chipsets. 
- Added new accelerator error code: "Flash Backed Cache Erasing Flash Memory". 
- Added Physical Disk Temperature support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.0.0" date="1401364800">- ENHANCEMENTS
- Added support for HP ProLiant Gen9 Servers.

- FIXES
- cmafcad daemon appears to cause segmentation fault.
- cmastdeqd daemon appears to cause segmentation fault when removing USB key.</changelog>
    <changelog author="HPE Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.4.0" date="1414584000">- ENHANCEMENTS

- FIXES</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 10.5.0" date="1472472000">- FIXES
- Cmahostd does not ignore nfs4 mount points.
- cmahostd triggers NFS auto-mounting and resulted in performance problem.
- Files in directories under /var/spool/compaq/hpasm/registry/ have SGID bit set removed.</changelog>
  </package>
  <package pkgid="ac438802d4dca3705bfdf6324a74f9b4c7a2b8b520af91ba47ab36123fe4c584" name="hp-tg3sd" arch="x86_64">
    <version epoch="0" ver="1.0.21" rel="1"/>
    <changelog author="Nithin Nayak Sujir &lt;nsujir@broadcom.com&gt; - 1.0.12" date="1367323200">- CQ68826: Set limited access file permissions for lock files/dir (Severity: Minor)</changelog>
    <changelog author="Prashant Sreedharan &lt;prashant@broadcom.com&gt; - 1.0.13" date="1401710400">- CQ73343: Error deleting lock file' message logged in syslog (Severity: Minor)</changelog>
    <changelog author="Prashant Sreedharan &lt;prashant@broadcom.com&gt; - 1.0.14" date="1411992000">- CQ73669: No support for 5717C0 devid (Severity: Minor)
- CQ73746: tg3sd fails to run on RH7.0 (Severity: Minor)
- hp-tg3sd-x.x.x.rpm fails to install on SLES11sp3 (Severity: Minor)</changelog>
    <changelog author="Prashant Sreedharan &lt;prashant@broadcom.com&gt; - 1.0.15" date="1413806400">- CQ73933: tg3sd i586 rpm shows dependency on 64bit libraries (Severity: Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; - 1.0.16" date="1424260800">- CTRL-20433: ocbb/ocsd - tg3 error return needs a fix (Severity: Critical)</changelog>
    <changelog author="Sanjeev Bansal &lt;sanjeevb@broadcom.com&gt; - 1.0.17" date="1429272000">- CTRL-20494: Add OCSD/OCBB Enable/Disable messages to var/logs (Severity: Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; - 1.0.18" date="1433332800">- CTRL-20577: Missing supported devices id information in tg3sd (Severity: Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; - 1.0.19" date="1441886400">- CTRL-20577: tg3sd does not run under RHEL 7.2 (Severity: Minor)
- CTRL-20998: 330i Network information missing in AHS (Severity: Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; - 1.0.20" date="1453896000">- CTRL-21484: tg3sd daemon has to be started afer rpm installation (Severity: Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; - 1.0.21" date="1532433600">- CTRL-30412: Add SLES15 support  (Severity: Medium)</changelog>
  </package>
  <package pkgid="1253782af7c466e6e844337cc1b664a50288064b80f7103ecabbf1bd30080e89" name="hpdsa-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.2.10" rel="162.sles12sp3"/>
    <changelog author="Linux Storage Driver Team &lt;iss_storagedev@hp.com&gt; 1.2.10-100" date="1449662400">- .</changelog>
    <changelog author="Linux Storage Driver Team &lt;iss_storagedev@hp.com&gt; 1.2.10-105" date="1452600000">- RC Build.</changelog>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 1.2.10-110" date="1468238400">- Updated driver for Ubuntu 14.04.4 kernel support.</changelog>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 1.2.10-120" date="1492171200">- Update to support high CPU core count servers.</changelog>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 1.2.10-125" date="1509710400">- Fixed issues with drive write cache not being enabled for drives
   associated with Volume 0.</changelog>
  </package>
  <package pkgid="6c579088cd8ba4e1b5828122092c60ea2f73b3987358fdc050b0132a9273a3a8" name="hpdsa-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.2.10" rel="162.sles12sp4"/>
    <changelog author="Linux Storage Driver Team &lt;iss_storagedev@hp.com&gt; 1.2.10-100" date="1449662400">- .</changelog>
    <changelog author="Linux Storage Driver Team &lt;iss_storagedev@hp.com&gt; 1.2.10-105" date="1452600000">- RC Build.</changelog>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 1.2.10-110" date="1468238400">- Updated driver for Ubuntu 14.04.4 kernel support.</changelog>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 1.2.10-120" date="1492171200">- Update to support high CPU core count servers.</changelog>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 1.2.10-125" date="1509710400">- Fixed issues with drive write cache not being enabled for drives
   associated with Volume 0.</changelog>
  </package>
  <package pkgid="0e152df6adef0d978b1e0413499a9effacfe7f83e524d920d861d06fba149f92" name="hpdsa-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.2.10" rel="162.sles15sp0"/>
  </package>
  <package pkgid="976d98aa83b5ef865dcbdd10676d09c2550dc04fc985be41334b7f0eefb8e730" name="hpdsa-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.2.10" rel="162.sles15sp1"/>
  </package>
  <package pkgid="06776d98c7c2cb08f28d15075ece402459f33ae7cc02e54f10b02e5322d5ef3b" name="hpe-emulex-smartsan-enablement-kit" arch="x86_64">
    <version epoch="0" ver="1.0.0.0" rel="4"/>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-1" date="1446465600">- Initial development</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-2" date="1469016000">- Added support the HPE StoreFabric 84E 4-port Fibre Channel Host Bus Adapter</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-3" date="1478174400">- Added support for HPE StoreFabric SN1200E 1P &amp; 2P, HPE StoreFabric SN1600E 1P &amp; 2P</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-4" date="1480334400">- Added support for HPE Synergy 3530C</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-4" date="1480507200">- Added Obsoletes tag since the rpm has been changed from noarch to x86_64 bit</changelog>
  </package>
  <package pkgid="db3a869e769cad83ce75f52aaf4121886aa9d1d525124d097542eebebeeea8d9" name="hpe-qlogic-smartsan-enablement-kit" arch="x86_64">
    <version epoch="0" ver="3.3" rel="3"/>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 3.3-1" date="1448280000">- Initial development</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 3.3-2" date="1479384000">- Added support for SN1600Q 1P &amp; 2P devices</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 3.3-3" date="1480334400">- Added support for 84Q and 3830C devices</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 3.3-3" date="1480507200">- Added Obsoletes tag since the rpm has been changed from noarch to x86_64 bit</changelog>
  </package>
  <package pkgid="e993841ed98a74bd3060b275a9b4f8449f38eaa0949c45254d29c41aa510d779" name="hponcfg" arch="x86_64">
    <version epoch="0" ver="5.5.0" rel="0"/>
    <changelog author="Sivakumar A &lt;sivakumar.alagumalai@hp.com&gt; 4.3.0-0" date="1375358400">- v4.3.0 is mainly targeted for iLO 4 1.40 and  iLO 3 1.70</changelog>
    <changelog author="Sivakumar A &lt;sivakumar.alagumalai@hp.com&gt; 4.4.0-0" date="1395662400">- v4.4.0 is mainly targeted for iLO 4 2.00 and  iLO 3 1.80</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hp.com&gt; 4.5.0-0" date="1426507200">- v4.5.0 is mainly targeted for iLO 4 2.20 and  iLO 3 1.80</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hp.com&gt; 4.6.0-0" date="1431345600">- v4.6.0 is mainly targeted for iLO 4 2.20 and  iLO 3 1.80</changelog>
    <changelog author="Suhas MG &lt;suhas.mg@hpe.com&gt; 5.0.0-0" date="1459252800">- v5.0.0 is mainly targeted for iLO 5 1.10</changelog>
    <changelog author="Suhas MG &lt;suhas.mg@hpe.com&gt; 5.1.0-0" date="1502193600">- v5.1.0 is mainly targeted for iLO 5 1.15</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.2.0-0" date="1506340800">- v5.2.0 is mainly targeted for iLO 5 1.20</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.3.0-0" date="1521633600">- v5.3.0 is mainly targeted for iLO 5 1.30</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.4.0-0" date="1532606400">- Changes include to select correct libssl.so file when multiple Openssl installed (32-bit and 64-bit)</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.4.0-0" date="1555416000">- Changes to remove the low level openSSL calls.</changelog>
  </package>
  <package pkgid="3c06582597e3712839fe69a6e58133f331761efcf7618345bb9d66239c7be822" name="hpsa-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.4.20" rel="170.sles12sp3"/>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 3.4.20-110" date="1495108800">* Fri Apr 21 2017 Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 3.4.20-100
 - Correct multipath failover operation that could fail to work under high
   IO conditions.</changelog>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 3.4.20-120" date="1501675200">- RC build</changelog>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 3.4.20-125" date="1505217600">- RC build</changelog>
  </package>
  <package pkgid="dfad3863a80e94e500f4896940a94a451bd69eb523d301635fc9c28180131e6f" name="hpsa-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.4.20" rel="170.sles12sp4"/>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 3.4.20-110" date="1495108800">* Fri Apr 21 2017 Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 3.4.20-100
 - Correct multipath failover operation that could fail to work under high
   IO conditions.</changelog>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 3.4.20-120" date="1501675200">- RC build</changelog>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 3.4.20-125" date="1505217600">- RC build</changelog>
  </package>
  <package pkgid="2abe4694243affa749044745735e92cf0d424afe5fe7d8e766e2fbe62962b0df" name="hpsa-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.4.20" rel="170.sles15sp0"/>
  </package>
  <package pkgid="d50e5942181d7e5a1a8832d0ade0fa777250ea4fe910f2299340cb7066f555ec" name="hpsa-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.4.20" rel="170.sles15sp1"/>
  </package>
  <package pkgid="61b191236f8ff33348af079e04457013767031fb5e6d01156e884120cc9457d7" name="hpsmh" arch="x86_64">
    <version epoch="0" ver="7.6.5" rel="3"/>
    <changelog author="Hewlett-Packard Development Company, L.P. 7.5.0" date="1429146000">- Updated the following components
   PHP to version php-5.5.23
   Openssl to version openssl-1.0.1m</changelog>
    <changelog author="Hewlett-Packard Development Company, L.P. 7.5.1" date="1432170000">- SMH is been improvised with respect to security vulnerabilites</changelog>
    <changelog author="Hewlett-Packard Development Company, L.P. 7.5.2" date="1438909200">- Updated the following components
   PHP to version php-5.6.11
   Openssl to version openssl-1.0.2d
   Curl to version curl-7.42.1
 - SMH is been improvised with respect to security vulnerabilites</changelog>
    <changelog author="Hewlett-Packard Development Company, L.P. 7.5.3" date="1441933200">- Updated the following components
   PHP to version php-5.5.28</changelog>
    <changelog author="Hewlett-Packard Development Company, L.P. 7.5.4" date="1446080400">- HP SMH self-signed certificate signature is changed to SHA-2
 - SMH is been improvised with respect to security vulnerabilites</changelog>
    <changelog author="Hewlett Packard Enterprise Development L P. 7.5.5" date="1457312400">- HPE Rebranding changes
 - Updated the following components
   PHP to version php-5.5.31
   cURL to version curl-7.47.0
   OpenSSL to version openssl-1.0.2g
   Libxml2 to version libxml2-2.9.3
 - SSL protocol is now configurable through smhconfig cli
 - SMH is been improvised with respect to security vulnerabilites</changelog>
    <changelog author="Hewlett Packard Enterprise Development LP 7.6.0" date="1466557200">- Updated the following components
   PHP to version php-5.5.38
   cURL to version curl-7.49.1
   OpenSSL to version openssl-1.0.2h
   Libxml2 to version libxml2-2.9.4
 - SSL Cipher Suite is set to TLSv1.2 as default
 - SMH is been improvised with respect to security vulnerabilites
 Upgrade Requirement: Recommended ? HPE recommends users update to this version at their earliest convenience.</changelog>
    <changelog author="Hewlett Packard Enterprise Development LP 7.6.1" date="1495760400">- Updated the following components
   PHP to version php-5.6.27
   OpenSSL to version openssl-1.0.2k
   Apache to version httpd-2.4.25
 - SMH is been improvised with respect to security vulnerabilities
 Upgrade Requirement: Recommended ? HPE recommends users update to this version at their earliest convenience.</changelog>
    <changelog author="Hewlett Packard Enterprise Development LP 7.6.3" date="1515978000">- Updated the following components
   PHP to version php-5.6.30
   OpenSSL to version openssl-1.0.2k
   Apache to version httpd-2.4.25
 - SMH is been improvised with respect to security vulnerabilities
 Upgrade Requirement: Recommended ? HPE recommends users update to this version at their earliest convenience.</changelog>
    <changelog author="Hewlett Packard Enterprise Development LP 7.6.4" date="1534122000">- Supported the SLES 15 OS
 Upgrade Requirement: Recommended ? HPE recommends users update to this version at their earliest convenience.</changelog>
  </package>
  <package pkgid="8b323a50c37f350e4ca2fb652da95acc38b3f63a78e3abfe5805a884e87cc689" name="iscsiuio" arch="x86_64">
    <version epoch="0" ver="2.11.5.13" rel="3.rhel7u6"/>
    <changelog author="Eddie Wai &lt;eddie.wai@broadcom.com&gt; - 0.7.8.1b" date="1372161600">- First release</changelog>
    <changelog author="Sarang Radke &lt;sarang.radke@cavium.com&gt;" date="1518436800">- Implement posttrans logic to handle update correctly.</changelog>
    <changelog author="Nilesh Javali &lt;nilesh.javali@cavium.com&gt;" date="1524657600">- Fix dracut command which incorrectly builds initrd image
  instead of initramfs image.</changelog>
  </package>
  <package pkgid="d2420274bf7567625c3d94068d94acd349305c63fbc136d482e1ff83302665d4" name="iscsiuio" arch="x86_64">
    <version epoch="0" ver="2.11.5.13" rel="3.rhel7u7"/>
    <changelog author="Eddie Wai &lt;eddie.wai@broadcom.com&gt; - 0.7.8.1b" date="1372161600">- First release</changelog>
    <changelog author="Sarang Radke &lt;sarang.radke@cavium.com&gt;" date="1518436800">- Implement posttrans logic to handle update correctly.</changelog>
    <changelog author="Nilesh Javali &lt;nilesh.javali@cavium.com&gt;" date="1524657600">- Fix dracut command which incorrectly builds initrd image
  instead of initramfs image.</changelog>
  </package>
  <package pkgid="dfb73ad569e5435049b5239a93ea9821c1d31238f33919d4d7bbd9828b236ca6" name="iscsiuio" arch="x86_64">
    <version epoch="0" ver="2.11.5.13" rel="3.rhel8u0"/>
    <changelog author="Eddie Wai &lt;eddie.wai@broadcom.com&gt; - 0.7.8.1b" date="1372161600">- First release</changelog>
    <changelog author="Sarang Radke &lt;sarang.radke@cavium.com&gt;" date="1518436800">- Implement posttrans logic to handle update correctly.</changelog>
    <changelog author="Nilesh Javali &lt;nilesh.javali@cavium.com&gt;" date="1524657600">- Fix dracut command which incorrectly builds initrd image
  instead of initramfs image.</changelog>
  </package>
  <package pkgid="bc62c71b4dfb904c9b70ee638a1326c843dec6d4c26fba13697700ce74488e31" name="iscsiuio" arch="x86_64">
    <version epoch="0" ver="2.11.5.13" rel="3.sles12sp3"/>
    <changelog author="Eddie Wai &lt;eddie.wai@broadcom.com&gt; - 0.7.8.1b" date="1372161600">- First release</changelog>
    <changelog author="Sarang Radke &lt;sarang.radke@cavium.com&gt;" date="1518436800">- Implement posttrans logic to handle update correctly.</changelog>
    <changelog author="Nilesh Javali &lt;nilesh.javali@cavium.com&gt;" date="1524657600">- Fix dracut command which incorrectly builds initrd image
  instead of initramfs image.</changelog>
  </package>
  <package pkgid="c645643b25e819620a7ce941b26cf016719d8bab4ace3b10797e8dc7aefcd857" name="iscsiuio" arch="x86_64">
    <version epoch="0" ver="2.11.5.13" rel="3.sles12sp4"/>
    <changelog author="Eddie Wai &lt;eddie.wai@broadcom.com&gt; - 0.7.8.1b" date="1372161600">- First release</changelog>
    <changelog author="Sarang Radke &lt;sarang.radke@cavium.com&gt;" date="1518436800">- Implement posttrans logic to handle update correctly.</changelog>
    <changelog author="Nilesh Javali &lt;nilesh.javali@cavium.com&gt;" date="1524657600">- Fix dracut command which incorrectly builds initrd image
  instead of initramfs image.</changelog>
  </package>
  <package pkgid="7956265e5a3bb0016d9914664e7a3941638fed8b351ffe46a2f865d43be8b082" name="iscsiuio" arch="x86_64">
    <version epoch="0" ver="2.11.5.13" rel="3.sles15sp0"/>
    <changelog author="Eddie Wai &lt;eddie.wai@broadcom.com&gt; - 0.7.8.1b" date="1372161600">- First release</changelog>
    <changelog author="Sarang Radke &lt;sarang.radke@cavium.com&gt;" date="1518436800">- Implement posttrans logic to handle update correctly.</changelog>
    <changelog author="Nilesh Javali &lt;nilesh.javali@cavium.com&gt;" date="1524657600">- Fix dracut command which incorrectly builds initrd image
  instead of initramfs image.</changelog>
  </package>
  <package pkgid="8e7cc1618d6ebafdb0650b63930ef68d54fe4765dd70e56d00d5465f8f1da989" name="iscsiuio" arch="x86_64">
    <version epoch="0" ver="2.11.5.13" rel="3.sles15sp1"/>
    <changelog author="Eddie Wai &lt;eddie.wai@broadcom.com&gt; - 0.7.8.1b" date="1372161600">- First release</changelog>
    <changelog author="Sarang Radke &lt;sarang.radke@cavium.com&gt;" date="1518436800">- Implement posttrans logic to handle update correctly.</changelog>
    <changelog author="Nilesh Javali &lt;nilesh.javali@cavium.com&gt;" date="1524657600">- Fix dracut command which incorrectly builds initrd image
  instead of initramfs image.</changelog>
  </package>
  <package pkgid="3032071b20d1e662d05c4c19d7a0e286ab493a36bc026b747c5b48fee730b6a9" name="iscsiuio_bl" arch="x86_64">
    <version epoch="0" ver="2.11.5.13" rel="3.rhel7u6"/>
    <changelog author="Eddie Wai &lt;eddie.wai@broadcom.com&gt; - 0.7.8.1b" date="1372161600">- First release</changelog>
    <changelog author="Sarang Radke &lt;sarang.radke@cavium.com&gt;" date="1518436800">- Implement posttrans logic to handle update correctly.</changelog>
    <changelog author="Nilesh Javali &lt;nilesh.javali@cavium.com&gt;" date="1524657600">- Fix dracut command which incorrectly builds initrd image
  instead of initramfs image.</changelog>
  </package>
  <package pkgid="e00c5142bc3aeecce2934f247e6788f53f9fd988f7cfdc61979c70097911fc81" name="iscsiuio_bl" arch="x86_64">
    <version epoch="0" ver="2.11.5.13" rel="3.rhel7u7"/>
    <changelog author="Eddie Wai &lt;eddie.wai@broadcom.com&gt; - 0.7.8.1b" date="1372161600">- First release</changelog>
    <changelog author="Sarang Radke &lt;sarang.radke@cavium.com&gt;" date="1518436800">- Implement posttrans logic to handle update correctly.</changelog>
    <changelog author="Nilesh Javali &lt;nilesh.javali@cavium.com&gt;" date="1524657600">- Fix dracut command which incorrectly builds initrd image
  instead of initramfs image.</changelog>
  </package>
  <package pkgid="879edc5566443f1992c2dc20271ef0881dd7f378bb8b2a8b8d0b9c1a71ef346e" name="iscsiuio_bl" arch="x86_64">
    <version epoch="0" ver="2.11.5.13" rel="3.rhel8u0"/>
    <changelog author="Eddie Wai &lt;eddie.wai@broadcom.com&gt; - 0.7.8.1b" date="1372161600">- First release</changelog>
    <changelog author="Sarang Radke &lt;sarang.radke@cavium.com&gt;" date="1518436800">- Implement posttrans logic to handle update correctly.</changelog>
    <changelog author="Nilesh Javali &lt;nilesh.javali@cavium.com&gt;" date="1524657600">- Fix dracut command which incorrectly builds initrd image
  instead of initramfs image.</changelog>
  </package>
  <package pkgid="39d260f9047a7e74a1e24bddfb102e6184b6d3891277f0f97cd317f4ca27e52a" name="iscsiuio_bl" arch="x86_64">
    <version epoch="0" ver="2.11.5.13" rel="3.sles12sp3"/>
    <changelog author="Eddie Wai &lt;eddie.wai@broadcom.com&gt; - 0.7.8.1b" date="1372161600">- First release</changelog>
    <changelog author="Sarang Radke &lt;sarang.radke@cavium.com&gt;" date="1518436800">- Implement posttrans logic to handle update correctly.</changelog>
    <changelog author="Nilesh Javali &lt;nilesh.javali@cavium.com&gt;" date="1524657600">- Fix dracut command which incorrectly builds initrd image
  instead of initramfs image.</changelog>
  </package>
  <package pkgid="751c1a7707405143f5f119d2a4d2e86aa11a5675be19eb43bd35bb9aeb12d910" name="iscsiuio_bl" arch="x86_64">
    <version epoch="0" ver="2.11.5.13" rel="3.sles12sp4"/>
    <changelog author="Eddie Wai &lt;eddie.wai@broadcom.com&gt; - 0.7.8.1b" date="1372161600">- First release</changelog>
    <changelog author="Sarang Radke &lt;sarang.radke@cavium.com&gt;" date="1518436800">- Implement posttrans logic to handle update correctly.</changelog>
    <changelog author="Nilesh Javali &lt;nilesh.javali@cavium.com&gt;" date="1524657600">- Fix dracut command which incorrectly builds initrd image
  instead of initramfs image.</changelog>
  </package>
  <package pkgid="08e25017c5b7c2669b6f09236cf6a738493e1f93fc2d96596b9cecbdf99de6e2" name="iscsiuio_bl" arch="x86_64">
    <version epoch="0" ver="2.11.5.13" rel="3.sles15sp0"/>
    <changelog author="Eddie Wai &lt;eddie.wai@broadcom.com&gt; - 0.7.8.1b" date="1372161600">- First release</changelog>
    <changelog author="Sarang Radke &lt;sarang.radke@cavium.com&gt;" date="1518436800">- Implement posttrans logic to handle update correctly.</changelog>
    <changelog author="Nilesh Javali &lt;nilesh.javali@cavium.com&gt;" date="1524657600">- Fix dracut command which incorrectly builds initrd image
  instead of initramfs image.</changelog>
  </package>
  <package pkgid="dacff89f9c24b316a10e49a089ea0a289660efa0c6c37d9fc107a3591f1e0fc4" name="iscsiuio_bl" arch="x86_64">
    <version epoch="0" ver="2.11.5.13" rel="3.sles15sp1"/>
    <changelog author="Eddie Wai &lt;eddie.wai@broadcom.com&gt; - 0.7.8.1b" date="1372161600">- First release</changelog>
    <changelog author="Sarang Radke &lt;sarang.radke@cavium.com&gt;" date="1518436800">- Implement posttrans logic to handle update correctly.</changelog>
    <changelog author="Nilesh Javali &lt;nilesh.javali@cavium.com&gt;" date="1524657600">- Fix dracut command which incorrectly builds initrd image
  instead of initramfs image.</changelog>
  </package>
  <package pkgid="e1e6189a60e2dfe6f3e00c567dd37e22263c64b5aac65c280355e743ccd2d144" name="kernel-mft-mlnx-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.13.0_k4.12.14_195" rel="1.sles15sp1"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.13.0_k4.12.14_195-1.sles15sp1</changelog>
  </package>
  <package pkgid="78fd8edfa576d386f9f0a5458685875b64dcf36c0c4660f06688d8fa01e1c2c1" name="kernel-mft-mlnx-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.13.0_k4.12.14_23" rel="1.sles15sp0"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.13.0_k4.12.14_23-1.sles15sp0</changelog>
  </package>
  <package pkgid="40a4dc42f47e8e97f34a641b9b5f106488187334a551342fdda5409c92ceee4d" name="kernel-mft-mlnx-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.13.0_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.13.0_k4.12.14_94.41-1.sles12sp4</changelog>
  </package>
  <package pkgid="885f99ced5645cb1c4130a1559d1f715cae72c00991ec4d06d0eb9c9058926d4" name="kernel-mft-mlnx-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.13.0_k4.4.73_5" rel="1.sles12sp3"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.13.0_k4.4.73_5-1.sles12sp3</changelog>
  </package>
  <package pkgid="5a479a4d781f7d67894cf9d704889bead5fd361d5d9da3290aaa48fbf936316c" name="kmod-be2iscsi" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1" rel="1.rhel7u6"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="4136977a835a5b87d8955fef455342e45bd99c5d5e767d59b0a06febf3985786" name="kmod-be2iscsi_bl" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1" rel="1.rhel7u6"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="6af8589f96705688cffc5aaa289a64693bae1ff9d52f3fcad941d84197006710" name="kmod-be2net" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1" rel="1.rhel7u6"/>
  </package>
  <package pkgid="8ff9d5cad5abe476d69befd339fec12a695a25bbd5ee0ff051211231764e4d0a" name="kmod-be2net_bl" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1" rel="1.rhel7u6"/>
  </package>
  <package pkgid="c4f69dc423fbfd4055fbd4d167b75ac94a6d995da9cefeb0a625a1bfb3cfce34" name="kmod-bnxt_en" arch="x86_64">
    <version epoch="0" ver="1.9.2" rel="214.0.182.0.rhel7u6"/>
  </package>
  <package pkgid="dc572411db6dd0ccc8b0a7802ac195783211877843d1b2057f567477b4afaae4" name="kmod-brcmfcoe" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1" rel="1.rhel7u5"/>
    <changelog author="Emulex Corporation &lt;ecd-tech.support@broadcom.com&gt; 12.0.1216.1" date="1545393600">- Built driver for rhel7</changelog>
  </package>
  <package pkgid="41253785a7e5c31806469b26aec597e42471294c49f7d5f350b2a14656ce06c1" name="kmod-brcmfcoe" arch="x86_64">
    <version epoch="0" ver="12.0.1216.1" rel="1.rhel7u6"/>
    <changelog author="Emulex Corporation &lt;ecd-tech.support@broadcom.com&gt; 12.0.1216.1" date="1545393600">- Built driver for rhel7</changelog>
  </package>
  <package pkgid="58b7490110437bf21f8fdb789cf217182be3f668ce12091b0f14877ccd887973" name="kmod-elx-lpfc" arch="x86_64">
    <version epoch="0" ver="12.4.270.3" rel="1.rhel7u6"/>
    <changelog author="Emulex Corporation &lt;ecd-tech.support@broadcom.com&gt; 12.4.270.3" date="1567080000">- Built driver for rhel7</changelog>
  </package>
  <package pkgid="1f2061d1a07326e76409b566f24c8e790490901440b5ca49f340c04f123f1127" name="kmod-elx-lpfc" arch="x86_64">
    <version epoch="0" ver="12.4.270.3" rel="1.rhel7u7"/>
    <changelog author="Emulex Corporation &lt;ecd-tech.support@broadcom.com&gt; 12.4.270.3" date="1567080000">- Built driver for rhel7</changelog>
  </package>
  <package pkgid="2074b8d25dfe9e4f29d5e995968df773d577af3ef8f82687d76e1be9d2c801f5" name="kmod-elx-lpfc" arch="x86_64">
    <version epoch="0" ver="12.4.270.3" rel="1.rhel8u0"/>
    <changelog author="Emulex Corporation &lt;ecd-tech.support@broadcom.com&gt; 12.4.270.3" date="1567080000">- Built driver for rhel8</changelog>
  </package>
  <package pkgid="d5b5587ff0eda4cba88dade9435b40132fa58e560ccefec26e9922711a787810" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.10.19.30" rel="2.rhel7u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.0.19-2[rhel6u9], 2.0.19-1[For other OSs]" date="1490097600">- Fix for configuration of RSS table with DCB
- Enabled VF trust on RHEL 7.3
- Added support for HPE Ethernet 10Gb 2-port 568i Adapter
- Added SLES12SP2 support
- Added RHEL7.3 support
- Feature implementation for speading out interrupts and to use all rx queues and all cpus
- Fix for NVM update process hangs on Linux at 88%</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.0.29-3" date="1501243200">- Added support for HPE Ethernet 1Gb 2-port 368i Adapter
- Added support for HPE Ethernet 1Gb 4-port 369i Adapter
- Added support for HPE Ethernet 1Gb 2-port 368FLR-MMT Adapter
- Added support for HPE Ethernet 10Gb 2-port 568FLR-MMT Adapter
- Added support for HPE Ethernet 10Gb 2-port 568FLR-MMSFP+ Adapter
- Added SLES12SP3 support
- Added RHEL7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.3.6-1" date="1509451200">- This driver addresses an issue with branding string in RHEL7.4
- This driver now fix the issue of LIS prevents switching back to the VF path in RHEL 7.3 guest
- This driver now alllows to use ethtool -m on DAC with or without NPAR
- This driver fixes the supported autoneg for devices with CRT_RETIMER
- This driver now ignores locality when spreading vectors over CPUs
- This driver now allows to change VLAN Tag Stripping
- This driver now throws an error after attempt to advertise unsupported link mode
- This driver now allows to set MTU value to more than 1500 in SLES12SP3 with Intel NICs
- This driver fixes the issue of ethtool not showing up dual-speed modules advertisements
- This driver fixes the issue of memory leak related to filter programming status
- This driver fixes the issue of Flow Director Sideband rules do not update as expected
- This driver fixes the issue of Could not change device features with Adapter Type SR-IOV passthrough and VSwitch VLAN Tagging Mode
- This driver fixes the issue of VxLAN checksum offload counter increments without VxLAN tunnels present
- This driver fixes the issue of kdump failure
- Feature implemention for split PCI error reset handler
- Feature implementation to return an error message when module that does not meet thermal requirements is plugged.
- Feature implementation to add some hw_csum rx offload counters
- Feature implementation to add wrap recovery mode.
- Feature implementation to add ethtool_intersect_link_masks.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.6.1-4" date="1526472000">- This driver fixes the issue of TX driver on SLES12SP2
- This driver fixes the issue of Flow Director User documentation - README.TXT is not current
- This driver fixes the issue of submodules updating
- This driver fixes the issue of client close on Netdev down causing RDMA dev to unregister? 
- This driver fixes the issue of unexpected queue selection messages observed during tx_timeout recovery? 
- This driver now preserves promiscuous mode across resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.6.1-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.11-0[rhel6.10, rhel7u5], 2.4.6.1-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-2.rhel7u6" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-2.rhel7u6" date="1570190400">* Wed Aug 08 2018 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1
- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
  </package>
  <package pkgid="e44e3e22e8c6893bf5217b3dd261b08f0e7ea763ba5636ec3b0c43d3958ed144" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.10.19.30" rel="2.rhel7u7"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.0.19-2[rhel6u9], 2.0.19-1[For other OSs]" date="1490097600">- Fix for configuration of RSS table with DCB
- Enabled VF trust on RHEL 7.3
- Added support for HPE Ethernet 10Gb 2-port 568i Adapter
- Added SLES12SP2 support
- Added RHEL7.3 support
- Feature implementation for speading out interrupts and to use all rx queues and all cpus
- Fix for NVM update process hangs on Linux at 88%</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.0.29-3" date="1501243200">- Added support for HPE Ethernet 1Gb 2-port 368i Adapter
- Added support for HPE Ethernet 1Gb 4-port 369i Adapter
- Added support for HPE Ethernet 1Gb 2-port 368FLR-MMT Adapter
- Added support for HPE Ethernet 10Gb 2-port 568FLR-MMT Adapter
- Added support for HPE Ethernet 10Gb 2-port 568FLR-MMSFP+ Adapter
- Added SLES12SP3 support
- Added RHEL7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.3.6-1" date="1509451200">- This driver addresses an issue with branding string in RHEL7.4
- This driver now fix the issue of LIS prevents switching back to the VF path in RHEL 7.3 guest
- This driver now alllows to use ethtool -m on DAC with or without NPAR
- This driver fixes the supported autoneg for devices with CRT_RETIMER
- This driver now ignores locality when spreading vectors over CPUs
- This driver now allows to change VLAN Tag Stripping
- This driver now throws an error after attempt to advertise unsupported link mode
- This driver now allows to set MTU value to more than 1500 in SLES12SP3 with Intel NICs
- This driver fixes the issue of ethtool not showing up dual-speed modules advertisements
- This driver fixes the issue of memory leak related to filter programming status
- This driver fixes the issue of Flow Director Sideband rules do not update as expected
- This driver fixes the issue of Could not change device features with Adapter Type SR-IOV passthrough and VSwitch VLAN Tagging Mode
- This driver fixes the issue of VxLAN checksum offload counter increments without VxLAN tunnels present
- This driver fixes the issue of kdump failure
- Feature implemention for split PCI error reset handler
- Feature implementation to return an error message when module that does not meet thermal requirements is plugged.
- Feature implementation to add some hw_csum rx offload counters
- Feature implementation to add wrap recovery mode.
- Feature implementation to add ethtool_intersect_link_masks.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.6.1-4" date="1526472000">- This driver fixes the issue of TX driver on SLES12SP2
- This driver fixes the issue of Flow Director User documentation - README.TXT is not current
- This driver fixes the issue of submodules updating
- This driver fixes the issue of client close on Netdev down causing RDMA dev to unregister? 
- This driver fixes the issue of unexpected queue selection messages observed during tx_timeout recovery? 
- This driver now preserves promiscuous mode across resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.6.1-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.11-0[rhel6.10, rhel7u5], 2.4.6.1-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-2.rhel7u7" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-2.rhel7u7" date="1570190400">* Wed Aug 08 2018 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1
- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
  </package>
  <package pkgid="02595337066c66286b8ed7ca4655a9b4e3eb490c9bc4d77d794a69346b18f230" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.10.19.30" rel="2.rhel8u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.0.19-2[rhel6u9], 2.0.19-1[For other OSs]" date="1490097600">- Fix for configuration of RSS table with DCB
- Enabled VF trust on RHEL 7.3
- Added support for HPE Ethernet 10Gb 2-port 568i Adapter
- Added SLES12SP2 support
- Added RHEL7.3 support
- Feature implementation for speading out interrupts and to use all rx queues and all cpus
- Fix for NVM update process hangs on Linux at 88%</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.0.29-3" date="1501243200">- Added support for HPE Ethernet 1Gb 2-port 368i Adapter
- Added support for HPE Ethernet 1Gb 4-port 369i Adapter
- Added support for HPE Ethernet 1Gb 2-port 368FLR-MMT Adapter
- Added support for HPE Ethernet 10Gb 2-port 568FLR-MMT Adapter
- Added support for HPE Ethernet 10Gb 2-port 568FLR-MMSFP+ Adapter
- Added SLES12SP3 support
- Added RHEL7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.3.6-1" date="1509451200">- This driver addresses an issue with branding string in RHEL7.4
- This driver now fix the issue of LIS prevents switching back to the VF path in RHEL 7.3 guest
- This driver now alllows to use ethtool -m on DAC with or without NPAR
- This driver fixes the supported autoneg for devices with CRT_RETIMER
- This driver now ignores locality when spreading vectors over CPUs
- This driver now allows to change VLAN Tag Stripping
- This driver now throws an error after attempt to advertise unsupported link mode
- This driver now allows to set MTU value to more than 1500 in SLES12SP3 with Intel NICs
- This driver fixes the issue of ethtool not showing up dual-speed modules advertisements
- This driver fixes the issue of memory leak related to filter programming status
- This driver fixes the issue of Flow Director Sideband rules do not update as expected
- This driver fixes the issue of Could not change device features with Adapter Type SR-IOV passthrough and VSwitch VLAN Tagging Mode
- This driver fixes the issue of VxLAN checksum offload counter increments without VxLAN tunnels present
- This driver fixes the issue of kdump failure
- Feature implemention for split PCI error reset handler
- Feature implementation to return an error message when module that does not meet thermal requirements is plugged.
- Feature implementation to add some hw_csum rx offload counters
- Feature implementation to add wrap recovery mode.
- Feature implementation to add ethtool_intersect_link_masks.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.6.1-4" date="1526472000">- This driver fixes the issue of TX driver on SLES12SP2
- This driver fixes the issue of Flow Director User documentation - README.TXT is not current
- This driver fixes the issue of submodules updating
- This driver fixes the issue of client close on Netdev down causing RDMA dev to unregister? 
- This driver fixes the issue of unexpected queue selection messages observed during tx_timeout recovery? 
- This driver now preserves promiscuous mode across resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.6.1-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.4.11-0[rhel6.10, rhel7u5], 2.4.6.1-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-2.rhel8u0" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-2.rhel8u0" date="1570190400">* Wed Aug 08 2018 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1
- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
  </package>
  <package pkgid="a9b8417cb2efa28069c991824c72f35e255e53f79d400c39aab4fd17637a9e65" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="3.7.61.20" rel="1.rhel7u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20-1.rhel7u6" date="1569499200">- Initial package which is renamed from i40evf driver</changelog>
  </package>
  <package pkgid="eb064cb9b6a27cd3f49d8af286d85ae3dd12dd6234fe82e9848d734200a01be2" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="3.7.61.20" rel="1.rhel7u7"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20-1.rhel7u7" date="1569499200">- Initial package which is renamed from i40evf driver</changelog>
  </package>
  <package pkgid="e81177ff85c446aad5e31d63f71748fa27f8202ac8232e60ba72b7cbed768d26" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="3.7.61.20" rel="1.rhel8u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20-1.rhel8u0" date="1569499200">- Initial package which is renamed from i40evf driver</changelog>
  </package>
  <package pkgid="aa80167984c8f5b27058930308e3b6ca4df252e1e21b65267baaafe9ea231d9a" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="6.2.1" rel="1.rhel7u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.17-11" date="1436270400">- Added SLES11SP4 support
 - Added RHEL 6.7 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3.2-7" date="1447156800">- Added SLES12SP1 support
 - Added RHEL 7.2 support
 - Fix queue allocation method to accomodate changing during runtime
 - Use skb_vlan_tag_* functions instead of old name vlan_tx_tag
 - This driver addresses an issue where the link speed reported by the HPE Active Health System (AHS) is incorrect.
 - This driver can now correctly change the queue allocation method during runtime.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.1-1.rhel7u6" date="1569499200">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
  </package>
  <package pkgid="4446593db77c28e1cbf8cc7c609906ef270ee6163d544e2e432cabb6b65e4dae" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="6.2.1" rel="1.rhel7u7"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.17-11" date="1436270400">- Added SLES11SP4 support
 - Added RHEL 6.7 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3.2-7" date="1447156800">- Added SLES12SP1 support
 - Added RHEL 7.2 support
 - Fix queue allocation method to accomodate changing during runtime
 - Use skb_vlan_tag_* functions instead of old name vlan_tx_tag
 - This driver addresses an issue where the link speed reported by the HPE Active Health System (AHS) is incorrect.
 - This driver can now correctly change the queue allocation method during runtime.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.1-1.rhel7u7" date="1569499200">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
  </package>
  <package pkgid="1763d4f1b72dd3ef242c89039564461d2a1ebe90118cfb7937dbba98370737b5" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="6.2.1" rel="1.rhel8u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.17-11" date="1436270400">- Added SLES11SP4 support
 - Added RHEL 6.7 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3.2-7" date="1447156800">- Added SLES12SP1 support
 - Added RHEL 7.2 support
 - Fix queue allocation method to accomodate changing during runtime
 - Use skb_vlan_tag_* functions instead of old name vlan_tx_tag
 - This driver addresses an issue where the link speed reported by the HPE Active Health System (AHS) is incorrect.
 - This driver can now correctly change the queue allocation method during runtime.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.1-1.rhel8u0" date="1569499200">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
  </package>
  <package pkgid="fb3c06418ae079d6d24e4d5b814eafc0019d28de9ee3464016bb7a68b650be44" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.6.4" rel="2.rhel7u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.4.6-1" date="1466510400">- Added RHEL 6.8 support
- Fix the issue of unable to dynamically detect SFP module
- Added support for Marvell PHY devices
- Added new netdev operation to trust the Virtual Function
- Added support to check and set the RSS hash and indirection table via ethtool -x/-X parameters	
- Added new netdev op to allow user to enable/disable the ability of a specific VF to query its RSS Indirection Table and an RSS Hash Key
- Fix the issue of packets being dropped as spoofed packets in SR-IOV mode
- Fix the issue of macvlan interfaces not being able to get link, ixgbevf parent loses link
- Fix the issue of ixgbe installation getting corrupted the system's ability to boot from SLES11SP4</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.0.7-2[rhel6u9], 5.0.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fix the issue of Vlan interface in RHEL 6.8 VM on RHEL6.8 host fails to get IP
- Fix the issue of PHY stack trace and OS crash creating / allocating VFs.
- Fix the issue of Transmit queue stuck [DCB enabled]
- Fix the issue of NULL pointer dereference when enabling SRIOV
- Fix the issue of cannot set MACVLAN if MAC is set by PF, when VF is trusted</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs
- Fix the issue of RHEL6.9 64 bit is not able to create Virtual Functions with the sysfs command</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3-1" date="1509969600">- This driver updated branding strings from HP to HPE for legacy adapters 
- This driver fixes the issue of Unable to automatically get link after swapping SFP+ modules of different speeds 
- This driver fixes the issue of IPV6 magic packet can't wake up
- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs
- This driver fixes linux Kernel panic occurs when assigning an IP address on HVL system with non existing PHY</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-5" date="1526472000">- This driver updated the kernel version infor for SLES12sP3</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-2.rhel7u6" date="1570190400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="fe5209e1faf1cd0467d0dc84440f6b13c55734cee8fe5e67ac54e446ec0ec008" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.6.4" rel="2.rhel7u7"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.4.6-1" date="1466510400">- Added RHEL 6.8 support
- Fix the issue of unable to dynamically detect SFP module
- Added support for Marvell PHY devices
- Added new netdev operation to trust the Virtual Function
- Added support to check and set the RSS hash and indirection table via ethtool -x/-X parameters	
- Added new netdev op to allow user to enable/disable the ability of a specific VF to query its RSS Indirection Table and an RSS Hash Key
- Fix the issue of packets being dropped as spoofed packets in SR-IOV mode
- Fix the issue of macvlan interfaces not being able to get link, ixgbevf parent loses link
- Fix the issue of ixgbe installation getting corrupted the system's ability to boot from SLES11SP4</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.0.7-2[rhel6u9], 5.0.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fix the issue of Vlan interface in RHEL 6.8 VM on RHEL6.8 host fails to get IP
- Fix the issue of PHY stack trace and OS crash creating / allocating VFs.
- Fix the issue of Transmit queue stuck [DCB enabled]
- Fix the issue of NULL pointer dereference when enabling SRIOV
- Fix the issue of cannot set MACVLAN if MAC is set by PF, when VF is trusted</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs
- Fix the issue of RHEL6.9 64 bit is not able to create Virtual Functions with the sysfs command</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3-1" date="1509969600">- This driver updated branding strings from HP to HPE for legacy adapters 
- This driver fixes the issue of Unable to automatically get link after swapping SFP+ modules of different speeds 
- This driver fixes the issue of IPV6 magic packet can't wake up
- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs
- This driver fixes linux Kernel panic occurs when assigning an IP address on HVL system with non existing PHY</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-5" date="1526472000">- This driver updated the kernel version infor for SLES12sP3</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-2.rhel7u7" date="1570190400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="6c49177bdd761d5c4687f436a12d390b2e866dd5893135981f6eab9231db0743" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.6.4" rel="2.rhel8u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.4.6-1" date="1466510400">- Added RHEL 6.8 support
- Fix the issue of unable to dynamically detect SFP module
- Added support for Marvell PHY devices
- Added new netdev operation to trust the Virtual Function
- Added support to check and set the RSS hash and indirection table via ethtool -x/-X parameters	
- Added new netdev op to allow user to enable/disable the ability of a specific VF to query its RSS Indirection Table and an RSS Hash Key
- Fix the issue of packets being dropped as spoofed packets in SR-IOV mode
- Fix the issue of macvlan interfaces not being able to get link, ixgbevf parent loses link
- Fix the issue of ixgbe installation getting corrupted the system's ability to boot from SLES11SP4</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.0.7-2[rhel6u9], 5.0.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fix the issue of Vlan interface in RHEL 6.8 VM on RHEL6.8 host fails to get IP
- Fix the issue of PHY stack trace and OS crash creating / allocating VFs.
- Fix the issue of Transmit queue stuck [DCB enabled]
- Fix the issue of NULL pointer dereference when enabling SRIOV
- Fix the issue of cannot set MACVLAN if MAC is set by PF, when VF is trusted</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs
- Fix the issue of RHEL6.9 64 bit is not able to create Virtual Functions with the sysfs command</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3-1" date="1509969600">- This driver updated branding strings from HP to HPE for legacy adapters 
- This driver fixes the issue of Unable to automatically get link after swapping SFP+ modules of different speeds 
- This driver fixes the issue of IPV6 magic packet can't wake up
- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs
- This driver fixes linux Kernel panic occurs when assigning an IP address on HVL system with non existing PHY</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-5" date="1526472000">- This driver updated the kernel version infor for SLES12sP3</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-2.rhel8u0" date="1570190400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="1c839f23263080928e1a4f2cd1eee44d5f40fa3fba17e8673aae0428a2b0e4dd" name="kmod-hp-ixgbe_bl" arch="x86_64">
    <version epoch="0" ver="5.6.4" rel="1.rhel7u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups" date="1460548800">.hp.com&gt; 4.3.13-2
 - Fix the issue of First Virtual Function(VF) receiving a copy of Physical Function(PF)'s traffic
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.4.6-1" date="1466510400">- Added RHEL 6.8 support
- Fix the issue of unable to dynamically detect SFP module
- Added support for Marvell PHY devices
- Added new netdev operation to trust the Virtual Function
- Added support to check and set the RSS hash and indirection table via ethtool -x/-X parameters	
- Added new netdev op to allow user to enable/disable the ability of a specific VF to query its RSS Indirection Table and an RSS Hash Key
- Fix the issue of packets being dropped as spoofed packets in SR-IOV mode
- Fix the issue of macvlan interfaces not being able to get link, ixgbevf parent loses link
- Fix the issue of ixgbe installation getting corrupted the system's ability to boot from SLES11SP4</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.0.7-2[rhel6u9], 5.0.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fix the issue of Vlan interface in RHEL 6.8 VM on RHEL6.8 host fails to get IP
- Fix the issue of PHY stack trace and OS crash creating / allocating VFs.
- Fix the issue of Transmit queue stuck [DCB enabled]
- Fix the issue of NULL pointer dereference when enabling SRIOV
- Fix the issue of cannot set MACVLAN if MAC is set by PF, when VF is trusted</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs
- Fix the issue of RHEL6.9 64 bit is not able to create Virtual Functions with the sysfs command</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3-1" date="1509969600">- This driver updated branding strings from HP to HPE for legacy adapters 
- This driver fixes the issue of Unable to automatically get link after swapping SFP+ modules of different speeds 
- This driver fixes the issue of IPV6 magic packet can't wake up
- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs
- This driver fixes linux Kernel panic occurs when assigning an IP address on HVL system with non existing PHY</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-5" date="1526472000">- This driver updated the kernel version infor for SLES12sP3</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1.rhel7u6" date="1569412800">- This driver fixes the issue of an infinite recursion in device shutdown path due to a corner case when PCIe link was down.
- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.
- Added RHEL7u7 Support.
- Added RHEL8u0 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="fae3f3c723c26eb90172833ee4cb0c51c88a32a4d9b0e8b572112180374e420c" name="kmod-hp-ixgbe_bl" arch="x86_64">
    <version epoch="0" ver="5.6.4" rel="1.rhel7u7"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups" date="1460548800">.hp.com&gt; 4.3.13-2
 - Fix the issue of First Virtual Function(VF) receiving a copy of Physical Function(PF)'s traffic
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.4.6-1" date="1466510400">- Added RHEL 6.8 support
- Fix the issue of unable to dynamically detect SFP module
- Added support for Marvell PHY devices
- Added new netdev operation to trust the Virtual Function
- Added support to check and set the RSS hash and indirection table via ethtool -x/-X parameters	
- Added new netdev op to allow user to enable/disable the ability of a specific VF to query its RSS Indirection Table and an RSS Hash Key
- Fix the issue of packets being dropped as spoofed packets in SR-IOV mode
- Fix the issue of macvlan interfaces not being able to get link, ixgbevf parent loses link
- Fix the issue of ixgbe installation getting corrupted the system's ability to boot from SLES11SP4</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.0.7-2[rhel6u9], 5.0.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fix the issue of Vlan interface in RHEL 6.8 VM on RHEL6.8 host fails to get IP
- Fix the issue of PHY stack trace and OS crash creating / allocating VFs.
- Fix the issue of Transmit queue stuck [DCB enabled]
- Fix the issue of NULL pointer dereference when enabling SRIOV
- Fix the issue of cannot set MACVLAN if MAC is set by PF, when VF is trusted</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs
- Fix the issue of RHEL6.9 64 bit is not able to create Virtual Functions with the sysfs command</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3-1" date="1509969600">- This driver updated branding strings from HP to HPE for legacy adapters 
- This driver fixes the issue of Unable to automatically get link after swapping SFP+ modules of different speeds 
- This driver fixes the issue of IPV6 magic packet can't wake up
- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs
- This driver fixes linux Kernel panic occurs when assigning an IP address on HVL system with non existing PHY</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-5" date="1526472000">- This driver updated the kernel version infor for SLES12sP3</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1.rhel7u7" date="1569412800">- This driver fixes the issue of an infinite recursion in device shutdown path due to a corner case when PCIe link was down.
- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.
- Added RHEL7u7 Support.
- Added RHEL8u0 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="8b374f529a4f619d52ef23127ab2ffa7fb5775b8cf7cd735279f4878c5edda1a" name="kmod-hp-ixgbe_bl" arch="x86_64">
    <version epoch="0" ver="5.6.4" rel="1.rhel8u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups" date="1460548800">.hp.com&gt; 4.3.13-2
 - Fix the issue of First Virtual Function(VF) receiving a copy of Physical Function(PF)'s traffic
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.4.6-1" date="1466510400">- Added RHEL 6.8 support
- Fix the issue of unable to dynamically detect SFP module
- Added support for Marvell PHY devices
- Added new netdev operation to trust the Virtual Function
- Added support to check and set the RSS hash and indirection table via ethtool -x/-X parameters	
- Added new netdev op to allow user to enable/disable the ability of a specific VF to query its RSS Indirection Table and an RSS Hash Key
- Fix the issue of packets being dropped as spoofed packets in SR-IOV mode
- Fix the issue of macvlan interfaces not being able to get link, ixgbevf parent loses link
- Fix the issue of ixgbe installation getting corrupted the system's ability to boot from SLES11SP4</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.0.7-2[rhel6u9], 5.0.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fix the issue of Vlan interface in RHEL 6.8 VM on RHEL6.8 host fails to get IP
- Fix the issue of PHY stack trace and OS crash creating / allocating VFs.
- Fix the issue of Transmit queue stuck [DCB enabled]
- Fix the issue of NULL pointer dereference when enabling SRIOV
- Fix the issue of cannot set MACVLAN if MAC is set by PF, when VF is trusted</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs
- Fix the issue of RHEL6.9 64 bit is not able to create Virtual Functions with the sysfs command</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.3-1" date="1509969600">- This driver updated branding strings from HP to HPE for legacy adapters 
- This driver fixes the issue of Unable to automatically get link after swapping SFP+ modules of different speeds 
- This driver fixes the issue of IPV6 magic packet can't wake up
- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs
- This driver fixes linux Kernel panic occurs when assigning an IP address on HVL system with non existing PHY</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-5" date="1526472000">- This driver updated the kernel version infor for SLES12sP3</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1.rhel8u0" date="1569412800">- This driver fixes the issue of an infinite recursion in device shutdown path due to a corner case when PCIe link was down.
- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.
- Added RHEL7u7 Support.
- Added RHEL8u0 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="a46606b80f5a05788e3aa4a54e7173b1cee6c4bfdfed64bad0d2df972f0d7936" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.6.2" rel="2.rhel7u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1.2-2" date="1460548800">- Fix the issue of packet loss in Virtual Functions(VF) in cases where Physical Function(PF) interface is brought up after VF.
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.5-2[rhel6u9], 4.0.5-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fixed the issue of installing ixgbevf corrupts ability of virtual machine to boot from SLES 11 SP4

 Tue Jun 21 2016 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2.2-1
- Added RHEL 6.8 support
- Fix the issue of setting of invalid MTU
- Added support for ethtool RSS get/set functionality
- Fix the issue of No error generated if untrusted VM user tries to set user defined VF MAC address</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.2-1" date="1509969600">- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.2-2.rhel7u6" date="1570190400">- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="5de2dcac1a563e69fc9e3a1596227eb2cb5a52505c676212d9839d8681dafc43" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.6.2" rel="2.rhel7u7"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1.2-2" date="1460548800">- Fix the issue of packet loss in Virtual Functions(VF) in cases where Physical Function(PF) interface is brought up after VF.
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.5-2[rhel6u9], 4.0.5-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fixed the issue of installing ixgbevf corrupts ability of virtual machine to boot from SLES 11 SP4

 Tue Jun 21 2016 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2.2-1
- Added RHEL 6.8 support
- Fix the issue of setting of invalid MTU
- Added support for ethtool RSS get/set functionality
- Fix the issue of No error generated if untrusted VM user tries to set user defined VF MAC address</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.2-1" date="1509969600">- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.2-2.rhel7u7" date="1570190400">- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="9d7a352a24ce3c74e048a483b164e69babb19159a1b0fab4d657ce7642357a37" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.6.2" rel="2.rhel8u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1.2-2" date="1460548800">- Fix the issue of packet loss in Virtual Functions(VF) in cases where Physical Function(PF) interface is brought up after VF.
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.5-2[rhel6u9], 4.0.5-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fixed the issue of installing ixgbevf corrupts ability of virtual machine to boot from SLES 11 SP4

 Tue Jun 21 2016 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2.2-1
- Added RHEL 6.8 support
- Fix the issue of setting of invalid MTU
- Added support for ethtool RSS get/set functionality
- Fix the issue of No error generated if untrusted VM user tries to set user defined VF MAC address</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.2-1" date="1509969600">- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.2-2.rhel8u0" date="1570190400">- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="2a9ef726ce28d28f9fafc3b37c37e357f44e4b98dcab80192db55823b6211f6b" name="kmod-hp-ixgbevf_bl" arch="x86_64">
    <version epoch="0" ver="4.6.2" rel="1.rhel7u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.16.4-6" date="1447156800">- Added SLES12SP1 support
 - Added RHEL 7.2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1.2-2" date="1460548800">- Fix the issue of packet loss in Virtual Functions(VF) in cases where Physical Function(PF) interface is brought up after VF.
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.5-2[rhel6u9], 4.0.5-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fixed the issue of installing ixgbevf corrupts ability of virtual machine to boot from SLES 11 SP4

 Tue Jun 21 2016 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2.2-1
- Added RHEL 6.8 support
- Fix the issue of setting of invalid MTU
- Added support for ethtool RSS get/set functionality
- Fix the issue of No error generated if untrusted VM user tries to set user defined VF MAC address</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.2-1" date="1509969600">- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.2-1.rhel7u6" date="1569412800">- This driver fixes the issue of an infinite recursion in device shutdown path due to a corner case when PCIe link was down.
- This driver fixes the issue of Link lost in VM on ixgbevf when restoring from freeze or suspend.
- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.
- Added RHEL7u7 Support.
- Added RHEL8u0 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="d10f0d919afe4698544c19e44703b2617fbe8220ab98068b38c494933c11ec50" name="kmod-hp-ixgbevf_bl" arch="x86_64">
    <version epoch="0" ver="4.6.2" rel="1.rhel7u7"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.16.4-6" date="1447156800">- Added SLES12SP1 support
 - Added RHEL 7.2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1.2-2" date="1460548800">- Fix the issue of packet loss in Virtual Functions(VF) in cases where Physical Function(PF) interface is brought up after VF.
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.5-2[rhel6u9], 4.0.5-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fixed the issue of installing ixgbevf corrupts ability of virtual machine to boot from SLES 11 SP4

 Tue Jun 21 2016 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2.2-1
- Added RHEL 6.8 support
- Fix the issue of setting of invalid MTU
- Added support for ethtool RSS get/set functionality
- Fix the issue of No error generated if untrusted VM user tries to set user defined VF MAC address</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.2-1" date="1509969600">- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.2-1.rhel7u7" date="1569412800">- This driver fixes the issue of an infinite recursion in device shutdown path due to a corner case when PCIe link was down.
- This driver fixes the issue of Link lost in VM on ixgbevf when restoring from freeze or suspend.
- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.
- Added RHEL7u7 Support.
- Added RHEL8u0 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="d0a48119573056312a0eedffb94dbe32f2891908647a3cb37ea204360a51e190" name="kmod-hp-ixgbevf_bl" arch="x86_64">
    <version epoch="0" ver="4.6.2" rel="1.rhel8u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.16.4-6" date="1447156800">- Added SLES12SP1 support
 - Added RHEL 7.2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1.2-2" date="1460548800">- Fix the issue of packet loss in Virtual Functions(VF) in cases where Physical Function(PF) interface is brought up after VF.
 - Added support for Multicast promiscous mode for trusted Virtual Functions</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.5-2[rhel6u9], 4.0.5-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support
- Fixed the issue of installing ixgbevf corrupts ability of virtual machine to boot from SLES 11 SP4

 Tue Jun 21 2016 HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2.2-1
- Added RHEL 6.8 support
- Fix the issue of setting of invalid MTU
- Added support for ethtool RSS get/set functionality
- Fix the issue of No error generated if untrusted VM user tries to set user defined VF MAC address</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.2.1-4.rhel7u4" date="1501243200">- Added support for HPE Ethernet 10Gb 2-port 562FLR-T Adapter
- Added support for HPE Ethernet 10Gb 2-port 562T Adapter
- Added SLES12SP3 support
- Added RHEL 7.4 support
- Fix the issue of sriov_totalvfs reporting incorrect number of supported VFs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.2-1" date="1509969600">- This driver fixes the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.2-1.rhel8u0" date="1569412800">- This driver fixes the issue of an infinite recursion in device shutdown path due to a corner case when PCIe link was down.
- This driver fixes the issue of Link lost in VM on ixgbevf when restoring from freeze or suspend.
- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.
- Added RHEL7u7 Support.
- Added RHEL8u0 Support.
- Added SLES15SP1 Support.</changelog>
  </package>
  <package pkgid="a02be720cf382bef24d5f0f4541b76e50892b83da0fe464d2ca019a6f8ad41db" name="kmod-hpdsa" arch="x86_64">
    <version epoch="0" ver="1.2.10" rel="162.rhel8u0"/>
  </package>
  <package pkgid="5c0572162613a939d2a8d9a078768340fe91a652cd082439398caab4e0c5f224" name="kmod-hpdsa" arch="x86_64">
    <version epoch="0" ver="1.2.10" rel="167.rhel7u6"/>
    <changelog author="Linux Storage Driver Team &lt;iss_storagedev@hp.com&gt; 1.2.10-100" date="1449662400">- .</changelog>
    <changelog author="Linux Storage Driver Team &lt;iss_storagedev@hp.com&gt; 1.2.10-105" date="1452600000">- RC Build.</changelog>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 1.2.10-110" date="1468238400">- Updated driver for Ubuntu 14.04.4 kernel support.</changelog>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 1.2.10-120" date="1492171200">- Update to support high CPU core count servers.</changelog>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 1.2.10-125" date="1509710400">- Fixed issues with drive write cache not being enabled for drives
   associated with Volume 0.</changelog>
  </package>
  <package pkgid="c19748382ddd7da1252c02631d49722c0d68e016505b0350a3df0a1732f56f91" name="kmod-hpdsa" arch="x86_64">
    <version epoch="0" ver="1.2.10" rel="167.rhel7u7"/>
    <changelog author="Linux Storage Driver Team &lt;iss_storagedev@hp.com&gt; 1.2.10-100" date="1449662400">- .</changelog>
    <changelog author="Linux Storage Driver Team &lt;iss_storagedev@hp.com&gt; 1.2.10-105" date="1452600000">- RC Build.</changelog>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 1.2.10-110" date="1468238400">- Updated driver for Ubuntu 14.04.4 kernel support.</changelog>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 1.2.10-120" date="1492171200">- Update to support high CPU core count servers.</changelog>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 1.2.10-125" date="1509710400">- Fixed issues with drive write cache not being enabled for drives
   associated with Volume 0.</changelog>
  </package>
  <package pkgid="8b98837631731b4d4127480eb5a69cbb3606b10b7bc9faf84ae198db49f93bdb" name="kmod-hpsa" arch="x86_64">
    <version epoch="0" ver="3.4.20" rel="170.rhel8u0"/>
  </package>
  <package pkgid="08e8d0a77666fe325dd103cb4bf9c33900f1e3683007b036387c06941ee9551e" name="kmod-hpsa" arch="x86_64">
    <version epoch="0" ver="3.4.20" rel="181.rhel7u6"/>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 3.4.20-110" date="1495108800">* Fri Apr 21 2017 Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 3.4.20-100
 - Correct multipath failover operation that could fail to work under high
   IO conditions.</changelog>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 3.4.20-120" date="1501675200">- RC build</changelog>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 3.4.20-125" date="1505217600">- RC build</changelog>
  </package>
  <package pkgid="20e56bcc876f7dca9219c301974d8b51f1d9f45eadea0c0c1504b34b3d0391a2" name="kmod-hpsa" arch="x86_64">
    <version epoch="0" ver="3.4.20" rel="181.rhel7u7"/>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 3.4.20-110" date="1495108800">* Fri Apr 21 2017 Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 3.4.20-100
 - Correct multipath failover operation that could fail to work under high
   IO conditions.</changelog>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 3.4.20-120" date="1501675200">- RC build</changelog>
    <changelog author="Linux Storage Driver Team &lt;esc.storagedev@microsemi.com&gt; 3.4.20-125" date="1505217600">- RC build</changelog>
  </package>
  <package pkgid="c70aa2600dd64473ba0342d3177237b4581c870d48a577d9acf175dfc7962c64" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.13.0" rel="1.rhel7u6"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.13.0-1.rhel7u6</changelog>
  </package>
  <package pkgid="f291c8bbeda8c8320660f36805c023b1b6398d82ee81d838fcf1e566c2a7ad05" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.13.0" rel="1.rhel7u7"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.13.0-1.rhel7u7</changelog>
  </package>
  <package pkgid="6987bd0be698bdc76b0499a519d8a06d615dbcdca3d97c7adb2a2871fed1fe8f" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.13.0" rel="1.rhel8u0"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.13.0-1.rhel8u0</changelog>
  </package>
  <package pkgid="f30f0681ce8957e76bb598ff23ab3c8c9f9f71054a72e6d4d167fd044238f2cc" name="kmod-megaraid_sas" arch="x86_64">
    <version epoch="0" ver="07.706.05.00" rel="14.rhel7u5"/>
  </package>
  <package pkgid="254b6c12dfb1c47226a5bbd95a5fe7176c0409e90717aaebbed090c0dacbc308" name="kmod-megaraid_sas" arch="x86_64">
    <version epoch="0" ver="07.706.05.00" rel="14.rhel7u6"/>
  </package>
  <package pkgid="1fee5230d51b65a3eb39e03e14c5904175e31492a85bd312c385386cd0694bd7" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.7" rel="OFED.4.7.1.0.0.1.g1c4bf42.rhel7u6"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="757abf6a4980b60491f818600131aa33ccc7c19090d9b5f053b9bfafad231221" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.7" rel="OFED.4.7.1.0.0.1.g1c4bf42.rhel7u7"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="259ba5094b3c1f26eadbec6e24b2580baa5f7c17880f80c72ade798cf88084c6" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.7" rel="OFED.4.7.1.0.0.1.g1c4bf42.rhel8u0"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="9c9e1be63149127cdc66198f99074c86f0446e4f78c93c0765c39a0cc3b3fdb5" name="kmod-mpt2sas" arch="x86_64">
    <version epoch="0" ver="15.10.07.00" rel="3.rhel7u5"/>
    <changelog author="Eric Moore &lt;eric.moore@lsi.com&gt;" date="1281614400">- first draft</changelog>
  </package>
  <package pkgid="37814846afd70b610a92a3006fb46098cf9c053d0364d49080f2f86fb39078df" name="kmod-mpt2sas" arch="x86_64">
    <version epoch="0" ver="15.10.09.00" rel="2.rhel7u6"/>
    <changelog author="Eric Moore &lt;eric.moore@lsi.com&gt;" date="1281614400">- first draft</changelog>
  </package>
  <package pkgid="68b9f9f2c6f2ac78c00f2c0c2586a8c51d858f74bfa8e4242d31d3145b5fb26f" name="kmod-netxtreme2" arch="x86_64">
    <version epoch="0" ver="7.14.63" rel="1.rhel7u6"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="f618758b9ba1443c6a8af03eba7f483d3b8aff654895f2273612236c19b47a7c" name="kmod-netxtreme2" arch="x86_64">
    <version epoch="0" ver="7.14.63" rel="1.rhel7u7"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="ff823297fb41639ee233a60bf6d59b6380ab11d21390b2c7f81c1285ebe6fe1f" name="kmod-netxtreme2" arch="x86_64">
    <version epoch="0" ver="7.14.63" rel="1.rhel8u0"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="3994f9ec99e5ef7d1d76699139713c502a75446f5851d5aac85e294224ff0c22" name="kmod-netxtreme2_bl" arch="x86_64">
    <version epoch="0" ver="7.14.63" rel="1.rhel7u6"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="4b2f893a1a3896977b4e6058436583995898d138442a21b2117315c7ba649a86" name="kmod-netxtreme2_bl" arch="x86_64">
    <version epoch="0" ver="7.14.63" rel="1.rhel7u7"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="8f06d038eb0e908f1280e4cac3b2eaa90f44234809b5594376b638dcea74dc98" name="kmod-netxtreme2_bl" arch="x86_64">
    <version epoch="0" ver="7.14.63" rel="1.rhel8u0"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="37791eca2271544727e76470fd93b0fc36d7e4aada7b5ef46e3f2d00a3baf16c" name="kmod-qlgc-fastlinq" arch="x86_64">
    <version epoch="0" ver="8.42.8.0" rel="1.rhel7u6"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="b37c608b4ce0de62ac9b284566a8daa19df2a9e6b89b113ed720a1f16ccb75ad" name="kmod-qlgc-fastlinq" arch="x86_64">
    <version epoch="0" ver="8.42.8.0" rel="1.rhel7u7"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="e3d301893927704bec9a464ab0feef4d40fe8c042e3dc993bb25592cc2d2a722" name="kmod-qlgc-fastlinq" arch="x86_64">
    <version epoch="0" ver="8.42.8.0" rel="1.rhel8u0"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="e2839b592951eaaa5d90b7aaa019db3627f469fae95ef062c24a6d406b3234b4" name="kmod-qlgc-qla2xxx" arch="x86_64">
    <version epoch="0" ver="10.01.00.52.07.6_k1" rel="1.rhel7u6"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.01.00.52.07.6-k1-1" date="1567166400">- 10.01.00.49.xx.y-k1 QT 06/24/2019
- qla2xxx: Fix unbound sleep in fcport delete path.
- qla2xxx: Fix hang in fcport delete path.
- qla2xxx: Fix kernel crash after disconnecting NVMe devices.
- qla2xxx: move IO flush to the front of NVME rport unregistration
- qla2xxx: migrate srb-&gt;ref_count to cmd_kref
- qla2xxx: fix potential multiple queue_work for nvme ls completion
- qla2xxx: Wrong reference count field usage
- qla2xxx: update: optimize NPIV tear down process.
- qla2xxx: Use proper bit position when reading dual FCP-NVMe priority
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI

- 10.01.00.48.xx.y-k1 HM 06/01/2019
- qla2xxx: update: fix premature timer expiration

- 10.01.00.47.xx.y-k1 HM 05/31/2019
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: Use common update-firmware-options routine for ISP27xx+.
- qla2xxx: Fix failed NVME port discovery after a short device port loss.
- Revert "qla2xxx: Use chip to blink laser for switch timeout"
- Revert "qla2xxx: update: Use chip to blink laser for switch timeout"
- qla2xxx: Correct error handling during initialization failures.
- qla2xxx: add error handling for PLOGI ELS passthrough
- qla2xxx: update: Use chip to blink laser for switch timeout
- qla2xxx: retry Fabric Scan on IOCB queue full.
- qla2xxx: fix premature timer expiration
- qla2xxx: UPDATE: fix login state machine freeze
- qla2xxx: Dual FCP-NVMe target port support

- 10.01.00.46.xx.y-k1 HM 05/31/2019
- qla2xxx: Fix compile failure for the DIF changes

- 10.01.00.45.xx.y-k1 HM 05/15/2019
- qla2xxx: Fix compile failure for the DIF changes

- 10.01.00.45.xx.y-k1 HM 05/13/2019
- qla2xxx: Add Vendor specific DIF for qla2xxx_mqueuecommand()
- qla2xxx: update: Implement LUN level DIF for 3PAR array

- 10.01.00.44.xx.y-k1 HM 05/06/2019
- qla2xxx: Add cleanup for PCI EEH recovery
- qla2xxx: Fix Crash due to NULL pointer access in qla2x00_sysfs_read_optrom()
- qla2xxx: update: Fix DMA error when the DIF sg buffer crosses 4GB boundary
- qla2xxx: reject eh_xxx request
- qla2xxx: do command completion on abort timeout
- qla2xxx: Use chip to blink laser for switch timeout
- qla2xxx: fix recursive dead lock
- qla2xxx: optimize NPIV tear down process.

- 10.01.00.43.xx.y-k1 HM 04/05/2019
- qla2xxx: Add support for ISP2089
- qla2xxx: remove FW dump on LOOP init error.

- 10.01.00.42.xx.y-k1 HM 03/27/2019
- qla2xxx: fix potential dma_unmap leak
- qla2xxx: fix different size dma alloc and unmap
- qla2xxx: fix over index of qpair array.
- qla2xxx: fix premature mem access.
- qla2xxx: fix nvme device discovery
- qla2xxx: fix abort timeout race condition.
- qla2xxx: fix NVME LS cmd timeout race condition 2/2.
- qla2xxx: fix NVME cmd timeout race condition 1/2.
- qla2xxx: Remove defer flag to indicate immeadiate port loss
- qla2xxx: Further limit FLASH region write access from SYSFS.
- qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines.

- 10.01.00.41.xx.y-k1 HM 03/13/2019
- qla2xxx: Silence log messages from Autoconnet script
- Revert "qla2xxx: Fix for the null pointer crash."

- 10.01.00.40.xx.y-k1 HM 03/11/2019
- qla2xxx: fix FW resource print error.
- qla2xxx: Fix RHBA command time out on link reset.

- 10.01.00.39.xx.y-k1 HM 03/06/2019
- qla2xxx: Fix driver unload when FC-NVMe LUNs are connected
- qla2xxx: Cleanup redundant qla2x00_abort_all_cmds during unload
- qla2xxx: Set remote port devloss timeout to 0
- qla2xxx: update: P2P issue with initiator and target port domains being different

- 10.01.00.38.xx.y-k1 HM 02/27/2019
- scsi: qla2xxx: Delete session for nport id change
- qla2xxx: fix N2N link up hang.
- qla2xxx: P2P issue with initiator and target port domains being different
- qla2xxx: Cleanup unused functions.
- qla2xxx: allow irqbalance control in non-MQ mode
- qla2xxx: Correct fcport flags handling.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: Update fcport disc_state only if we could allocate mem.
- qla2xxx: Add a shadow variable to hold disc_state history of fcport
- qla2xxx: v3: fix corrupt fw dump. 2/2
- qla2xxx: v3: fix corrupt fw dump. 1/2

- 10.01.00.37.xx.y-k1 HM 02/01/2019
- qla2xxx: Fix for the null pointer crash.

- 10.01.00.36.xx.y-k1 HM 01/31/2019
- qla2xxx: Move disabling T10 DIF feature ealry in probe
- qla2xxx: fix fabric scan hang
- qla2xxx: Change abort wait_loop from msleep to wait_event_timeout.
- qla2xxx: Track release of different command resources on completion.
- qla2xxx: Increase the max_sgl_segments to 1024(max supported) to support larger IO size.
- qla2xxx: Fix incorrect SFUB length used for Secure Flash Update MB Cmd
- qla2xxx: fix Nport ID display value.
- qla2xxx: Use correct pointer when calculating FLT checksum
- qla2xxx: Added support for MPI and PEP regions for 28XX secure flash update.
- qla2xxx: v2: Fix N2N link reset
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxx: Reset the FCF_ASYNC_SENT and FCF_ASYNC_ACTIVE flag after processing GPSC command.
- qla2xxx: Set the qpair in SRB to NULL when SRB is released.
- qla2xxx: Set the SCSI command result before calling the command done.
- qla2xxx: Use complete switch scan for RSCN events
- qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware
- qla2xxx: prevent multiple active discovery commands per session
- scsi: qla2xxx: Delete session for nport id change

- 10.01.00.34.xx.y-k1 HM 12/17/2018
- extras: Clean up build script for FC-NVMe install directive
- qla2xxx: Add fix for N2N topology.
- qla2xxx: Secure flash update support for ISP28XX.
- qla2xxx: Restore WWPN of Physical Port for fabric configuration only for loop down.

- 10.01.00.33.xx.y-k1 HM 12/10/2018
- extras: Silence diff related to nvme scripts with driver install script

- 10.01.00.32.xx.y-k1 HM 12/07/2018
- extras: update FC-NVMe boot script to use single TRADDR

- 10.01.00.31.xx.y-k1 HM 12/04/2018
SLES15, SLES12 SP4
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF

- 10.01.00.30.xx.y-k1 SC 11/28/2018
- qla2xxx: Fix for call trace being seen on reboot
- Revert "qla2xxx: unable to discover NVME target."

- 10.01.00.29.xx.y-k1 HM 11/21/2018
- qla2xxx: Look for updated FC-NVME enable BIT to enable FC-NVME

- 10.01.00.28.xx.y-k1 HM 11/21/2018
- qla2xxx: Fix for call trace being seen on reboot

- 10.01.00.27.xx.y-k1 HM 11/19/2018
- qla2xxx: Fix issue reading primary region for ISP27xx/28xx
- qla2xxx: Remove hardcoded OS value for SPECTER flags
- qla2xxx: fix BUS Reset
- qla2xxx: Correctly retrieve and interpret active flash regions for 27XX/28XX

- 10.01.00.26.xx.x-k1 HM 11/05/2018
RHEL7.6, SLES12.4, SLES15
- qla2xxx: Demote log message 0x3079 to ql_dbg_io.
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF
- qla2xxx: Demote log message 0x3079 to ql_dbg_io.
- qla2xxx: Snoop Inquiry response spanning multiple scatter/gather elements.
- qla2xxx: Track if INQ was sent, and send INQ to all luns.
- qla2xxx: Reset the PROT bit in the cdb.
- qla2xxx: Make fcport a pointer in qlt_free_session_done().
- qla2xxx: Implement LUN level DIF for 3PAR array.
- qla2xxx: T10-DIF: Fix ref tag errors reported for CAW command.
- qla2xxx: Disable standard DIF for arrays advertising proprietary DIF.
- qla2xxx: Reset PROTECT bit only in standard INQUIRY response.
- qla2xxx: Check if the INQ response buffer is &gt; 170 (instead of &gt;=).
- qla2xxx: Fix invalid offset reference of inquiry response data.
- qla2xxx: Correct modinfo text for ql2xenablehba_err_chk.
- qla2xxx: Fix modinfo text for ql2xenabledif and ql2xenabledif_tgt.
- qla2xxx: set ql2xenabledif_tgt enabled by default.
- qla2xxx: Handle INQ data changed check condition.
- qla2xxx: Parameterize ql2xenabledif_tgt (defaulted to zero).
- qla2xxx: Unparameterize ql2xenabledif_tgt (leave as global variable zeroed).
- qla2xxx: Fix for issue where the scsi status was getting overwritten.
- qla2xxx: Fail module load on user config errors.
- qla2xxx: Check for success of INQ response before parsing.
- qla2xxx: Check for INQ response validity before parsing the response.
- qla2xxx: Control vendor T10 DIF via ql2xenabledif_tgt module parameter.
- qla2xxx: Mark DIF errors from target as re-tryable errors.
- qla2xxx: Remove extraneous debug messages.
- qla2xxx: Mark DIF errors from target as re-tryable errors.
- qla2xxx: Do not turn off T10 DIF on a port reset.
- qla2xxx: Add routines to get LBA from the SCSI CDB.
- qla2xxx: Enable T10 DIF for reads as well.
- qla2xxx: Enable SCSI T10 DIF registration during driver probe.
- qla2xxx: Initial check-in for vendor T10 DIF.


- 10.01.00.26.xx.x-k HM 11/05/2018
- qla2xxx: fix stale mem access on unload. v2
- Revert "qla2xxx: fix stale mem access on unload."
- extras: Add capability to start system service
- qla2xxx: fix stale mem access on unload.
- qla2xxx: reduce duplicate code.
- qla2xxx: Handle the fail case when fail to allocate memory for CT req and rsp.
- qla2xxx: Change SRB allocation flag to ATOMIC to avoid sleeping in IRQ context.

- 10.01.00.25.xx.x-k HM 10/20/2018
- extras: Updated Build script for FC-NVMe Discovery
- extras: Add Auto-connect scripts for FC-NVMe
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect
- qla2xxx: Fix unload when NVMe devices are configured
- qla2xxx: performance enhancement for ISP 28XX Target mode.
- qla2xxx: tweak error code for bsg_request.
- qla2xxx: reject garble setting for speed and qlini_mode
- qla2xxx: performance enhancement for nvme
- qla2xxx: Send Marker for each QPair.
- qla2xxx: move marker request behind qpair

- 10.01.00.24.xx.x-k HM 10/15/2018
- qla2xxx: Correctly report max/min supported speeds for Mach adapter
- qla2xxx: Fix flash pri/sec image selection bug
- qla2xxx: Add 28xx flash primary/secondary refreshing
- qla2xxx: Add 28xx flash primary/secondary status/image mechanism
- qla2xxx: Fix Use after free case while issuing Async TM command
- qla2xxx: no MB IOCB during chip down
- qla2xxx: Fix message to indicated Vectors used by driver
- scsi: qla2xxx: don't allow negative thresholds
- scsi: qla2xxx: Fix comment in MODULE_PARM_DESC in qla2xxx
- scsi: qla2xxx: Remove set but not used variable 'ptr_dma'
- scsi: qla2xxx: fix typo "CT-PASSTRHU" -&gt; "CT-PASSTHRU"
- qla2xxx: move error message behind error case.
- scsi: qla2xxx: Add debug knob for user control workload

- 10.01.00.23.xx.x-k JC 9/29/2018
RHEL7.6, SLES12.4, SLES15
- Fixed build issue.

- 10.01.00.22.xx.x-k JC 9/25/2018
RHEL7.6, SLES12.4, SLES15
- qla2xxx: aggregated compile error fix ups.
- qla2xxx: fix duplicate switch DB entries.
- Revert "qla2xxx: fix duplicate switch's Nport ID entries."
- qla2xxx: unable to discover NVME target.
- qla2xxx: Move debug log messages which dereference SRB structure before issuing the command to firmware.
- qla2xxx: Fix for double free of SRB structure used in Async switch query commands.
- qla2xxx: fix double increment of switch scan retry count.
- qla2xxx: fix duplicate switch's Nport ID entries.
- qla2xxx: Schedule worker to process response queue
- Revert "qla2xxx: Fix process response queue for ISP26XX and above"
- qla2xxx: Enable Target mode for ISP28XX
- qla2xxx: remove debug trace
- qla2xxx: Do not set dev_loss_tmo while unregistering remote nvme port.
- qla2xxx: Initialize atio request queue length.
- qla2xxx: fix command premature free.
- qla2xxx: Reject bsg request if chip is down.
- qla2xxx: shutdown chip if reset fail
- qla2xxx: fix stuck session in PLOGI state
- qla2xxx: fix early srb free on abort
- qla2xxx: Add mode control for each physical port.
- qla2xxx: fix cleanup race condition
- qla2xxx: fix dropped srb resource.
- qla2xxx: fix port speed display on chip reset
- qla2xxx: fix recursive mailbox timeout
- qla2xxx: Check for Register disconnect, during adapter shutdown process.

- 10.01.00.21.xx.x-k JC 8/21/2018
RHEL7.6, SLES12.4, SLES15
- Revert "qla2xxx: send nvme disconnect message to udev"
- Revert "qla2xxx_udev: nvme disconnect"
- qla2xxx: fix nvme session hang on unload

- 10.01.00.20.xx.x-k JC 8/9/2018
RHEL7.5, SLES12.3, SLES15
- qla2xxx: Added retpoline support.
- qla2xxx: Fixed module parameter for ql2xnvmeenable
- extras: Fix qlssen.sh build initrd for SLES15.
- extras: Fix udev bash command lines to use $PATH
- qla2xxx: Added file Module.supported.
RHEL7.5
- scsi: qla2xxx: fix MSI-X vector affinity

- 10.01.00.19.xx.x-k JC 8/6/2018
RHEL7.5, SLES12.3, SLES15
- extras: Fix usage of find in build.sh
- qla2xxx: Fix for FC-NVMe discovery for NPIV port
- qla2xxx: Set FC-NVMe feature to disabled as default
- qla2xxx: fix tape device re-connect

- 10.01.00.18.xx.x-k JC 7/26/2018
RHEL7.5, SLES12.3, SLES15
- qla2xxx: Return error when TM returns an error from firmware
- qla2xxx: move abort code behind qpair
- qla2xxx: extend abort timeout value
- qla2xxx: fix srb's ref_count get race condition
- qla2xxx: Fix memory leak for allocating abort IOCB. v2
- qla2xxx: Enable FC-NVME on NPIV ports
- qla2xxx: Fix NPIV handling for FC-NVMe
- qla2xxx: use correct vp_idx for NPIV
- qla2xxx: Fix vha access for FC-NVMe
- qla2xxx: Fix erroneous session deletion
- qla2xxx: Update: Fix NPORT ID display for N2N Direct connect
- qla2xxx: back port IS_SW_RESV_ADDR

- 10.01.00.17.07.5-k JC 7/26/2018
- qla2xxx: Add case for 28xx transfer rate.
- qla2xxx: Correct ISP filter for invalid SFP.
- qla2xxx: Add signature for 28xx flash image.
- qla2xxx: Include 28xx in abort isp cleanup.
- qla2xxx: Fix flash/nvram addressing.
- Revert "qla2xxx: Fix memory leak for allocating abort IOCB"

- 10.01.00.16.07.5-k JC 7/11/2018
- qla2xxx: Fix memory leak for allocating abort IOCB
- qla2xxx: Fix MBX failure during driver unload for FCoE adapter
- qla2xxx: silent warning in freeirq
- qla2xxx_udev: nvme disconnect
- qla2xxx: send nvme disconnect message to udev
- qla2xxx: on session delete return nvme cmd
- qla2xxx: fix N2N inifinite retry loop
- qla2xxx: Remove stale ADISC_DONE event
- qla2xxx: Shutdown Chip on unload.
- qla2xxx: back port fw_started flag from upstream
- qla2xxx: wait for session deletion done for npiv
- qla2xxx: no isp recovery on unload
- qla2xxx: fix uninit list head (sp-&gt;elem)

- 10.01.00.15.07.5-k JC 6/25/2018
- qla2xxx: Fix NPORT ID display for N2N Direct connect

- 10.01.00.14.07.5-k HM 6/24/2018
- qla2xxx: Fix spinlock resuctsion in qlt_reset()
- qla2xxx: Fix process response queue for ISP26XX and above
- qla2xxx: Fix NULL pointer derefrence for fcport search
- qla2xxx: Fix kernel crash due to late workqueue allocation
- qla2xxx: Alow nvme underrun to be handled transport.
- qla2xxx: Fix inconsistent DMA mem alloc/free
- qla2xxx: Fix Remote port registration
- qla2xxx: Remove Stale code from update_fw_options() settings

- 10.01.00.12.07.5-k HM 6/15/2018
- qla2xxx: Retry Loop resync when req/rsp is not setup
- qla2xxx: Fix NVMe Discovery
- qla2xxx: Fix SF_SCANNING flag for async_gnnft
- qla2xxx: Fix login_retry count
- qla2xxx: Update:qla2xxx: move command alloc to tcm_qla2xxx
- qla2xxx: move command alloc to tcm_qla2xxx
- qla2xxx: Fix double free of sp
- qla2xxx: assign NULL to dpc_thread before unloading to prevent crash
- qla2xxx: Fix crash for get_qpair()
- qla2xxx: Remove extra lock to reduce contention
- qla2xxx: fix sp-&gt;vha assignment problem
- qla2xxx: Reduce holding sess_lock to prevent CPU lock-up
- qla2xxx: Move qla2x00_start_sp behind qpair
- qla2xxx: Move {get|rel}_sp to base_qpair struct
- qla2xxx: Updated: Zio6 interrupt threashold

- 10.01.00.11.07.5-k HM 6/07/2018
- qla2xxx: zio6 interrupt threshold
- qla2xxx: UPDATE: serialize user space mailbox access.
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: fix out of order Termination and ABTS Resp
- qla2xxx: fix missing mutex_unlock
- qla2xxx: remove unneccessary byte swap
- scsi: qla2xxx: Fix incorrect handle for abort IOCB
- scsi: qla2xxx: Fix queue ID for async abort with Multiqueue
- qla2xxx: add detection of ABTS hang
- qla2xxx: fix ABTS response completion
- qla2xxx: serialize user space mailbox access.
- qla2xxx: allow speed set before chip is on
- qla2xxx: Tweak debug info for invalid RX_ID
- qla2xxx: fix deadlock between atio &amp; hw lock
- qla2xxx: remove redundant call to mark port lost
- qla2xxx: fix double Rport
- qla2xxx: serialize mailbox call.
- qla2xxx: fix erroneous debug log.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add support for setting port speed
- qla2xxx: holding off chip reset until target mode is enabled
- qla2xxx: Terminate Plogi/PRLI if WWN is 0
- qla2xxx: fix deadlock between qla &amp; target core drivers
- qla2xxx: Fix iIDMA error
- qla2xxx: Remove all rports if fabric scan retry fails
- qla2xxx: Force fw cleanup on ADISC error
- qla2xxx: Turn off IOCB timeout timer on IOCB completion
- qla2xxx: Decrement login retry count for only plogi
- qla2xxx: Move rport registration out of internal work_list
- qla2xxx: Remove redundant check for fcport deletion
- qla2xxx: Update rscn_rcvd field to more meaningful scan_needed
- qla2xxx: Use correct qpair for abort and cmd
- extras: Fixed find syntax in build.sh
- qla2xxx: Fix race between switch cmd completion and timeout
- qla2xxx: Flush mailbox commands on chip reset
- qla2xxx: Fix unintended Logout
- qla2xxx: Fix session state stuck in Get Port DB
- qla2xxx: Fix redundant fc_rport registration
- qla2xxx: Silent erroneous message
- qla2xxx: Prevent SysFS access when chip is down
- qla2xxx: Add longer window for Chip reset
- qla2xxx: Fix login retry count
- qla2xxx: Fix setting lower transfer speed if GPSC fails
- scsi: qla2xxx: Fix TMF and Multi-Queue config

- 10.01.00.10.07.5-k HM 6/05/2018
- qla2xxx: fix merge error
- qla2xxx: migrate NVME N2N handling into state machine
- qla2xxx: save frame payload size
- qla2xxx: fix N2N link re-connect

- 10.01.00.09.xx.y-k JC 5/24/2018
- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq
- scsi: qla2xxx: Remove stale debug value for login_retry flag
- scsi: qla2xxx: Use predefined get_datalen_for_atio() inline function
- scsi: qla2xxx: Fix Inquiry command being dropped in Target mode
- scsi: qla2xxx: Move GPSC and GFPNID out of session management
- scsi: qla2xxx: Reduce redundant ADISC command for RSCNs
- scsi: qla2xxx: Delete session for nport id change
- scsi: qla2xxx: Fix Rport and session state getting out of sync
- scsi: qla2xxx: Fix sending ADISC command for login
- scsi: qla2xxx: Correct setting of SAM_STAT_CHECK_CONDITION
- scsi: qla2xxx: correctly shift host byte
- scsi: qla2xxx: Fix race condition between iocb timeout and initialisation
- scsi: qla2xxx: Avoid double completion of abort command
- scsi: qla2xxx: Fix small memory leak in qla2x00_probe_one on probe failure
- scsi: qla2xxx: fx00 copypaste typo
- scsi: qla2xxx: fix error message on &lt;qla2400
- scsi: qla2xxx: Fix Async GPN_FT for FCP and FC-NVMe scan
- scsi: qla2xxx: fix spelling mistake: "existant" -&gt; "existent"
- scsi: qla2xxx: Use dma_pool_zalloc()
- scsi: qla2xxx: Remove unused symbols
- scsi: qla2xxx: Use %p for printing pointers
- scsi: qla2xxx: Remove FC_NO_LOOP_ID for FCP and FC-NVMe Discovery
- scsi: qla2xxx: Fix crashes in qla2x00_probe_one on probe failure
- scsi: qla2xxx: Fix FC-NVMe LUN discovery
- scsi: qla2xxx: ensure async flags are reset correctly
- scsi: qla2xxx: do not check login_state if no loop id is assigned
- scsi: qla2xxx: Fixup locking for session deletion
- scsi: qla2xxx: Fix NULL pointer crash due to active timer for ABTS
- scsi: qla2xxx: Fix double free bug after firmware timeout
- scsi: qla2xxx: Fix a locking imbalance in qlt_24xx_handle_els()
- scsi: qla2xxx: Avoid triggering undefined behavior in qla2x00_mbx_completion()
- scsi: qla2xxx: Add XCB counters to debugfs
- scsi: qla2xxx: Fix warning during port_name debug print
- scsi: qla2xxx: Fix warning in qla2x00_async_iocb_timeout()
- scsi: qla2xxx: Fix recursion while sending terminate exchange
- scsi: qla2xxx: remove redundant assignment of d
- scsi: qla2xxx: Use zeroing allocator rather than allocator/memset
- scsi: qla2xxx: Serialize session deletion by using work_lock
- scsi: qla2xxx: Prevent relogin trigger from sending too many commands
- scsi: qla2xxx: Prevent multiple active discovery commands per session
- scsi: qla2xxx: Add retry limit for fabric scan logic
- scsi: qla2xxx: Delay loop id allocation at login
- scsi: qla2xxx: Increase verbosity of debug messages logged
- scsi: qla2xxx: Allow relogin and session creation after reset
- scsi: qla2xxx: Add ability to use GPNFT/GNNFT for RSCN handling
- scsi: qla2xxx: Properly extract ADISC error codes
- scsi: qla2xxx: Fix GPNFT/GNNFT error handling
- scsi: qla2xxx: Remove session creation redundant code
- scsi: qla2xxx: Migrate switch registration commands away from mailbox interface
- scsi: qla2xxx: Fix login state machine freeze
- scsi: qla2xxx: Reduce trace noise for Async Events
- scsi: qla2xxx: Reduce the use of terminate exchange
- scsi: qla2xxx: Add lock protection around host lookup
- scsi: qla2xxx: Add switch command to simplify fabric discovery
- scsi: qla2xxx: Use known NPort ID for Management Server login
- scsi: qla2xxx: Fix session cleanup for N2N
- scsi: qla2xxx: Tweak resource count dump
- scsi: qla2xxx: Allow target mode to accept PRLI in dual mode
- scsi: qla2xxx: Don't call dma_free_coherent with IRQ disabled.
- scsi: qla2xxx: Add ability to send PRLO
- scsi: qla2xxx: Add option for use reserve exch for ELS
- scsi: qla2xxx: Use shadow register for ISP27XX
- scsi: qla2xxx: Enable ATIO interrupt handshake for ISP27XX
- scsi: qla2xxx: Move work element processing out of DPC thread
- scsi: qla2xxx: Replace GPDB with async ADISC command
- scsi: qla2xxx: Relogin to target port on a cable swap
- scsi: qla2xxx: Chip reset uses wrong lock during IO flush.
- scsi: qla2xxx: Add boundary checks for exchanges to be offloaded
- scsi: qla2xxx: Use chip reset to bring down laser on unload.
- scsi: qla2xxx: Use IOCB path to submit Control VP MBX command
- scsi: qla2xxx: Fix smatch warning in qla25xx_delete_{rsp|req}_que
- scsi: qla2xxx: remove duplicate includes
- scsi: qla2xxx: Fix memory leak in dual/target mode
- scsi: qla2xxx: Fix system crash in qlt_plogi_ack_unref
- scsi: qla2xxx: Clear loop id after delete
- scsi: qla2xxx: Fix scan state field for fcport
- scsi: qla2xxx: Replace fcport alloc with qla2x00_alloc_fcport
- scsi: qla2xxx: Fix PRLI state check
- scsi: qla2xxx: Fix NPIV host cleanup in target mode
- scsi: qla2xxx: Move session delete to driver work queue
- scsi: qla2xxx: Fix gpnid error processing

- 10.01.00.08.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Fix NULL pointer crash with FC-NVMe LUNs during unload.

- 10.01.00.07.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Add fix to free dma memory.
- qla2xxx: Mask off Scope bits in retry delay.

- 10.01.00.06.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Remove module parameter ql2xqos_priority_test.
- qla2xxx: Add ability to process multiple CT-PT SGE's.

- 10.01.00.05.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Simplification of register address used in qla_tmpl.c.
- qla2xxx: Correction and improvement to fwdt processing.
- qla2xxx: Add correction to RDP FW support logic.
- qla2xxx: serialize sess free
- qla2xxx: serialize session deletion
- qla2xxx: prevent re_login trigger from sending too many commands
- qla2xxx: prevent multiple active discovery commands per session
- qla2xxx: Add log message for bbcr.
- qla2xxx: Remove alias names for QoS module parameters.

- 10.01.00.04.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Correction to non-existant fabric name.
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add qos fcport test mode.
- qla2xxx: Optimized logs for searching qos fcport table.
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Correction to function qla26xx_read_qos_fcport_table().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Allow 27xx and 28xx to do bidirectional commands.
- qla2xxx: Add RDP/ABTS deferred processing for vp's.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Rename QoS table row type and cleanup log prints.
- qla2xxx: Optimize reading of QoS fcport table.
- qla2xxx: Fixup/cleanup of QoS table index code.
- qla2xxx: Minor cleanup of flash calls reoganization.
- qla2xxx: Optimize flash register routines.
- qla2xxx: Fixup flash register routines.
- qla2xxx: Add debug prints to write flash routine.
- qla2xxx: Simplify flash slow write log messages.
- qla2xxx: Simplify NPIV create log messages.
- qla2xxx: Simplify D-Port Diagnostics log messages.
- qla2xxx: Cleanup log message for fwdt allocate.
- qla2xxx: Add non-verbose SFP detail print.
- qla2xxx: Quieten FEC=enabled message.
- qla2xxx: Use interrupt pin number for port number.

- 10.01.00.03.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Correction to EFT selection.
- qla2xxx: Correction to flash write routine.
- qla2xxx: Add correction to FW image selection.

- 10.01.00.02.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Convert FLT flash reads to register method.
- qla2xxx: Undo the replacements to -&gt;optrom_read() calls.
- qla2xxx: Flash reading routines cleanups.
- qla2xxx: Make flash write avoid register banging.

- 10.01.00.01.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Use registers for reading unaligned flash offset.
- qla2xxx: Fix PCI header and data struct addresses.
- qla2xxx: Fix and cleanup ROM code version string reading.
- qla2xxx: Corrections to flt-&gt;region addresses.
- qla2xxx: Add debug buffer dump for INITFW MBC.
- qla2xxx: Add debug logs for QoS sorting/searching.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: Add conditionals to avoid fcport QoS when it is not enabled.
- qla2xxx: Fix mis-pointing buffer in qla24xx_load_risc_flash().
- qla2xxx: Provide Makefile CPP define for MoB testing.
- qla2xxx: Fixup flash region code struct.
- qla2xxx: Fixup msix/msi vector selection.

- 10.01.00.00.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Add dump buffer print when nvram checksum fails.
- qla2xxx: Refactor character signature compares into memcmp's.
- qla2xxx: Replace 0x%x with %#x in all format strings.
- qla2xxx: Normalize all flash reads to always use the dump ram mbc.
- qla2xxx: Flash image validation cleanups.
- qla2xxx: Add error test after dma_map_single.
- qla2xxx: Add support for ISP28XX.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Minor cleanup regarding device type.
- qla2xxx: Improve, correct, simplify fwdt endianess handling.
- qla2xxx: Use endian macros to assign dynamic fields in fwdump buffer.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add endianizers to 27xx firmware image validator.
- qla2xxx: Add new fwdt entry types.
- qla2xxx: Leave fwdt endianess alone.
- qla2xxx: Isolate test for valid firmware image.
- qla2xxx: Add support for multiple fwdump templates/segments.
- qla2xxx: Fix routine qla27xx_dump_mpi_ram().
- qla2xxx: Fix routine qla27xx_dump_ram().
- qla2xxx: Remove fwdt default template.

- 10.00.00.60.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: nvme features developed/added.</changelog>
  </package>
  <package pkgid="6da3e64938e5013f3634fa2ed7cbcfc1fa47ddcbc37dbc8c19d3b41cc3f337d2" name="kmod-qlgc-qla2xxx" arch="x86_64">
    <version epoch="0" ver="10.01.00.52.07.6_k1" rel="1.rhel7u7"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.01.00.52.07.6-k1-1" date="1567166400">- 10.01.00.49.xx.y-k1 QT 06/24/2019
- qla2xxx: Fix unbound sleep in fcport delete path.
- qla2xxx: Fix hang in fcport delete path.
- qla2xxx: Fix kernel crash after disconnecting NVMe devices.
- qla2xxx: move IO flush to the front of NVME rport unregistration
- qla2xxx: migrate srb-&gt;ref_count to cmd_kref
- qla2xxx: fix potential multiple queue_work for nvme ls completion
- qla2xxx: Wrong reference count field usage
- qla2xxx: update: optimize NPIV tear down process.
- qla2xxx: Use proper bit position when reading dual FCP-NVMe priority
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI

- 10.01.00.48.xx.y-k1 HM 06/01/2019
- qla2xxx: update: fix premature timer expiration

- 10.01.00.47.xx.y-k1 HM 05/31/2019
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: Use common update-firmware-options routine for ISP27xx+.
- qla2xxx: Fix failed NVME port discovery after a short device port loss.
- Revert "qla2xxx: Use chip to blink laser for switch timeout"
- Revert "qla2xxx: update: Use chip to blink laser for switch timeout"
- qla2xxx: Correct error handling during initialization failures.
- qla2xxx: add error handling for PLOGI ELS passthrough
- qla2xxx: update: Use chip to blink laser for switch timeout
- qla2xxx: retry Fabric Scan on IOCB queue full.
- qla2xxx: fix premature timer expiration
- qla2xxx: UPDATE: fix login state machine freeze
- qla2xxx: Dual FCP-NVMe target port support

- 10.01.00.46.xx.y-k1 HM 05/31/2019
- qla2xxx: Fix compile failure for the DIF changes

- 10.01.00.45.xx.y-k1 HM 05/15/2019
- qla2xxx: Fix compile failure for the DIF changes

- 10.01.00.45.xx.y-k1 HM 05/13/2019
- qla2xxx: Add Vendor specific DIF for qla2xxx_mqueuecommand()
- qla2xxx: update: Implement LUN level DIF for 3PAR array

- 10.01.00.44.xx.y-k1 HM 05/06/2019
- qla2xxx: Add cleanup for PCI EEH recovery
- qla2xxx: Fix Crash due to NULL pointer access in qla2x00_sysfs_read_optrom()
- qla2xxx: update: Fix DMA error when the DIF sg buffer crosses 4GB boundary
- qla2xxx: reject eh_xxx request
- qla2xxx: do command completion on abort timeout
- qla2xxx: Use chip to blink laser for switch timeout
- qla2xxx: fix recursive dead lock
- qla2xxx: optimize NPIV tear down process.

- 10.01.00.43.xx.y-k1 HM 04/05/2019
- qla2xxx: Add support for ISP2089
- qla2xxx: remove FW dump on LOOP init error.

- 10.01.00.42.xx.y-k1 HM 03/27/2019
- qla2xxx: fix potential dma_unmap leak
- qla2xxx: fix different size dma alloc and unmap
- qla2xxx: fix over index of qpair array.
- qla2xxx: fix premature mem access.
- qla2xxx: fix nvme device discovery
- qla2xxx: fix abort timeout race condition.
- qla2xxx: fix NVME LS cmd timeout race condition 2/2.
- qla2xxx: fix NVME cmd timeout race condition 1/2.
- qla2xxx: Remove defer flag to indicate immeadiate port loss
- qla2xxx: Further limit FLASH region write access from SYSFS.
- qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines.

- 10.01.00.41.xx.y-k1 HM 03/13/2019
- qla2xxx: Silence log messages from Autoconnet script
- Revert "qla2xxx: Fix for the null pointer crash."

- 10.01.00.40.xx.y-k1 HM 03/11/2019
- qla2xxx: fix FW resource print error.
- qla2xxx: Fix RHBA command time out on link reset.

- 10.01.00.39.xx.y-k1 HM 03/06/2019
- qla2xxx: Fix driver unload when FC-NVMe LUNs are connected
- qla2xxx: Cleanup redundant qla2x00_abort_all_cmds during unload
- qla2xxx: Set remote port devloss timeout to 0
- qla2xxx: update: P2P issue with initiator and target port domains being different

- 10.01.00.38.xx.y-k1 HM 02/27/2019
- scsi: qla2xxx: Delete session for nport id change
- qla2xxx: fix N2N link up hang.
- qla2xxx: P2P issue with initiator and target port domains being different
- qla2xxx: Cleanup unused functions.
- qla2xxx: allow irqbalance control in non-MQ mode
- qla2xxx: Correct fcport flags handling.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: Update fcport disc_state only if we could allocate mem.
- qla2xxx: Add a shadow variable to hold disc_state history of fcport
- qla2xxx: v3: fix corrupt fw dump. 2/2
- qla2xxx: v3: fix corrupt fw dump. 1/2

- 10.01.00.37.xx.y-k1 HM 02/01/2019
- qla2xxx: Fix for the null pointer crash.

- 10.01.00.36.xx.y-k1 HM 01/31/2019
- qla2xxx: Move disabling T10 DIF feature ealry in probe
- qla2xxx: fix fabric scan hang
- qla2xxx: Change abort wait_loop from msleep to wait_event_timeout.
- qla2xxx: Track release of different command resources on completion.
- qla2xxx: Increase the max_sgl_segments to 1024(max supported) to support larger IO size.
- qla2xxx: Fix incorrect SFUB length used for Secure Flash Update MB Cmd
- qla2xxx: fix Nport ID display value.
- qla2xxx: Use correct pointer when calculating FLT checksum
- qla2xxx: Added support for MPI and PEP regions for 28XX secure flash update.
- qla2xxx: v2: Fix N2N link reset
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxx: Reset the FCF_ASYNC_SENT and FCF_ASYNC_ACTIVE flag after processing GPSC command.
- qla2xxx: Set the qpair in SRB to NULL when SRB is released.
- qla2xxx: Set the SCSI command result before calling the command done.
- qla2xxx: Use complete switch scan for RSCN events
- qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware
- qla2xxx: prevent multiple active discovery commands per session
- scsi: qla2xxx: Delete session for nport id change

- 10.01.00.34.xx.y-k1 HM 12/17/2018
- extras: Clean up build script for FC-NVMe install directive
- qla2xxx: Add fix for N2N topology.
- qla2xxx: Secure flash update support for ISP28XX.
- qla2xxx: Restore WWPN of Physical Port for fabric configuration only for loop down.

- 10.01.00.33.xx.y-k1 HM 12/10/2018
- extras: Silence diff related to nvme scripts with driver install script

- 10.01.00.32.xx.y-k1 HM 12/07/2018
- extras: update FC-NVMe boot script to use single TRADDR

- 10.01.00.31.xx.y-k1 HM 12/04/2018
SLES15, SLES12 SP4
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF

- 10.01.00.30.xx.y-k1 SC 11/28/2018
- qla2xxx: Fix for call trace being seen on reboot
- Revert "qla2xxx: unable to discover NVME target."

- 10.01.00.29.xx.y-k1 HM 11/21/2018
- qla2xxx: Look for updated FC-NVME enable BIT to enable FC-NVME

- 10.01.00.28.xx.y-k1 HM 11/21/2018
- qla2xxx: Fix for call trace being seen on reboot

- 10.01.00.27.xx.y-k1 HM 11/19/2018
- qla2xxx: Fix issue reading primary region for ISP27xx/28xx
- qla2xxx: Remove hardcoded OS value for SPECTER flags
- qla2xxx: fix BUS Reset
- qla2xxx: Correctly retrieve and interpret active flash regions for 27XX/28XX

- 10.01.00.26.xx.x-k1 HM 11/05/2018
RHEL7.6, SLES12.4, SLES15
- qla2xxx: Demote log message 0x3079 to ql_dbg_io.
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF
- qla2xxx: Demote log message 0x3079 to ql_dbg_io.
- qla2xxx: Snoop Inquiry response spanning multiple scatter/gather elements.
- qla2xxx: Track if INQ was sent, and send INQ to all luns.
- qla2xxx: Reset the PROT bit in the cdb.
- qla2xxx: Make fcport a pointer in qlt_free_session_done().
- qla2xxx: Implement LUN level DIF for 3PAR array.
- qla2xxx: T10-DIF: Fix ref tag errors reported for CAW command.
- qla2xxx: Disable standard DIF for arrays advertising proprietary DIF.
- qla2xxx: Reset PROTECT bit only in standard INQUIRY response.
- qla2xxx: Check if the INQ response buffer is &gt; 170 (instead of &gt;=).
- qla2xxx: Fix invalid offset reference of inquiry response data.
- qla2xxx: Correct modinfo text for ql2xenablehba_err_chk.
- qla2xxx: Fix modinfo text for ql2xenabledif and ql2xenabledif_tgt.
- qla2xxx: set ql2xenabledif_tgt enabled by default.
- qla2xxx: Handle INQ data changed check condition.
- qla2xxx: Parameterize ql2xenabledif_tgt (defaulted to zero).
- qla2xxx: Unparameterize ql2xenabledif_tgt (leave as global variable zeroed).
- qla2xxx: Fix for issue where the scsi status was getting overwritten.
- qla2xxx: Fail module load on user config errors.
- qla2xxx: Check for success of INQ response before parsing.
- qla2xxx: Check for INQ response validity before parsing the response.
- qla2xxx: Control vendor T10 DIF via ql2xenabledif_tgt module parameter.
- qla2xxx: Mark DIF errors from target as re-tryable errors.
- qla2xxx: Remove extraneous debug messages.
- qla2xxx: Mark DIF errors from target as re-tryable errors.
- qla2xxx: Do not turn off T10 DIF on a port reset.
- qla2xxx: Add routines to get LBA from the SCSI CDB.
- qla2xxx: Enable T10 DIF for reads as well.
- qla2xxx: Enable SCSI T10 DIF registration during driver probe.
- qla2xxx: Initial check-in for vendor T10 DIF.


- 10.01.00.26.xx.x-k HM 11/05/2018
- qla2xxx: fix stale mem access on unload. v2
- Revert "qla2xxx: fix stale mem access on unload."
- extras: Add capability to start system service
- qla2xxx: fix stale mem access on unload.
- qla2xxx: reduce duplicate code.
- qla2xxx: Handle the fail case when fail to allocate memory for CT req and rsp.
- qla2xxx: Change SRB allocation flag to ATOMIC to avoid sleeping in IRQ context.

- 10.01.00.25.xx.x-k HM 10/20/2018
- extras: Updated Build script for FC-NVMe Discovery
- extras: Add Auto-connect scripts for FC-NVMe
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect
- qla2xxx: Fix unload when NVMe devices are configured
- qla2xxx: performance enhancement for ISP 28XX Target mode.
- qla2xxx: tweak error code for bsg_request.
- qla2xxx: reject garble setting for speed and qlini_mode
- qla2xxx: performance enhancement for nvme
- qla2xxx: Send Marker for each QPair.
- qla2xxx: move marker request behind qpair

- 10.01.00.24.xx.x-k HM 10/15/2018
- qla2xxx: Correctly report max/min supported speeds for Mach adapter
- qla2xxx: Fix flash pri/sec image selection bug
- qla2xxx: Add 28xx flash primary/secondary refreshing
- qla2xxx: Add 28xx flash primary/secondary status/image mechanism
- qla2xxx: Fix Use after free case while issuing Async TM command
- qla2xxx: no MB IOCB during chip down
- qla2xxx: Fix message to indicated Vectors used by driver
- scsi: qla2xxx: don't allow negative thresholds
- scsi: qla2xxx: Fix comment in MODULE_PARM_DESC in qla2xxx
- scsi: qla2xxx: Remove set but not used variable 'ptr_dma'
- scsi: qla2xxx: fix typo "CT-PASSTRHU" -&gt; "CT-PASSTHRU"
- qla2xxx: move error message behind error case.
- scsi: qla2xxx: Add debug knob for user control workload

- 10.01.00.23.xx.x-k JC 9/29/2018
RHEL7.6, SLES12.4, SLES15
- Fixed build issue.

- 10.01.00.22.xx.x-k JC 9/25/2018
RHEL7.6, SLES12.4, SLES15
- qla2xxx: aggregated compile error fix ups.
- qla2xxx: fix duplicate switch DB entries.
- Revert "qla2xxx: fix duplicate switch's Nport ID entries."
- qla2xxx: unable to discover NVME target.
- qla2xxx: Move debug log messages which dereference SRB structure before issuing the command to firmware.
- qla2xxx: Fix for double free of SRB structure used in Async switch query commands.
- qla2xxx: fix double increment of switch scan retry count.
- qla2xxx: fix duplicate switch's Nport ID entries.
- qla2xxx: Schedule worker to process response queue
- Revert "qla2xxx: Fix process response queue for ISP26XX and above"
- qla2xxx: Enable Target mode for ISP28XX
- qla2xxx: remove debug trace
- qla2xxx: Do not set dev_loss_tmo while unregistering remote nvme port.
- qla2xxx: Initialize atio request queue length.
- qla2xxx: fix command premature free.
- qla2xxx: Reject bsg request if chip is down.
- qla2xxx: shutdown chip if reset fail
- qla2xxx: fix stuck session in PLOGI state
- qla2xxx: fix early srb free on abort
- qla2xxx: Add mode control for each physical port.
- qla2xxx: fix cleanup race condition
- qla2xxx: fix dropped srb resource.
- qla2xxx: fix port speed display on chip reset
- qla2xxx: fix recursive mailbox timeout
- qla2xxx: Check for Register disconnect, during adapter shutdown process.

- 10.01.00.21.xx.x-k JC 8/21/2018
RHEL7.6, SLES12.4, SLES15
- Revert "qla2xxx: send nvme disconnect message to udev"
- Revert "qla2xxx_udev: nvme disconnect"
- qla2xxx: fix nvme session hang on unload

- 10.01.00.20.xx.x-k JC 8/9/2018
RHEL7.5, SLES12.3, SLES15
- qla2xxx: Added retpoline support.
- qla2xxx: Fixed module parameter for ql2xnvmeenable
- extras: Fix qlssen.sh build initrd for SLES15.
- extras: Fix udev bash command lines to use $PATH
- qla2xxx: Added file Module.supported.
RHEL7.5
- scsi: qla2xxx: fix MSI-X vector affinity

- 10.01.00.19.xx.x-k JC 8/6/2018
RHEL7.5, SLES12.3, SLES15
- extras: Fix usage of find in build.sh
- qla2xxx: Fix for FC-NVMe discovery for NPIV port
- qla2xxx: Set FC-NVMe feature to disabled as default
- qla2xxx: fix tape device re-connect

- 10.01.00.18.xx.x-k JC 7/26/2018
RHEL7.5, SLES12.3, SLES15
- qla2xxx: Return error when TM returns an error from firmware
- qla2xxx: move abort code behind qpair
- qla2xxx: extend abort timeout value
- qla2xxx: fix srb's ref_count get race condition
- qla2xxx: Fix memory leak for allocating abort IOCB. v2
- qla2xxx: Enable FC-NVME on NPIV ports
- qla2xxx: Fix NPIV handling for FC-NVMe
- qla2xxx: use correct vp_idx for NPIV
- qla2xxx: Fix vha access for FC-NVMe
- qla2xxx: Fix erroneous session deletion
- qla2xxx: Update: Fix NPORT ID display for N2N Direct connect
- qla2xxx: back port IS_SW_RESV_ADDR

- 10.01.00.17.07.5-k JC 7/26/2018
- qla2xxx: Add case for 28xx transfer rate.
- qla2xxx: Correct ISP filter for invalid SFP.
- qla2xxx: Add signature for 28xx flash image.
- qla2xxx: Include 28xx in abort isp cleanup.
- qla2xxx: Fix flash/nvram addressing.
- Revert "qla2xxx: Fix memory leak for allocating abort IOCB"

- 10.01.00.16.07.5-k JC 7/11/2018
- qla2xxx: Fix memory leak for allocating abort IOCB
- qla2xxx: Fix MBX failure during driver unload for FCoE adapter
- qla2xxx: silent warning in freeirq
- qla2xxx_udev: nvme disconnect
- qla2xxx: send nvme disconnect message to udev
- qla2xxx: on session delete return nvme cmd
- qla2xxx: fix N2N inifinite retry loop
- qla2xxx: Remove stale ADISC_DONE event
- qla2xxx: Shutdown Chip on unload.
- qla2xxx: back port fw_started flag from upstream
- qla2xxx: wait for session deletion done for npiv
- qla2xxx: no isp recovery on unload
- qla2xxx: fix uninit list head (sp-&gt;elem)

- 10.01.00.15.07.5-k JC 6/25/2018
- qla2xxx: Fix NPORT ID display for N2N Direct connect

- 10.01.00.14.07.5-k HM 6/24/2018
- qla2xxx: Fix spinlock resuctsion in qlt_reset()
- qla2xxx: Fix process response queue for ISP26XX and above
- qla2xxx: Fix NULL pointer derefrence for fcport search
- qla2xxx: Fix kernel crash due to late workqueue allocation
- qla2xxx: Alow nvme underrun to be handled transport.
- qla2xxx: Fix inconsistent DMA mem alloc/free
- qla2xxx: Fix Remote port registration
- qla2xxx: Remove Stale code from update_fw_options() settings

- 10.01.00.12.07.5-k HM 6/15/2018
- qla2xxx: Retry Loop resync when req/rsp is not setup
- qla2xxx: Fix NVMe Discovery
- qla2xxx: Fix SF_SCANNING flag for async_gnnft
- qla2xxx: Fix login_retry count
- qla2xxx: Update:qla2xxx: move command alloc to tcm_qla2xxx
- qla2xxx: move command alloc to tcm_qla2xxx
- qla2xxx: Fix double free of sp
- qla2xxx: assign NULL to dpc_thread before unloading to prevent crash
- qla2xxx: Fix crash for get_qpair()
- qla2xxx: Remove extra lock to reduce contention
- qla2xxx: fix sp-&gt;vha assignment problem
- qla2xxx: Reduce holding sess_lock to prevent CPU lock-up
- qla2xxx: Move qla2x00_start_sp behind qpair
- qla2xxx: Move {get|rel}_sp to base_qpair struct
- qla2xxx: Updated: Zio6 interrupt threashold

- 10.01.00.11.07.5-k HM 6/07/2018
- qla2xxx: zio6 interrupt threshold
- qla2xxx: UPDATE: serialize user space mailbox access.
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: fix out of order Termination and ABTS Resp
- qla2xxx: fix missing mutex_unlock
- qla2xxx: remove unneccessary byte swap
- scsi: qla2xxx: Fix incorrect handle for abort IOCB
- scsi: qla2xxx: Fix queue ID for async abort with Multiqueue
- qla2xxx: add detection of ABTS hang
- qla2xxx: fix ABTS response completion
- qla2xxx: serialize user space mailbox access.
- qla2xxx: allow speed set before chip is on
- qla2xxx: Tweak debug info for invalid RX_ID
- qla2xxx: fix deadlock between atio &amp; hw lock
- qla2xxx: remove redundant call to mark port lost
- qla2xxx: fix double Rport
- qla2xxx: serialize mailbox call.
- qla2xxx: fix erroneous debug log.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add support for setting port speed
- qla2xxx: holding off chip reset until target mode is enabled
- qla2xxx: Terminate Plogi/PRLI if WWN is 0
- qla2xxx: fix deadlock between qla &amp; target core drivers
- qla2xxx: Fix iIDMA error
- qla2xxx: Remove all rports if fabric scan retry fails
- qla2xxx: Force fw cleanup on ADISC error
- qla2xxx: Turn off IOCB timeout timer on IOCB completion
- qla2xxx: Decrement login retry count for only plogi
- qla2xxx: Move rport registration out of internal work_list
- qla2xxx: Remove redundant check for fcport deletion
- qla2xxx: Update rscn_rcvd field to more meaningful scan_needed
- qla2xxx: Use correct qpair for abort and cmd
- extras: Fixed find syntax in build.sh
- qla2xxx: Fix race between switch cmd completion and timeout
- qla2xxx: Flush mailbox commands on chip reset
- qla2xxx: Fix unintended Logout
- qla2xxx: Fix session state stuck in Get Port DB
- qla2xxx: Fix redundant fc_rport registration
- qla2xxx: Silent erroneous message
- qla2xxx: Prevent SysFS access when chip is down
- qla2xxx: Add longer window for Chip reset
- qla2xxx: Fix login retry count
- qla2xxx: Fix setting lower transfer speed if GPSC fails
- scsi: qla2xxx: Fix TMF and Multi-Queue config

- 10.01.00.10.07.5-k HM 6/05/2018
- qla2xxx: fix merge error
- qla2xxx: migrate NVME N2N handling into state machine
- qla2xxx: save frame payload size
- qla2xxx: fix N2N link re-connect

- 10.01.00.09.xx.y-k JC 5/24/2018
- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq
- scsi: qla2xxx: Remove stale debug value for login_retry flag
- scsi: qla2xxx: Use predefined get_datalen_for_atio() inline function
- scsi: qla2xxx: Fix Inquiry command being dropped in Target mode
- scsi: qla2xxx: Move GPSC and GFPNID out of session management
- scsi: qla2xxx: Reduce redundant ADISC command for RSCNs
- scsi: qla2xxx: Delete session for nport id change
- scsi: qla2xxx: Fix Rport and session state getting out of sync
- scsi: qla2xxx: Fix sending ADISC command for login
- scsi: qla2xxx: Correct setting of SAM_STAT_CHECK_CONDITION
- scsi: qla2xxx: correctly shift host byte
- scsi: qla2xxx: Fix race condition between iocb timeout and initialisation
- scsi: qla2xxx: Avoid double completion of abort command
- scsi: qla2xxx: Fix small memory leak in qla2x00_probe_one on probe failure
- scsi: qla2xxx: fx00 copypaste typo
- scsi: qla2xxx: fix error message on &lt;qla2400
- scsi: qla2xxx: Fix Async GPN_FT for FCP and FC-NVMe scan
- scsi: qla2xxx: fix spelling mistake: "existant" -&gt; "existent"
- scsi: qla2xxx: Use dma_pool_zalloc()
- scsi: qla2xxx: Remove unused symbols
- scsi: qla2xxx: Use %p for printing pointers
- scsi: qla2xxx: Remove FC_NO_LOOP_ID for FCP and FC-NVMe Discovery
- scsi: qla2xxx: Fix crashes in qla2x00_probe_one on probe failure
- scsi: qla2xxx: Fix FC-NVMe LUN discovery
- scsi: qla2xxx: ensure async flags are reset correctly
- scsi: qla2xxx: do not check login_state if no loop id is assigned
- scsi: qla2xxx: Fixup locking for session deletion
- scsi: qla2xxx: Fix NULL pointer crash due to active timer for ABTS
- scsi: qla2xxx: Fix double free bug after firmware timeout
- scsi: qla2xxx: Fix a locking imbalance in qlt_24xx_handle_els()
- scsi: qla2xxx: Avoid triggering undefined behavior in qla2x00_mbx_completion()
- scsi: qla2xxx: Add XCB counters to debugfs
- scsi: qla2xxx: Fix warning during port_name debug print
- scsi: qla2xxx: Fix warning in qla2x00_async_iocb_timeout()
- scsi: qla2xxx: Fix recursion while sending terminate exchange
- scsi: qla2xxx: remove redundant assignment of d
- scsi: qla2xxx: Use zeroing allocator rather than allocator/memset
- scsi: qla2xxx: Serialize session deletion by using work_lock
- scsi: qla2xxx: Prevent relogin trigger from sending too many commands
- scsi: qla2xxx: Prevent multiple active discovery commands per session
- scsi: qla2xxx: Add retry limit for fabric scan logic
- scsi: qla2xxx: Delay loop id allocation at login
- scsi: qla2xxx: Increase verbosity of debug messages logged
- scsi: qla2xxx: Allow relogin and session creation after reset
- scsi: qla2xxx: Add ability to use GPNFT/GNNFT for RSCN handling
- scsi: qla2xxx: Properly extract ADISC error codes
- scsi: qla2xxx: Fix GPNFT/GNNFT error handling
- scsi: qla2xxx: Remove session creation redundant code
- scsi: qla2xxx: Migrate switch registration commands away from mailbox interface
- scsi: qla2xxx: Fix login state machine freeze
- scsi: qla2xxx: Reduce trace noise for Async Events
- scsi: qla2xxx: Reduce the use of terminate exchange
- scsi: qla2xxx: Add lock protection around host lookup
- scsi: qla2xxx: Add switch command to simplify fabric discovery
- scsi: qla2xxx: Use known NPort ID for Management Server login
- scsi: qla2xxx: Fix session cleanup for N2N
- scsi: qla2xxx: Tweak resource count dump
- scsi: qla2xxx: Allow target mode to accept PRLI in dual mode
- scsi: qla2xxx: Don't call dma_free_coherent with IRQ disabled.
- scsi: qla2xxx: Add ability to send PRLO
- scsi: qla2xxx: Add option for use reserve exch for ELS
- scsi: qla2xxx: Use shadow register for ISP27XX
- scsi: qla2xxx: Enable ATIO interrupt handshake for ISP27XX
- scsi: qla2xxx: Move work element processing out of DPC thread
- scsi: qla2xxx: Replace GPDB with async ADISC command
- scsi: qla2xxx: Relogin to target port on a cable swap
- scsi: qla2xxx: Chip reset uses wrong lock during IO flush.
- scsi: qla2xxx: Add boundary checks for exchanges to be offloaded
- scsi: qla2xxx: Use chip reset to bring down laser on unload.
- scsi: qla2xxx: Use IOCB path to submit Control VP MBX command
- scsi: qla2xxx: Fix smatch warning in qla25xx_delete_{rsp|req}_que
- scsi: qla2xxx: remove duplicate includes
- scsi: qla2xxx: Fix memory leak in dual/target mode
- scsi: qla2xxx: Fix system crash in qlt_plogi_ack_unref
- scsi: qla2xxx: Clear loop id after delete
- scsi: qla2xxx: Fix scan state field for fcport
- scsi: qla2xxx: Replace fcport alloc with qla2x00_alloc_fcport
- scsi: qla2xxx: Fix PRLI state check
- scsi: qla2xxx: Fix NPIV host cleanup in target mode
- scsi: qla2xxx: Move session delete to driver work queue
- scsi: qla2xxx: Fix gpnid error processing

- 10.01.00.08.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Fix NULL pointer crash with FC-NVMe LUNs during unload.

- 10.01.00.07.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Add fix to free dma memory.
- qla2xxx: Mask off Scope bits in retry delay.

- 10.01.00.06.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Remove module parameter ql2xqos_priority_test.
- qla2xxx: Add ability to process multiple CT-PT SGE's.

- 10.01.00.05.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Simplification of register address used in qla_tmpl.c.
- qla2xxx: Correction and improvement to fwdt processing.
- qla2xxx: Add correction to RDP FW support logic.
- qla2xxx: serialize sess free
- qla2xxx: serialize session deletion
- qla2xxx: prevent re_login trigger from sending too many commands
- qla2xxx: prevent multiple active discovery commands per session
- qla2xxx: Add log message for bbcr.
- qla2xxx: Remove alias names for QoS module parameters.

- 10.01.00.04.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Correction to non-existant fabric name.
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add qos fcport test mode.
- qla2xxx: Optimized logs for searching qos fcport table.
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Correction to function qla26xx_read_qos_fcport_table().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Allow 27xx and 28xx to do bidirectional commands.
- qla2xxx: Add RDP/ABTS deferred processing for vp's.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Rename QoS table row type and cleanup log prints.
- qla2xxx: Optimize reading of QoS fcport table.
- qla2xxx: Fixup/cleanup of QoS table index code.
- qla2xxx: Minor cleanup of flash calls reoganization.
- qla2xxx: Optimize flash register routines.
- qla2xxx: Fixup flash register routines.
- qla2xxx: Add debug prints to write flash routine.
- qla2xxx: Simplify flash slow write log messages.
- qla2xxx: Simplify NPIV create log messages.
- qla2xxx: Simplify D-Port Diagnostics log messages.
- qla2xxx: Cleanup log message for fwdt allocate.
- qla2xxx: Add non-verbose SFP detail print.
- qla2xxx: Quieten FEC=enabled message.
- qla2xxx: Use interrupt pin number for port number.

- 10.01.00.03.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Correction to EFT selection.
- qla2xxx: Correction to flash write routine.
- qla2xxx: Add correction to FW image selection.

- 10.01.00.02.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Convert FLT flash reads to register method.
- qla2xxx: Undo the replacements to -&gt;optrom_read() calls.
- qla2xxx: Flash reading routines cleanups.
- qla2xxx: Make flash write avoid register banging.

- 10.01.00.01.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Use registers for reading unaligned flash offset.
- qla2xxx: Fix PCI header and data struct addresses.
- qla2xxx: Fix and cleanup ROM code version string reading.
- qla2xxx: Corrections to flt-&gt;region addresses.
- qla2xxx: Add debug buffer dump for INITFW MBC.
- qla2xxx: Add debug logs for QoS sorting/searching.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: Add conditionals to avoid fcport QoS when it is not enabled.
- qla2xxx: Fix mis-pointing buffer in qla24xx_load_risc_flash().
- qla2xxx: Provide Makefile CPP define for MoB testing.
- qla2xxx: Fixup flash region code struct.
- qla2xxx: Fixup msix/msi vector selection.

- 10.01.00.00.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Add dump buffer print when nvram checksum fails.
- qla2xxx: Refactor character signature compares into memcmp's.
- qla2xxx: Replace 0x%x with %#x in all format strings.
- qla2xxx: Normalize all flash reads to always use the dump ram mbc.
- qla2xxx: Flash image validation cleanups.
- qla2xxx: Add error test after dma_map_single.
- qla2xxx: Add support for ISP28XX.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Minor cleanup regarding device type.
- qla2xxx: Improve, correct, simplify fwdt endianess handling.
- qla2xxx: Use endian macros to assign dynamic fields in fwdump buffer.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add endianizers to 27xx firmware image validator.
- qla2xxx: Add new fwdt entry types.
- qla2xxx: Leave fwdt endianess alone.
- qla2xxx: Isolate test for valid firmware image.
- qla2xxx: Add support for multiple fwdump templates/segments.
- qla2xxx: Fix routine qla27xx_dump_mpi_ram().
- qla2xxx: Fix routine qla27xx_dump_ram().
- qla2xxx: Remove fwdt default template.

- 10.00.00.60.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: nvme features developed/added.</changelog>
  </package>
  <package pkgid="d0339021201df5ea14bf18019336da8b3235171746f54025dd8747e738d1331a" name="kmod-qlgc-qla2xxx" arch="x86_64">
    <version epoch="0" ver="10.01.00.52.08.0_k1" rel="1.rhel8u0"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.01.00.52.08.0-k1-1" date="1567166400">- 10.01.00.49.xx.y-k1 QT 06/24/2019
- qla2xxx: Fix unbound sleep in fcport delete path.
- qla2xxx: Fix hang in fcport delete path.
- qla2xxx: Fix kernel crash after disconnecting NVMe devices.
- qla2xxx: move IO flush to the front of NVME rport unregistration
- qla2xxx: migrate srb-&gt;ref_count to cmd_kref
- qla2xxx: fix potential multiple queue_work for nvme ls completion
- qla2xxx: Wrong reference count field usage
- qla2xxx: update: optimize NPIV tear down process.
- qla2xxx: Use proper bit position when reading dual FCP-NVMe priority
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI

- 10.01.00.48.xx.y-k1 HM 06/01/2019
- qla2xxx: update: fix premature timer expiration

- 10.01.00.47.xx.y-k1 HM 05/31/2019
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: Use common update-firmware-options routine for ISP27xx+.
- qla2xxx: Fix failed NVME port discovery after a short device port loss.
- Revert "qla2xxx: Use chip to blink laser for switch timeout"
- Revert "qla2xxx: update: Use chip to blink laser for switch timeout"
- qla2xxx: Correct error handling during initialization failures.
- qla2xxx: add error handling for PLOGI ELS passthrough
- qla2xxx: update: Use chip to blink laser for switch timeout
- qla2xxx: retry Fabric Scan on IOCB queue full.
- qla2xxx: fix premature timer expiration
- qla2xxx: UPDATE: fix login state machine freeze
- qla2xxx: Dual FCP-NVMe target port support

- 10.01.00.46.xx.y-k1 HM 05/31/2019
- qla2xxx: Fix compile failure for the DIF changes

- 10.01.00.45.xx.y-k1 HM 05/15/2019
- qla2xxx: Fix compile failure for the DIF changes

- 10.01.00.45.xx.y-k1 HM 05/13/2019
- qla2xxx: Add Vendor specific DIF for qla2xxx_mqueuecommand()
- qla2xxx: update: Implement LUN level DIF for 3PAR array

- 10.01.00.44.xx.y-k1 HM 05/06/2019
- qla2xxx: Add cleanup for PCI EEH recovery
- qla2xxx: Fix Crash due to NULL pointer access in qla2x00_sysfs_read_optrom()
- qla2xxx: update: Fix DMA error when the DIF sg buffer crosses 4GB boundary
- qla2xxx: reject eh_xxx request
- qla2xxx: do command completion on abort timeout
- qla2xxx: Use chip to blink laser for switch timeout
- qla2xxx: fix recursive dead lock
- qla2xxx: optimize NPIV tear down process.

- 10.01.00.43.xx.y-k1 HM 04/05/2019
- qla2xxx: Add support for ISP2089
- qla2xxx: remove FW dump on LOOP init error.

- 10.01.00.42.xx.y-k1 HM 03/27/2019
- qla2xxx: fix potential dma_unmap leak
- qla2xxx: fix different size dma alloc and unmap
- qla2xxx: fix over index of qpair array.
- qla2xxx: fix premature mem access.
- qla2xxx: fix nvme device discovery
- qla2xxx: fix abort timeout race condition.
- qla2xxx: fix NVME LS cmd timeout race condition 2/2.
- qla2xxx: fix NVME cmd timeout race condition 1/2.
- qla2xxx: Remove defer flag to indicate immeadiate port loss
- qla2xxx: Further limit FLASH region write access from SYSFS.
- qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines.

- 10.01.00.41.xx.y-k1 HM 03/13/2019
- qla2xxx: Silence log messages from Autoconnet script
- Revert "qla2xxx: Fix for the null pointer crash."

- 10.01.00.40.xx.y-k1 HM 03/11/2019
- qla2xxx: fix FW resource print error.
- qla2xxx: Fix RHBA command time out on link reset.

- 10.01.00.39.xx.y-k1 HM 03/06/2019
- qla2xxx: Fix driver unload when FC-NVMe LUNs are connected
- qla2xxx: Cleanup redundant qla2x00_abort_all_cmds during unload
- qla2xxx: Set remote port devloss timeout to 0
- qla2xxx: update: P2P issue with initiator and target port domains being different

- 10.01.00.38.xx.y-k1 HM 02/27/2019
- scsi: qla2xxx: Delete session for nport id change
- qla2xxx: fix N2N link up hang.
- qla2xxx: P2P issue with initiator and target port domains being different
- qla2xxx: Cleanup unused functions.
- qla2xxx: allow irqbalance control in non-MQ mode
- qla2xxx: Correct fcport flags handling.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: Update fcport disc_state only if we could allocate mem.
- qla2xxx: Add a shadow variable to hold disc_state history of fcport
- qla2xxx: v3: fix corrupt fw dump. 2/2
- qla2xxx: v3: fix corrupt fw dump. 1/2

- 10.01.00.37.xx.y-k1 HM 02/01/2019
- qla2xxx: Fix for the null pointer crash.

- 10.01.00.36.xx.y-k1 HM 01/31/2019
- qla2xxx: Move disabling T10 DIF feature ealry in probe
- qla2xxx: fix fabric scan hang
- qla2xxx: Change abort wait_loop from msleep to wait_event_timeout.
- qla2xxx: Track release of different command resources on completion.
- qla2xxx: Increase the max_sgl_segments to 1024(max supported) to support larger IO size.
- qla2xxx: Fix incorrect SFUB length used for Secure Flash Update MB Cmd
- qla2xxx: fix Nport ID display value.
- qla2xxx: Use correct pointer when calculating FLT checksum
- qla2xxx: Added support for MPI and PEP regions for 28XX secure flash update.
- qla2xxx: v2: Fix N2N link reset
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxx: Reset the FCF_ASYNC_SENT and FCF_ASYNC_ACTIVE flag after processing GPSC command.
- qla2xxx: Set the qpair in SRB to NULL when SRB is released.
- qla2xxx: Set the SCSI command result before calling the command done.
- qla2xxx: Use complete switch scan for RSCN events
- qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware
- qla2xxx: prevent multiple active discovery commands per session
- scsi: qla2xxx: Delete session for nport id change

- 10.01.00.34.xx.y-k1 HM 12/17/2018
- extras: Clean up build script for FC-NVMe install directive
- qla2xxx: Add fix for N2N topology.
- qla2xxx: Secure flash update support for ISP28XX.
- qla2xxx: Restore WWPN of Physical Port for fabric configuration only for loop down.

- 10.01.00.33.xx.y-k1 HM 12/10/2018
- extras: Silence diff related to nvme scripts with driver install script

- 10.01.00.32.xx.y-k1 HM 12/07/2018
- extras: update FC-NVMe boot script to use single TRADDR

- 10.01.00.31.xx.y-k1 HM 12/04/2018
SLES15, SLES12 SP4
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF

- 10.01.00.30.xx.y-k1 SC 11/28/2018
- qla2xxx: Fix for call trace being seen on reboot
- Revert "qla2xxx: unable to discover NVME target."

- 10.01.00.29.xx.y-k1 HM 11/21/2018
- qla2xxx: Look for updated FC-NVME enable BIT to enable FC-NVME

- 10.01.00.28.xx.y-k1 HM 11/21/2018
- qla2xxx: Fix for call trace being seen on reboot

- 10.01.00.27.xx.y-k1 HM 11/19/2018
- qla2xxx: Fix issue reading primary region for ISP27xx/28xx
- qla2xxx: Remove hardcoded OS value for SPECTER flags
- qla2xxx: fix BUS Reset
- qla2xxx: Correctly retrieve and interpret active flash regions for 27XX/28XX

- 10.01.00.26.xx.x-k1 HM 11/05/2018
RHEL7.6, SLES12.4, SLES15
- qla2xxx: Demote log message 0x3079 to ql_dbg_io.
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF
- qla2xxx: Demote log message 0x3079 to ql_dbg_io.
- qla2xxx: Snoop Inquiry response spanning multiple scatter/gather elements.
- qla2xxx: Track if INQ was sent, and send INQ to all luns.
- qla2xxx: Reset the PROT bit in the cdb.
- qla2xxx: Make fcport a pointer in qlt_free_session_done().
- qla2xxx: Implement LUN level DIF for 3PAR array.
- qla2xxx: T10-DIF: Fix ref tag errors reported for CAW command.
- qla2xxx: Disable standard DIF for arrays advertising proprietary DIF.
- qla2xxx: Reset PROTECT bit only in standard INQUIRY response.
- qla2xxx: Check if the INQ response buffer is &gt; 170 (instead of &gt;=).
- qla2xxx: Fix invalid offset reference of inquiry response data.
- qla2xxx: Correct modinfo text for ql2xenablehba_err_chk.
- qla2xxx: Fix modinfo text for ql2xenabledif and ql2xenabledif_tgt.
- qla2xxx: set ql2xenabledif_tgt enabled by default.
- qla2xxx: Handle INQ data changed check condition.
- qla2xxx: Parameterize ql2xenabledif_tgt (defaulted to zero).
- qla2xxx: Unparameterize ql2xenabledif_tgt (leave as global variable zeroed).
- qla2xxx: Fix for issue where the scsi status was getting overwritten.
- qla2xxx: Fail module load on user config errors.
- qla2xxx: Check for success of INQ response before parsing.
- qla2xxx: Check for INQ response validity before parsing the response.
- qla2xxx: Control vendor T10 DIF via ql2xenabledif_tgt module parameter.
- qla2xxx: Mark DIF errors from target as re-tryable errors.
- qla2xxx: Remove extraneous debug messages.
- qla2xxx: Mark DIF errors from target as re-tryable errors.
- qla2xxx: Do not turn off T10 DIF on a port reset.
- qla2xxx: Add routines to get LBA from the SCSI CDB.
- qla2xxx: Enable T10 DIF for reads as well.
- qla2xxx: Enable SCSI T10 DIF registration during driver probe.
- qla2xxx: Initial check-in for vendor T10 DIF.


- 10.01.00.26.xx.x-k HM 11/05/2018
- qla2xxx: fix stale mem access on unload. v2
- Revert "qla2xxx: fix stale mem access on unload."
- extras: Add capability to start system service
- qla2xxx: fix stale mem access on unload.
- qla2xxx: reduce duplicate code.
- qla2xxx: Handle the fail case when fail to allocate memory for CT req and rsp.
- qla2xxx: Change SRB allocation flag to ATOMIC to avoid sleeping in IRQ context.

- 10.01.00.25.xx.x-k HM 10/20/2018
- extras: Updated Build script for FC-NVMe Discovery
- extras: Add Auto-connect scripts for FC-NVMe
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect
- qla2xxx: Fix unload when NVMe devices are configured
- qla2xxx: performance enhancement for ISP 28XX Target mode.
- qla2xxx: tweak error code for bsg_request.
- qla2xxx: reject garble setting for speed and qlini_mode
- qla2xxx: performance enhancement for nvme
- qla2xxx: Send Marker for each QPair.
- qla2xxx: move marker request behind qpair

- 10.01.00.24.xx.x-k HM 10/15/2018
- qla2xxx: Correctly report max/min supported speeds for Mach adapter
- qla2xxx: Fix flash pri/sec image selection bug
- qla2xxx: Add 28xx flash primary/secondary refreshing
- qla2xxx: Add 28xx flash primary/secondary status/image mechanism
- qla2xxx: Fix Use after free case while issuing Async TM command
- qla2xxx: no MB IOCB during chip down
- qla2xxx: Fix message to indicated Vectors used by driver
- scsi: qla2xxx: don't allow negative thresholds
- scsi: qla2xxx: Fix comment in MODULE_PARM_DESC in qla2xxx
- scsi: qla2xxx: Remove set but not used variable 'ptr_dma'
- scsi: qla2xxx: fix typo "CT-PASSTRHU" -&gt; "CT-PASSTHRU"
- qla2xxx: move error message behind error case.
- scsi: qla2xxx: Add debug knob for user control workload

- 10.01.00.23.xx.x-k JC 9/29/2018
RHEL7.6, SLES12.4, SLES15
- Fixed build issue.

- 10.01.00.22.xx.x-k JC 9/25/2018
RHEL7.6, SLES12.4, SLES15
- qla2xxx: aggregated compile error fix ups.
- qla2xxx: fix duplicate switch DB entries.
- Revert "qla2xxx: fix duplicate switch's Nport ID entries."
- qla2xxx: unable to discover NVME target.
- qla2xxx: Move debug log messages which dereference SRB structure before issuing the command to firmware.
- qla2xxx: Fix for double free of SRB structure used in Async switch query commands.
- qla2xxx: fix double increment of switch scan retry count.
- qla2xxx: fix duplicate switch's Nport ID entries.
- qla2xxx: Schedule worker to process response queue
- Revert "qla2xxx: Fix process response queue for ISP26XX and above"
- qla2xxx: Enable Target mode for ISP28XX
- qla2xxx: remove debug trace
- qla2xxx: Do not set dev_loss_tmo while unregistering remote nvme port.
- qla2xxx: Initialize atio request queue length.
- qla2xxx: fix command premature free.
- qla2xxx: Reject bsg request if chip is down.
- qla2xxx: shutdown chip if reset fail
- qla2xxx: fix stuck session in PLOGI state
- qla2xxx: fix early srb free on abort
- qla2xxx: Add mode control for each physical port.
- qla2xxx: fix cleanup race condition
- qla2xxx: fix dropped srb resource.
- qla2xxx: fix port speed display on chip reset
- qla2xxx: fix recursive mailbox timeout
- qla2xxx: Check for Register disconnect, during adapter shutdown process.

- 10.01.00.21.xx.x-k JC 8/21/2018
RHEL7.6, SLES12.4, SLES15
- Revert "qla2xxx: send nvme disconnect message to udev"
- Revert "qla2xxx_udev: nvme disconnect"
- qla2xxx: fix nvme session hang on unload

- 10.01.00.20.xx.x-k JC 8/9/2018
RHEL7.5, SLES12.3, SLES15
- qla2xxx: Added retpoline support.
- qla2xxx: Fixed module parameter for ql2xnvmeenable
- extras: Fix qlssen.sh build initrd for SLES15.
- extras: Fix udev bash command lines to use $PATH
- qla2xxx: Added file Module.supported.
RHEL7.5
- scsi: qla2xxx: fix MSI-X vector affinity

- 10.01.00.19.xx.x-k JC 8/6/2018
RHEL7.5, SLES12.3, SLES15
- extras: Fix usage of find in build.sh
- qla2xxx: Fix for FC-NVMe discovery for NPIV port
- qla2xxx: Set FC-NVMe feature to disabled as default
- qla2xxx: fix tape device re-connect

- 10.01.00.18.xx.x-k JC 7/26/2018
RHEL7.5, SLES12.3, SLES15
- qla2xxx: Return error when TM returns an error from firmware
- qla2xxx: move abort code behind qpair
- qla2xxx: extend abort timeout value
- qla2xxx: fix srb's ref_count get race condition
- qla2xxx: Fix memory leak for allocating abort IOCB. v2
- qla2xxx: Enable FC-NVME on NPIV ports
- qla2xxx: Fix NPIV handling for FC-NVMe
- qla2xxx: use correct vp_idx for NPIV
- qla2xxx: Fix vha access for FC-NVMe
- qla2xxx: Fix erroneous session deletion
- qla2xxx: Update: Fix NPORT ID display for N2N Direct connect
- qla2xxx: back port IS_SW_RESV_ADDR

- 10.01.00.17.07.5-k JC 7/26/2018
- qla2xxx: Add case for 28xx transfer rate.
- qla2xxx: Correct ISP filter for invalid SFP.
- qla2xxx: Add signature for 28xx flash image.
- qla2xxx: Include 28xx in abort isp cleanup.
- qla2xxx: Fix flash/nvram addressing.
- Revert "qla2xxx: Fix memory leak for allocating abort IOCB"

- 10.01.00.16.07.5-k JC 7/11/2018
- qla2xxx: Fix memory leak for allocating abort IOCB
- qla2xxx: Fix MBX failure during driver unload for FCoE adapter
- qla2xxx: silent warning in freeirq
- qla2xxx_udev: nvme disconnect
- qla2xxx: send nvme disconnect message to udev
- qla2xxx: on session delete return nvme cmd
- qla2xxx: fix N2N inifinite retry loop
- qla2xxx: Remove stale ADISC_DONE event
- qla2xxx: Shutdown Chip on unload.
- qla2xxx: back port fw_started flag from upstream
- qla2xxx: wait for session deletion done for npiv
- qla2xxx: no isp recovery on unload
- qla2xxx: fix uninit list head (sp-&gt;elem)

- 10.01.00.15.07.5-k JC 6/25/2018
- qla2xxx: Fix NPORT ID display for N2N Direct connect

- 10.01.00.14.07.5-k HM 6/24/2018
- qla2xxx: Fix spinlock resuctsion in qlt_reset()
- qla2xxx: Fix process response queue for ISP26XX and above
- qla2xxx: Fix NULL pointer derefrence for fcport search
- qla2xxx: Fix kernel crash due to late workqueue allocation
- qla2xxx: Alow nvme underrun to be handled transport.
- qla2xxx: Fix inconsistent DMA mem alloc/free
- qla2xxx: Fix Remote port registration
- qla2xxx: Remove Stale code from update_fw_options() settings

- 10.01.00.12.07.5-k HM 6/15/2018
- qla2xxx: Retry Loop resync when req/rsp is not setup
- qla2xxx: Fix NVMe Discovery
- qla2xxx: Fix SF_SCANNING flag for async_gnnft
- qla2xxx: Fix login_retry count
- qla2xxx: Update:qla2xxx: move command alloc to tcm_qla2xxx
- qla2xxx: move command alloc to tcm_qla2xxx
- qla2xxx: Fix double free of sp
- qla2xxx: assign NULL to dpc_thread before unloading to prevent crash
- qla2xxx: Fix crash for get_qpair()
- qla2xxx: Remove extra lock to reduce contention
- qla2xxx: fix sp-&gt;vha assignment problem
- qla2xxx: Reduce holding sess_lock to prevent CPU lock-up
- qla2xxx: Move qla2x00_start_sp behind qpair
- qla2xxx: Move {get|rel}_sp to base_qpair struct
- qla2xxx: Updated: Zio6 interrupt threashold

- 10.01.00.11.07.5-k HM 6/07/2018
- qla2xxx: zio6 interrupt threshold
- qla2xxx: UPDATE: serialize user space mailbox access.
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: fix out of order Termination and ABTS Resp
- qla2xxx: fix missing mutex_unlock
- qla2xxx: remove unneccessary byte swap
- scsi: qla2xxx: Fix incorrect handle for abort IOCB
- scsi: qla2xxx: Fix queue ID for async abort with Multiqueue
- qla2xxx: add detection of ABTS hang
- qla2xxx: fix ABTS response completion
- qla2xxx: serialize user space mailbox access.
- qla2xxx: allow speed set before chip is on
- qla2xxx: Tweak debug info for invalid RX_ID
- qla2xxx: fix deadlock between atio &amp; hw lock
- qla2xxx: remove redundant call to mark port lost
- qla2xxx: fix double Rport
- qla2xxx: serialize mailbox call.
- qla2xxx: fix erroneous debug log.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add support for setting port speed
- qla2xxx: holding off chip reset until target mode is enabled
- qla2xxx: Terminate Plogi/PRLI if WWN is 0
- qla2xxx: fix deadlock between qla &amp; target core drivers
- qla2xxx: Fix iIDMA error
- qla2xxx: Remove all rports if fabric scan retry fails
- qla2xxx: Force fw cleanup on ADISC error
- qla2xxx: Turn off IOCB timeout timer on IOCB completion
- qla2xxx: Decrement login retry count for only plogi
- qla2xxx: Move rport registration out of internal work_list
- qla2xxx: Remove redundant check for fcport deletion
- qla2xxx: Update rscn_rcvd field to more meaningful scan_needed
- qla2xxx: Use correct qpair for abort and cmd
- extras: Fixed find syntax in build.sh
- qla2xxx: Fix race between switch cmd completion and timeout
- qla2xxx: Flush mailbox commands on chip reset
- qla2xxx: Fix unintended Logout
- qla2xxx: Fix session state stuck in Get Port DB
- qla2xxx: Fix redundant fc_rport registration
- qla2xxx: Silent erroneous message
- qla2xxx: Prevent SysFS access when chip is down
- qla2xxx: Add longer window for Chip reset
- qla2xxx: Fix login retry count
- qla2xxx: Fix setting lower transfer speed if GPSC fails
- scsi: qla2xxx: Fix TMF and Multi-Queue config

- 10.01.00.10.07.5-k HM 6/05/2018
- qla2xxx: fix merge error
- qla2xxx: migrate NVME N2N handling into state machine
- qla2xxx: save frame payload size
- qla2xxx: fix N2N link re-connect

- 10.01.00.09.xx.y-k JC 5/24/2018
- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq
- scsi: qla2xxx: Remove stale debug value for login_retry flag
- scsi: qla2xxx: Use predefined get_datalen_for_atio() inline function
- scsi: qla2xxx: Fix Inquiry command being dropped in Target mode
- scsi: qla2xxx: Move GPSC and GFPNID out of session management
- scsi: qla2xxx: Reduce redundant ADISC command for RSCNs
- scsi: qla2xxx: Delete session for nport id change
- scsi: qla2xxx: Fix Rport and session state getting out of sync
- scsi: qla2xxx: Fix sending ADISC command for login
- scsi: qla2xxx: Correct setting of SAM_STAT_CHECK_CONDITION
- scsi: qla2xxx: correctly shift host byte
- scsi: qla2xxx: Fix race condition between iocb timeout and initialisation
- scsi: qla2xxx: Avoid double completion of abort command
- scsi: qla2xxx: Fix small memory leak in qla2x00_probe_one on probe failure
- scsi: qla2xxx: fx00 copypaste typo
- scsi: qla2xxx: fix error message on &lt;qla2400
- scsi: qla2xxx: Fix Async GPN_FT for FCP and FC-NVMe scan
- scsi: qla2xxx: fix spelling mistake: "existant" -&gt; "existent"
- scsi: qla2xxx: Use dma_pool_zalloc()
- scsi: qla2xxx: Remove unused symbols
- scsi: qla2xxx: Use %p for printing pointers
- scsi: qla2xxx: Remove FC_NO_LOOP_ID for FCP and FC-NVMe Discovery
- scsi: qla2xxx: Fix crashes in qla2x00_probe_one on probe failure
- scsi: qla2xxx: Fix FC-NVMe LUN discovery
- scsi: qla2xxx: ensure async flags are reset correctly
- scsi: qla2xxx: do not check login_state if no loop id is assigned
- scsi: qla2xxx: Fixup locking for session deletion
- scsi: qla2xxx: Fix NULL pointer crash due to active timer for ABTS
- scsi: qla2xxx: Fix double free bug after firmware timeout
- scsi: qla2xxx: Fix a locking imbalance in qlt_24xx_handle_els()
- scsi: qla2xxx: Avoid triggering undefined behavior in qla2x00_mbx_completion()
- scsi: qla2xxx: Add XCB counters to debugfs
- scsi: qla2xxx: Fix warning during port_name debug print
- scsi: qla2xxx: Fix warning in qla2x00_async_iocb_timeout()
- scsi: qla2xxx: Fix recursion while sending terminate exchange
- scsi: qla2xxx: remove redundant assignment of d
- scsi: qla2xxx: Use zeroing allocator rather than allocator/memset
- scsi: qla2xxx: Serialize session deletion by using work_lock
- scsi: qla2xxx: Prevent relogin trigger from sending too many commands
- scsi: qla2xxx: Prevent multiple active discovery commands per session
- scsi: qla2xxx: Add retry limit for fabric scan logic
- scsi: qla2xxx: Delay loop id allocation at login
- scsi: qla2xxx: Increase verbosity of debug messages logged
- scsi: qla2xxx: Allow relogin and session creation after reset
- scsi: qla2xxx: Add ability to use GPNFT/GNNFT for RSCN handling
- scsi: qla2xxx: Properly extract ADISC error codes
- scsi: qla2xxx: Fix GPNFT/GNNFT error handling
- scsi: qla2xxx: Remove session creation redundant code
- scsi: qla2xxx: Migrate switch registration commands away from mailbox interface
- scsi: qla2xxx: Fix login state machine freeze
- scsi: qla2xxx: Reduce trace noise for Async Events
- scsi: qla2xxx: Reduce the use of terminate exchange
- scsi: qla2xxx: Add lock protection around host lookup
- scsi: qla2xxx: Add switch command to simplify fabric discovery
- scsi: qla2xxx: Use known NPort ID for Management Server login
- scsi: qla2xxx: Fix session cleanup for N2N
- scsi: qla2xxx: Tweak resource count dump
- scsi: qla2xxx: Allow target mode to accept PRLI in dual mode
- scsi: qla2xxx: Don't call dma_free_coherent with IRQ disabled.
- scsi: qla2xxx: Add ability to send PRLO
- scsi: qla2xxx: Add option for use reserve exch for ELS
- scsi: qla2xxx: Use shadow register for ISP27XX
- scsi: qla2xxx: Enable ATIO interrupt handshake for ISP27XX
- scsi: qla2xxx: Move work element processing out of DPC thread
- scsi: qla2xxx: Replace GPDB with async ADISC command
- scsi: qla2xxx: Relogin to target port on a cable swap
- scsi: qla2xxx: Chip reset uses wrong lock during IO flush.
- scsi: qla2xxx: Add boundary checks for exchanges to be offloaded
- scsi: qla2xxx: Use chip reset to bring down laser on unload.
- scsi: qla2xxx: Use IOCB path to submit Control VP MBX command
- scsi: qla2xxx: Fix smatch warning in qla25xx_delete_{rsp|req}_que
- scsi: qla2xxx: remove duplicate includes
- scsi: qla2xxx: Fix memory leak in dual/target mode
- scsi: qla2xxx: Fix system crash in qlt_plogi_ack_unref
- scsi: qla2xxx: Clear loop id after delete
- scsi: qla2xxx: Fix scan state field for fcport
- scsi: qla2xxx: Replace fcport alloc with qla2x00_alloc_fcport
- scsi: qla2xxx: Fix PRLI state check
- scsi: qla2xxx: Fix NPIV host cleanup in target mode
- scsi: qla2xxx: Move session delete to driver work queue
- scsi: qla2xxx: Fix gpnid error processing

- 10.01.00.08.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Fix NULL pointer crash with FC-NVMe LUNs during unload.

- 10.01.00.07.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Add fix to free dma memory.
- qla2xxx: Mask off Scope bits in retry delay.

- 10.01.00.06.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Remove module parameter ql2xqos_priority_test.
- qla2xxx: Add ability to process multiple CT-PT SGE's.

- 10.01.00.05.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Simplification of register address used in qla_tmpl.c.
- qla2xxx: Correction and improvement to fwdt processing.
- qla2xxx: Add correction to RDP FW support logic.
- qla2xxx: serialize sess free
- qla2xxx: serialize session deletion
- qla2xxx: prevent re_login trigger from sending too many commands
- qla2xxx: prevent multiple active discovery commands per session
- qla2xxx: Add log message for bbcr.
- qla2xxx: Remove alias names for QoS module parameters.

- 10.01.00.04.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Correction to non-existant fabric name.
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add qos fcport test mode.
- qla2xxx: Optimized logs for searching qos fcport table.
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Correction to function qla26xx_read_qos_fcport_table().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Allow 27xx and 28xx to do bidirectional commands.
- qla2xxx: Add RDP/ABTS deferred processing for vp's.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Rename QoS table row type and cleanup log prints.
- qla2xxx: Optimize reading of QoS fcport table.
- qla2xxx: Fixup/cleanup of QoS table index code.
- qla2xxx: Minor cleanup of flash calls reoganization.
- qla2xxx: Optimize flash register routines.
- qla2xxx: Fixup flash register routines.
- qla2xxx: Add debug prints to write flash routine.
- qla2xxx: Simplify flash slow write log messages.
- qla2xxx: Simplify NPIV create log messages.
- qla2xxx: Simplify D-Port Diagnostics log messages.
- qla2xxx: Cleanup log message for fwdt allocate.
- qla2xxx: Add non-verbose SFP detail print.
- qla2xxx: Quieten FEC=enabled message.
- qla2xxx: Use interrupt pin number for port number.

- 10.01.00.03.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Correction to EFT selection.
- qla2xxx: Correction to flash write routine.
- qla2xxx: Add correction to FW image selection.

- 10.01.00.02.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Convert FLT flash reads to register method.
- qla2xxx: Undo the replacements to -&gt;optrom_read() calls.
- qla2xxx: Flash reading routines cleanups.
- qla2xxx: Make flash write avoid register banging.

- 10.01.00.01.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Use registers for reading unaligned flash offset.
- qla2xxx: Fix PCI header and data struct addresses.
- qla2xxx: Fix and cleanup ROM code version string reading.
- qla2xxx: Corrections to flt-&gt;region addresses.
- qla2xxx: Add debug buffer dump for INITFW MBC.
- qla2xxx: Add debug logs for QoS sorting/searching.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: Add conditionals to avoid fcport QoS when it is not enabled.
- qla2xxx: Fix mis-pointing buffer in qla24xx_load_risc_flash().
- qla2xxx: Provide Makefile CPP define for MoB testing.
- qla2xxx: Fixup flash region code struct.
- qla2xxx: Fixup msix/msi vector selection.

- 10.01.00.00.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Add dump buffer print when nvram checksum fails.
- qla2xxx: Refactor character signature compares into memcmp's.
- qla2xxx: Replace 0x%x with %#x in all format strings.
- qla2xxx: Normalize all flash reads to always use the dump ram mbc.
- qla2xxx: Flash image validation cleanups.
- qla2xxx: Add error test after dma_map_single.
- qla2xxx: Add support for ISP28XX.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Minor cleanup regarding device type.
- qla2xxx: Improve, correct, simplify fwdt endianess handling.
- qla2xxx: Use endian macros to assign dynamic fields in fwdump buffer.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add endianizers to 27xx firmware image validator.
- qla2xxx: Add new fwdt entry types.
- qla2xxx: Leave fwdt endianess alone.
- qla2xxx: Isolate test for valid firmware image.
- qla2xxx: Add support for multiple fwdump templates/segments.
- qla2xxx: Fix routine qla27xx_dump_mpi_ram().
- qla2xxx: Fix routine qla27xx_dump_ram().
- qla2xxx: Remove fwdt default template.

- 10.00.00.60.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: nvme features developed/added.</changelog>
  </package>
  <package pkgid="accbda0876df2f4d10555c96423eec4b2d5f7e59c229b22cd0928e8d0e8f068e" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="1.2.10" rel="025.rhel7u6"/>
  </package>
  <package pkgid="913092fe4572d56e22c5711b98c5c72055de90037b04a04f9e6817b2bd862ac6" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="1.2.10" rel="025.rhel7u7"/>
  </package>
  <package pkgid="aa87d1e481ed42b7e0747d8b654429c7796dbd9e70aebbfd0a32a733b86e2170" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="1.2.10" rel="025.rhel8u0"/>
  </package>
  <package pkgid="ccac3a020e77e130a712e3388537b5978b8dfe507e62a98cc77c557060e9d240" name="kmod-tg3" arch="x86_64">
    <version epoch="0" ver="3.137y" rel="1.rhel7u6"/>
    <changelog author="Sanjeev Bansal &lt;sanjeevb.bansal@broadcom.com&gt; 3.137n" date="1446638400">- Add support for 5720 inverting serdes signal detect feature (Severity:Minor)</changelog>
    <changelog author="Sanjeev Bansal &lt;sanjeevb.bansal@broadcom.com&gt; 3.137o" date="1450180800">- Add work around HW/FW limitations with vlan encapsulated frames (Severity:Minor)
- Fix for transmit queue 0 timed out when too many gso_segs (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137p" date="1466164800">- Update the copyright information for tg3 source files (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137q" date="1472558400">- Add support for SLES 12 SP2 (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497441600">- Add workaround for 5762 MRRS  (Severity:Medium)
- Update copyright year to 2017 (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
  </package>
  <package pkgid="62fb87034f7b5790ec44c7263f7b514847723ed5499227f78742decda4af4f53" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="214.0.181.0" rel="rhel7u6"/>
  </package>
  <package pkgid="258c4ba4054deecf4949b4ccadc35e4ca866b7cc8fc456ad340bc2ec8b8db83a" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="214.0.181.0" rel="sles12sp3"/>
  </package>
  <package pkgid="20ada1fba8bfef4c5dc0d9dc9074b903e9bb691337a4e7edbcaa406694ad4356" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="214.0.181.0" rel="sles12sp4"/>
  </package>
  <package pkgid="6f9f232e5606cf17aa96b12b2527f91cb090d6fd23fa2c9e995e286b03e4efd3" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="214.0.181.0" rel="sles15"/>
  </package>
  <package pkgid="34b2697c679495c40aee83503012af2d2f300419546bffa867a30b0aa8d6e7df" name="lsi-megaraid_sas-kmp-default" arch="x86_64">
    <version epoch="0" ver="07.706.05.00" rel="14.sles12sp3"/>
  </package>
  <package pkgid="769d731c126fcf7ac2918c0f59ef3fd25bb8c63dde4486fcd49d050ec98ee8fd" name="lsi-megaraid_sas-kmp-default" arch="x86_64">
    <version epoch="0" ver="07.706.05.00" rel="14.sles12sp4"/>
  </package>
  <package pkgid="08766007d43a682bee91ebe76957b7efd313bd9ac97c61dd245266990f6c8c8b" name="lsi-megaraid_sas-kmp-default" arch="x86_64">
    <version epoch="0" ver="07.706.05.00" rel="14.sles15sp0"/>
  </package>
  <package pkgid="7dce0fc5b0421b9cbd0be3e2c9e504ed966500fcb96f1e291ca6997a6593b217" name="lsi-mpt2sas-kmp-default" arch="x86_64">
    <version epoch="0" ver="15.10.09.00" rel="1.sles12sp4"/>
    <changelog author="Eric.Moore@lsi.com" date="1210680000">- Initial version.</changelog>
  </package>
  <package pkgid="40c42e2b21675c1ad7ec7d7fe4ca23d5a7582cdea414a74ea50927a50ddcfb75" name="mft" arch="x86_64">
    <version epoch="0" ver="4.13.0" rel="102.rhel7u6"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.13.0-102.rhel7u6</changelog>
  </package>
  <package pkgid="1100704c1f958244339a2ed6ede282923c55844f96082bb14fbd79a778a2b906" name="mft" arch="x86_64">
    <version epoch="0" ver="4.13.0" rel="102.rhel7u7"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.13.0-102.rhel7u7</changelog>
  </package>
  <package pkgid="9089e9d92aca3bce8874df401da7313ffc618d2ec60092b126a2d4b9a5d44027" name="mft" arch="x86_64">
    <version epoch="0" ver="4.13.0" rel="102.rhel8u0"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.13.0-102.rhel8u0</changelog>
  </package>
  <package pkgid="54d0f9417c9fc756a6bd81b5eb0d1e34029054d2851a08ef85ed5e4ff3dbb80d" name="mft" arch="x86_64">
    <version epoch="0" ver="4.13.0" rel="102.sles12sp3"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.13.0-102.sles12sp3</changelog>
  </package>
  <package pkgid="1ecb2132e2457fa7a451950ac7093db88b2816c08f0fcc930e14e509d115b95f" name="mft" arch="x86_64">
    <version epoch="0" ver="4.13.0" rel="102.sles12sp4"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.13.0-102.sles12sp4</changelog>
  </package>
  <package pkgid="71b1c805f1dde63033e775f39a66c6500c6ca86e12b369d136850edb73e420c6" name="mft" arch="x86_64">
    <version epoch="0" ver="4.13.0" rel="102.sles15sp0"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.13.0-102.sles15sp0</changelog>
  </package>
  <package pkgid="f645faaaae85ec960edff93d6fcc1fd328c5ab298e101c92a1aa6f1541c57ddf" name="mft" arch="x86_64">
    <version epoch="0" ver="4.13.0" rel="102.sles15sp1"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.13.0-102.sles15sp1</changelog>
  </package>
  <package pkgid="e2870a5b8644c3a02ca52d0411432158deea572746ffb21b4658a3eab08444ab" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.7" rel="OFED.4.7.1.0.0.1.g1c4bf42.rhel7u6"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.7-OFED.4.7.1.0.0.1.g1c4bf42.rhel7u6</changelog>
  </package>
  <package pkgid="4dcf0e3bb2a8f278936c677774609e9662160d4849b19be318daf75dacd8ffe8" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.7" rel="OFED.4.7.1.0.0.1.g1c4bf42.rhel7u7"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.7-OFED.4.7.1.0.0.1.g1c4bf42.rhel7u7</changelog>
  </package>
  <package pkgid="2d324dec442cc255b8ecba40172218d9ef9a9baca8cacb5e3c6da73c7c3e1b58" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.7" rel="OFED.4.7.1.0.0.1.g1c4bf42.rhel8u0"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.7-OFED.4.7.1.0.0.1.g1c4bf42.rhel8u0</changelog>
  </package>
  <package pkgid="a3bda2a998d06e09d3461176c58e72ac48a8459536b8cbd11e168852eab49347" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.7" rel="OFED.4.7.1.0.0.1.g1c4bf42.sles12sp3"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.7-OFED.4.7.1.0.0.1.g1c4bf42.sles12sp3</changelog>
  </package>
  <package pkgid="ee7b504dc1e78fe4347859bd80c46a3278a01ea8f2965899dda4d6ba0a13e3fc" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.7" rel="OFED.4.7.1.0.0.1.g1c4bf42.sles12sp4"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.7-OFED.4.7.1.0.0.1.g1c4bf42.sles12sp4</changelog>
  </package>
  <package pkgid="4f1a7f92b64a2cb26f241db3148de59157eea7dadfc334152e93c4642e84df8b" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.7" rel="OFED.4.7.1.0.0.1.g1c4bf42.sles15sp0"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.7-OFED.4.7.1.0.0.1.g1c4bf42.sles15sp0</changelog>
  </package>
  <package pkgid="65373f3addd0b2a52cb26ce004905111101a5c2b5bbf8dd319f1440a63186e9b" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.7" rel="OFED.4.7.1.0.0.1.g1c4bf42.sles15sp1"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1569499200">- Release version 4.7-OFED.4.7.1.0.0.1.g1c4bf42.sles15sp1</changelog>
  </package>
  <package pkgid="be282ab0b0f8761934588066fbf6bd7dd5881956af1ddad493c7c068e3029683" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.7_k4.12.14_195" rel="OFED.4.7.1.0.0.1.g1c4bf42.sles15sp1"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="8cd92b57a0c24c5dd30f68975e4258356255b6e7ad7be0e27a580afba3d7dbb3" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.7_k4.12.14_23" rel="OFED.4.7.1.0.0.1.g1c4bf42.sles15sp0"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="89e7793f32fae9dcb10bb72b243af4afedb56b2bc8fecd7fc7c564c0e52e45ae" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.7_k4.12.14_94.41" rel="OFED.4.7.1.0.0.1.g1c4bf42.sles12sp4"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="14b0f7979b7a2e22dd38a4a60b241ffe20a2954bc4281ec1085996cc1d0c7986" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.7_k4.4.73_5" rel="OFED.4.7.1.0.0.1.g1c4bf42.sles12sp3"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="96ab236b92843e205f7d48dce66e7ad7699955d67fc234c3062f63ebcec90c70" name="netxtreme2-kmp-default" arch="x86_64">
    <version epoch="0" ver="7.14.63_k4.12.14_195" rel="1.sles15sp1"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="5411106b794cdbee97c8acc68430abe09069cb6824b50e4d25127d154b3244ed" name="netxtreme2-kmp-default" arch="x86_64">
    <version epoch="0" ver="7.14.63_k4.12.14_23" rel="1.sles15sp0"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="b1482f58b55a2607037c2632de913847328f6954f37c284842285fcdc372ff43" name="netxtreme2-kmp-default" arch="x86_64">
    <version epoch="0" ver="7.14.63_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="9f207a0d27ecf6356960934f09185ab9a6c2a17c58422e8bbe77a657b8061d2b" name="netxtreme2-kmp-default" arch="x86_64">
    <version epoch="0" ver="7.14.63_k4.4.73_5" rel="1.sles12sp3"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="4f9d3bd6f19fb050122e4ded4c684dde9f142772bb2de10071e747782e9ce944" name="netxtreme2_bl-kmp-default" arch="x86_64">
    <version epoch="0" ver="7.14.63_k4.12.14_195" rel="1.sles15sp1"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="82b6e3bcf0dac95450588c5ea7dea3b256f36ae94294235982f592197efa7344" name="netxtreme2_bl-kmp-default" arch="x86_64">
    <version epoch="0" ver="7.14.63_k4.12.14_23" rel="1.sles15sp0"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="75cacbffe04965be7d2e6e8e53720987f31a061b97ded118dae2763884a4e84b" name="netxtreme2_bl-kmp-default" arch="x86_64">
    <version epoch="0" ver="7.14.63_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="13e277a031d63c08c5b86d0ee83cf95b17d233bff1908870deee56fb65310b38" name="netxtreme2_bl-kmp-default" arch="x86_64">
    <version epoch="0" ver="7.14.63_k4.4.73_5" rel="1.sles12sp3"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="3143850c012403086c3a7eafa07a4a35305aa733d50abd15c627ceb9a16a0984" name="qlgc-fastlinq-kmp-default" arch="x86_64">
    <version epoch="0" ver="8.42.8.0_k4.12.14_195" rel="1.sles15sp1"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="27a8c07d2e097d79c08f7b24d9506d2675b31faed20219f948c23f5d49c91aae" name="qlgc-fastlinq-kmp-default" arch="x86_64">
    <version epoch="0" ver="8.42.8.0_k4.12.14_23" rel="1.sles15sp0"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="94991dc284e6722ff847e21b43526c9d80fe776cea6c67a5d012faa19529e4aa" name="qlgc-fastlinq-kmp-default" arch="x86_64">
    <version epoch="0" ver="8.42.8.0_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="e90f6415828eb718644474b7bcb6e52b3bcd537996964359afff015ccc41b9ab" name="qlgc-fastlinq-kmp-default" arch="x86_64">
    <version epoch="0" ver="8.42.8.0_k4.4.73_5" rel="1.sles12sp3"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="36c49b94a1712ded08167b72dde0c270295d105d875a6f70dc0912faa17b4088" name="qlgc-open-iscsi" arch="x86_64">
    <version epoch="0" ver="2.0_873.113.rhel7u6" rel="1"/>
  </package>
  <package pkgid="89eab6727355f02bc8bce6e5c58566941a79fed09dacccc5d718659f61839e63" name="qlgc-open-iscsi" arch="x86_64">
    <version epoch="0" ver="2.0_873.113.rhel7u7" rel="1"/>
  </package>
  <package pkgid="eb37d326b6f7e8e2835da076d7bc09d3b12637c14bb29ecf1c00eca844566da4" name="qlgc-open-iscsi" arch="x86_64">
    <version epoch="0" ver="2.0_873.113.rhel8u0" rel="1"/>
  </package>
  <package pkgid="e018c93d82ed34485958b3ebbfb847e6bf17a1ec3af61b8da54d08d92f50e43a" name="qlgc-open-iscsi" arch="x86_64">
    <version epoch="0" ver="2.0_873.113.sles12sp3" rel="1"/>
  </package>
  <package pkgid="03ce1b61e0525b6bc292f4d4bdd40266cb86922b3cd995ec42665af08920dd72" name="qlgc-open-iscsi" arch="x86_64">
    <version epoch="0" ver="2.0_873.113.sles12sp4" rel="1"/>
  </package>
  <package pkgid="7bfafac815ac9400156379989ace22458f72f8b3cca0aaeb1a635b33dffbc60d" name="qlgc-open-iscsi" arch="x86_64">
    <version epoch="0" ver="2.0_873.113.sles15sp0" rel="1"/>
  </package>
  <package pkgid="b356000612ddc44dff8f09a1e7b034d77e43c28ba59f96b8861a74b011239e3e" name="qlgc-open-iscsi" arch="x86_64">
    <version epoch="0" ver="2.0_873.113.sles15sp1" rel="1"/>
  </package>
  <package pkgid="fc763729efb2a42ba0a88b67ec6f8e526f2c563bb83a6f99dd875d95f3a7e6ca" name="qlgc-qla2xxx-kmp-default" arch="x86_64">
    <version epoch="0" ver="10.01.00.52.12.4_k1_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.01.00.52.12.4-k1-1" date="1567166400">- 10.01.00.49.xx.y-k1 QT 06/24/2019
- qla2xxx: Fix unbound sleep in fcport delete path.
- qla2xxx: Fix hang in fcport delete path.
- qla2xxx: Fix kernel crash after disconnecting NVMe devices.
- qla2xxx: move IO flush to the front of NVME rport unregistration
- qla2xxx: migrate srb-&gt;ref_count to cmd_kref
- qla2xxx: fix potential multiple queue_work for nvme ls completion
- qla2xxx: Wrong reference count field usage
- qla2xxx: update: optimize NPIV tear down process.
- qla2xxx: Use proper bit position when reading dual FCP-NVMe priority
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI

- 10.01.00.48.xx.y-k1 HM 06/01/2019
- qla2xxx: update: fix premature timer expiration

- 10.01.00.47.xx.y-k1 HM 05/31/2019
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: Use common update-firmware-options routine for ISP27xx+.
- qla2xxx: Fix failed NVME port discovery after a short device port loss.
- Revert "qla2xxx: Use chip to blink laser for switch timeout"
- Revert "qla2xxx: update: Use chip to blink laser for switch timeout"
- qla2xxx: Correct error handling during initialization failures.
- qla2xxx: add error handling for PLOGI ELS passthrough
- qla2xxx: update: Use chip to blink laser for switch timeout
- qla2xxx: retry Fabric Scan on IOCB queue full.
- qla2xxx: fix premature timer expiration
- qla2xxx: UPDATE: fix login state machine freeze
- qla2xxx: Dual FCP-NVMe target port support

- 10.01.00.46.xx.y-k1 HM 05/31/2019
- qla2xxx: Fix compile failure for the DIF changes

- 10.01.00.45.xx.y-k1 HM 05/15/2019
- qla2xxx: Fix compile failure for the DIF changes

- 10.01.00.45.xx.y-k1 HM 05/13/2019
- qla2xxx: Add Vendor specific DIF for qla2xxx_mqueuecommand()
- qla2xxx: update: Implement LUN level DIF for 3PAR array

- 10.01.00.44.xx.y-k1 HM 05/06/2019
- qla2xxx: Add cleanup for PCI EEH recovery
- qla2xxx: Fix Crash due to NULL pointer access in qla2x00_sysfs_read_optrom()
- qla2xxx: update: Fix DMA error when the DIF sg buffer crosses 4GB boundary
- qla2xxx: reject eh_xxx request
- qla2xxx: do command completion on abort timeout
- qla2xxx: Use chip to blink laser for switch timeout
- qla2xxx: fix recursive dead lock
- qla2xxx: optimize NPIV tear down process.

- 10.01.00.43.xx.y-k1 HM 04/05/2019
- qla2xxx: Add support for ISP2089
- qla2xxx: remove FW dump on LOOP init error.

- 10.01.00.42.xx.y-k1 HM 03/27/2019
- qla2xxx: fix potential dma_unmap leak
- qla2xxx: fix different size dma alloc and unmap
- qla2xxx: fix over index of qpair array.
- qla2xxx: fix premature mem access.
- qla2xxx: fix nvme device discovery
- qla2xxx: fix abort timeout race condition.
- qla2xxx: fix NVME LS cmd timeout race condition 2/2.
- qla2xxx: fix NVME cmd timeout race condition 1/2.
- qla2xxx: Remove defer flag to indicate immeadiate port loss
- qla2xxx: Further limit FLASH region write access from SYSFS.
- qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines.

- 10.01.00.41.xx.y-k1 HM 03/13/2019
- qla2xxx: Silence log messages from Autoconnet script
- Revert "qla2xxx: Fix for the null pointer crash."

- 10.01.00.40.xx.y-k1 HM 03/11/2019
- qla2xxx: fix FW resource print error.
- qla2xxx: Fix RHBA command time out on link reset.

- 10.01.00.39.xx.y-k1 HM 03/06/2019
- qla2xxx: Fix driver unload when FC-NVMe LUNs are connected
- qla2xxx: Cleanup redundant qla2x00_abort_all_cmds during unload
- qla2xxx: Set remote port devloss timeout to 0
- qla2xxx: update: P2P issue with initiator and target port domains being different

- 10.01.00.38.xx.y-k1 HM 02/27/2019
- scsi: qla2xxx: Delete session for nport id change
- qla2xxx: fix N2N link up hang.
- qla2xxx: P2P issue with initiator and target port domains being different
- qla2xxx: Cleanup unused functions.
- qla2xxx: allow irqbalance control in non-MQ mode
- qla2xxx: Correct fcport flags handling.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: Update fcport disc_state only if we could allocate mem.
- qla2xxx: Add a shadow variable to hold disc_state history of fcport
- qla2xxx: v3: fix corrupt fw dump. 2/2
- qla2xxx: v3: fix corrupt fw dump. 1/2

- 10.01.00.37.xx.y-k1 HM 02/01/2019
- qla2xxx: Fix for the null pointer crash.

- 10.01.00.36.xx.y-k1 HM 01/31/2019
- qla2xxx: Move disabling T10 DIF feature ealry in probe
- qla2xxx: fix fabric scan hang
- qla2xxx: Change abort wait_loop from msleep to wait_event_timeout.
- qla2xxx: Track release of different command resources on completion.
- qla2xxx: Increase the max_sgl_segments to 1024(max supported) to support larger IO size.
- qla2xxx: Fix incorrect SFUB length used for Secure Flash Update MB Cmd
- qla2xxx: fix Nport ID display value.
- qla2xxx: Use correct pointer when calculating FLT checksum
- qla2xxx: Added support for MPI and PEP regions for 28XX secure flash update.
- qla2xxx: v2: Fix N2N link reset
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxx: Reset the FCF_ASYNC_SENT and FCF_ASYNC_ACTIVE flag after processing GPSC command.
- qla2xxx: Set the qpair in SRB to NULL when SRB is released.
- qla2xxx: Set the SCSI command result before calling the command done.
- qla2xxx: Use complete switch scan for RSCN events
- qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware
- qla2xxx: prevent multiple active discovery commands per session
- scsi: qla2xxx: Delete session for nport id change

- 10.01.00.34.xx.y-k1 HM 12/17/2018
- extras: Clean up build script for FC-NVMe install directive
- qla2xxx: Add fix for N2N topology.
- qla2xxx: Secure flash update support for ISP28XX.
- qla2xxx: Restore WWPN of Physical Port for fabric configuration only for loop down.

- 10.01.00.33.xx.y-k1 HM 12/10/2018
- extras: Silence diff related to nvme scripts with driver install script

- 10.01.00.32.xx.y-k1 HM 12/07/2018
- extras: update FC-NVMe boot script to use single TRADDR

- 10.01.00.31.xx.y-k1 HM 12/04/2018
SLES15, SLES12 SP4
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF

- 10.01.00.30.xx.y-k1 SC 11/28/2018
- qla2xxx: Fix for call trace being seen on reboot
- Revert "qla2xxx: unable to discover NVME target."

- 10.01.00.29.xx.y-k1 HM 11/21/2018
- qla2xxx: Look for updated FC-NVME enable BIT to enable FC-NVME

- 10.01.00.28.xx.y-k1 HM 11/21/2018
- qla2xxx: Fix for call trace being seen on reboot

- 10.01.00.27.xx.y-k1 HM 11/19/2018
- qla2xxx: Fix issue reading primary region for ISP27xx/28xx
- qla2xxx: Remove hardcoded OS value for SPECTER flags
- qla2xxx: fix BUS Reset
- qla2xxx: Correctly retrieve and interpret active flash regions for 27XX/28XX

- 10.01.00.26.xx.x-k1 HM 11/05/2018
RHEL7.6, SLES12.4, SLES15
- qla2xxx: Demote log message 0x3079 to ql_dbg_io.
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF
- qla2xxx: Demote log message 0x3079 to ql_dbg_io.
- qla2xxx: Snoop Inquiry response spanning multiple scatter/gather elements.
- qla2xxx: Track if INQ was sent, and send INQ to all luns.
- qla2xxx: Reset the PROT bit in the cdb.
- qla2xxx: Make fcport a pointer in qlt_free_session_done().
- qla2xxx: Implement LUN level DIF for 3PAR array.
- qla2xxx: T10-DIF: Fix ref tag errors reported for CAW command.
- qla2xxx: Disable standard DIF for arrays advertising proprietary DIF.
- qla2xxx: Reset PROTECT bit only in standard INQUIRY response.
- qla2xxx: Check if the INQ response buffer is &gt; 170 (instead of &gt;=).
- qla2xxx: Fix invalid offset reference of inquiry response data.
- qla2xxx: Correct modinfo text for ql2xenablehba_err_chk.
- qla2xxx: Fix modinfo text for ql2xenabledif and ql2xenabledif_tgt.
- qla2xxx: set ql2xenabledif_tgt enabled by default.
- qla2xxx: Handle INQ data changed check condition.
- qla2xxx: Parameterize ql2xenabledif_tgt (defaulted to zero).
- qla2xxx: Unparameterize ql2xenabledif_tgt (leave as global variable zeroed).
- qla2xxx: Fix for issue where the scsi status was getting overwritten.
- qla2xxx: Fail module load on user config errors.
- qla2xxx: Check for success of INQ response before parsing.
- qla2xxx: Check for INQ response validity before parsing the response.
- qla2xxx: Control vendor T10 DIF via ql2xenabledif_tgt module parameter.
- qla2xxx: Mark DIF errors from target as re-tryable errors.
- qla2xxx: Remove extraneous debug messages.
- qla2xxx: Mark DIF errors from target as re-tryable errors.
- qla2xxx: Do not turn off T10 DIF on a port reset.
- qla2xxx: Add routines to get LBA from the SCSI CDB.
- qla2xxx: Enable T10 DIF for reads as well.
- qla2xxx: Enable SCSI T10 DIF registration during driver probe.
- qla2xxx: Initial check-in for vendor T10 DIF.


- 10.01.00.26.xx.x-k HM 11/05/2018
- qla2xxx: fix stale mem access on unload. v2
- Revert "qla2xxx: fix stale mem access on unload."
- extras: Add capability to start system service
- qla2xxx: fix stale mem access on unload.
- qla2xxx: reduce duplicate code.
- qla2xxx: Handle the fail case when fail to allocate memory for CT req and rsp.
- qla2xxx: Change SRB allocation flag to ATOMIC to avoid sleeping in IRQ context.

- 10.01.00.25.xx.x-k HM 10/20/2018
- extras: Updated Build script for FC-NVMe Discovery
- extras: Add Auto-connect scripts for FC-NVMe
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect
- qla2xxx: Fix unload when NVMe devices are configured
- qla2xxx: performance enhancement for ISP 28XX Target mode.
- qla2xxx: tweak error code for bsg_request.
- qla2xxx: reject garble setting for speed and qlini_mode
- qla2xxx: performance enhancement for nvme
- qla2xxx: Send Marker for each QPair.
- qla2xxx: move marker request behind qpair

- 10.01.00.24.xx.x-k HM 10/15/2018
- qla2xxx: Correctly report max/min supported speeds for Mach adapter
- qla2xxx: Fix flash pri/sec image selection bug
- qla2xxx: Add 28xx flash primary/secondary refreshing
- qla2xxx: Add 28xx flash primary/secondary status/image mechanism
- qla2xxx: Fix Use after free case while issuing Async TM command
- qla2xxx: no MB IOCB during chip down
- qla2xxx: Fix message to indicated Vectors used by driver
- scsi: qla2xxx: don't allow negative thresholds
- scsi: qla2xxx: Fix comment in MODULE_PARM_DESC in qla2xxx
- scsi: qla2xxx: Remove set but not used variable 'ptr_dma'
- scsi: qla2xxx: fix typo "CT-PASSTRHU" -&gt; "CT-PASSTHRU"
- qla2xxx: move error message behind error case.
- scsi: qla2xxx: Add debug knob for user control workload

- 10.01.00.23.xx.x-k JC 9/29/2018
RHEL7.6, SLES12.4, SLES15
- Fixed build issue.

- 10.01.00.22.xx.x-k JC 9/25/2018
RHEL7.6, SLES12.4, SLES15
- qla2xxx: aggregated compile error fix ups.
- qla2xxx: fix duplicate switch DB entries.
- Revert "qla2xxx: fix duplicate switch's Nport ID entries."
- qla2xxx: unable to discover NVME target.
- qla2xxx: Move debug log messages which dereference SRB structure before issuing the command to firmware.
- qla2xxx: Fix for double free of SRB structure used in Async switch query commands.
- qla2xxx: fix double increment of switch scan retry count.
- qla2xxx: fix duplicate switch's Nport ID entries.
- qla2xxx: Schedule worker to process response queue
- Revert "qla2xxx: Fix process response queue for ISP26XX and above"
- qla2xxx: Enable Target mode for ISP28XX
- qla2xxx: remove debug trace
- qla2xxx: Do not set dev_loss_tmo while unregistering remote nvme port.
- qla2xxx: Initialize atio request queue length.
- qla2xxx: fix command premature free.
- qla2xxx: Reject bsg request if chip is down.
- qla2xxx: shutdown chip if reset fail
- qla2xxx: fix stuck session in PLOGI state
- qla2xxx: fix early srb free on abort
- qla2xxx: Add mode control for each physical port.
- qla2xxx: fix cleanup race condition
- qla2xxx: fix dropped srb resource.
- qla2xxx: fix port speed display on chip reset
- qla2xxx: fix recursive mailbox timeout
- qla2xxx: Check for Register disconnect, during adapter shutdown process.

- 10.01.00.21.xx.x-k JC 8/21/2018
RHEL7.6, SLES12.4, SLES15
- Revert "qla2xxx: send nvme disconnect message to udev"
- Revert "qla2xxx_udev: nvme disconnect"
- qla2xxx: fix nvme session hang on unload

- 10.01.00.20.xx.x-k JC 8/9/2018
RHEL7.5, SLES12.3, SLES15
- qla2xxx: Added retpoline support.
- qla2xxx: Fixed module parameter for ql2xnvmeenable
- extras: Fix qlssen.sh build initrd for SLES15.
- extras: Fix udev bash command lines to use $PATH
- qla2xxx: Added file Module.supported.
RHEL7.5
- scsi: qla2xxx: fix MSI-X vector affinity

- 10.01.00.19.xx.x-k JC 8/6/2018
RHEL7.5, SLES12.3, SLES15
- extras: Fix usage of find in build.sh
- qla2xxx: Fix for FC-NVMe discovery for NPIV port
- qla2xxx: Set FC-NVMe feature to disabled as default
- qla2xxx: fix tape device re-connect

- 10.01.00.18.xx.x-k JC 7/26/2018
RHEL7.5, SLES12.3, SLES15
- qla2xxx: Return error when TM returns an error from firmware
- qla2xxx: move abort code behind qpair
- qla2xxx: extend abort timeout value
- qla2xxx: fix srb's ref_count get race condition
- qla2xxx: Fix memory leak for allocating abort IOCB. v2
- qla2xxx: Enable FC-NVME on NPIV ports
- qla2xxx: Fix NPIV handling for FC-NVMe
- qla2xxx: use correct vp_idx for NPIV
- qla2xxx: Fix vha access for FC-NVMe
- qla2xxx: Fix erroneous session deletion
- qla2xxx: Update: Fix NPORT ID display for N2N Direct connect
- qla2xxx: back port IS_SW_RESV_ADDR

- 10.01.00.17.07.5-k JC 7/26/2018
- qla2xxx: Add case for 28xx transfer rate.
- qla2xxx: Correct ISP filter for invalid SFP.
- qla2xxx: Add signature for 28xx flash image.
- qla2xxx: Include 28xx in abort isp cleanup.
- qla2xxx: Fix flash/nvram addressing.
- Revert "qla2xxx: Fix memory leak for allocating abort IOCB"

- 10.01.00.16.07.5-k JC 7/11/2018
- qla2xxx: Fix memory leak for allocating abort IOCB
- qla2xxx: Fix MBX failure during driver unload for FCoE adapter
- qla2xxx: silent warning in freeirq
- qla2xxx_udev: nvme disconnect
- qla2xxx: send nvme disconnect message to udev
- qla2xxx: on session delete return nvme cmd
- qla2xxx: fix N2N inifinite retry loop
- qla2xxx: Remove stale ADISC_DONE event
- qla2xxx: Shutdown Chip on unload.
- qla2xxx: back port fw_started flag from upstream
- qla2xxx: wait for session deletion done for npiv
- qla2xxx: no isp recovery on unload
- qla2xxx: fix uninit list head (sp-&gt;elem)

- 10.01.00.15.07.5-k JC 6/25/2018
- qla2xxx: Fix NPORT ID display for N2N Direct connect

- 10.01.00.14.07.5-k HM 6/24/2018
- qla2xxx: Fix spinlock resuctsion in qlt_reset()
- qla2xxx: Fix process response queue for ISP26XX and above
- qla2xxx: Fix NULL pointer derefrence for fcport search
- qla2xxx: Fix kernel crash due to late workqueue allocation
- qla2xxx: Alow nvme underrun to be handled transport.
- qla2xxx: Fix inconsistent DMA mem alloc/free
- qla2xxx: Fix Remote port registration
- qla2xxx: Remove Stale code from update_fw_options() settings

- 10.01.00.12.07.5-k HM 6/15/2018
- qla2xxx: Retry Loop resync when req/rsp is not setup
- qla2xxx: Fix NVMe Discovery
- qla2xxx: Fix SF_SCANNING flag for async_gnnft
- qla2xxx: Fix login_retry count
- qla2xxx: Update:qla2xxx: move command alloc to tcm_qla2xxx
- qla2xxx: move command alloc to tcm_qla2xxx
- qla2xxx: Fix double free of sp
- qla2xxx: assign NULL to dpc_thread before unloading to prevent crash
- qla2xxx: Fix crash for get_qpair()
- qla2xxx: Remove extra lock to reduce contention
- qla2xxx: fix sp-&gt;vha assignment problem
- qla2xxx: Reduce holding sess_lock to prevent CPU lock-up
- qla2xxx: Move qla2x00_start_sp behind qpair
- qla2xxx: Move {get|rel}_sp to base_qpair struct
- qla2xxx: Updated: Zio6 interrupt threashold

- 10.01.00.11.07.5-k HM 6/07/2018
- qla2xxx: zio6 interrupt threshold
- qla2xxx: UPDATE: serialize user space mailbox access.
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: fix out of order Termination and ABTS Resp
- qla2xxx: fix missing mutex_unlock
- qla2xxx: remove unneccessary byte swap
- scsi: qla2xxx: Fix incorrect handle for abort IOCB
- scsi: qla2xxx: Fix queue ID for async abort with Multiqueue
- qla2xxx: add detection of ABTS hang
- qla2xxx: fix ABTS response completion
- qla2xxx: serialize user space mailbox access.
- qla2xxx: allow speed set before chip is on
- qla2xxx: Tweak debug info for invalid RX_ID
- qla2xxx: fix deadlock between atio &amp; hw lock
- qla2xxx: remove redundant call to mark port lost
- qla2xxx: fix double Rport
- qla2xxx: serialize mailbox call.
- qla2xxx: fix erroneous debug log.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add support for setting port speed
- qla2xxx: holding off chip reset until target mode is enabled
- qla2xxx: Terminate Plogi/PRLI if WWN is 0
- qla2xxx: fix deadlock between qla &amp; target core drivers
- qla2xxx: Fix iIDMA error
- qla2xxx: Remove all rports if fabric scan retry fails
- qla2xxx: Force fw cleanup on ADISC error
- qla2xxx: Turn off IOCB timeout timer on IOCB completion
- qla2xxx: Decrement login retry count for only plogi
- qla2xxx: Move rport registration out of internal work_list
- qla2xxx: Remove redundant check for fcport deletion
- qla2xxx: Update rscn_rcvd field to more meaningful scan_needed
- qla2xxx: Use correct qpair for abort and cmd
- extras: Fixed find syntax in build.sh
- qla2xxx: Fix race between switch cmd completion and timeout
- qla2xxx: Flush mailbox commands on chip reset
- qla2xxx: Fix unintended Logout
- qla2xxx: Fix session state stuck in Get Port DB
- qla2xxx: Fix redundant fc_rport registration
- qla2xxx: Silent erroneous message
- qla2xxx: Prevent SysFS access when chip is down
- qla2xxx: Add longer window for Chip reset
- qla2xxx: Fix login retry count
- qla2xxx: Fix setting lower transfer speed if GPSC fails
- scsi: qla2xxx: Fix TMF and Multi-Queue config

- 10.01.00.10.07.5-k HM 6/05/2018
- qla2xxx: fix merge error
- qla2xxx: migrate NVME N2N handling into state machine
- qla2xxx: save frame payload size
- qla2xxx: fix N2N link re-connect

- 10.01.00.09.xx.y-k JC 5/24/2018
- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq
- scsi: qla2xxx: Remove stale debug value for login_retry flag
- scsi: qla2xxx: Use predefined get_datalen_for_atio() inline function
- scsi: qla2xxx: Fix Inquiry command being dropped in Target mode
- scsi: qla2xxx: Move GPSC and GFPNID out of session management
- scsi: qla2xxx: Reduce redundant ADISC command for RSCNs
- scsi: qla2xxx: Delete session for nport id change
- scsi: qla2xxx: Fix Rport and session state getting out of sync
- scsi: qla2xxx: Fix sending ADISC command for login
- scsi: qla2xxx: Correct setting of SAM_STAT_CHECK_CONDITION
- scsi: qla2xxx: correctly shift host byte
- scsi: qla2xxx: Fix race condition between iocb timeout and initialisation
- scsi: qla2xxx: Avoid double completion of abort command
- scsi: qla2xxx: Fix small memory leak in qla2x00_probe_one on probe failure
- scsi: qla2xxx: fx00 copypaste typo
- scsi: qla2xxx: fix error message on &lt;qla2400
- scsi: qla2xxx: Fix Async GPN_FT for FCP and FC-NVMe scan
- scsi: qla2xxx: fix spelling mistake: "existant" -&gt; "existent"
- scsi: qla2xxx: Use dma_pool_zalloc()
- scsi: qla2xxx: Remove unused symbols
- scsi: qla2xxx: Use %p for printing pointers
- scsi: qla2xxx: Remove FC_NO_LOOP_ID for FCP and FC-NVMe Discovery
- scsi: qla2xxx: Fix crashes in qla2x00_probe_one on probe failure
- scsi: qla2xxx: Fix FC-NVMe LUN discovery
- scsi: qla2xxx: ensure async flags are reset correctly
- scsi: qla2xxx: do not check login_state if no loop id is assigned
- scsi: qla2xxx: Fixup locking for session deletion
- scsi: qla2xxx: Fix NULL pointer crash due to active timer for ABTS
- scsi: qla2xxx: Fix double free bug after firmware timeout
- scsi: qla2xxx: Fix a locking imbalance in qlt_24xx_handle_els()
- scsi: qla2xxx: Avoid triggering undefined behavior in qla2x00_mbx_completion()
- scsi: qla2xxx: Add XCB counters to debugfs
- scsi: qla2xxx: Fix warning during port_name debug print
- scsi: qla2xxx: Fix warning in qla2x00_async_iocb_timeout()
- scsi: qla2xxx: Fix recursion while sending terminate exchange
- scsi: qla2xxx: remove redundant assignment of d
- scsi: qla2xxx: Use zeroing allocator rather than allocator/memset
- scsi: qla2xxx: Serialize session deletion by using work_lock
- scsi: qla2xxx: Prevent relogin trigger from sending too many commands
- scsi: qla2xxx: Prevent multiple active discovery commands per session
- scsi: qla2xxx: Add retry limit for fabric scan logic
- scsi: qla2xxx: Delay loop id allocation at login
- scsi: qla2xxx: Increase verbosity of debug messages logged
- scsi: qla2xxx: Allow relogin and session creation after reset
- scsi: qla2xxx: Add ability to use GPNFT/GNNFT for RSCN handling
- scsi: qla2xxx: Properly extract ADISC error codes
- scsi: qla2xxx: Fix GPNFT/GNNFT error handling
- scsi: qla2xxx: Remove session creation redundant code
- scsi: qla2xxx: Migrate switch registration commands away from mailbox interface
- scsi: qla2xxx: Fix login state machine freeze
- scsi: qla2xxx: Reduce trace noise for Async Events
- scsi: qla2xxx: Reduce the use of terminate exchange
- scsi: qla2xxx: Add lock protection around host lookup
- scsi: qla2xxx: Add switch command to simplify fabric discovery
- scsi: qla2xxx: Use known NPort ID for Management Server login
- scsi: qla2xxx: Fix session cleanup for N2N
- scsi: qla2xxx: Tweak resource count dump
- scsi: qla2xxx: Allow target mode to accept PRLI in dual mode
- scsi: qla2xxx: Don't call dma_free_coherent with IRQ disabled.
- scsi: qla2xxx: Add ability to send PRLO
- scsi: qla2xxx: Add option for use reserve exch for ELS
- scsi: qla2xxx: Use shadow register for ISP27XX
- scsi: qla2xxx: Enable ATIO interrupt handshake for ISP27XX
- scsi: qla2xxx: Move work element processing out of DPC thread
- scsi: qla2xxx: Replace GPDB with async ADISC command
- scsi: qla2xxx: Relogin to target port on a cable swap
- scsi: qla2xxx: Chip reset uses wrong lock during IO flush.
- scsi: qla2xxx: Add boundary checks for exchanges to be offloaded
- scsi: qla2xxx: Use chip reset to bring down laser on unload.
- scsi: qla2xxx: Use IOCB path to submit Control VP MBX command
- scsi: qla2xxx: Fix smatch warning in qla25xx_delete_{rsp|req}_que
- scsi: qla2xxx: remove duplicate includes
- scsi: qla2xxx: Fix memory leak in dual/target mode
- scsi: qla2xxx: Fix system crash in qlt_plogi_ack_unref
- scsi: qla2xxx: Clear loop id after delete
- scsi: qla2xxx: Fix scan state field for fcport
- scsi: qla2xxx: Replace fcport alloc with qla2x00_alloc_fcport
- scsi: qla2xxx: Fix PRLI state check
- scsi: qla2xxx: Fix NPIV host cleanup in target mode
- scsi: qla2xxx: Move session delete to driver work queue
- scsi: qla2xxx: Fix gpnid error processing

- 10.01.00.08.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Fix NULL pointer crash with FC-NVMe LUNs during unload.

- 10.01.00.07.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Add fix to free dma memory.
- qla2xxx: Mask off Scope bits in retry delay.

- 10.01.00.06.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Remove module parameter ql2xqos_priority_test.
- qla2xxx: Add ability to process multiple CT-PT SGE's.

- 10.01.00.05.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Simplification of register address used in qla_tmpl.c.
- qla2xxx: Correction and improvement to fwdt processing.
- qla2xxx: Add correction to RDP FW support logic.
- qla2xxx: serialize sess free
- qla2xxx: serialize session deletion
- qla2xxx: prevent re_login trigger from sending too many commands
- qla2xxx: prevent multiple active discovery commands per session
- qla2xxx: Add log message for bbcr.
- qla2xxx: Remove alias names for QoS module parameters.

- 10.01.00.04.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Correction to non-existant fabric name.
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add qos fcport test mode.
- qla2xxx: Optimized logs for searching qos fcport table.
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Correction to function qla26xx_read_qos_fcport_table().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Allow 27xx and 28xx to do bidirectional commands.
- qla2xxx: Add RDP/ABTS deferred processing for vp's.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Rename QoS table row type and cleanup log prints.
- qla2xxx: Optimize reading of QoS fcport table.
- qla2xxx: Fixup/cleanup of QoS table index code.
- qla2xxx: Minor cleanup of flash calls reoganization.
- qla2xxx: Optimize flash register routines.
- qla2xxx: Fixup flash register routines.
- qla2xxx: Add debug prints to write flash routine.
- qla2xxx: Simplify flash slow write log messages.
- qla2xxx: Simplify NPIV create log messages.
- qla2xxx: Simplify D-Port Diagnostics log messages.
- qla2xxx: Cleanup log message for fwdt allocate.
- qla2xxx: Add non-verbose SFP detail print.
- qla2xxx: Quieten FEC=enabled message.
- qla2xxx: Use interrupt pin number for port number.

- 10.01.00.03.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Correction to EFT selection.
- qla2xxx: Correction to flash write routine.
- qla2xxx: Add correction to FW image selection.

- 10.01.00.02.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Convert FLT flash reads to register method.
- qla2xxx: Undo the replacements to -&gt;optrom_read() calls.
- qla2xxx: Flash reading routines cleanups.
- qla2xxx: Make flash write avoid register banging.

- 10.01.00.01.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Use registers for reading unaligned flash offset.
- qla2xxx: Fix PCI header and data struct addresses.
- qla2xxx: Fix and cleanup ROM code version string reading.
- qla2xxx: Corrections to flt-&gt;region addresses.
- qla2xxx: Add debug buffer dump for INITFW MBC.
- qla2xxx: Add debug logs for QoS sorting/searching.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: Add conditionals to avoid fcport QoS when it is not enabled.
- qla2xxx: Fix mis-pointing buffer in qla24xx_load_risc_flash().
- qla2xxx: Provide Makefile CPP define for MoB testing.
- qla2xxx: Fixup flash region code struct.
- qla2xxx: Fixup msix/msi vector selection.

- 10.01.00.00.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Add dump buffer print when nvram checksum fails.
- qla2xxx: Refactor character signature compares into memcmp's.
- qla2xxx: Replace 0x%x with %#x in all format strings.
- qla2xxx: Normalize all flash reads to always use the dump ram mbc.
- qla2xxx: Flash image validation cleanups.
- qla2xxx: Add error test after dma_map_single.
- qla2xxx: Add support for ISP28XX.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Minor cleanup regarding device type.
- qla2xxx: Improve, correct, simplify fwdt endianess handling.
- qla2xxx: Use endian macros to assign dynamic fields in fwdump buffer.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add endianizers to 27xx firmware image validator.
- qla2xxx: Add new fwdt entry types.
- qla2xxx: Leave fwdt endianess alone.
- qla2xxx: Isolate test for valid firmware image.
- qla2xxx: Add support for multiple fwdump templates/segments.
- qla2xxx: Fix routine qla27xx_dump_mpi_ram().
- qla2xxx: Fix routine qla27xx_dump_ram().
- qla2xxx: Remove fwdt default template.

- 10.00.00.60.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: nvme features developed/added.</changelog>
  </package>
  <package pkgid="2b4ae08a9fc81db7a8e9e7a42b5367137397aca9f2d19ac925786063e8c8b403" name="qlgc-qla2xxx-kmp-default" arch="x86_64">
    <version epoch="0" ver="10.01.00.52.15.0_k1_k4.12.14_23" rel="1.sles15sp0"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.01.00.52.15.0-k1-1" date="1567166400">- 10.01.00.49.xx.y-k1 QT 06/24/2019
- qla2xxx: Fix unbound sleep in fcport delete path.
- qla2xxx: Fix hang in fcport delete path.
- qla2xxx: Fix kernel crash after disconnecting NVMe devices.
- qla2xxx: move IO flush to the front of NVME rport unregistration
- qla2xxx: migrate srb-&gt;ref_count to cmd_kref
- qla2xxx: fix potential multiple queue_work for nvme ls completion
- qla2xxx: Wrong reference count field usage
- qla2xxx: update: optimize NPIV tear down process.
- qla2xxx: Use proper bit position when reading dual FCP-NVMe priority
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI

- 10.01.00.48.xx.y-k1 HM 06/01/2019
- qla2xxx: update: fix premature timer expiration

- 10.01.00.47.xx.y-k1 HM 05/31/2019
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: Use common update-firmware-options routine for ISP27xx+.
- qla2xxx: Fix failed NVME port discovery after a short device port loss.
- Revert "qla2xxx: Use chip to blink laser for switch timeout"
- Revert "qla2xxx: update: Use chip to blink laser for switch timeout"
- qla2xxx: Correct error handling during initialization failures.
- qla2xxx: add error handling for PLOGI ELS passthrough
- qla2xxx: update: Use chip to blink laser for switch timeout
- qla2xxx: retry Fabric Scan on IOCB queue full.
- qla2xxx: fix premature timer expiration
- qla2xxx: UPDATE: fix login state machine freeze
- qla2xxx: Dual FCP-NVMe target port support

- 10.01.00.46.xx.y-k1 HM 05/31/2019
- qla2xxx: Fix compile failure for the DIF changes

- 10.01.00.45.xx.y-k1 HM 05/15/2019
- qla2xxx: Fix compile failure for the DIF changes

- 10.01.00.45.xx.y-k1 HM 05/13/2019
- qla2xxx: Add Vendor specific DIF for qla2xxx_mqueuecommand()
- qla2xxx: update: Implement LUN level DIF for 3PAR array

- 10.01.00.44.xx.y-k1 HM 05/06/2019
- qla2xxx: Add cleanup for PCI EEH recovery
- qla2xxx: Fix Crash due to NULL pointer access in qla2x00_sysfs_read_optrom()
- qla2xxx: update: Fix DMA error when the DIF sg buffer crosses 4GB boundary
- qla2xxx: reject eh_xxx request
- qla2xxx: do command completion on abort timeout
- qla2xxx: Use chip to blink laser for switch timeout
- qla2xxx: fix recursive dead lock
- qla2xxx: optimize NPIV tear down process.

- 10.01.00.43.xx.y-k1 HM 04/05/2019
- qla2xxx: Add support for ISP2089
- qla2xxx: remove FW dump on LOOP init error.

- 10.01.00.42.xx.y-k1 HM 03/27/2019
- qla2xxx: fix potential dma_unmap leak
- qla2xxx: fix different size dma alloc and unmap
- qla2xxx: fix over index of qpair array.
- qla2xxx: fix premature mem access.
- qla2xxx: fix nvme device discovery
- qla2xxx: fix abort timeout race condition.
- qla2xxx: fix NVME LS cmd timeout race condition 2/2.
- qla2xxx: fix NVME cmd timeout race condition 1/2.
- qla2xxx: Remove defer flag to indicate immeadiate port loss
- qla2xxx: Further limit FLASH region write access from SYSFS.
- qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines.

- 10.01.00.41.xx.y-k1 HM 03/13/2019
- qla2xxx: Silence log messages from Autoconnet script
- Revert "qla2xxx: Fix for the null pointer crash."

- 10.01.00.40.xx.y-k1 HM 03/11/2019
- qla2xxx: fix FW resource print error.
- qla2xxx: Fix RHBA command time out on link reset.

- 10.01.00.39.xx.y-k1 HM 03/06/2019
- qla2xxx: Fix driver unload when FC-NVMe LUNs are connected
- qla2xxx: Cleanup redundant qla2x00_abort_all_cmds during unload
- qla2xxx: Set remote port devloss timeout to 0
- qla2xxx: update: P2P issue with initiator and target port domains being different

- 10.01.00.38.xx.y-k1 HM 02/27/2019
- scsi: qla2xxx: Delete session for nport id change
- qla2xxx: fix N2N link up hang.
- qla2xxx: P2P issue with initiator and target port domains being different
- qla2xxx: Cleanup unused functions.
- qla2xxx: allow irqbalance control in non-MQ mode
- qla2xxx: Correct fcport flags handling.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: Update fcport disc_state only if we could allocate mem.
- qla2xxx: Add a shadow variable to hold disc_state history of fcport
- qla2xxx: v3: fix corrupt fw dump. 2/2
- qla2xxx: v3: fix corrupt fw dump. 1/2

- 10.01.00.37.xx.y-k1 HM 02/01/2019
- qla2xxx: Fix for the null pointer crash.

- 10.01.00.36.xx.y-k1 HM 01/31/2019
- qla2xxx: Move disabling T10 DIF feature ealry in probe
- qla2xxx: fix fabric scan hang
- qla2xxx: Change abort wait_loop from msleep to wait_event_timeout.
- qla2xxx: Track release of different command resources on completion.
- qla2xxx: Increase the max_sgl_segments to 1024(max supported) to support larger IO size.
- qla2xxx: Fix incorrect SFUB length used for Secure Flash Update MB Cmd
- qla2xxx: fix Nport ID display value.
- qla2xxx: Use correct pointer when calculating FLT checksum
- qla2xxx: Added support for MPI and PEP regions for 28XX secure flash update.
- qla2xxx: v2: Fix N2N link reset
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxx: Reset the FCF_ASYNC_SENT and FCF_ASYNC_ACTIVE flag after processing GPSC command.
- qla2xxx: Set the qpair in SRB to NULL when SRB is released.
- qla2xxx: Set the SCSI command result before calling the command done.
- qla2xxx: Use complete switch scan for RSCN events
- qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware
- qla2xxx: prevent multiple active discovery commands per session
- scsi: qla2xxx: Delete session for nport id change

- 10.01.00.34.xx.y-k1 HM 12/17/2018
- extras: Clean up build script for FC-NVMe install directive
- qla2xxx: Add fix for N2N topology.
- qla2xxx: Secure flash update support for ISP28XX.
- qla2xxx: Restore WWPN of Physical Port for fabric configuration only for loop down.

- 10.01.00.33.xx.y-k1 HM 12/10/2018
- extras: Silence diff related to nvme scripts with driver install script

- 10.01.00.32.xx.y-k1 HM 12/07/2018
- extras: update FC-NVMe boot script to use single TRADDR

- 10.01.00.31.xx.y-k1 HM 12/04/2018
SLES15, SLES12 SP4
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF

- 10.01.00.30.xx.y-k1 SC 11/28/2018
- qla2xxx: Fix for call trace being seen on reboot
- Revert "qla2xxx: unable to discover NVME target."

- 10.01.00.29.xx.y-k1 HM 11/21/2018
- qla2xxx: Look for updated FC-NVME enable BIT to enable FC-NVME

- 10.01.00.28.xx.y-k1 HM 11/21/2018
- qla2xxx: Fix for call trace being seen on reboot

- 10.01.00.27.xx.y-k1 HM 11/19/2018
- qla2xxx: Fix issue reading primary region for ISP27xx/28xx
- qla2xxx: Remove hardcoded OS value for SPECTER flags
- qla2xxx: fix BUS Reset
- qla2xxx: Correctly retrieve and interpret active flash regions for 27XX/28XX

- 10.01.00.26.xx.x-k1 HM 11/05/2018
RHEL7.6, SLES12.4, SLES15
- qla2xxx: Demote log message 0x3079 to ql_dbg_io.
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF
- qla2xxx: Demote log message 0x3079 to ql_dbg_io.
- qla2xxx: Snoop Inquiry response spanning multiple scatter/gather elements.
- qla2xxx: Track if INQ was sent, and send INQ to all luns.
- qla2xxx: Reset the PROT bit in the cdb.
- qla2xxx: Make fcport a pointer in qlt_free_session_done().
- qla2xxx: Implement LUN level DIF for 3PAR array.
- qla2xxx: T10-DIF: Fix ref tag errors reported for CAW command.
- qla2xxx: Disable standard DIF for arrays advertising proprietary DIF.
- qla2xxx: Reset PROTECT bit only in standard INQUIRY response.
- qla2xxx: Check if the INQ response buffer is &gt; 170 (instead of &gt;=).
- qla2xxx: Fix invalid offset reference of inquiry response data.
- qla2xxx: Correct modinfo text for ql2xenablehba_err_chk.
- qla2xxx: Fix modinfo text for ql2xenabledif and ql2xenabledif_tgt.
- qla2xxx: set ql2xenabledif_tgt enabled by default.
- qla2xxx: Handle INQ data changed check condition.
- qla2xxx: Parameterize ql2xenabledif_tgt (defaulted to zero).
- qla2xxx: Unparameterize ql2xenabledif_tgt (leave as global variable zeroed).
- qla2xxx: Fix for issue where the scsi status was getting overwritten.
- qla2xxx: Fail module load on user config errors.
- qla2xxx: Check for success of INQ response before parsing.
- qla2xxx: Check for INQ response validity before parsing the response.
- qla2xxx: Control vendor T10 DIF via ql2xenabledif_tgt module parameter.
- qla2xxx: Mark DIF errors from target as re-tryable errors.
- qla2xxx: Remove extraneous debug messages.
- qla2xxx: Mark DIF errors from target as re-tryable errors.
- qla2xxx: Do not turn off T10 DIF on a port reset.
- qla2xxx: Add routines to get LBA from the SCSI CDB.
- qla2xxx: Enable T10 DIF for reads as well.
- qla2xxx: Enable SCSI T10 DIF registration during driver probe.
- qla2xxx: Initial check-in for vendor T10 DIF.


- 10.01.00.26.xx.x-k HM 11/05/2018
- qla2xxx: fix stale mem access on unload. v2
- Revert "qla2xxx: fix stale mem access on unload."
- extras: Add capability to start system service
- qla2xxx: fix stale mem access on unload.
- qla2xxx: reduce duplicate code.
- qla2xxx: Handle the fail case when fail to allocate memory for CT req and rsp.
- qla2xxx: Change SRB allocation flag to ATOMIC to avoid sleeping in IRQ context.

- 10.01.00.25.xx.x-k HM 10/20/2018
- extras: Updated Build script for FC-NVMe Discovery
- extras: Add Auto-connect scripts for FC-NVMe
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect
- qla2xxx: Fix unload when NVMe devices are configured
- qla2xxx: performance enhancement for ISP 28XX Target mode.
- qla2xxx: tweak error code for bsg_request.
- qla2xxx: reject garble setting for speed and qlini_mode
- qla2xxx: performance enhancement for nvme
- qla2xxx: Send Marker for each QPair.
- qla2xxx: move marker request behind qpair

- 10.01.00.24.xx.x-k HM 10/15/2018
- qla2xxx: Correctly report max/min supported speeds for Mach adapter
- qla2xxx: Fix flash pri/sec image selection bug
- qla2xxx: Add 28xx flash primary/secondary refreshing
- qla2xxx: Add 28xx flash primary/secondary status/image mechanism
- qla2xxx: Fix Use after free case while issuing Async TM command
- qla2xxx: no MB IOCB during chip down
- qla2xxx: Fix message to indicated Vectors used by driver
- scsi: qla2xxx: don't allow negative thresholds
- scsi: qla2xxx: Fix comment in MODULE_PARM_DESC in qla2xxx
- scsi: qla2xxx: Remove set but not used variable 'ptr_dma'
- scsi: qla2xxx: fix typo "CT-PASSTRHU" -&gt; "CT-PASSTHRU"
- qla2xxx: move error message behind error case.
- scsi: qla2xxx: Add debug knob for user control workload

- 10.01.00.23.xx.x-k JC 9/29/2018
RHEL7.6, SLES12.4, SLES15
- Fixed build issue.

- 10.01.00.22.xx.x-k JC 9/25/2018
RHEL7.6, SLES12.4, SLES15
- qla2xxx: aggregated compile error fix ups.
- qla2xxx: fix duplicate switch DB entries.
- Revert "qla2xxx: fix duplicate switch's Nport ID entries."
- qla2xxx: unable to discover NVME target.
- qla2xxx: Move debug log messages which dereference SRB structure before issuing the command to firmware.
- qla2xxx: Fix for double free of SRB structure used in Async switch query commands.
- qla2xxx: fix double increment of switch scan retry count.
- qla2xxx: fix duplicate switch's Nport ID entries.
- qla2xxx: Schedule worker to process response queue
- Revert "qla2xxx: Fix process response queue for ISP26XX and above"
- qla2xxx: Enable Target mode for ISP28XX
- qla2xxx: remove debug trace
- qla2xxx: Do not set dev_loss_tmo while unregistering remote nvme port.
- qla2xxx: Initialize atio request queue length.
- qla2xxx: fix command premature free.
- qla2xxx: Reject bsg request if chip is down.
- qla2xxx: shutdown chip if reset fail
- qla2xxx: fix stuck session in PLOGI state
- qla2xxx: fix early srb free on abort
- qla2xxx: Add mode control for each physical port.
- qla2xxx: fix cleanup race condition
- qla2xxx: fix dropped srb resource.
- qla2xxx: fix port speed display on chip reset
- qla2xxx: fix recursive mailbox timeout
- qla2xxx: Check for Register disconnect, during adapter shutdown process.

- 10.01.00.21.xx.x-k JC 8/21/2018
RHEL7.6, SLES12.4, SLES15
- Revert "qla2xxx: send nvme disconnect message to udev"
- Revert "qla2xxx_udev: nvme disconnect"
- qla2xxx: fix nvme session hang on unload

- 10.01.00.20.xx.x-k JC 8/9/2018
RHEL7.5, SLES12.3, SLES15
- qla2xxx: Added retpoline support.
- qla2xxx: Fixed module parameter for ql2xnvmeenable
- extras: Fix qlssen.sh build initrd for SLES15.
- extras: Fix udev bash command lines to use $PATH
- qla2xxx: Added file Module.supported.
RHEL7.5
- scsi: qla2xxx: fix MSI-X vector affinity

- 10.01.00.19.xx.x-k JC 8/6/2018
RHEL7.5, SLES12.3, SLES15
- extras: Fix usage of find in build.sh
- qla2xxx: Fix for FC-NVMe discovery for NPIV port
- qla2xxx: Set FC-NVMe feature to disabled as default
- qla2xxx: fix tape device re-connect

- 10.01.00.18.xx.x-k JC 7/26/2018
RHEL7.5, SLES12.3, SLES15
- qla2xxx: Return error when TM returns an error from firmware
- qla2xxx: move abort code behind qpair
- qla2xxx: extend abort timeout value
- qla2xxx: fix srb's ref_count get race condition
- qla2xxx: Fix memory leak for allocating abort IOCB. v2
- qla2xxx: Enable FC-NVME on NPIV ports
- qla2xxx: Fix NPIV handling for FC-NVMe
- qla2xxx: use correct vp_idx for NPIV
- qla2xxx: Fix vha access for FC-NVMe
- qla2xxx: Fix erroneous session deletion
- qla2xxx: Update: Fix NPORT ID display for N2N Direct connect
- qla2xxx: back port IS_SW_RESV_ADDR

- 10.01.00.17.07.5-k JC 7/26/2018
- qla2xxx: Add case for 28xx transfer rate.
- qla2xxx: Correct ISP filter for invalid SFP.
- qla2xxx: Add signature for 28xx flash image.
- qla2xxx: Include 28xx in abort isp cleanup.
- qla2xxx: Fix flash/nvram addressing.
- Revert "qla2xxx: Fix memory leak for allocating abort IOCB"

- 10.01.00.16.07.5-k JC 7/11/2018
- qla2xxx: Fix memory leak for allocating abort IOCB
- qla2xxx: Fix MBX failure during driver unload for FCoE adapter
- qla2xxx: silent warning in freeirq
- qla2xxx_udev: nvme disconnect
- qla2xxx: send nvme disconnect message to udev
- qla2xxx: on session delete return nvme cmd
- qla2xxx: fix N2N inifinite retry loop
- qla2xxx: Remove stale ADISC_DONE event
- qla2xxx: Shutdown Chip on unload.
- qla2xxx: back port fw_started flag from upstream
- qla2xxx: wait for session deletion done for npiv
- qla2xxx: no isp recovery on unload
- qla2xxx: fix uninit list head (sp-&gt;elem)

- 10.01.00.15.07.5-k JC 6/25/2018
- qla2xxx: Fix NPORT ID display for N2N Direct connect

- 10.01.00.14.07.5-k HM 6/24/2018
- qla2xxx: Fix spinlock resuctsion in qlt_reset()
- qla2xxx: Fix process response queue for ISP26XX and above
- qla2xxx: Fix NULL pointer derefrence for fcport search
- qla2xxx: Fix kernel crash due to late workqueue allocation
- qla2xxx: Alow nvme underrun to be handled transport.
- qla2xxx: Fix inconsistent DMA mem alloc/free
- qla2xxx: Fix Remote port registration
- qla2xxx: Remove Stale code from update_fw_options() settings

- 10.01.00.12.07.5-k HM 6/15/2018
- qla2xxx: Retry Loop resync when req/rsp is not setup
- qla2xxx: Fix NVMe Discovery
- qla2xxx: Fix SF_SCANNING flag for async_gnnft
- qla2xxx: Fix login_retry count
- qla2xxx: Update:qla2xxx: move command alloc to tcm_qla2xxx
- qla2xxx: move command alloc to tcm_qla2xxx
- qla2xxx: Fix double free of sp
- qla2xxx: assign NULL to dpc_thread before unloading to prevent crash
- qla2xxx: Fix crash for get_qpair()
- qla2xxx: Remove extra lock to reduce contention
- qla2xxx: fix sp-&gt;vha assignment problem
- qla2xxx: Reduce holding sess_lock to prevent CPU lock-up
- qla2xxx: Move qla2x00_start_sp behind qpair
- qla2xxx: Move {get|rel}_sp to base_qpair struct
- qla2xxx: Updated: Zio6 interrupt threashold

- 10.01.00.11.07.5-k HM 6/07/2018
- qla2xxx: zio6 interrupt threshold
- qla2xxx: UPDATE: serialize user space mailbox access.
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: fix out of order Termination and ABTS Resp
- qla2xxx: fix missing mutex_unlock
- qla2xxx: remove unneccessary byte swap
- scsi: qla2xxx: Fix incorrect handle for abort IOCB
- scsi: qla2xxx: Fix queue ID for async abort with Multiqueue
- qla2xxx: add detection of ABTS hang
- qla2xxx: fix ABTS response completion
- qla2xxx: serialize user space mailbox access.
- qla2xxx: allow speed set before chip is on
- qla2xxx: Tweak debug info for invalid RX_ID
- qla2xxx: fix deadlock between atio &amp; hw lock
- qla2xxx: remove redundant call to mark port lost
- qla2xxx: fix double Rport
- qla2xxx: serialize mailbox call.
- qla2xxx: fix erroneous debug log.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add support for setting port speed
- qla2xxx: holding off chip reset until target mode is enabled
- qla2xxx: Terminate Plogi/PRLI if WWN is 0
- qla2xxx: fix deadlock between qla &amp; target core drivers
- qla2xxx: Fix iIDMA error
- qla2xxx: Remove all rports if fabric scan retry fails
- qla2xxx: Force fw cleanup on ADISC error
- qla2xxx: Turn off IOCB timeout timer on IOCB completion
- qla2xxx: Decrement login retry count for only plogi
- qla2xxx: Move rport registration out of internal work_list
- qla2xxx: Remove redundant check for fcport deletion
- qla2xxx: Update rscn_rcvd field to more meaningful scan_needed
- qla2xxx: Use correct qpair for abort and cmd
- extras: Fixed find syntax in build.sh
- qla2xxx: Fix race between switch cmd completion and timeout
- qla2xxx: Flush mailbox commands on chip reset
- qla2xxx: Fix unintended Logout
- qla2xxx: Fix session state stuck in Get Port DB
- qla2xxx: Fix redundant fc_rport registration
- qla2xxx: Silent erroneous message
- qla2xxx: Prevent SysFS access when chip is down
- qla2xxx: Add longer window for Chip reset
- qla2xxx: Fix login retry count
- qla2xxx: Fix setting lower transfer speed if GPSC fails
- scsi: qla2xxx: Fix TMF and Multi-Queue config

- 10.01.00.10.07.5-k HM 6/05/2018
- qla2xxx: fix merge error
- qla2xxx: migrate NVME N2N handling into state machine
- qla2xxx: save frame payload size
- qla2xxx: fix N2N link re-connect

- 10.01.00.09.xx.y-k JC 5/24/2018
- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq
- scsi: qla2xxx: Remove stale debug value for login_retry flag
- scsi: qla2xxx: Use predefined get_datalen_for_atio() inline function
- scsi: qla2xxx: Fix Inquiry command being dropped in Target mode
- scsi: qla2xxx: Move GPSC and GFPNID out of session management
- scsi: qla2xxx: Reduce redundant ADISC command for RSCNs
- scsi: qla2xxx: Delete session for nport id change
- scsi: qla2xxx: Fix Rport and session state getting out of sync
- scsi: qla2xxx: Fix sending ADISC command for login
- scsi: qla2xxx: Correct setting of SAM_STAT_CHECK_CONDITION
- scsi: qla2xxx: correctly shift host byte
- scsi: qla2xxx: Fix race condition between iocb timeout and initialisation
- scsi: qla2xxx: Avoid double completion of abort command
- scsi: qla2xxx: Fix small memory leak in qla2x00_probe_one on probe failure
- scsi: qla2xxx: fx00 copypaste typo
- scsi: qla2xxx: fix error message on &lt;qla2400
- scsi: qla2xxx: Fix Async GPN_FT for FCP and FC-NVMe scan
- scsi: qla2xxx: fix spelling mistake: "existant" -&gt; "existent"
- scsi: qla2xxx: Use dma_pool_zalloc()
- scsi: qla2xxx: Remove unused symbols
- scsi: qla2xxx: Use %p for printing pointers
- scsi: qla2xxx: Remove FC_NO_LOOP_ID for FCP and FC-NVMe Discovery
- scsi: qla2xxx: Fix crashes in qla2x00_probe_one on probe failure
- scsi: qla2xxx: Fix FC-NVMe LUN discovery
- scsi: qla2xxx: ensure async flags are reset correctly
- scsi: qla2xxx: do not check login_state if no loop id is assigned
- scsi: qla2xxx: Fixup locking for session deletion
- scsi: qla2xxx: Fix NULL pointer crash due to active timer for ABTS
- scsi: qla2xxx: Fix double free bug after firmware timeout
- scsi: qla2xxx: Fix a locking imbalance in qlt_24xx_handle_els()
- scsi: qla2xxx: Avoid triggering undefined behavior in qla2x00_mbx_completion()
- scsi: qla2xxx: Add XCB counters to debugfs
- scsi: qla2xxx: Fix warning during port_name debug print
- scsi: qla2xxx: Fix warning in qla2x00_async_iocb_timeout()
- scsi: qla2xxx: Fix recursion while sending terminate exchange
- scsi: qla2xxx: remove redundant assignment of d
- scsi: qla2xxx: Use zeroing allocator rather than allocator/memset
- scsi: qla2xxx: Serialize session deletion by using work_lock
- scsi: qla2xxx: Prevent relogin trigger from sending too many commands
- scsi: qla2xxx: Prevent multiple active discovery commands per session
- scsi: qla2xxx: Add retry limit for fabric scan logic
- scsi: qla2xxx: Delay loop id allocation at login
- scsi: qla2xxx: Increase verbosity of debug messages logged
- scsi: qla2xxx: Allow relogin and session creation after reset
- scsi: qla2xxx: Add ability to use GPNFT/GNNFT for RSCN handling
- scsi: qla2xxx: Properly extract ADISC error codes
- scsi: qla2xxx: Fix GPNFT/GNNFT error handling
- scsi: qla2xxx: Remove session creation redundant code
- scsi: qla2xxx: Migrate switch registration commands away from mailbox interface
- scsi: qla2xxx: Fix login state machine freeze
- scsi: qla2xxx: Reduce trace noise for Async Events
- scsi: qla2xxx: Reduce the use of terminate exchange
- scsi: qla2xxx: Add lock protection around host lookup
- scsi: qla2xxx: Add switch command to simplify fabric discovery
- scsi: qla2xxx: Use known NPort ID for Management Server login
- scsi: qla2xxx: Fix session cleanup for N2N
- scsi: qla2xxx: Tweak resource count dump
- scsi: qla2xxx: Allow target mode to accept PRLI in dual mode
- scsi: qla2xxx: Don't call dma_free_coherent with IRQ disabled.
- scsi: qla2xxx: Add ability to send PRLO
- scsi: qla2xxx: Add option for use reserve exch for ELS
- scsi: qla2xxx: Use shadow register for ISP27XX
- scsi: qla2xxx: Enable ATIO interrupt handshake for ISP27XX
- scsi: qla2xxx: Move work element processing out of DPC thread
- scsi: qla2xxx: Replace GPDB with async ADISC command
- scsi: qla2xxx: Relogin to target port on a cable swap
- scsi: qla2xxx: Chip reset uses wrong lock during IO flush.
- scsi: qla2xxx: Add boundary checks for exchanges to be offloaded
- scsi: qla2xxx: Use chip reset to bring down laser on unload.
- scsi: qla2xxx: Use IOCB path to submit Control VP MBX command
- scsi: qla2xxx: Fix smatch warning in qla25xx_delete_{rsp|req}_que
- scsi: qla2xxx: remove duplicate includes
- scsi: qla2xxx: Fix memory leak in dual/target mode
- scsi: qla2xxx: Fix system crash in qlt_plogi_ack_unref
- scsi: qla2xxx: Clear loop id after delete
- scsi: qla2xxx: Fix scan state field for fcport
- scsi: qla2xxx: Replace fcport alloc with qla2x00_alloc_fcport
- scsi: qla2xxx: Fix PRLI state check
- scsi: qla2xxx: Fix NPIV host cleanup in target mode
- scsi: qla2xxx: Move session delete to driver work queue
- scsi: qla2xxx: Fix gpnid error processing

- 10.01.00.08.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Fix NULL pointer crash with FC-NVMe LUNs during unload.

- 10.01.00.07.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Add fix to free dma memory.
- qla2xxx: Mask off Scope bits in retry delay.

- 10.01.00.06.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Remove module parameter ql2xqos_priority_test.
- qla2xxx: Add ability to process multiple CT-PT SGE's.

- 10.01.00.05.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Simplification of register address used in qla_tmpl.c.
- qla2xxx: Correction and improvement to fwdt processing.
- qla2xxx: Add correction to RDP FW support logic.
- qla2xxx: serialize sess free
- qla2xxx: serialize session deletion
- qla2xxx: prevent re_login trigger from sending too many commands
- qla2xxx: prevent multiple active discovery commands per session
- qla2xxx: Add log message for bbcr.
- qla2xxx: Remove alias names for QoS module parameters.

- 10.01.00.04.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Correction to non-existant fabric name.
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add qos fcport test mode.
- qla2xxx: Optimized logs for searching qos fcport table.
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Correction to function qla26xx_read_qos_fcport_table().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Allow 27xx and 28xx to do bidirectional commands.
- qla2xxx: Add RDP/ABTS deferred processing for vp's.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Rename QoS table row type and cleanup log prints.
- qla2xxx: Optimize reading of QoS fcport table.
- qla2xxx: Fixup/cleanup of QoS table index code.
- qla2xxx: Minor cleanup of flash calls reoganization.
- qla2xxx: Optimize flash register routines.
- qla2xxx: Fixup flash register routines.
- qla2xxx: Add debug prints to write flash routine.
- qla2xxx: Simplify flash slow write log messages.
- qla2xxx: Simplify NPIV create log messages.
- qla2xxx: Simplify D-Port Diagnostics log messages.
- qla2xxx: Cleanup log message for fwdt allocate.
- qla2xxx: Add non-verbose SFP detail print.
- qla2xxx: Quieten FEC=enabled message.
- qla2xxx: Use interrupt pin number for port number.

- 10.01.00.03.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Correction to EFT selection.
- qla2xxx: Correction to flash write routine.
- qla2xxx: Add correction to FW image selection.

- 10.01.00.02.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Convert FLT flash reads to register method.
- qla2xxx: Undo the replacements to -&gt;optrom_read() calls.
- qla2xxx: Flash reading routines cleanups.
- qla2xxx: Make flash write avoid register banging.

- 10.01.00.01.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Use registers for reading unaligned flash offset.
- qla2xxx: Fix PCI header and data struct addresses.
- qla2xxx: Fix and cleanup ROM code version string reading.
- qla2xxx: Corrections to flt-&gt;region addresses.
- qla2xxx: Add debug buffer dump for INITFW MBC.
- qla2xxx: Add debug logs for QoS sorting/searching.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: Add conditionals to avoid fcport QoS when it is not enabled.
- qla2xxx: Fix mis-pointing buffer in qla24xx_load_risc_flash().
- qla2xxx: Provide Makefile CPP define for MoB testing.
- qla2xxx: Fixup flash region code struct.
- qla2xxx: Fixup msix/msi vector selection.

- 10.01.00.00.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Add dump buffer print when nvram checksum fails.
- qla2xxx: Refactor character signature compares into memcmp's.
- qla2xxx: Replace 0x%x with %#x in all format strings.
- qla2xxx: Normalize all flash reads to always use the dump ram mbc.
- qla2xxx: Flash image validation cleanups.
- qla2xxx: Add error test after dma_map_single.
- qla2xxx: Add support for ISP28XX.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Minor cleanup regarding device type.
- qla2xxx: Improve, correct, simplify fwdt endianess handling.
- qla2xxx: Use endian macros to assign dynamic fields in fwdump buffer.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add endianizers to 27xx firmware image validator.
- qla2xxx: Add new fwdt entry types.
- qla2xxx: Leave fwdt endianess alone.
- qla2xxx: Isolate test for valid firmware image.
- qla2xxx: Add support for multiple fwdump templates/segments.
- qla2xxx: Fix routine qla27xx_dump_mpi_ram().
- qla2xxx: Fix routine qla27xx_dump_ram().
- qla2xxx: Remove fwdt default template.

- 10.00.00.60.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: nvme features developed/added.</changelog>
  </package>
  <package pkgid="b0b3ee094118a66b01b7daa901b3eb0f26f72c86c4a9b8e57390056f6882b902" name="qlgc-qla2xxx-kmp-default" arch="x86_64">
    <version epoch="0" ver="10.01.00.52.15.1_k1_k4.12.14_195" rel="1.sles15sp1"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.01.00.52.15.1-k1-1" date="1567166400">- 10.01.00.49.xx.y-k1 QT 06/24/2019
- qla2xxx: Fix unbound sleep in fcport delete path.
- qla2xxx: Fix hang in fcport delete path.
- qla2xxx: Fix kernel crash after disconnecting NVMe devices.
- qla2xxx: move IO flush to the front of NVME rport unregistration
- qla2xxx: migrate srb-&gt;ref_count to cmd_kref
- qla2xxx: fix potential multiple queue_work for nvme ls completion
- qla2xxx: Wrong reference count field usage
- qla2xxx: update: optimize NPIV tear down process.
- qla2xxx: Use proper bit position when reading dual FCP-NVMe priority
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI

- 10.01.00.48.xx.y-k1 HM 06/01/2019
- qla2xxx: update: fix premature timer expiration

- 10.01.00.47.xx.y-k1 HM 05/31/2019
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: Use common update-firmware-options routine for ISP27xx+.
- qla2xxx: Fix failed NVME port discovery after a short device port loss.
- Revert "qla2xxx: Use chip to blink laser for switch timeout"
- Revert "qla2xxx: update: Use chip to blink laser for switch timeout"
- qla2xxx: Correct error handling during initialization failures.
- qla2xxx: add error handling for PLOGI ELS passthrough
- qla2xxx: update: Use chip to blink laser for switch timeout
- qla2xxx: retry Fabric Scan on IOCB queue full.
- qla2xxx: fix premature timer expiration
- qla2xxx: UPDATE: fix login state machine freeze
- qla2xxx: Dual FCP-NVMe target port support

- 10.01.00.46.xx.y-k1 HM 05/31/2019
- qla2xxx: Fix compile failure for the DIF changes

- 10.01.00.45.xx.y-k1 HM 05/15/2019
- qla2xxx: Fix compile failure for the DIF changes

- 10.01.00.45.xx.y-k1 HM 05/13/2019
- qla2xxx: Add Vendor specific DIF for qla2xxx_mqueuecommand()
- qla2xxx: update: Implement LUN level DIF for 3PAR array

- 10.01.00.44.xx.y-k1 HM 05/06/2019
- qla2xxx: Add cleanup for PCI EEH recovery
- qla2xxx: Fix Crash due to NULL pointer access in qla2x00_sysfs_read_optrom()
- qla2xxx: update: Fix DMA error when the DIF sg buffer crosses 4GB boundary
- qla2xxx: reject eh_xxx request
- qla2xxx: do command completion on abort timeout
- qla2xxx: Use chip to blink laser for switch timeout
- qla2xxx: fix recursive dead lock
- qla2xxx: optimize NPIV tear down process.

- 10.01.00.43.xx.y-k1 HM 04/05/2019
- qla2xxx: Add support for ISP2089
- qla2xxx: remove FW dump on LOOP init error.

- 10.01.00.42.xx.y-k1 HM 03/27/2019
- qla2xxx: fix potential dma_unmap leak
- qla2xxx: fix different size dma alloc and unmap
- qla2xxx: fix over index of qpair array.
- qla2xxx: fix premature mem access.
- qla2xxx: fix nvme device discovery
- qla2xxx: fix abort timeout race condition.
- qla2xxx: fix NVME LS cmd timeout race condition 2/2.
- qla2xxx: fix NVME cmd timeout race condition 1/2.
- qla2xxx: Remove defer flag to indicate immeadiate port loss
- qla2xxx: Further limit FLASH region write access from SYSFS.
- qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines.

- 10.01.00.41.xx.y-k1 HM 03/13/2019
- qla2xxx: Silence log messages from Autoconnet script
- Revert "qla2xxx: Fix for the null pointer crash."

- 10.01.00.40.xx.y-k1 HM 03/11/2019
- qla2xxx: fix FW resource print error.
- qla2xxx: Fix RHBA command time out on link reset.

- 10.01.00.39.xx.y-k1 HM 03/06/2019
- qla2xxx: Fix driver unload when FC-NVMe LUNs are connected
- qla2xxx: Cleanup redundant qla2x00_abort_all_cmds during unload
- qla2xxx: Set remote port devloss timeout to 0
- qla2xxx: update: P2P issue with initiator and target port domains being different

- 10.01.00.38.xx.y-k1 HM 02/27/2019
- scsi: qla2xxx: Delete session for nport id change
- qla2xxx: fix N2N link up hang.
- qla2xxx: P2P issue with initiator and target port domains being different
- qla2xxx: Cleanup unused functions.
- qla2xxx: allow irqbalance control in non-MQ mode
- qla2xxx: Correct fcport flags handling.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: Update fcport disc_state only if we could allocate mem.
- qla2xxx: Add a shadow variable to hold disc_state history of fcport
- qla2xxx: v3: fix corrupt fw dump. 2/2
- qla2xxx: v3: fix corrupt fw dump. 1/2

- 10.01.00.37.xx.y-k1 HM 02/01/2019
- qla2xxx: Fix for the null pointer crash.

- 10.01.00.36.xx.y-k1 HM 01/31/2019
- qla2xxx: Move disabling T10 DIF feature ealry in probe
- qla2xxx: fix fabric scan hang
- qla2xxx: Change abort wait_loop from msleep to wait_event_timeout.
- qla2xxx: Track release of different command resources on completion.
- qla2xxx: Increase the max_sgl_segments to 1024(max supported) to support larger IO size.
- qla2xxx: Fix incorrect SFUB length used for Secure Flash Update MB Cmd
- qla2xxx: fix Nport ID display value.
- qla2xxx: Use correct pointer when calculating FLT checksum
- qla2xxx: Added support for MPI and PEP regions for 28XX secure flash update.
- qla2xxx: v2: Fix N2N link reset
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxx: Reset the FCF_ASYNC_SENT and FCF_ASYNC_ACTIVE flag after processing GPSC command.
- qla2xxx: Set the qpair in SRB to NULL when SRB is released.
- qla2xxx: Set the SCSI command result before calling the command done.
- qla2xxx: Use complete switch scan for RSCN events
- qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware
- qla2xxx: prevent multiple active discovery commands per session
- scsi: qla2xxx: Delete session for nport id change

- 10.01.00.34.xx.y-k1 HM 12/17/2018
- extras: Clean up build script for FC-NVMe install directive
- qla2xxx: Add fix for N2N topology.
- qla2xxx: Secure flash update support for ISP28XX.
- qla2xxx: Restore WWPN of Physical Port for fabric configuration only for loop down.

- 10.01.00.33.xx.y-k1 HM 12/10/2018
- extras: Silence diff related to nvme scripts with driver install script

- 10.01.00.32.xx.y-k1 HM 12/07/2018
- extras: update FC-NVMe boot script to use single TRADDR

- 10.01.00.31.xx.y-k1 HM 12/04/2018
SLES15, SLES12 SP4
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF

- 10.01.00.30.xx.y-k1 SC 11/28/2018
- qla2xxx: Fix for call trace being seen on reboot
- Revert "qla2xxx: unable to discover NVME target."

- 10.01.00.29.xx.y-k1 HM 11/21/2018
- qla2xxx: Look for updated FC-NVME enable BIT to enable FC-NVME

- 10.01.00.28.xx.y-k1 HM 11/21/2018
- qla2xxx: Fix for call trace being seen on reboot

- 10.01.00.27.xx.y-k1 HM 11/19/2018
- qla2xxx: Fix issue reading primary region for ISP27xx/28xx
- qla2xxx: Remove hardcoded OS value for SPECTER flags
- qla2xxx: fix BUS Reset
- qla2xxx: Correctly retrieve and interpret active flash regions for 27XX/28XX

- 10.01.00.26.xx.x-k1 HM 11/05/2018
RHEL7.6, SLES12.4, SLES15
- qla2xxx: Demote log message 0x3079 to ql_dbg_io.
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF
- qla2xxx: Demote log message 0x3079 to ql_dbg_io.
- qla2xxx: Snoop Inquiry response spanning multiple scatter/gather elements.
- qla2xxx: Track if INQ was sent, and send INQ to all luns.
- qla2xxx: Reset the PROT bit in the cdb.
- qla2xxx: Make fcport a pointer in qlt_free_session_done().
- qla2xxx: Implement LUN level DIF for 3PAR array.
- qla2xxx: T10-DIF: Fix ref tag errors reported for CAW command.
- qla2xxx: Disable standard DIF for arrays advertising proprietary DIF.
- qla2xxx: Reset PROTECT bit only in standard INQUIRY response.
- qla2xxx: Check if the INQ response buffer is &gt; 170 (instead of &gt;=).
- qla2xxx: Fix invalid offset reference of inquiry response data.
- qla2xxx: Correct modinfo text for ql2xenablehba_err_chk.
- qla2xxx: Fix modinfo text for ql2xenabledif and ql2xenabledif_tgt.
- qla2xxx: set ql2xenabledif_tgt enabled by default.
- qla2xxx: Handle INQ data changed check condition.
- qla2xxx: Parameterize ql2xenabledif_tgt (defaulted to zero).
- qla2xxx: Unparameterize ql2xenabledif_tgt (leave as global variable zeroed).
- qla2xxx: Fix for issue where the scsi status was getting overwritten.
- qla2xxx: Fail module load on user config errors.
- qla2xxx: Check for success of INQ response before parsing.
- qla2xxx: Check for INQ response validity before parsing the response.
- qla2xxx: Control vendor T10 DIF via ql2xenabledif_tgt module parameter.
- qla2xxx: Mark DIF errors from target as re-tryable errors.
- qla2xxx: Remove extraneous debug messages.
- qla2xxx: Mark DIF errors from target as re-tryable errors.
- qla2xxx: Do not turn off T10 DIF on a port reset.
- qla2xxx: Add routines to get LBA from the SCSI CDB.
- qla2xxx: Enable T10 DIF for reads as well.
- qla2xxx: Enable SCSI T10 DIF registration during driver probe.
- qla2xxx: Initial check-in for vendor T10 DIF.


- 10.01.00.26.xx.x-k HM 11/05/2018
- qla2xxx: fix stale mem access on unload. v2
- Revert "qla2xxx: fix stale mem access on unload."
- extras: Add capability to start system service
- qla2xxx: fix stale mem access on unload.
- qla2xxx: reduce duplicate code.
- qla2xxx: Handle the fail case when fail to allocate memory for CT req and rsp.
- qla2xxx: Change SRB allocation flag to ATOMIC to avoid sleeping in IRQ context.

- 10.01.00.25.xx.x-k HM 10/20/2018
- extras: Updated Build script for FC-NVMe Discovery
- extras: Add Auto-connect scripts for FC-NVMe
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect
- qla2xxx: Fix unload when NVMe devices are configured
- qla2xxx: performance enhancement for ISP 28XX Target mode.
- qla2xxx: tweak error code for bsg_request.
- qla2xxx: reject garble setting for speed and qlini_mode
- qla2xxx: performance enhancement for nvme
- qla2xxx: Send Marker for each QPair.
- qla2xxx: move marker request behind qpair

- 10.01.00.24.xx.x-k HM 10/15/2018
- qla2xxx: Correctly report max/min supported speeds for Mach adapter
- qla2xxx: Fix flash pri/sec image selection bug
- qla2xxx: Add 28xx flash primary/secondary refreshing
- qla2xxx: Add 28xx flash primary/secondary status/image mechanism
- qla2xxx: Fix Use after free case while issuing Async TM command
- qla2xxx: no MB IOCB during chip down
- qla2xxx: Fix message to indicated Vectors used by driver
- scsi: qla2xxx: don't allow negative thresholds
- scsi: qla2xxx: Fix comment in MODULE_PARM_DESC in qla2xxx
- scsi: qla2xxx: Remove set but not used variable 'ptr_dma'
- scsi: qla2xxx: fix typo "CT-PASSTRHU" -&gt; "CT-PASSTHRU"
- qla2xxx: move error message behind error case.
- scsi: qla2xxx: Add debug knob for user control workload

- 10.01.00.23.xx.x-k JC 9/29/2018
RHEL7.6, SLES12.4, SLES15
- Fixed build issue.

- 10.01.00.22.xx.x-k JC 9/25/2018
RHEL7.6, SLES12.4, SLES15
- qla2xxx: aggregated compile error fix ups.
- qla2xxx: fix duplicate switch DB entries.
- Revert "qla2xxx: fix duplicate switch's Nport ID entries."
- qla2xxx: unable to discover NVME target.
- qla2xxx: Move debug log messages which dereference SRB structure before issuing the command to firmware.
- qla2xxx: Fix for double free of SRB structure used in Async switch query commands.
- qla2xxx: fix double increment of switch scan retry count.
- qla2xxx: fix duplicate switch's Nport ID entries.
- qla2xxx: Schedule worker to process response queue
- Revert "qla2xxx: Fix process response queue for ISP26XX and above"
- qla2xxx: Enable Target mode for ISP28XX
- qla2xxx: remove debug trace
- qla2xxx: Do not set dev_loss_tmo while unregistering remote nvme port.
- qla2xxx: Initialize atio request queue length.
- qla2xxx: fix command premature free.
- qla2xxx: Reject bsg request if chip is down.
- qla2xxx: shutdown chip if reset fail
- qla2xxx: fix stuck session in PLOGI state
- qla2xxx: fix early srb free on abort
- qla2xxx: Add mode control for each physical port.
- qla2xxx: fix cleanup race condition
- qla2xxx: fix dropped srb resource.
- qla2xxx: fix port speed display on chip reset
- qla2xxx: fix recursive mailbox timeout
- qla2xxx: Check for Register disconnect, during adapter shutdown process.

- 10.01.00.21.xx.x-k JC 8/21/2018
RHEL7.6, SLES12.4, SLES15
- Revert "qla2xxx: send nvme disconnect message to udev"
- Revert "qla2xxx_udev: nvme disconnect"
- qla2xxx: fix nvme session hang on unload

- 10.01.00.20.xx.x-k JC 8/9/2018
RHEL7.5, SLES12.3, SLES15
- qla2xxx: Added retpoline support.
- qla2xxx: Fixed module parameter for ql2xnvmeenable
- extras: Fix qlssen.sh build initrd for SLES15.
- extras: Fix udev bash command lines to use $PATH
- qla2xxx: Added file Module.supported.
RHEL7.5
- scsi: qla2xxx: fix MSI-X vector affinity

- 10.01.00.19.xx.x-k JC 8/6/2018
RHEL7.5, SLES12.3, SLES15
- extras: Fix usage of find in build.sh
- qla2xxx: Fix for FC-NVMe discovery for NPIV port
- qla2xxx: Set FC-NVMe feature to disabled as default
- qla2xxx: fix tape device re-connect

- 10.01.00.18.xx.x-k JC 7/26/2018
RHEL7.5, SLES12.3, SLES15
- qla2xxx: Return error when TM returns an error from firmware
- qla2xxx: move abort code behind qpair
- qla2xxx: extend abort timeout value
- qla2xxx: fix srb's ref_count get race condition
- qla2xxx: Fix memory leak for allocating abort IOCB. v2
- qla2xxx: Enable FC-NVME on NPIV ports
- qla2xxx: Fix NPIV handling for FC-NVMe
- qla2xxx: use correct vp_idx for NPIV
- qla2xxx: Fix vha access for FC-NVMe
- qla2xxx: Fix erroneous session deletion
- qla2xxx: Update: Fix NPORT ID display for N2N Direct connect
- qla2xxx: back port IS_SW_RESV_ADDR

- 10.01.00.17.07.5-k JC 7/26/2018
- qla2xxx: Add case for 28xx transfer rate.
- qla2xxx: Correct ISP filter for invalid SFP.
- qla2xxx: Add signature for 28xx flash image.
- qla2xxx: Include 28xx in abort isp cleanup.
- qla2xxx: Fix flash/nvram addressing.
- Revert "qla2xxx: Fix memory leak for allocating abort IOCB"

- 10.01.00.16.07.5-k JC 7/11/2018
- qla2xxx: Fix memory leak for allocating abort IOCB
- qla2xxx: Fix MBX failure during driver unload for FCoE adapter
- qla2xxx: silent warning in freeirq
- qla2xxx_udev: nvme disconnect
- qla2xxx: send nvme disconnect message to udev
- qla2xxx: on session delete return nvme cmd
- qla2xxx: fix N2N inifinite retry loop
- qla2xxx: Remove stale ADISC_DONE event
- qla2xxx: Shutdown Chip on unload.
- qla2xxx: back port fw_started flag from upstream
- qla2xxx: wait for session deletion done for npiv
- qla2xxx: no isp recovery on unload
- qla2xxx: fix uninit list head (sp-&gt;elem)

- 10.01.00.15.07.5-k JC 6/25/2018
- qla2xxx: Fix NPORT ID display for N2N Direct connect

- 10.01.00.14.07.5-k HM 6/24/2018
- qla2xxx: Fix spinlock resuctsion in qlt_reset()
- qla2xxx: Fix process response queue for ISP26XX and above
- qla2xxx: Fix NULL pointer derefrence for fcport search
- qla2xxx: Fix kernel crash due to late workqueue allocation
- qla2xxx: Alow nvme underrun to be handled transport.
- qla2xxx: Fix inconsistent DMA mem alloc/free
- qla2xxx: Fix Remote port registration
- qla2xxx: Remove Stale code from update_fw_options() settings

- 10.01.00.12.07.5-k HM 6/15/2018
- qla2xxx: Retry Loop resync when req/rsp is not setup
- qla2xxx: Fix NVMe Discovery
- qla2xxx: Fix SF_SCANNING flag for async_gnnft
- qla2xxx: Fix login_retry count
- qla2xxx: Update:qla2xxx: move command alloc to tcm_qla2xxx
- qla2xxx: move command alloc to tcm_qla2xxx
- qla2xxx: Fix double free of sp
- qla2xxx: assign NULL to dpc_thread before unloading to prevent crash
- qla2xxx: Fix crash for get_qpair()
- qla2xxx: Remove extra lock to reduce contention
- qla2xxx: fix sp-&gt;vha assignment problem
- qla2xxx: Reduce holding sess_lock to prevent CPU lock-up
- qla2xxx: Move qla2x00_start_sp behind qpair
- qla2xxx: Move {get|rel}_sp to base_qpair struct
- qla2xxx: Updated: Zio6 interrupt threashold

- 10.01.00.11.07.5-k HM 6/07/2018
- qla2xxx: zio6 interrupt threshold
- qla2xxx: UPDATE: serialize user space mailbox access.
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: fix out of order Termination and ABTS Resp
- qla2xxx: fix missing mutex_unlock
- qla2xxx: remove unneccessary byte swap
- scsi: qla2xxx: Fix incorrect handle for abort IOCB
- scsi: qla2xxx: Fix queue ID for async abort with Multiqueue
- qla2xxx: add detection of ABTS hang
- qla2xxx: fix ABTS response completion
- qla2xxx: serialize user space mailbox access.
- qla2xxx: allow speed set before chip is on
- qla2xxx: Tweak debug info for invalid RX_ID
- qla2xxx: fix deadlock between atio &amp; hw lock
- qla2xxx: remove redundant call to mark port lost
- qla2xxx: fix double Rport
- qla2xxx: serialize mailbox call.
- qla2xxx: fix erroneous debug log.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add support for setting port speed
- qla2xxx: holding off chip reset until target mode is enabled
- qla2xxx: Terminate Plogi/PRLI if WWN is 0
- qla2xxx: fix deadlock between qla &amp; target core drivers
- qla2xxx: Fix iIDMA error
- qla2xxx: Remove all rports if fabric scan retry fails
- qla2xxx: Force fw cleanup on ADISC error
- qla2xxx: Turn off IOCB timeout timer on IOCB completion
- qla2xxx: Decrement login retry count for only plogi
- qla2xxx: Move rport registration out of internal work_list
- qla2xxx: Remove redundant check for fcport deletion
- qla2xxx: Update rscn_rcvd field to more meaningful scan_needed
- qla2xxx: Use correct qpair for abort and cmd
- extras: Fixed find syntax in build.sh
- qla2xxx: Fix race between switch cmd completion and timeout
- qla2xxx: Flush mailbox commands on chip reset
- qla2xxx: Fix unintended Logout
- qla2xxx: Fix session state stuck in Get Port DB
- qla2xxx: Fix redundant fc_rport registration
- qla2xxx: Silent erroneous message
- qla2xxx: Prevent SysFS access when chip is down
- qla2xxx: Add longer window for Chip reset
- qla2xxx: Fix login retry count
- qla2xxx: Fix setting lower transfer speed if GPSC fails
- scsi: qla2xxx: Fix TMF and Multi-Queue config

- 10.01.00.10.07.5-k HM 6/05/2018
- qla2xxx: fix merge error
- qla2xxx: migrate NVME N2N handling into state machine
- qla2xxx: save frame payload size
- qla2xxx: fix N2N link re-connect

- 10.01.00.09.xx.y-k JC 5/24/2018
- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq
- scsi: qla2xxx: Remove stale debug value for login_retry flag
- scsi: qla2xxx: Use predefined get_datalen_for_atio() inline function
- scsi: qla2xxx: Fix Inquiry command being dropped in Target mode
- scsi: qla2xxx: Move GPSC and GFPNID out of session management
- scsi: qla2xxx: Reduce redundant ADISC command for RSCNs
- scsi: qla2xxx: Delete session for nport id change
- scsi: qla2xxx: Fix Rport and session state getting out of sync
- scsi: qla2xxx: Fix sending ADISC command for login
- scsi: qla2xxx: Correct setting of SAM_STAT_CHECK_CONDITION
- scsi: qla2xxx: correctly shift host byte
- scsi: qla2xxx: Fix race condition between iocb timeout and initialisation
- scsi: qla2xxx: Avoid double completion of abort command
- scsi: qla2xxx: Fix small memory leak in qla2x00_probe_one on probe failure
- scsi: qla2xxx: fx00 copypaste typo
- scsi: qla2xxx: fix error message on &lt;qla2400
- scsi: qla2xxx: Fix Async GPN_FT for FCP and FC-NVMe scan
- scsi: qla2xxx: fix spelling mistake: "existant" -&gt; "existent"
- scsi: qla2xxx: Use dma_pool_zalloc()
- scsi: qla2xxx: Remove unused symbols
- scsi: qla2xxx: Use %p for printing pointers
- scsi: qla2xxx: Remove FC_NO_LOOP_ID for FCP and FC-NVMe Discovery
- scsi: qla2xxx: Fix crashes in qla2x00_probe_one on probe failure
- scsi: qla2xxx: Fix FC-NVMe LUN discovery
- scsi: qla2xxx: ensure async flags are reset correctly
- scsi: qla2xxx: do not check login_state if no loop id is assigned
- scsi: qla2xxx: Fixup locking for session deletion
- scsi: qla2xxx: Fix NULL pointer crash due to active timer for ABTS
- scsi: qla2xxx: Fix double free bug after firmware timeout
- scsi: qla2xxx: Fix a locking imbalance in qlt_24xx_handle_els()
- scsi: qla2xxx: Avoid triggering undefined behavior in qla2x00_mbx_completion()
- scsi: qla2xxx: Add XCB counters to debugfs
- scsi: qla2xxx: Fix warning during port_name debug print
- scsi: qla2xxx: Fix warning in qla2x00_async_iocb_timeout()
- scsi: qla2xxx: Fix recursion while sending terminate exchange
- scsi: qla2xxx: remove redundant assignment of d
- scsi: qla2xxx: Use zeroing allocator rather than allocator/memset
- scsi: qla2xxx: Serialize session deletion by using work_lock
- scsi: qla2xxx: Prevent relogin trigger from sending too many commands
- scsi: qla2xxx: Prevent multiple active discovery commands per session
- scsi: qla2xxx: Add retry limit for fabric scan logic
- scsi: qla2xxx: Delay loop id allocation at login
- scsi: qla2xxx: Increase verbosity of debug messages logged
- scsi: qla2xxx: Allow relogin and session creation after reset
- scsi: qla2xxx: Add ability to use GPNFT/GNNFT for RSCN handling
- scsi: qla2xxx: Properly extract ADISC error codes
- scsi: qla2xxx: Fix GPNFT/GNNFT error handling
- scsi: qla2xxx: Remove session creation redundant code
- scsi: qla2xxx: Migrate switch registration commands away from mailbox interface
- scsi: qla2xxx: Fix login state machine freeze
- scsi: qla2xxx: Reduce trace noise for Async Events
- scsi: qla2xxx: Reduce the use of terminate exchange
- scsi: qla2xxx: Add lock protection around host lookup
- scsi: qla2xxx: Add switch command to simplify fabric discovery
- scsi: qla2xxx: Use known NPort ID for Management Server login
- scsi: qla2xxx: Fix session cleanup for N2N
- scsi: qla2xxx: Tweak resource count dump
- scsi: qla2xxx: Allow target mode to accept PRLI in dual mode
- scsi: qla2xxx: Don't call dma_free_coherent with IRQ disabled.
- scsi: qla2xxx: Add ability to send PRLO
- scsi: qla2xxx: Add option for use reserve exch for ELS
- scsi: qla2xxx: Use shadow register for ISP27XX
- scsi: qla2xxx: Enable ATIO interrupt handshake for ISP27XX
- scsi: qla2xxx: Move work element processing out of DPC thread
- scsi: qla2xxx: Replace GPDB with async ADISC command
- scsi: qla2xxx: Relogin to target port on a cable swap
- scsi: qla2xxx: Chip reset uses wrong lock during IO flush.
- scsi: qla2xxx: Add boundary checks for exchanges to be offloaded
- scsi: qla2xxx: Use chip reset to bring down laser on unload.
- scsi: qla2xxx: Use IOCB path to submit Control VP MBX command
- scsi: qla2xxx: Fix smatch warning in qla25xx_delete_{rsp|req}_que
- scsi: qla2xxx: remove duplicate includes
- scsi: qla2xxx: Fix memory leak in dual/target mode
- scsi: qla2xxx: Fix system crash in qlt_plogi_ack_unref
- scsi: qla2xxx: Clear loop id after delete
- scsi: qla2xxx: Fix scan state field for fcport
- scsi: qla2xxx: Replace fcport alloc with qla2x00_alloc_fcport
- scsi: qla2xxx: Fix PRLI state check
- scsi: qla2xxx: Fix NPIV host cleanup in target mode
- scsi: qla2xxx: Move session delete to driver work queue
- scsi: qla2xxx: Fix gpnid error processing

- 10.01.00.08.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Fix NULL pointer crash with FC-NVMe LUNs during unload.

- 10.01.00.07.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Add fix to free dma memory.
- qla2xxx: Mask off Scope bits in retry delay.

- 10.01.00.06.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Remove module parameter ql2xqos_priority_test.
- qla2xxx: Add ability to process multiple CT-PT SGE's.

- 10.01.00.05.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Simplification of register address used in qla_tmpl.c.
- qla2xxx: Correction and improvement to fwdt processing.
- qla2xxx: Add correction to RDP FW support logic.
- qla2xxx: serialize sess free
- qla2xxx: serialize session deletion
- qla2xxx: prevent re_login trigger from sending too many commands
- qla2xxx: prevent multiple active discovery commands per session
- qla2xxx: Add log message for bbcr.
- qla2xxx: Remove alias names for QoS module parameters.

- 10.01.00.04.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Correction to non-existant fabric name.
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add qos fcport test mode.
- qla2xxx: Optimized logs for searching qos fcport table.
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Correction to function qla26xx_read_qos_fcport_table().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Allow 27xx and 28xx to do bidirectional commands.
- qla2xxx: Add RDP/ABTS deferred processing for vp's.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Rename QoS table row type and cleanup log prints.
- qla2xxx: Optimize reading of QoS fcport table.
- qla2xxx: Fixup/cleanup of QoS table index code.
- qla2xxx: Minor cleanup of flash calls reoganization.
- qla2xxx: Optimize flash register routines.
- qla2xxx: Fixup flash register routines.
- qla2xxx: Add debug prints to write flash routine.
- qla2xxx: Simplify flash slow write log messages.
- qla2xxx: Simplify NPIV create log messages.
- qla2xxx: Simplify D-Port Diagnostics log messages.
- qla2xxx: Cleanup log message for fwdt allocate.
- qla2xxx: Add non-verbose SFP detail print.
- qla2xxx: Quieten FEC=enabled message.
- qla2xxx: Use interrupt pin number for port number.

- 10.01.00.03.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Correction to EFT selection.
- qla2xxx: Correction to flash write routine.
- qla2xxx: Add correction to FW image selection.

- 10.01.00.02.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Convert FLT flash reads to register method.
- qla2xxx: Undo the replacements to -&gt;optrom_read() calls.
- qla2xxx: Flash reading routines cleanups.
- qla2xxx: Make flash write avoid register banging.

- 10.01.00.01.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Use registers for reading unaligned flash offset.
- qla2xxx: Fix PCI header and data struct addresses.
- qla2xxx: Fix and cleanup ROM code version string reading.
- qla2xxx: Corrections to flt-&gt;region addresses.
- qla2xxx: Add debug buffer dump for INITFW MBC.
- qla2xxx: Add debug logs for QoS sorting/searching.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: Add conditionals to avoid fcport QoS when it is not enabled.
- qla2xxx: Fix mis-pointing buffer in qla24xx_load_risc_flash().
- qla2xxx: Provide Makefile CPP define for MoB testing.
- qla2xxx: Fixup flash region code struct.
- qla2xxx: Fixup msix/msi vector selection.

- 10.01.00.00.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Add dump buffer print when nvram checksum fails.
- qla2xxx: Refactor character signature compares into memcmp's.
- qla2xxx: Replace 0x%x with %#x in all format strings.
- qla2xxx: Normalize all flash reads to always use the dump ram mbc.
- qla2xxx: Flash image validation cleanups.
- qla2xxx: Add error test after dma_map_single.
- qla2xxx: Add support for ISP28XX.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Minor cleanup regarding device type.
- qla2xxx: Improve, correct, simplify fwdt endianess handling.
- qla2xxx: Use endian macros to assign dynamic fields in fwdump buffer.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add endianizers to 27xx firmware image validator.
- qla2xxx: Add new fwdt entry types.
- qla2xxx: Leave fwdt endianess alone.
- qla2xxx: Isolate test for valid firmware image.
- qla2xxx: Add support for multiple fwdump templates/segments.
- qla2xxx: Fix routine qla27xx_dump_mpi_ram().
- qla2xxx: Fix routine qla27xx_dump_ram().
- qla2xxx: Remove fwdt default template.

- 10.00.00.60.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: nvme features developed/added.</changelog>
  </package>
  <package pkgid="b7d70d5d12aeb95e75d3734f25ae5955f9a4168b32d4cd6f3c85c121af2e3ae8" name="qlgc-qla2xxx-kmp-default" arch="x86_64">
    <version epoch="0" ver="8.08.00.08.12.3_k12_k4.4.73_5" rel="1.sles12sp3"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 8.08.00.08.12.3-k12-1" date="1570190400">- 10.01.00.48.xx.y-k HM 06/01/2019
- qla2xxx: update: fix premature timer expiration

- 10.01.00.47.xx.y-k HM 05/31/2019
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: Use common update-firmware-options routine for ISP27xx+.
- qla2xxx: Fix failed NVME port discovery after a short device port loss.
- Revert "qla2xxx: Use chip to blink laser for switch timeout"
- Revert "qla2xxx: update: Use chip to blink laser for switch timeout"
- qla2xxx: Correct error handling during initialization failures.
- qla2xxx: add error handling for PLOGI ELS passthrough
- qla2xxx: update: Use chip to blink laser for switch timeout
- qla2xxx: retry Fabric Scan on IOCB queue full.
- qla2xxx: fix premature timer expiration
- qla2xxx: UPDATE: fix login state machine freeze
- qla2xxx: Dual FCP-NVMe target port support

- 10.01.00.46.xx.y-k HM 05/14/2019
- 10.01.00.45.xx.y-k HM 05/13/2019
- 10.01.00.44.xx.y-k HM 05/06/2019
- qla2xxx: Add cleanup for PCI EEH recovery
- qla2xxx: Fix Crash due to NULL pointer access in qla2x00_sysfs_read_optrom()
- qla2xxx: update: Fix DMA error when the DIF sg buffer crosses 4GB boundary
- qla2xxx: reject eh_xxx request
- qla2xxx: do command completion on abort timeout
- qla2xxx: Use chip to blink laser for switch timeout
- qla2xxx: fix recursive dead lock
- qla2xxx: optimize NPIV tear down process.

- 10.01.00.43.xx.y-k HM 04/05/2019
- qla2xxx: Add support for ISP2089
- qla2xxx: remove FW dump on LOOP init error.

- 10.01.00.42.xx.y-k HM 03/27/2019
- qla2xxx: fix potential dma_unmap leak
- qla2xxx: fix different size dma alloc and unmap
- qla2xxx: fix over index of qpair array.
- qla2xxx: fix premature mem access.
- qla2xxx: fix nvme device discovery
- qla2xxx: fix abort timeout race condition.
- qla2xxx: fix NVME LS cmd timeout race condition 2/2.
- qla2xxx: fix NVME cmd timeout race condition 1/2.
- qla2xxx: Remove defer flag to indicate immeadiate port loss
- qla2xxx: Further limit FLASH region write access from SYSFS.
- qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines.

- 10.01.00.41.xx.y-k HM 03/13/2019
- qla2xxx: Silence log messages from Autoconnet script
- Revert "qla2xxx: Fix for the null pointer crash."

- 10.01.00.40.xx.y-k HM 03/11/2019
- qla2xxx: fix FW resource print error.
- qla2xxx: Fix RHBA command time out on link reset.
- qla2xxx: Fix crash due to unused NULL CPU pointer


- 10.01.00.39.xx.y-k HM 03/06/2019
- qla2xxx: Fix driver unload when FC-NVMe LUNs are connected
- qla2xxx: Cleanup redundant qla2x00_abort_all_cmds during unload
- qla2xxx: Set remote port devloss timeout to 0
- qla2xxx: update: P2P issue with initiator and target port domains being different

- 10.01.00.38.xx.y-k HM 02/27/2019
- scsi: qla2xxx: Delete session for nport id change
- qla2xxx: fix N2N link up hang.
- qla2xxx: P2P issue with initiator and target port domains being different
- qla2xxx: Cleanup unused functions.
- qla2xxx: allow irqbalance control in non-MQ mode
- qla2xxx: Correct fcport flags handling.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: Update fcport disc_state only if we could allocate mem.
- qla2xxx: Add a shadow variable to hold disc_state history of fcport
- qla2xxx: v3: fix corrupt fw dump. 2/2
- qla2xxx: v3: fix corrupt fw dump. 1/2

- 10.01.00.37.xx.y-k HM 02/01/2019
- qla2xxx: Fix for the null pointer crash.

- 10.01.00.36.xx.y-k HM 01/31/2019
- qla2xxx: Move disabling T10 DIF feature ealry in probe
- qla2xxx: fix fabric scan hang
- qla2xxx: Change abort wait_loop from msleep to wait_event_timeout.
- qla2xxx: Track release of different command resources on completion.
- qla2xxx: Increase the max_sgl_segments to 1024(max supported) to support larger IO size.
- qla2xxx: Fix incorrect SFUB length used for Secure Flash Update MB Cmd
- qla2xxx: fix Nport ID display value.
- qla2xxx: Use correct pointer when calculating FLT checksum
- qla2xxx: Added support for MPI and PEP regions for 28XX secure flash update.
- qla2xxx: v2: Fix N2N link reset
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxx: Reset the FCF_ASYNC_SENT and FCF_ASYNC_ACTIVE flag after processing GPSC command.
- qla2xxx: Set the qpair in SRB to NULL when SRB is released.
- qla2xxx: Set the SCSI command result before calling the command done.
- qla2xxx: Use complete switch scan for RSCN events
- qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware
- qla2xxx: prevent multiple active discovery commands per session
- scsi: qla2xxx: Delete session for nport id change

- 10.01.00.34.xx.y-k HM 12/17/2018
- extras: Clean up build script for FC-NVMe install directive
- qla2xxx: Add fix for N2N topology.
- qla2xxx: Secure flash update support for ISP28XX.
- qla2xxx: Restore WWPN of Physical Port for fabric configuration only for loop down.
- qla2xxx: Fix DMA error when the DIF sg buffer crosses 4GB boundary
- qla2xxx: Initialize port speed to avoid setting lower speed

- 10.01.00.33.xx.y-k HM 12/10/2018
- extras: Silence diff related to nvme scripts with driver install script

- 10.01.00.32.xx.y-k HM 12/07/2018
- extras: update FC-NVMe boot script to use single TRADDR

- 10.01.00.31.xx.y-k HM 12/04/2018
- 10.01.00.30.xx.y-k SC 11/28/2018
- qla2xxx: Fix for call trace being seen on reboot
- Revert "qla2xxx: unable to discover NVME target."

- 10.01.00.29.xx.y-k HM 11/21/2018
- qla2xxx: Look for updated FC-NVME enable BIT to enable FC-NVME

- 10.01.00.28.xx.y-k HM 11/21/2018
- qla2xxx: Fix for call trace being seen on reboot

- 10.01.00.27.xx.y-k HM 11/19/2018
- qla2xxx: Fix issue reading primary region for ISP27xx/28xx
- qla2xxx: Remove hardcoded OS value for SPECTER flags
- qla2xxx: fix BUS Reset
- qla2xxx: Correctly retrieve and interpret active flash regions for 27XX/28XX

- 10.01.00.26.xx.y-k HM 11/05/2018
- qla2xxx: fix stale mem access on unload. v2
- Revert "qla2xxx: fix stale mem access on unload."
- extras: Add capability to start system service
- qla2xxx: fix stale mem access on unload.
- qla2xxx: reduce duplicate code.
- qla2xxx: Handle the fail case when fail to allocate memory for CT req and rsp.
- qla2xxx: Change SRB allocation flag to ATOMIC to avoid sleeping in IRQ context.

- 10.01.00.25.xx.x-k HM 10/20/2018
- extras: Updated Build script for FC-NVMe Discovery
- extras: Add Auto-connect scripts for FC-NVMe
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect
- qla2xxx: Fix unload when NVMe devices are configured
- qla2xxx: performance enhancement for ISP 28XX Target mode.
- qla2xxx: tweak error code for bsg_request.
- qla2xxx: reject garble setting for speed and qlini_mode
- qla2xxx: performance enhancement for nvme
- qla2xxx: Send Marker for each QPair.
- qla2xxx: move marker request behind qpair

- 10.01.00.24.xx.x-k HM 10/15/2018
- qla2xxx: Correctly report max/min supported speeds for Mach adapter
- qla2xxx: Fix flash pri/sec image selection bug
- qla2xxx: Add 28xx flash primary/secondary refreshing
- qla2xxx: Add 28xx flash primary/secondary status/image mechanism
- qla2xxx: Fix Use after free case while issuing Async TM command
- qla2xxx: no MB IOCB during chip down
- qla2xxx: Fix message to indicated Vectors used by driver
- scsi: qla2xxx: don't allow negative thresholds
- scsi: qla2xxx: Fix comment in MODULE_PARM_DESC in qla2xxx
- scsi: qla2xxx: Remove set but not used variable 'ptr_dma'
- scsi: qla2xxx: fix typo "CT-PASSTRHU" -&gt; "CT-PASSTHRU"
- qla2xxx: move error message behind error case.
- scsi: qla2xxx: Add debug knob for user control workload

- 10.01.00.23.xx.x-k JC 9/29/2018
RHEL7.6, SLES12.4, SLES15
- Fixed build issue.

- 10.01.00.22.xx.x-k JC 9/25/2018
RHEL7.6, SLES12.4, SLES15
- qla2xxx: aggregated compile error fix ups.
- qla2xxx: fix duplicate switch DB entries.
- Revert "qla2xxx: fix duplicate switch's Nport ID entries."
- qla2xxx: unable to discover NVME target.
- qla2xxx: Move debug log messages which dereference SRB structure before issuing the command to firmware.
- qla2xxx: Fix for double free of SRB structure used in Async switch query commands.
- qla2xxx: fix double increment of switch scan retry count.
- qla2xxx: fix duplicate switch's Nport ID entries.
- qla2xxx: Schedule worker to process response queue
- Revert "qla2xxx: Fix process response queue for ISP26XX and above"
- qla2xxx: Enable Target mode for ISP28XX
- qla2xxx: remove debug trace
- qla2xxx: Do not set dev_loss_tmo while unregistering remote nvme port.
- qla2xxx: Initialize atio request queue length.
- qla2xxx: fix command premature free.
- qla2xxx: Reject bsg request if chip is down.
- qla2xxx: shutdown chip if reset fail
- qla2xxx: fix stuck session in PLOGI state
- qla2xxx: fix early srb free on abort
- qla2xxx: Add mode control for each physical port.
- qla2xxx: fix cleanup race condition
- qla2xxx: fix dropped srb resource.
- qla2xxx: fix port speed display on chip reset
- qla2xxx: fix recursive mailbox timeout
- qla2xxx: Check for Register disconnect, during adapter shutdown process.

- 10.01.00.21.xx.x-k JC 8/21/2018
RHEL7.6, SLES12.4, SLES15
- Revert "qla2xxx: send nvme disconnect message to udev"
- Revert "qla2xxx_udev: nvme disconnect"
- qla2xxx: fix nvme session hang on unload

- 10.01.00.20.xx.x-k JC 8/9/2018
RHEL7.5, SLES12.3, SLES15
- qla2xxx: Added retpoline support.
- qla2xxx: Fixed module parameter for ql2xnvmeenable
- extras: Fix qlssen.sh build initrd for SLES15.
- extras: Fix udev bash command lines to use $PATH
- qla2xxx: Added file Module.supported.
RHEL7.5
- scsi: qla2xxx: fix MSI-X vector affinity

- 10.01.00.19.xx.x-k JC 8/6/2018
RHEL7.5, SLES12.3, SLES15
- extras: Fix usage of find in build.sh
- qla2xxx: Fix for FC-NVMe discovery for NPIV port
- qla2xxx: Set FC-NVMe feature to disabled as default
- qla2xxx: fix tape device re-connect

- 10.01.00.18.xx.x-k JC 7/26/2018
RHEL7.5, SLES12.3, SLES15
- qla2xxx: Return error when TM returns an error from firmware
- qla2xxx: move abort code behind qpair
- qla2xxx: extend abort timeout value
- qla2xxx: fix srb's ref_count get race condition
- qla2xxx: Fix memory leak for allocating abort IOCB. v2
- qla2xxx: Enable FC-NVME on NPIV ports
- qla2xxx: Fix NPIV handling for FC-NVMe
- qla2xxx: use correct vp_idx for NPIV
- qla2xxx: Fix vha access for FC-NVMe
- qla2xxx: Fix erroneous session deletion
- qla2xxx: Update: Fix NPORT ID display for N2N Direct connect
- qla2xxx: back port IS_SW_RESV_ADDR

- 10.01.00.17.07.5-k JC 7/26/2018
- qla2xxx: Add case for 28xx transfer rate.
- qla2xxx: Correct ISP filter for invalid SFP.
- qla2xxx: Add signature for 28xx flash image.
- qla2xxx: Include 28xx in abort isp cleanup.
- qla2xxx: Fix flash/nvram addressing.
- Revert "qla2xxx: Fix memory leak for allocating abort IOCB"

- 10.01.00.16.07.5-k JC 7/11/2018
- qla2xxx: Fix memory leak for allocating abort IOCB
- qla2xxx: Fix MBX failure during driver unload for FCoE adapter
- qla2xxx: silent warning in freeirq
- qla2xxx_udev: nvme disconnect
- qla2xxx: send nvme disconnect message to udev
- qla2xxx: on session delete return nvme cmd
- qla2xxx: fix N2N inifinite retry loop
- qla2xxx: Remove stale ADISC_DONE event
- qla2xxx: Shutdown Chip on unload.
- qla2xxx: back port fw_started flag from upstream
- qla2xxx: wait for session deletion done for npiv
- qla2xxx: no isp recovery on unload
- qla2xxx: fix uninit list head (sp-&gt;elem)

- 10.01.00.15.07.5-k JC 6/25/2018
- qla2xxx: Fix NPORT ID display for N2N Direct connect

- 10.01.00.14.07.5-k HM 6/24/2018
- qla2xxx: Fix spinlock resuctsion in qlt_reset()
- qla2xxx: Fix process response queue for ISP26XX and above
- qla2xxx: Fix NULL pointer derefrence for fcport search
- qla2xxx: Fix kernel crash due to late workqueue allocation
- qla2xxx: Alow nvme underrun to be handled transport.
- qla2xxx: Fix inconsistent DMA mem alloc/free
- qla2xxx: Fix Remote port registration
- qla2xxx: Remove Stale code from update_fw_options() settings

- 10.01.00.12.07.5-k HM 6/15/2018
- qla2xxx: Retry Loop resync when req/rsp is not setup
- qla2xxx: Fix NVMe Discovery
- qla2xxx: Fix SF_SCANNING flag for async_gnnft
- qla2xxx: Fix login_retry count
- qla2xxx: Update:qla2xxx: move command alloc to tcm_qla2xxx
- qla2xxx: move command alloc to tcm_qla2xxx
- qla2xxx: Fix double free of sp
- qla2xxx: assign NULL to dpc_thread before unloading to prevent crash
- qla2xxx: Fix crash for get_qpair()
- qla2xxx: Remove extra lock to reduce contention
- qla2xxx: fix sp-&gt;vha assignment problem
- qla2xxx: Reduce holding sess_lock to prevent CPU lock-up
- qla2xxx: Move qla2x00_start_sp behind qpair
- qla2xxx: Move {get|rel}_sp to base_qpair struct
- qla2xxx: Updated: Zio6 interrupt threashold

- 10.01.00.11.07.5-k HM 6/07/2018
- qla2xxx: zio6 interrupt threshold
- qla2xxx: UPDATE: serialize user space mailbox access.
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: fix out of order Termination and ABTS Resp
- qla2xxx: fix missing mutex_unlock
- qla2xxx: remove unneccessary byte swap
- scsi: qla2xxx: Fix incorrect handle for abort IOCB
- scsi: qla2xxx: Fix queue ID for async abort with Multiqueue
- qla2xxx: add detection of ABTS hang
- qla2xxx: fix ABTS response completion
- qla2xxx: serialize user space mailbox access.
- qla2xxx: allow speed set before chip is on
- qla2xxx: Tweak debug info for invalid RX_ID
- qla2xxx: fix deadlock between atio &amp; hw lock
- qla2xxx: remove redundant call to mark port lost
- qla2xxx: fix double Rport
- qla2xxx: serialize mailbox call.
- qla2xxx: fix erroneous debug log.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add support for setting port speed
- qla2xxx: holding off chip reset until target mode is enabled
- qla2xxx: Terminate Plogi/PRLI if WWN is 0
- qla2xxx: fix deadlock between qla &amp; target core drivers
- qla2xxx: Fix iIDMA error
- qla2xxx: Remove all rports if fabric scan retry fails
- qla2xxx: Force fw cleanup on ADISC error
- qla2xxx: Turn off IOCB timeout timer on IOCB completion
- qla2xxx: Decrement login retry count for only plogi
- qla2xxx: Move rport registration out of internal work_list
- qla2xxx: Remove redundant check for fcport deletion
- qla2xxx: Update rscn_rcvd field to more meaningful scan_needed
- qla2xxx: Use correct qpair for abort and cmd
- extras: Fixed find syntax in build.sh
- qla2xxx: Fix race between switch cmd completion and timeout
- qla2xxx: Flush mailbox commands on chip reset
- qla2xxx: Fix unintended Logout
- qla2xxx: Fix session state stuck in Get Port DB
- qla2xxx: Fix redundant fc_rport registration
- qla2xxx: Silent erroneous message
- qla2xxx: Prevent SysFS access when chip is down
- qla2xxx: Add longer window for Chip reset
- qla2xxx: Fix login retry count
- qla2xxx: Fix setting lower transfer speed if GPSC fails
- scsi: qla2xxx: Fix TMF and Multi-Queue config

- 10.01.00.10.07.5-k HM 6/05/2018
- qla2xxx: fix merge error
- qla2xxx: migrate NVME N2N handling into state machine
- qla2xxx: save frame payload size
- qla2xxx: fix N2N link re-connect

- 10.01.00.09.xx.y-k JC 5/24/2018
- scsi: qla2xxx: remove the unused tcm_qla2xxx_cmd_wq
- scsi: qla2xxx: Remove stale debug value for login_retry flag
- scsi: qla2xxx: Use predefined get_datalen_for_atio() inline function
- scsi: qla2xxx: Fix Inquiry command being dropped in Target mode
- scsi: qla2xxx: Move GPSC and GFPNID out of session management
- scsi: qla2xxx: Reduce redundant ADISC command for RSCNs
- scsi: qla2xxx: Delete session for nport id change
- scsi: qla2xxx: Fix Rport and session state getting out of sync
- scsi: qla2xxx: Fix sending ADISC command for login
- scsi: qla2xxx: Correct setting of SAM_STAT_CHECK_CONDITION
- scsi: qla2xxx: correctly shift host byte
- scsi: qla2xxx: Fix race condition between iocb timeout and initialisation
- scsi: qla2xxx: Avoid double completion of abort command
- scsi: qla2xxx: Fix small memory leak in qla2x00_probe_one on probe failure
- scsi: qla2xxx: fx00 copypaste typo
- scsi: qla2xxx: fix error message on &lt;qla2400
- scsi: qla2xxx: Fix Async GPN_FT for FCP and FC-NVMe scan
- scsi: qla2xxx: fix spelling mistake: "existant" -&gt; "existent"
- scsi: qla2xxx: Use dma_pool_zalloc()
- scsi: qla2xxx: Remove unused symbols
- scsi: qla2xxx: Use %p for printing pointers
- scsi: qla2xxx: Remove FC_NO_LOOP_ID for FCP and FC-NVMe Discovery
- scsi: qla2xxx: Fix crashes in qla2x00_probe_one on probe failure
- scsi: qla2xxx: Fix FC-NVMe LUN discovery
- scsi: qla2xxx: ensure async flags are reset correctly
- scsi: qla2xxx: do not check login_state if no loop id is assigned
- scsi: qla2xxx: Fixup locking for session deletion
- scsi: qla2xxx: Fix NULL pointer crash due to active timer for ABTS
- scsi: qla2xxx: Fix double free bug after firmware timeout
- scsi: qla2xxx: Fix a locking imbalance in qlt_24xx_handle_els()
- scsi: qla2xxx: Avoid triggering undefined behavior in qla2x00_mbx_completion()
- scsi: qla2xxx: Add XCB counters to debugfs
- scsi: qla2xxx: Fix warning during port_name debug print
- scsi: qla2xxx: Fix warning in qla2x00_async_iocb_timeout()
- scsi: qla2xxx: Fix recursion while sending terminate exchange
- scsi: qla2xxx: remove redundant assignment of d
- scsi: qla2xxx: Use zeroing allocator rather than allocator/memset
- scsi: qla2xxx: Serialize session deletion by using work_lock
- scsi: qla2xxx: Prevent relogin trigger from sending too many commands
- scsi: qla2xxx: Prevent multiple active discovery commands per session
- scsi: qla2xxx: Add retry limit for fabric scan logic
- scsi: qla2xxx: Delay loop id allocation at login
- scsi: qla2xxx: Increase verbosity of debug messages logged
- scsi: qla2xxx: Allow relogin and session creation after reset
- scsi: qla2xxx: Add ability to use GPNFT/GNNFT for RSCN handling
- scsi: qla2xxx: Properly extract ADISC error codes
- scsi: qla2xxx: Fix GPNFT/GNNFT error handling
- scsi: qla2xxx: Remove session creation redundant code
- scsi: qla2xxx: Migrate switch registration commands away from mailbox interface
- scsi: qla2xxx: Fix login state machine freeze
- scsi: qla2xxx: Reduce trace noise for Async Events
- scsi: qla2xxx: Reduce the use of terminate exchange
- scsi: qla2xxx: Add lock protection around host lookup
- scsi: qla2xxx: Add switch command to simplify fabric discovery
- scsi: qla2xxx: Use known NPort ID for Management Server login
- scsi: qla2xxx: Fix session cleanup for N2N
- scsi: qla2xxx: Tweak resource count dump
- scsi: qla2xxx: Allow target mode to accept PRLI in dual mode
- scsi: qla2xxx: Don't call dma_free_coherent with IRQ disabled.
- scsi: qla2xxx: Add ability to send PRLO
- scsi: qla2xxx: Add option for use reserve exch for ELS
- scsi: qla2xxx: Use shadow register for ISP27XX
- scsi: qla2xxx: Enable ATIO interrupt handshake for ISP27XX
- scsi: qla2xxx: Move work element processing out of DPC thread
- scsi: qla2xxx: Replace GPDB with async ADISC command
- scsi: qla2xxx: Relogin to target port on a cable swap
- scsi: qla2xxx: Chip reset uses wrong lock during IO flush.
- scsi: qla2xxx: Add boundary checks for exchanges to be offloaded
- scsi: qla2xxx: Use chip reset to bring down laser on unload.
- scsi: qla2xxx: Use IOCB path to submit Control VP MBX command
- scsi: qla2xxx: Fix smatch warning in qla25xx_delete_{rsp|req}_que
- scsi: qla2xxx: remove duplicate includes
- scsi: qla2xxx: Fix memory leak in dual/target mode
- scsi: qla2xxx: Fix system crash in qlt_plogi_ack_unref
- scsi: qla2xxx: Clear loop id after delete
- scsi: qla2xxx: Fix scan state field for fcport
- scsi: qla2xxx: Replace fcport alloc with qla2x00_alloc_fcport
- scsi: qla2xxx: Fix PRLI state check
- scsi: qla2xxx: Fix NPIV host cleanup in target mode
- scsi: qla2xxx: Move session delete to driver work queue
- scsi: qla2xxx: Fix gpnid error processing

- 10.01.00.08.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Fix NULL pointer crash with FC-NVMe LUNs during unload.

- 10.01.00.07.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Add fix to free dma memory.
- qla2xxx: Mask off Scope bits in retry delay.

- 10.01.00.06.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Remove module parameter ql2xqos_priority_test.
- qla2xxx: Add ability to process multiple CT-PT SGE's.

- 10.01.00.05.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Simplification of register address used in qla_tmpl.c.
- qla2xxx: Correction and improvement to fwdt processing.
- qla2xxx: Add correction to RDP FW support logic.
- qla2xxx: serialize sess free
- qla2xxx: serialize session deletion
- qla2xxx: prevent re_login trigger from sending too many commands
- qla2xxx: prevent multiple active discovery commands per session
- qla2xxx: Add log message for bbcr.
- qla2xxx: Remove alias names for QoS module parameters.

- 10.01.00.04.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Correction to non-existant fabric name.
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add qos fcport test mode.
- qla2xxx: Optimized logs for searching qos fcport table.
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Correction to function qla26xx_read_qos_fcport_table().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Allow 27xx and 28xx to do bidirectional commands.
- qla2xxx: Add RDP/ABTS deferred processing for vp's.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Rename QoS table row type and cleanup log prints.
- qla2xxx: Optimize reading of QoS fcport table.
- qla2xxx: Fixup/cleanup of QoS table index code.
- qla2xxx: Minor cleanup of flash calls reoganization.
- qla2xxx: Optimize flash register routines.
- qla2xxx: Fixup flash register routines.
- qla2xxx: Add debug prints to write flash routine.
- qla2xxx: Simplify flash slow write log messages.
- qla2xxx: Simplify NPIV create log messages.
- qla2xxx: Simplify D-Port Diagnostics log messages.
- qla2xxx: Cleanup log message for fwdt allocate.
- qla2xxx: Add non-verbose SFP detail print.
- qla2xxx: Quieten FEC=enabled message.
- qla2xxx: Use interrupt pin number for port number.

- 10.01.00.03.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Correction to EFT selection.
- qla2xxx: Correction to flash write routine.
- qla2xxx: Add correction to FW image selection.

- 10.01.00.02.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Convert FLT flash reads to register method.
- qla2xxx: Undo the replacements to -&gt;optrom_read() calls.
- qla2xxx: Flash reading routines cleanups.
- qla2xxx: Make flash write avoid register banging.

- 10.01.00.01.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Use registers for reading unaligned flash offset.
- qla2xxx: Fix PCI header and data struct addresses.
- qla2xxx: Fix and cleanup ROM code version string reading.
- qla2xxx: Corrections to flt-&gt;region addresses.
- qla2xxx: Add debug buffer dump for INITFW MBC.
- qla2xxx: Add debug logs for QoS sorting/searching.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: Add conditionals to avoid fcport QoS when it is not enabled.
- qla2xxx: Fix mis-pointing buffer in qla24xx_load_risc_flash().
- qla2xxx: Provide Makefile CPP define for MoB testing.
- qla2xxx: Fixup flash region code struct.
- qla2xxx: Fixup msix/msi vector selection.

- 10.01.00.00.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: Add dump buffer print when nvram checksum fails.
- qla2xxx: Refactor character signature compares into memcmp's.
- qla2xxx: Replace 0x%x with %#x in all format strings.
- qla2xxx: Normalize all flash reads to always use the dump ram mbc.
- qla2xxx: Flash image validation cleanups.
- qla2xxx: Add error test after dma_map_single.
- qla2xxx: Add support for ISP28XX.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Minor cleanup regarding device type.
- qla2xxx: Improve, correct, simplify fwdt endianess handling.
- qla2xxx: Use endian macros to assign dynamic fields in fwdump buffer.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add endianizers to 27xx firmware image validator.
- qla2xxx: Add new fwdt entry types.
- qla2xxx: Leave fwdt endianess alone.
- qla2xxx: Isolate test for valid firmware image.
- qla2xxx: Add support for multiple fwdump templates/segments.
- qla2xxx: Fix routine qla27xx_dump_mpi_ram().
- qla2xxx: Fix routine qla27xx_dump_ram().
- qla2xxx: Remove fwdt default template.

- 10.00.00.60.xx.y-k
RHEL7.5, SLES12.3 NVME
- qla2xxx: nvme features developed/added.</changelog>
  </package>
  <package pkgid="4b3fe6dd0a50e6c594e2bad9ba9f7eff67caef8c581ad25627e108e5e09421cc" name="smartpqi-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.2.10" rel="025.sles12sp3"/>
  </package>
  <package pkgid="13148269fb8a6543245925872e507febfa67e46c7b568a54c1906e3a0d5b9a7f" name="smartpqi-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.2.10" rel="025.sles12sp4"/>
  </package>
  <package pkgid="dbaa2ae8af965cfa45c44ad80f173a90c497bab9968b86006098b94041bed19c" name="smartpqi-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.2.10" rel="025.sles15sp0"/>
  </package>
  <package pkgid="c36e72848efa8c7061725aa8c4ac0078cbd9ea2b9c61195cdf763d78ac43ad38" name="smartpqi-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.2.10" rel="025.sles15sp1"/>
  </package>
  <package pkgid="0f95a04689f1d9651a9637132c0b5ac446e545df39d8f2d0e227a43b62c477c7" name="ssa" arch="x86_64">
    <version epoch="0" ver="4.15" rel="6.0"/>
    <changelog author="Ver:4.15-6.0" date="1570536000">- Please refer to online documentation by searching for the 
"Smart Storage Administrator Configuration Utility" using
the search box on http://www.hpe.com. Then select the Download
software link, select your operation system. Under the Enhancements
tab is a description of the changes. (Severity: Low)</changelog>
  </package>
  <package pkgid="80632df2bf157cd95dc935e3d5d582aec397399d3336a541defd302d5a8b2b3b" name="ssacli" arch="x86_64">
    <version epoch="0" ver="4.15" rel="6.0"/>
    <changelog author="Ver:4.15-6.0" date="1570536000">- Please refer to online documentation by searching for the 
"Smart Storage Administrator Configuration Utility CLI" using
the search box on http://www.hpe.com. Then select the Download
software link, select your operation system. Under the Enhancements
tab is a description of the changes. (Severity: Low)</changelog>
  </package>
  <package pkgid="08ca8391c59197504aa0822df40a55b085a3e04df4d9f8c0f8b5ed73b0c1c2bf" name="ssaducli" arch="x86_64">
    <version epoch="0" ver="4.15" rel="6.0"/>
    <changelog author="Ver:4.15-6.0" date="1570536000">- Please refer to online documentation by searching for the 
"Smart Storage Administrator Diagnostic Utility" using
the search box on http://www.hpe.com. Then select the Download
software link, select your operation system. Under the Enhancements
tab is a description of the changes. (Severity: Low)</changelog>
  </package>
  <package pkgid="d6fcf0f3ec7e8769196a3e62cb0498bc841cfeb1c3c0e3c753ffc47537848c5d" name="storcli" arch="noarch">
    <version epoch="0" ver="1.25.12" rel="1"/>
  </package>
  <package pkgid="4414c4823dd86e2f2ab1f81bae20c6cc7701c1e8e89a2e0ce5fa01cc8efb8743" name="sut" arch="x86_64">
    <version epoch="0" ver="2.5.0" rel="71.linux"/>
  </package>
  <package pkgid="5e51d4e826a4e454b2fb95d7c753d5b22686923d0f11386c845197c56a8b436d" name="tg3-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.137y_k4.12.14_23" rel="2.sles15"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137p" date="1466164800">- Update the copyright information for tg3 source files (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137q" date="1472558400">- Add support for SLES 12 SP2 (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497355200">- Add workaround for MRRS of 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
  </package>
  <package pkgid="ec52197d551d3bbe2e27ca1df537265808d0344fb580ca94f59bdbd858be4457" name="tg3-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.137y_k4.12.14_94.41" rel="2.sles12sp4"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137p" date="1466164800">- Update the copyright information for tg3 source files (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137q" date="1472558400">- Add support for SLES 12 SP2 (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497355200">- Add workaround for MRRS of 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
  </package>
  <package pkgid="310e023bc89de1a95161df1dc08f82eac3ee3738f4f8779a331de68b3f1c0d96" name="tg3-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.137y_k4.4.73_5" rel="2.sles12sp3"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137p" date="1466164800">- Update the copyright information for tg3 source files (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137q" date="1472558400">- Add support for SLES 12 SP2 (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497355200">- Add workaround for MRRS of 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
  </package>
</otherdata>
</manifest>
