<?xml version="1.0" encoding="UTF-8"?>
<manifest schema_version="2.0.0.0">
<otherdata xmlns="http://linux.duke.edu/metadata/other" packages="434">
  <package pkgid="65fa4cbd6e36e7182a9e8027d183ed7c2948c3c2332a11385b5177fab8517995" name="HPE-CNA-FC-Broadcom-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="12.0.1339.0" rel="1.rhel7"/>
    <changelog author="Broadcom Automated Build User" date="1497441600">- Changed version to 11.2
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1505995200">- Changed version to 11.4
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1507550400">- Changed version to 12.0
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
  </package>
  <package pkgid="4d41e6b4d473bf2113dfb9d4cd210602839f48af2373ab3ff90a66c22d0e76c6" name="HPE-CNA-FC-Broadcom-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="12.0.1339.0" rel="1.rhel8"/>
    <changelog author="Broadcom Automated Build User" date="1497441600">- Changed version to 11.2
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1505995200">- Changed version to 11.4
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1507550400">- Changed version to 12.0
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
  </package>
  <package pkgid="12e012ca09db5c86904f50c5a35c55a7748e7e3067d2c2b6a1a739e6d0cc4d2b" name="HPE-CNA-FC-Broadcom-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="12.0.1339.0" rel="1.sles12sp5"/>
    <changelog author="Broadcom Automated Build User" date="1497441600">- Changed version to 11.2
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1505995200">- Changed version to 11.4
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1507550400">- Changed version to 12.0
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
  </package>
  <package pkgid="0343ca85f804400b690f83d69829a61f7fe2a358f15e508cfef85cafddcdaf89" name="HPE-CNA-FC-Broadcom-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="12.0.1339.0" rel="1.sles15sp2"/>
    <changelog author="Broadcom Automated Build User" date="1497441600">- Changed version to 11.2
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1505995200">- Changed version to 11.4
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1507550400">- Changed version to 12.0
- Updated libbrcmdfc library 
- Updated libbrcmemsdm library 
- Updated libbrcmhbaapi library</changelog>
  </package>
  <package pkgid="270cf3b557bee054f7ae2daf80cd08cda0516d2fbf8a6a725f1d6d2bab21e843" name="HPE-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="12.8.526.0" rel="1.rhel7"/>
    <changelog author="Emulex Automated Build User" date="1379678400">- Changed version number to 6.4.12.3
- Fixed Bug 148456: Updated the spec file to use ldconfig -X</changelog>
    <changelog author="Emulex Automated Build User" date="1464782400">- Changed version to 10.7
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library 
- Added support for RHEL 7.2, SLES12 SP1</changelog>
    <changelog author="Broadcom Automated Build User" date="1497441600">- Changed version to 11.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1505995200">- Changed version to 11.4
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1507550400">- Changed version to 12.0
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1556539200">- Changed version to 12.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library
- Added support for RHEL 8, SLES 12 SP4, and SLES 15 SP1
- Removed support for SLES 11 SP3 and SLES 11 SP4</changelog>
    <changelog author="Broadcom Automated Build User" date="1566820800">- Changed version to 12.4
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library
- Added support for SLES 12 SP5
- Removed support for RHEL 6</changelog>
    <changelog author="Broadcom Automated Build User" date="1583150400">- Changed version to 12.6
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library
- Added support for SLES 15 SP2
- Removed support for SLES 12 SP2 and SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User" date="1583755200">- Changed version to 12.8
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1613044800">- Added support for SLES 15 SP3</changelog>
  </package>
  <package pkgid="8a2897c7c57a30116c48107072ede5e1b2f9cad554d18780be22a5e8afb9fd34" name="HPE-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="12.8.526.0" rel="1.rhel8"/>
    <changelog author="Emulex Automated Build User" date="1379678400">- Changed version number to 6.4.12.3
- Fixed Bug 148456: Updated the spec file to use ldconfig -X</changelog>
    <changelog author="Emulex Automated Build User" date="1464782400">- Changed version to 10.7
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library 
- Added support for RHEL 7.2, SLES12 SP1</changelog>
    <changelog author="Broadcom Automated Build User" date="1497441600">- Changed version to 11.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1505995200">- Changed version to 11.4
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1507550400">- Changed version to 12.0
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1556539200">- Changed version to 12.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library
- Added support for RHEL 8, SLES 12 SP4, and SLES 15 SP1
- Removed support for SLES 11 SP3 and SLES 11 SP4</changelog>
    <changelog author="Broadcom Automated Build User" date="1566820800">- Changed version to 12.4
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library
- Added support for SLES 12 SP5
- Removed support for RHEL 6</changelog>
    <changelog author="Broadcom Automated Build User" date="1583150400">- Changed version to 12.6
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library
- Added support for SLES 15 SP2
- Removed support for SLES 12 SP2 and SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User" date="1583755200">- Changed version to 12.8
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1613044800">- Added support for SLES 15 SP3</changelog>
  </package>
  <package pkgid="5efeaf4f4a9845a43358641a0df2eb1d54d41615b86a0f2edddbd69db8d8c453" name="HPE-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="12.8.526.0" rel="1.sles12sp5"/>
    <changelog author="Emulex Automated Build User" date="1379678400">- Changed version number to 6.4.12.3
- Fixed Bug 148456: Updated the spec file to use ldconfig -X</changelog>
    <changelog author="Emulex Automated Build User" date="1464782400">- Changed version to 10.7
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library 
- Added support for RHEL 7.2, SLES12 SP1</changelog>
    <changelog author="Broadcom Automated Build User" date="1497441600">- Changed version to 11.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1505995200">- Changed version to 11.4
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1507550400">- Changed version to 12.0
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1556539200">- Changed version to 12.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library
- Added support for RHEL 8, SLES 12 SP4, and SLES 15 SP1
- Removed support for SLES 11 SP3 and SLES 11 SP4</changelog>
    <changelog author="Broadcom Automated Build User" date="1566820800">- Changed version to 12.4
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library
- Added support for SLES 12 SP5
- Removed support for RHEL 6</changelog>
    <changelog author="Broadcom Automated Build User" date="1583150400">- Changed version to 12.6
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library
- Added support for SLES 15 SP2
- Removed support for SLES 12 SP2 and SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User" date="1583755200">- Changed version to 12.8
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1613044800">- Added support for SLES 15 SP3</changelog>
  </package>
  <package pkgid="ad17e581aee0ec59331b1d2a4cc8d1bd64f9a26a2204a92382729922ad6ff38f" name="HPE-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="12.8.526.0" rel="1.sles15sp2"/>
    <changelog author="Emulex Automated Build User" date="1379678400">- Changed version number to 6.4.12.3
- Fixed Bug 148456: Updated the spec file to use ldconfig -X</changelog>
    <changelog author="Emulex Automated Build User" date="1464782400">- Changed version to 10.7
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library 
- Added support for RHEL 7.2, SLES12 SP1</changelog>
    <changelog author="Broadcom Automated Build User" date="1497441600">- Changed version to 11.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1505995200">- Changed version to 11.4
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1507550400">- Changed version to 12.0
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1556539200">- Changed version to 12.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library
- Added support for RHEL 8, SLES 12 SP4, and SLES 15 SP1
- Removed support for SLES 11 SP3 and SLES 11 SP4</changelog>
    <changelog author="Broadcom Automated Build User" date="1566820800">- Changed version to 12.4
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library
- Added support for SLES 12 SP5
- Removed support for RHEL 6</changelog>
    <changelog author="Broadcom Automated Build User" date="1583150400">- Changed version to 12.6
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library
- Added support for SLES 15 SP2
- Removed support for SLES 12 SP2 and SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User" date="1583755200">- Changed version to 12.8
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1613044800">- Added support for SLES 15 SP3</changelog>
  </package>
  <package pkgid="68ac4416b72a49958f8745ed9d2cf325be1666ef189401d10888790c1e102d1d" name="HPE-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="12.8.526.0" rel="1.sles15sp3"/>
    <changelog author="Emulex Automated Build User" date="1379678400">- Changed version number to 6.4.12.3
- Fixed Bug 148456: Updated the spec file to use ldconfig -X</changelog>
    <changelog author="Emulex Automated Build User" date="1464782400">- Changed version to 10.7
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library 
- Added support for RHEL 7.2, SLES12 SP1</changelog>
    <changelog author="Broadcom Automated Build User" date="1497441600">- Changed version to 11.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1505995200">- Changed version to 11.4
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1507550400">- Changed version to 12.0
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1556539200">- Changed version to 12.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library
- Added support for RHEL 8, SLES 12 SP4, and SLES 15 SP1
- Removed support for SLES 11 SP3 and SLES 11 SP4</changelog>
    <changelog author="Broadcom Automated Build User" date="1566820800">- Changed version to 12.4
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library
- Added support for SLES 12 SP5
- Removed support for RHEL 6</changelog>
    <changelog author="Broadcom Automated Build User" date="1583150400">- Changed version to 12.6
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library
- Added support for SLES 15 SP2
- Removed support for SLES 12 SP2 and SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User" date="1583755200">- Changed version to 12.8
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1613044800">- Added support for SLES 15 SP3</changelog>
  </package>
  <package pkgid="c09279ab69a0c269fb4a058d35ded7e3a5d90b33e4f46e7618998a516fcb967d" name="HPE-CNA-FC-hpeqlgc-Enablement-Kit" arch="noarch">
    <version epoch="0" ver="6.0.0.0" rel="16"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1553083200">Enablement Kit Version: 6.0.0.0-7
---------------------------------

v6.04 build41:
-------------
Defect/Enhancement: Defect
Problem: BSG interface fails if /tmp is mounted with tmpfs on shared memory
Solution: Use /var/cache/sdmapi for BSG device creation
Introduced: v6.04 build1
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC, FCoE</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1555502400">Enablement Kit Version: 6.0.0.0-8
---------------------------------

v6.04 build45:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Add NVRAM parameter to select FCP or NVME targets
Introduced: v6.04 build45
Impact: HW: ISP2071, ISP2271, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build44:
-------------
Defect/Enhancement: Defect
Problem: Apps issues seen with NVME target in RHEL
Solution: Detect NVME target/luns by traversing sysfs tree
Introduced: v6.04 build42
Impact: HW: ISP2071, ISP2271, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build43:
-------------
Defect/Enhancement: Defect
Problem: Apps issues seen with NVME target in NPIV configuration
Solution: Set deafult value of NVME targets for NPIV ports
Introduced: v6.04 build42
Impact: HW: ISP2071, ISP2271, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build42:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Add NVME target support for QLogic/Marvell Apps
Introduced: v6.04 build42
Impact: HW: ISP2071, ISP2271, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1558094400">Enablement Kit Version: 6.0.0.0-9
---------------------------------

v6.04 build47:
-------------
Defect/Enhancement: Defect
Problem: Apps initialization delay seen with NPIV ports
Solution: Allow reading active flash regions for NPIV ports
Introduced: v6.04 build39
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build46:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Restrict application features for NVME targets
Introduced: v6.04 build45
Impact: HW: ISP2071, ISP2271, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1559908800">Enablement Kit Version: 6.0.0.0-10
----------------------------------

v6.04 build48:
-------------
Defect/Enhancement: Defect
Problem: NVME targets not seen when NVME Id and Subsys Id are different
Solution: Identify NVME targets using subsys Id
Introduced: v6.04 build42
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1565006400">Enablement Kit Version: 6.0.0.0-11
----------------------------------

v6.04 build49:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Allow SDGetActiveRegions API for 27xx based adapters
Introduced: v6.04 build45
Impact: HW: ISP2071, ISP2271, ISP2261, ISP2871, ISP2971, ISP2A61
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1572868800">Enablement Kit Version: 6.0.0.0-12
----------------------------------

v6.04 build52:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Allow SCM stats for NVMe targets for Marvell/QLogic Apps
Introduced: v6.04 build52
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

Defect/Enhancement: Enhancement
Problem: Modalias removal request from HPE
Solution: Remove modalias support from Enablement kit rpm
Introduced: Day One
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build51:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Add additional SCM stats for FCP targets for Marvell/QLogic Apps
Introduced: v6.04 build51
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

Defect/Enhancement: Defect
Problem: Corruption seen after flash update with some inbox drivers
	 when BSG device creation fails
Solution: Use /dev/bsg path to create BSG device creation
Introduced: v6.00 build9
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build50:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Allow SCM stats for FCP targets for Marvell/QLogic Apps
Introduced: v6.04 build50
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1587729600">Enablement Kit Version: 6.0.0.0-13
----------------------------------

v6.04 build55:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added MPI Firmware Dump support
Introduced: v6.04 build55
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271,
	    ISP2261, ISP2871, ISP2971, ISP2A61
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build54:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Secure remote port info support
Introduced: v6.04 build54
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build53:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Check driver for SCM stats support before reading SCM stats
Introduced: v6.04 build53
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1592481600">Enablement Kit Version: 6.0.0.0-14
----------------------------------

v6.04 build56:
-------------

Defect/Enhancement: Defect
Problem: LUN QoS API returns "Not Supported"
Solution: Fixed QoS value read issue in BSG path
Introduced: v6.04 build21
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271,
	    ISP2261, ISP2871, ISP2971, ISP2A61, ISP2031
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1593086400">Enablement Kit Version: 6.0.0.0-15
----------------------------------

v6.04 build57:
-------------

Defect/Enhancement: Defect
Problem: Delay seen in Application bringup on some inbox drivers
Solution: Do not perform retries for newer features if driver returns
	  not supported error
Introduced: v6.04 build28
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271,
	    ISP2261, ISP2871, ISP2971, ISP2A61
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="Marvell Semiconductor Inc." date="1599825600">Enablement Kit Version: 6.0.0.0-16
----------------------------------

v6.04 build63:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Allow NVMe specific APIs for newer ISPs
Introduced: v6.04 build63
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271,
	    ISP2261, ISP2871, ISP2971, ISP2A61
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build62:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added ISP FW and MPI FW lockdown bits
Introduced: v6.04 build62
Impact: HW: ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build61:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Provide lockdown mode error codes to apps
Introduced: v6.04 build61
Impact: HW: ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build60:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added adapter firmware lockdown support
Introduced: v6.04 build60
Impact: HW: ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build59:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added EP2989 support
Introduced: v6.04 build59
Impact: HW: EP2989
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build58:
-------------
Defect/Enhancement: Defect
Problem: HBA Parameters read fails for newer adapters for inbox drivers
Solution: Read active HBA Parameters region set from flash
Introduced: v6.04 build24
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
  </package>
  <package pkgid="2c13384eaecb26f64f4d0793609c2cd104d3b39ddcc78e0c69409f03d5ae489b" name="HPE-NFC-host-agent-RHEL" arch="x86_64">
    <version epoch="0" ver="1.1" rel="1.rhel7u8"/>
    <changelog author="Aravinda Rajanna&lt;aravinda.rajanna@hpe.com&gt; 1.0-1" date="1584532800">- Initial Development</changelog>
  </package>
  <package pkgid="b28a7daf6d33eb19b3ee52e192942307b2aa6f7494a7d0b2bc1bafe63ef3ac6b" name="HPE-NFC-host-agent-RHEL" arch="x86_64">
    <version epoch="0" ver="1.1" rel="1.rhel7u9"/>
    <changelog author="Aravinda Rajanna&lt;aravinda.rajanna@hpe.com&gt; 1.0-1" date="1584532800">- Initial Development</changelog>
  </package>
  <package pkgid="c67792532620b295d4c963220df4974505189d6c4ef66f9898115044bc918ad3" name="HPE-NFC-host-agent-RHEL" arch="x86_64">
    <version epoch="0" ver="1.1" rel="1.rhel8u4"/>
    <changelog author="Aravinda Rajanna&lt;aravinda.rajanna@hpe.com&gt; 1.0-1" date="1584532800">- Initial Development</changelog>
  </package>
  <package pkgid="688a5c95c2f26ff09954850da774298f8f94902f1b0f329cb4f6a2e4cb62186e" name="HPE-NFC-host-agent-RHEL" arch="x86_64">
    <version epoch="0" ver="1.1" rel="1.rhel8u5"/>
    <changelog author="Aravinda Rajanna&lt;aravinda.rajanna@hpe.com&gt; 1.0-1" date="1584532800">- Initial Development</changelog>
  </package>
  <package pkgid="53cee91fc5eee2c518f9401ef90ce00afba12549dc95f7958e93f67bd62c419d" name="HPE-NFC-host-agent-SLES" arch="x86_64">
    <version epoch="0" ver="1.1" rel="1.sles12sp5"/>
    <changelog author="Aravinda Rajanna&lt;aravinda.rajanna@hpe.com&gt; 1.0-1" date="1584532800">- Initial Development</changelog>
  </package>
  <package pkgid="34b756327c06f84dc014b62a2c5c7e065c6af1e7a69aae3c10fcbe5a63c8a5ee" name="HPE-NFC-host-agent-SLES" arch="x86_64">
    <version epoch="0" ver="1.1" rel="1.sles15sp2"/>
    <changelog author="Aravinda Rajanna&lt;aravinda.rajanna@hpe.com&gt; 1.0-1" date="1584532800">- Initial Development</changelog>
  </package>
  <package pkgid="2580b1d0560d6191f12a99edd715ec0086aa6bf1dd1154a921ad7caa748185c2" name="HPE-NFC-host-agent-SLES" arch="x86_64">
    <version epoch="0" ver="1.1" rel="1.sles15sp3"/>
    <changelog author="Aravinda Rajanna&lt;aravinda.rajanna@hpe.com&gt; 1.0-1" date="1584532800">- Initial Development</changelog>
  </package>
  <package pkgid="897ce5bbc07380dfb94292e0dc75bf0360da783f320b229f71e309ab2f530d8d" name="MRStorageAdministrator" arch="x86_64">
    <version epoch="0" ver="007.016.016.000" rel="00"/>
  </package>
  <package pkgid="3030567bd6300eb769070c7ffcc02c2244a09ad6232d53db6074a15701ca25d9" name="amsd" arch="x86_64">
    <version epoch="0" ver="2.6.0" rel="1701.1.rhel7"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.6.0-1701.1.rhel7" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="4aaed722b7004028b75198e90027f8c968ddda4e2124be36425f362f174d6cc0" name="amsd" arch="x86_64">
    <version epoch="0" ver="2.6.0" rel="1701.1.rhel8"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.6.0-1701.1.rhel8" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="f36f3a96ca28f907b919e31a0306697abf22cbb847d5dc43c0824526a50fbc81" name="amsd" arch="x86_64">
    <version epoch="0" ver="2.6.0" rel="1701.1.sles12"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.6.0-1701.1.sles12" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="7203de42f9c5ec7963c40dbfe6b260bddba18bb845fa190c1ba674d4117442bc" name="amsd" arch="x86_64">
    <version epoch="0" ver="2.6.0" rel="1701.1.sles15"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.6.0-1701.1.sles15" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="c181cd791d502cf59eb17236d95f295df806d09991e3ce2ec6e42b24358d320f" name="be2iscsi-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="80e483b27f6677fb4cdbc2ae4b914ba788b36edbc6d4641c0e9814ad1de3f011" name="be2iscsi-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0_k4.12.14_195" rel="1.sles15sp1"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="cbf7773c79d7e2aac74f8cc4cdd2329608770cf8027f78f0acac388f57d42db6" name="be2iscsi-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="51cfc3396ed1f442f2a931174456a7fdc3b3ed29cd6aa669302f525687579c7f" name="be2iscsi-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0_k5.3.18_22" rel="1.sles15sp2"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="67a40f707ddafe1be5c2c75a0432b4b0504c6b167a5c95ec8a1dfcc6cf00e1eb" name="be2net-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="Emulex Corporation &lt;tech.support@emulex.com&gt; 10.6.35.0" date="1424174400">-</changelog>
  </package>
  <package pkgid="108a54338c77e9335eadd46b085a520fce94cb1985e9a5431a9f200ceeb3c3b3" name="be2net-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0_k4.12.14_195" rel="1.sles15sp1"/>
    <changelog author="Emulex Corporation &lt;tech.support@emulex.com&gt; 10.6.35.0" date="1424174400">-</changelog>
  </package>
  <package pkgid="ec658c0d4f0f044226a7268d110832536da0732b5bf6d1286662c92f6d5f8596" name="be2net-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="Emulex Corporation &lt;tech.support@emulex.com&gt; 10.6.35.0" date="1424174400">-</changelog>
  </package>
  <package pkgid="892c03ae3dfa7be0b1f32d0eac3d120f3c33db0cf53770e05e223ea5b860f6ac" name="be2net-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0_k5.3.18_22" rel="1.sles15sp2"/>
    <changelog author="Emulex Corporation &lt;tech.support@emulex.com&gt; 10.6.35.0" date="1424174400">-</changelog>
  </package>
  <package pkgid="d9259ef974fa8109e8b7c447eacb89c88240f4e19975952c431474c04c0cb447" name="bnxt_en-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.10.2_k4.12.14_120" rel="219.0.55.0.sles12sp5"/>
  </package>
  <package pkgid="038461b8a360f895b775a6c0f8ad8f07a2615c4f2ffb2866750b9dbc60af4926" name="bnxt_en-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.10.2_k5.3.18_22" rel="219.0.55.0.sles15sp2"/>
  </package>
  <package pkgid="d2e073fa7ea034ff1877c94cd294d4208f9381b21a7afbd63632ffdb2222a9b6" name="bnxt_en-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.10.2_k5.3.18_57" rel="219.0.55.0.sles15sp3"/>
  </package>
  <package pkgid="794d7ffff074b77c5972c78a5b80987fcb7150d153d3717557397b9e074f82a0" name="brcmfcoe-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="Broadcom Automated Build User&#13;" date="1587384000">- Changed version to 12.0&#13;
- Initial build</changelog>
  </package>
  <package pkgid="476f60bede52ce68d40ddbc4bf3e985fae5ab753bf629718d91ebeb8ea832ad6" name="brcmfcoe-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0_k5.3.18_22" rel="1.sles15sp2"/>
    <changelog author="Broadcom Automated Build User&#13;" date="1587384000">- Changed version to 12.0&#13;
- Initial build</changelog>
  </package>
  <package pkgid="311e5b8ebe31159a9cfb8a84ce03a6ffa963a12bc2e1274402c1078418a9d0a1" name="elx-lpfc-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.8.528.7_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="Emulex Automated Build User&#13;" date="1442750400">- Changed version to 10.7&#13;
- Added support for RHEL 6U8&#13;
- Added support for RHEL 7U2&#13;
- Added support for SLES12 SP1</changelog>
    <changelog author="Emulex Automated Build User&#13;" date="1453723200">- Changed version to 11.0</changelog>
    <changelog author="Emulex Automated Build User&#13;" date="1472472000">- Changed version to 11.1&#13;
- Added support for RHEL 7U3&#13;
- Added support for SLES 12 SP2&#13;
- Removed support for RHEL 6U5</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1497441600">- Changed version to 11.2&#13;
- Added support for RHEL 6U9&#13;
- Added support for RHEL 7U4&#13;
- Added support for SLES 12 SP3&#13;
- Removed support for RHEL 7U0&#13;
- Removed support for SLES 12 SP0</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1505908800">- Changed version to 11.4&#13;
- Removed support for RHEL 6U6&#13;
- Removed support for RHEL 7U1&#13;
- Added support for RHEL 7U5&#13;
- Added support for SLES 15 SP0</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1507550400">- Changed version to 12.0&#13;
- Removed support for RHEL 6U7&#13;
- Removed support for SLES 12 SP1&#13;
- Added support for RHEL 6U10&#13;
- Added support for RHEL 7U6&#13;
- Added support for RHEL 8U0&#13;
- Added support for SLES 12 SP4&#13;
- Added support for SLES 15 SP1</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1556539200">- Changed version to 12.2&#13;
- Removed support for SLES 11 SP3&#13;
- Removed support for SLES 11 SP4&#13;
- Removed support for RHEL 6U8&#13;
- Removed support for RHEL 7U2&#13;
- Removed support for RHEL 7U3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1566820800">- Changed version to 12.4&#13;
- Added support for RHEL 7U7&#13;
- Added support for RHEL 8U1&#13;
- Added support for SLES 12 SP5&#13;
- Removed support for RHEL 6U9&#13;
- Removed support for RHEL 6U10&#13;
- Removed support for RHEL 7U4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1583150400">- Changed version to 12.6&#13;
- Added support for RHEL 7U8&#13;
- Added support for RHEL 8U2&#13;
- Added support for SLES 15 SP2&#13;
- Removed support for SLES 12 SP2&#13;
- Removed support for SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1587384000">- Changed version to 12.8&#13;
- Initial build</changelog>
  </package>
  <package pkgid="dcb137c5edfe8d92287c8be400ed64115d70b5fd474ac6a0c57d1f22df61b77b" name="elx-lpfc-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.8.528.7_k5.3.18_22" rel="1.sles15sp2"/>
    <changelog author="Emulex Automated Build User&#13;" date="1442750400">- Changed version to 10.7&#13;
- Added support for RHEL 6U8&#13;
- Added support for RHEL 7U2&#13;
- Added support for SLES12 SP1</changelog>
    <changelog author="Emulex Automated Build User&#13;" date="1453723200">- Changed version to 11.0</changelog>
    <changelog author="Emulex Automated Build User&#13;" date="1472472000">- Changed version to 11.1&#13;
- Added support for RHEL 7U3&#13;
- Added support for SLES 12 SP2&#13;
- Removed support for RHEL 6U5</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1497441600">- Changed version to 11.2&#13;
- Added support for RHEL 6U9&#13;
- Added support for RHEL 7U4&#13;
- Added support for SLES 12 SP3&#13;
- Removed support for RHEL 7U0&#13;
- Removed support for SLES 12 SP0</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1505908800">- Changed version to 11.4&#13;
- Removed support for RHEL 6U6&#13;
- Removed support for RHEL 7U1&#13;
- Added support for RHEL 7U5&#13;
- Added support for SLES 15 SP0</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1507550400">- Changed version to 12.0&#13;
- Removed support for RHEL 6U7&#13;
- Removed support for SLES 12 SP1&#13;
- Added support for RHEL 6U10&#13;
- Added support for RHEL 7U6&#13;
- Added support for RHEL 8U0&#13;
- Added support for SLES 12 SP4&#13;
- Added support for SLES 15 SP1</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1556539200">- Changed version to 12.2&#13;
- Removed support for SLES 11 SP3&#13;
- Removed support for SLES 11 SP4&#13;
- Removed support for RHEL 6U8&#13;
- Removed support for RHEL 7U2&#13;
- Removed support for RHEL 7U3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1566820800">- Changed version to 12.4&#13;
- Added support for RHEL 7U7&#13;
- Added support for RHEL 8U1&#13;
- Added support for SLES 12 SP5&#13;
- Removed support for RHEL 6U9&#13;
- Removed support for RHEL 6U10&#13;
- Removed support for RHEL 7U4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1583150400">- Changed version to 12.6&#13;
- Added support for RHEL 7U8&#13;
- Added support for RHEL 8U2&#13;
- Added support for SLES 15 SP2&#13;
- Removed support for SLES 12 SP2&#13;
- Removed support for SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1587384000">- Changed version to 12.8&#13;
- Initial build</changelog>
  </package>
  <package pkgid="2b549286674763b67ff2464d6a27fa4d8d531c6c73613cad6fd6861e0954572d" name="elx-lpfc-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.8.528.7_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="Emulex Automated Build User&#13;" date="1442750400">- Changed version to 10.7&#13;
- Added support for RHEL 6U8&#13;
- Added support for RHEL 7U2&#13;
- Added support for SLES12 SP1</changelog>
    <changelog author="Emulex Automated Build User&#13;" date="1453723200">- Changed version to 11.0</changelog>
    <changelog author="Emulex Automated Build User&#13;" date="1472472000">- Changed version to 11.1&#13;
- Added support for RHEL 7U3&#13;
- Added support for SLES 12 SP2&#13;
- Removed support for RHEL 6U5</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1497441600">- Changed version to 11.2&#13;
- Added support for RHEL 6U9&#13;
- Added support for RHEL 7U4&#13;
- Added support for SLES 12 SP3&#13;
- Removed support for RHEL 7U0&#13;
- Removed support for SLES 12 SP0</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1505908800">- Changed version to 11.4&#13;
- Removed support for RHEL 6U6&#13;
- Removed support for RHEL 7U1&#13;
- Added support for RHEL 7U5&#13;
- Added support for SLES 15 SP0</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1507550400">- Changed version to 12.0&#13;
- Removed support for RHEL 6U7&#13;
- Removed support for SLES 12 SP1&#13;
- Added support for RHEL 6U10&#13;
- Added support for RHEL 7U6&#13;
- Added support for RHEL 8U0&#13;
- Added support for SLES 12 SP4&#13;
- Added support for SLES 15 SP1</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1556539200">- Changed version to 12.2&#13;
- Removed support for SLES 11 SP3&#13;
- Removed support for SLES 11 SP4&#13;
- Removed support for RHEL 6U8&#13;
- Removed support for RHEL 7U2&#13;
- Removed support for RHEL 7U3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1566820800">- Changed version to 12.4&#13;
- Added support for RHEL 7U7&#13;
- Added support for RHEL 8U1&#13;
- Added support for SLES 12 SP5&#13;
- Removed support for RHEL 6U9&#13;
- Removed support for RHEL 6U10&#13;
- Removed support for RHEL 7U4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1583150400">- Changed version to 12.6&#13;
- Added support for RHEL 7U8&#13;
- Added support for RHEL 8U2&#13;
- Added support for SLES 15 SP2&#13;
- Removed support for SLES 12 SP2&#13;
- Removed support for SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1587384000">- Changed version to 12.8&#13;
- Initial build</changelog>
  </package>
  <package pkgid="19dc8e8eba373723ecec11c43225f91461f054101d23c080ec20af99188d5405" name="fibreutils" arch="x86_64">
    <version epoch="0" ver="4.2" rel="1_rhel"/>
    <changelog author="Chad Dupuis &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1-3" date="1260446400">- Fixed discovery of HBAs in adapter_info on Integrity servers with multiple PCI
  busses</changelog>
    <changelog author="Keith Wortman &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-3" date="1298635200">- Initial release with Emulex CNA support</changelog>
    <changelog author="Keith Wortman &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-4" date="1323345600">- Fix for dependency check error seen when installing with HPSUM</changelog>
    <changelog author="Kumar Rahul&lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-5" date="1329220800">- Removed installation check for kernel 2.6 and addded Installation check for Rhel5.3 and SLES10 SP3 onwards</changelog>
    <changelog author="Shreya Roy Chowdhury&lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-6" date="1355832000">- Corrected Link state display information for Qlogic Adapters
- Added MSA G3 support in Scsi_info.h</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 3.3-6" date="1557316800">-Perl dependancy fix for RHEL8</changelog>
    <changelog author="Ratna Dey&lt;rathna.dey@hpe.com&gt; and Aravinda Rajanna &lt;aravinda.rajanna@hpe.com&gt; 4.1-1" date="1561550400">-Initial support added for E4 and will get updated subsequently</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.1-1" date="1563451200">-Fixed adpater_info code to display correct Vendor name instead of Unknown</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.1-1" date="1564056000">-Removed Brocade HBAs support</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.2-1" date="1630584000">-Removed adapter_info_nx code for E4 adapters</changelog>
  </package>
  <package pkgid="ace72c27bedb84aea710b36b06402c3d0ea122595c85d8bdd12cf8a7ac5727a7" name="fibreutils" arch="x86_64">
    <version epoch="0" ver="4.2" rel="1_sles"/>
    <changelog author="Chad Dupuis &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1-3" date="1260446400">- Fixed discovery of HBAs in adapter_info on Integrity servers with multiple PCI
  busses</changelog>
    <changelog author="Keith Wortman &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-3" date="1298635200">- Initial release with Emulex CNA support</changelog>
    <changelog author="Keith Wortman &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-4" date="1323345600">- Fix for dependency check error seen when installing with HPSUM</changelog>
    <changelog author="Kumar Rahul&lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-5" date="1329220800">- Removed installation check for kernel 2.6 and addded Installation check for Rhel5.3 and SLES10 SP3 onwards</changelog>
    <changelog author="Shreya Roy Chowdhury&lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-6" date="1355832000">- Corrected Link state display information for Qlogic Adapters
- Added MSA G3 support in Scsi_info.h</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 3.3-6" date="1557316800">-Separated code stream for RHEL and SLES</changelog>
    <changelog author="Ratna Dey&lt;rathna.dey@hpe.com&gt; and Aravinda Rajanna &lt;aravinda.rajanna@hpe.com&gt; 4.1-1" date="1561550400">-Initial support added for E4 and will get updated subsequently</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.1-1" date="1563451200">-Fixed adpater_info code to display correct Vendor name instead of Unknown</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.1-1" date="1564056000">-Removed Brocade HBAs support</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.2-1" date="1630584000">-Removed adapter_info_nx code for E4 adapters</changelog>
  </package>
  <package pkgid="bb81894956ce6df112f83b13eeb9b5c469c8323751e2370f4db911466f5fdbd9" name="firmware-8586fe2547" arch="x86_64">
    <version epoch="0" ver="1.24" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22" date="1632830400">-      Update device guid
      * Fixed FW update causing NVME drive missing</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.24" date="1644235200">-     Fix issues</changelog>
  </package>
  <package pkgid="22dd326dc1502095bc7ba451ef700dddc4d6923e74c97181e8161d90e316840b" name="firmware-b303c4dfec" arch="x86_64">
    <version epoch="0" ver="1.46" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.42" date="1634644800">-     Fixed to correct the NVMe drive functionality</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.42-2.1" date="1636545600">-     Correct device GUID.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.46" date="1644148800">-</changelog>
  </package>
  <package pkgid="899e327361723eca8026aa09c55732ae2c78b6828a52a94d375539fdc6487fe5" name="firmware-cafee9b6e4" arch="x86_64">
    <version epoch="0" ver="24.23.0_0043" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 24.23.0-0019" date="1515499200">-      Initial Release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 24.23.0-0019-2.1" date="1540468800">-     Customers who already installed firmware version 24.23.0-0019 do not need to
    update to 24.23.0-0019 (B).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 24.23.0-0019-2.1" date="1540555200">-      Releasing support for SUSE LINUX Enterprise Server 15 OS</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 24.23.0-0042" date="1548676800">-      Added support for the Apollo 4510 system</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 24.23.0-0042-1.1" date="1565265600">-     Fixes installation issues with Intelligent Provisioning and Service Pack for
    ProLiant Offline.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 24.23.0-0043-1.1" date="1594987200">-     Over-temp issue was a false IML due to a &gt;=60C threshold, modified the
    threshold to &gt;65C in new version.
    
    Please reference Customer Advisory
    [a00101958en_us](https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-
    a00101958en_us)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 24.23.0-0043-2.1" date="1600084800">-</changelog>
  </package>
  <package pkgid="e6291321e2bb5b9b420e8903bcda5eb0fafd94c191b27cc55308ab01d956b920" name="firmware-cna-emulex" arch="x86_64">
    <version epoch="0" ver="2021.10.01" rel="1.8"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.03.01" date="1548331200">-     Fixed the following:
    
      * Fixed unexpected behavior in Active Health System (AHS) logs show World Wide Node Name (wwnn) &amp; World Wide Port Name (wwpn) in reverse order.
      * Fixed unexpected behavior with HP FlexFabric 20Gb 2-port 650FLB Adapter, HP FlexFabric 20Gb 2-port 650M Adapter cards does not complete to boot to Linux SUSE Linux Enterprise Server 12 Service Pack 3(SLES12 SP3) Operating System (OS) when both adapter are enabled for Fibre Channel over Ethernet (FCoE) boot.
      * Microsoft Windows Server 2012 R2 Hyper-V Storage Area Network (SAN) Disconnect.
      * Link lost with firmware version 11.2.1263.19
      * "FW not responding" message seen on card when creating Virtual Function (VF) in loop for HPE StoreFabric CN1200E-T 10GBASE-T Converged Network Adapter [NIC+ iSCSI] in Gen10 server.
      * HP FlexFabric 20Gb 2-port 650FLB Adapter - Loss of access to storage after Virtual Connect (VC) login redistribution
      * HP StoreFabric CN1200E Dual Port Converged Network Adapter does not complete to boot in Legacy Mode on Gen 9 Server
      * Emulex Peripheral Component Interconnect (PCI) slot Network Interface Connector (NIC) reported as device path instead of product name
      * Unable to disable shared memory feature in Human Interface Infrastructure (HII) menu
      * 650M Adapter has some info in Chinese and Japanese show garbled code under Human Interface Infrastructure (HII) Form</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.12.01" date="1577102400">-     We have separate components to update fibre channel and converged network
    adapters.  This is a converged network adapter update component.  
      
    Updated CNA (XE100 series) firmware
    
    **Firmware**
    
    Contains:  
    CNA (XE100 series) firmware 12.0.1280.5</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.12.01" date="1577188800">-     Fixed the following:
    
    UEFI:
    
      * Change Unified Extensible Firmware Interface (UEFI) support version from 2.6 to 2.7
      * HPE FlexFabric 20Gb 2-port 650FLB Adapter and HPE FlexFabric 20Gb 2-port 650M Adapter does not complete to create boot source on 2nd port
    
    Firmware:
    
      * Light Emiiting Diode(LED) is in invalid state when disable the port under Unified Extensible Firmware Interface (UEFI)
      * Duplicate Entries found in firmware report under NIC details for few adaptors.
      * Full adapter name is not displayed for HPE FlexFabric 20Gb 2-port 650M Adapter in some Rom Based Setup Utility (RBSU).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.12.01-2.8" date="1591531200">-     We have separate components to update fibre channel and converged network
    adapters.  This is a converged network adapter update component.  
      
    Updated CNA (XE100 series) firmware
    
    **Firmware**
    
    Contains:  
    CNA (XE100 series) firmware 12.0.1280.5</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.12.01-2.8" date="1591617600">-     Fixed the following:
    
    UEFI:
    
      * HPE FlexFabric 20Gb 2-port 650FLB Adapter and HPE FlexFabric 20Gb 2-port 650M Adapter does not complete to create boot source on 2nd port
    
    Firmware:
    
      * Light Emiiting Diode(LED) is in invalid state when disable the port under Unified Extensible Firmware Interface (UEFI)
      * Duplicate Entries found in firmware report under NIC details for few adaptors.
      * Full adapter name is not displayed for HPE FlexFabric 20Gb 2-port 650M Adapter in some Rom Based Setup Utility (RBSU).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2020.09.01" date="1595246400">-     We have separate components to update fibre channel and converged network
    adapters.  This is a converged network adapter update component.  
      
    Updated CNA (XE100 series) firmware
    
    **Firmware**
    
    Contains:  
    CNA (XE100 series) firmware 12.0.1280.5</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2020.09.01" date="1595332800">-     Fixed the following:
    
    UEFI:
    
      * HPE FlexFabric 20Gb 2-port 650FLB Adapter and HPE FlexFabric 20Gb 2-port 650M Adapter does not complete to create boot source on 2nd port
    
    Firmware:
    
      * Light Emiiting Diode(LED) is in invalid state when disable the port under Unified Extensible Firmware Interface (UEFI)
      * Duplicate Entries found in firmware report under NIC details for few adaptors.
      * Full adapter name is not displayed for HPE FlexFabric 20Gb 2-port 650M Adapter in some Rom Based Setup Utility (RBSU).
      * On any HPE ProLiant server configured with the HPE Emulex XE-102 Based network adapter HPE FlexFabric 10Gb 2-port 556FLR-T Adapter with CNA (XE100 series) firmware 12.0.1110.0, 12.0.1110.10, or 12.0.1110.11 (or later), the network adapters may experience a "link down" state that is not recoverable by a power-cycle or reset.
    
              For more details please go through the document titled "HPE ProLiant Servers Configured With Certain HPE Emulex XE-102 Based Network Adapters May Experience Link Down Due To a Firmware Issue" at the following link:&lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.02.01" date="1614686400">-     Updated CNA (XE100 series) firmware
    
    This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    Universal Boot Image
    
    Firmware
    
    UEFI
    
    Boot BIOS
    
    HPE FlexFabric 10Gb 2-port 556FLR-T Adapter
    
    10Gb
    
    12.0.1277.0
    
    12.0.1336.0
    
    12.0.1269.0
    
    12.0.1171.0
    
    HPE FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter
    
    10Gb
    
    12.0.1277.0
    
    12.0.1336.0
    
    12.0.1269.0
    
    12.0.1171.0
    
    HPE CN1200E Dual Port Converged Network Adapter
    
    20Gb
    
    12.0.1277.0
    
    12.0.1336.0
    
    12.0.1269.0
    
    12.0.1171.0
    
    HPE CN1200E-T Dual Port Adapter
    
    20Gb
    
    12.0.1277.0
    
    12.0.1336.0
    
    12.0.1269.0
    
    12.0.1171.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.02.01" date="1614772800">-     *Fixed the following:**
    
      * Fixed a behavior with internal engineering data display</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.10.01" date="1614859200">-</changelog>
  </package>
  <package pkgid="3f21023bf8944dfc5dac00eacb7a37fba46e95151ba8fc205770191b42811e55" name="firmware-d3000" arch="x86_64">
    <version epoch="0" ver="5.04" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.04-2.1" date="1534852800">-     *The following fix was incorporated in this version:**
    
      *  Fixed NVRAM CRC error
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v155369/D3000_P07231-002.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.04-3.1" date="1540209600">-     *The following fix was incorporated in this version:**
    
      *  Fixed NVRAM CRC error
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v157942/P07231-003.html) for the complete listing of fixes,
    enhancements, known issues and work-arounds corresponding to this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.12" date="1551700800">-     *The following fixes were incorporated in this version:**
    
      * Fixed TLB exception during upgrade from Rev build 1.11.000 to 0412.000
    
      * Fixed expander bootstrap task which failed with 0xB1 error code appearing in the console due to missing NVRAM tag - Product Name
    
      * Enabled-ClusterS2D command that does not complete with SATA drive in D3610
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v154196/D3000_P07231-004.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04" date="1601985600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04" date="1602072000">-     *The following fixes were incorporated in this version:**
    
      * The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.
    
      * The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.
    
      * Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.
    
      * If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v177052/D3000_P07231-006.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04-2.1" date="1618833600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04-2.1" date="1618920000">-     *The following fixes were incorporated in this version:**
    
      * The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.
    
      * The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.
    
      * Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.
    
      * If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v191363/D3000_v5.04B.html) for the complete listing of fixes,
    enhancements, known issues and work-arounds corresponding to this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04-3.1" date="1636977600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04-3.1" date="1637064000">-     *The following fixes were incorporated in this version:**
    
      * The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.
    
      * The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.
    
      * Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.
    
      * If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v202692/20-D3000-Gen10RN504C_ED3.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04-4.1" date="1640347200">-     *The following fixes were incorporated in this version:**
    
      * The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.
    
      * The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.
    
      * Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.
    
      * If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v202692/20-D3000-Gen10RN504C_ED3.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
  </package>
  <package pkgid="e5d71fa846019531502e8db11aff4f102707637f4b9ca60ea9d7010dc9c436e2" name="firmware-d6020" arch="x86_64">
    <version epoch="0" ver="2.74" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-4.1" date="1572955200">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v172139/D6020_P07232-006.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-5.1" date="1586347200">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 8</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-5.1" date="1586433600">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v177006/D6020_v274_RN.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-7.1" date="1601985600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-7.1" date="1602072000">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v183133/D6020_P07232-008.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-9.1" date="1618833600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-9.1" date="1618920000">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v191364/D6020_v2.74I.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-10.1" date="1636977600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-10.1" date="1637064000">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v202690/20-D6020-Gen10RN274J_ED8.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-11.1" date="1640779200">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v202690/20-D6020-Gen10RN274J_ED8.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
  </package>
  <package pkgid="b376dc6e3d608e92b9711511723406b32992b9a4889b88120b8f4cc0c229d6cb" name="firmware-d8000" arch="x86_64">
    <version epoch="0" ver="0118" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0102" date="1569326400">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 8</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0102" date="1569412800">-     *The following fixes were incorporated in this version:**
    
      * SAS drive LED behavior was corrected to align with the Smart Array specification, specifically: 
        * The Activity LED of a sanitize erase drive now turns ON when connected.
    
        * The Array present LED now turns ON for the SAS drive.
    
        * The Activity LED now blinks on all drives during a SAS drive rebuild.
    
      * SATA logical drives now display as available after a simultaneous power restore to the server and the D8000.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v168048/D8000_v0102_RN.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0105" date="1572955200">-     *The following fixes were incorporated in this version:**
    
      * SAS drive LED behavior was corrected to align with the Smart Array specification, specifically: 
        * The Activity LED of a sanitize erase drive now turns ON when connected.
    
        * The Array present LED now turns ON for the SAS drive.
    
        * The Activity LED now blinks on all drives during a SAS drive rebuild.
    
      * The Serial Output Buffer (SOB) has a fixed sized for stored entries. Now, when the buffer is full, the oldest entries are cleared or committed to persistent storage (if available). For this reason, subsequent requests to read the SOB only retrieves new entries that have been logged since the last successful request to read the SOB.
    
      * The drive activity LED has been changed to a function as described in the installation and maintenance guide.
    
      * The reboot flag was changed to issue a hard reset, which enables the service delivery subsystem (ZPSDS) information be shared across (expanded across) the internal expanders to all devices attached.
    
      * The drive activity LED on the SAS disk drives was changed to support the ACTIVE_LOW signal state. The ACTIVE_LOW signal state is the default operation state for most drives.
    
      * The SCSI WRITE BUFFER MODE was changed from activate to soft reset. This change improves the host ability to detect and report whether the enclosure is going to perform a disruptive or non-disruptive activation after a firmware upgrade.
    
      * With I/O module firmware v0105 and PQI firmware 2.02 , the slot power cycle issue has been resolved by changing the power cycle SES request to return a failure when a partner slot is not connected.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v172138/D8000_P20366-002.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0107" date="1601985600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0107" date="1602072000">-     *The following fixes were incorporated in this version:**
    
      * In STD INQUIRY RESPONSE, the ErrM bit was always being set. The ErrM bit indicates that the enclosure firmware detects a mismatch in any of its package versions and the firmware version of a FRU component. The issue was due to an incorrect version of PSU firmware being included and that has been fixed.
    
      * After installing the latest firmware on the enclosure I/O modules, the SES targets could not be discovered on the host. The virtual phy bit in SMP DISCOVER RESPONSE, which is used by the Microchip smartpqi HBA, was det for the virtual phy of the I/O module.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v183134/D8000_P20366-004.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0111" date="1618833600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0111" date="1618920000">-     *The following fixes were incorporated in this version:**
    
      * Incorrect programming of the PHY ERROR COUNTERS parameter caused the amber LED to be lit, resulting in a false warning. The counter condition was corrected and the amber LED now functions correctly.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v191365/D8000_v0111.html) for the complete listing of fixes,
    enhancements, known issues and work-arounds corresponding to this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0118" date="1635163200">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0118" date="1635249600">-     *The following fixes were incorporated in this version:**
    
      * User was not able to collect ddump logs.
    
      * Logical Fault LED remains ON even after clearing the fault using "reboot soft"
    
      * Vendor ID showed as "DEFAULT" for D8000 expander in SSACLI enclosure detail
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v203448/20-D8000-Gen10RN0118_ED1.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0118-1.1" date="1640260800">-     *The following fixes were incorporated in this version:**
    
      * User was not able to collect ddump logs.
    
      * Logical Fault LED remains ON even after clearing the fault using "reboot soft".
    
      * Vendor ID showed as "DEFAULT" for D8000 expander in SSACLI enclosure detail.
    
      * Fixes a problem where after upgrade, drives in slots 1 - 96 may not appear.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v203448/20-D8000-Gen10RN0118_ED1.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
  </package>
  <package pkgid="d66cce2256f6870c23565fe9c6edbe6858edddd9f63924d7374c174a8940a58b" name="firmware-dcpmm" arch="x86_64">
    <version epoch="0" ver="1.2.0.5446" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0.5375" date="1561982400">-     Initial release of Firmware for HPE Persistent Memory for Gen10 Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0.5435" date="1585742400">-     Initial release of Firmware for HPE Persistent Memory for Gen10 Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0.5435-2.1" date="1599220800">-      Initial release of Firmware for HPE Persistent Memory for Gen10 Servers.
      * This product contains mainly performance improvements.
      * This product now supports Red Hat Enterprise Linux 8 and SUSE Linux Enterprise Server 12.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0.5446" date="1621512000">-     .</changelog>
  </package>
  <package pkgid="a1c38c3758f094f6b35e263232c8fabbb706d7406ed543034efe1e5d87e24330" name="firmware-dcpmm" arch="x86_64">
    <version epoch="0" ver="2.2.0.1553" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.2.0.1553" date="1622462400">-     Initial release of Firmware for HPE Persistent Memory for Gen10 Plus Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.2.0.1553-2.1" date="1624276800">-     This product corrects an issue that three different capacities of Intel Optane
    DC Persistent Memory are identifiable with three individual device GUID.</changelog>
  </package>
  <package pkgid="84a40a7d07f8413a02f7bfde0b73800dee59e5c8cd337a37c5af880bae3a950c" name="firmware-dl20gen10plus_me" arch="x86_64">
    <version epoch="0" ver="06.00.03.039" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.039" date="1645358400">-</changelog>
  </package>
  <package pkgid="969d5c5aa01289a21d9a5f344978a4319093e25281a5207191b1ec02a614d087" name="firmware-dl20ml30gen10sps" arch="x86_64">
    <version epoch="0" ver="05.01.04.400" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.00.03.107" date="1566993600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.03.078" date="1567166400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Silicon Platform Services (SPS) Firmware provides
    mitigation to the latest CSME security vulnerabilities, also known as Local
    Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.03.094" date="1575633600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision contains the latest Intel Server Platform Services (SPS)
    Firmware which provides mitigations for CVE-2019-11090 and CVE 2019-11109. The
    issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.113" date="1591617600">-     This image contains the latest Intel Server Platform Services (SPS) Firmware
    which contains mitigations for a variety of security vulnerabilities. The
    following vulnerabilities have been addressed in this SPS release:
    CVE-2020-0545 and CVE-2020-0586. These issues are not unique to HPE Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.208" date="1604923200">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2020-8755. This security
    vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.303" date="1623067200">-     See the release document in Download Product Binaries page from Product
    Summary of the firmware product.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.303" date="1623153600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services (SPS) Firmware provides
    mitigations for SPS security vulnerabilities documented as CVE-2020-24509.
    These security vulnerabilities are documented in Intel Security Advisory
    INTEL-SA-00459.  These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.400" date="1645704000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services (SPS) Firmware provides
    mitigations for SPS security vulnerabilities documented as CVE-2021-0060. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="75b71c313bedcf0971299e7f85e77ed25453953626872a82805378ed6cdc255c" name="firmware-fc-emulex" arch="x86_64">
    <version epoch="0" ver="2022.03.01" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.12.02" date="1581595200">-     We  have separate components to update fibre channel and converged network
    adapters. This is a fibre channel update component.
    
    **Contains:**
    
    16/32 Gb HBA/Mezz universal boot 12.4.270.14  
    16 Gb HBA/Mezz universal boot 12.4.270.10
    
    8 Gb standup/mezz firmware 2.10X6
    
    8 Gb standup/mezz universal boot image 12.40a6 (12.4.262.0 BIOS, 12.4.153.0
    UEFI)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.12.02" date="1581681600">-     Fix the following:
    
    Where Host Bus Adapters reporting address NACKs (No Acknowledgements) from
    external temperature sensors.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2020.06.02" date="1596369600">-     This is a fibre channel component.
    
    Added support for the following:
    
      * Code update to support new flash vendors
    
    Contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.6.275.24
    
    12.6.275.24
    
    12.6.275.7
    
    12.6.271.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.6.275.24
    
    12.6.275.24
    
    12.6.275.7
    
    12.6.271.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2020.09.01" date="1596456000">-     We  have separate components to update fibre channel and converged network
    adapters. This is a fibre channel update component.
    
    **Contains:**
    
    
    
    32 Gb universal boot 12.6.275.12(EFI 12.6.275.7 BOOT BIOS 12.6.271.0 Firmware
    12.6.275.12)
    
    16/32 Gb universal boot 12.6.275.12(EFI 12.6.275.7 BOOT BIOS 12.6.271.0
    Firmware 12.6.275.12)
    
    16 Gb universal boot 12.6.275.12(EFI 12.6.275.7 BOOT BIOS 12.6.271.0 Firmware
    12.6.275.12)
    
    8 Gb HBA Standup firmware 2.10X6  
    8 Gb standup universal boot image 12.60a4(12.6.302.0 BIOS, 12.6.284.0 UEFI)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.02.01" date="1615118400">-     *Added the following:-**
    
      * Added support for Distributed Management Task Force (DMTF) - Platform Level Data Model (PLDM) Firmware Update to the SN1200E, SN1600E, and SN1610E
      * The adapter will now reset to defaults when the user activates Hewlett Packard Enterprise (HPE) Secure Erase from Hewlett Packard Enterprise (HPE) intelligent provisioning
      * Added support for Fabric Performance Impact Notifications (FPIN)
    
    
    
    This Firmware package contains following firmware versions:
    
    
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE 81E 8Gb Single Port PCIe Fibre Channel Host Bus Adapter
    
    8Gb
    
    12.80a3
    
    2.10X6
    
    12.8.183.0
    
    12.8.9.0
    
    HPE 82E 8Gb Dual Port PCIe Fibre Channel Host Bus Adapter
    
    8Gb
    
    12.80a3
    
    2.10X6
    
    12.8.183.0
    
    12.8.9.0
    
    HPE 84E 8Gb Quad Port Fibre Channel Host Bus Adapter
    
    8Gb
    
    12.80a3
    
    2.10X6
    
    12.8.183.0
    
    12.8.9.0
    
    HPE SN1000E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    12.8.352.12
    
    12.8.352.12
    
    12.8.352.10
    
    12.8.352.5
    
    HPE SN1000E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    12.8.352.12
    
    12.8.352.12
    
    12.8.352.10
    
    12.8.352.5
    
    HPE SN1100E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    12.8.352.12
    
    12.8.352.12
    
    12.8.352.10
    
    12.8.352.5
    
    HPE SN1100E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    12.8.352.12
    
    12.8.352.12
    
    12.8.352.10
    
    12.8.352.5
    
    HPE SN1100E Quad Port 16Gb Fibre Channel Host Bus Adapter
    
    16Gb
    
    12.8.352.12
    
    12.8.352.12
    
    12.8.352.10
    
    12.8.352.5
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    12.8.352.12
    
    12.8.352.12
    
    12.8.352.10
    
    12.8.352.5
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    12.8.352.12
    
    12.8.352.12
    
    12.8.352.10
    
    12.8.352.5
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.352.12
    
    12.8.352.12
    
    12.8.352.10
    
    12.8.352.5
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.352.12
    
    12.8.352.12
    
    12.8.352.10
    
    12.8.352.5
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.352.12
    
    12.8.352.12
    
    12.8.352.10
    
    12.8.352.5
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.352.12
    
    12.8.352.12
    
    12.8.352.10
    
    12.8.352.5</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.02.01" date="1615204800">-     *Fixed the following:**
    
      * Fixed a behavior where the SN1600E would wrongly display an unwanted message when loading Unified Extensible Firmware Interface (UEFI) driver defaults</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.02.03" date="1625486400">-     This is a fibre channel component.
    
    Added support for the following:
    
      * Code update to support new flash vendors
    
    Contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.352.24
    
    12.8.352.24
    
    12.8.352.10
    
    12.8.352.5
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.352.24
    
    12.8.352.24
    
    12.8.352.10
    
    12.8.352.5</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.10.01" date="1632830400">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    12.8.528.12
    
    12.8.528.12
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    12.8.528.12
    
    12.8.528.12
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.12
    
    12.8.528.12
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.12
    
    12.8.528.12
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.12
    
    12.8.528.12
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.12
    
    12.8.528.12
    
    12.8.528.10
    
    12.8.502.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.11.01" date="1635508800">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.03.01" date="1639224000">-</changelog>
  </package>
  <package pkgid="3a0e9344267f8b417a4aec3964ad6fec448744ecab7f496264ef1828897be503" name="firmware-fc-qlogic" arch="x86_64">
    <version epoch="0" ver="2021.10.01" rel="1.10"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.12.02" date="1577188800">-     Updated the Firmware/BIOS/UEFI packages for following:
    
      * Gen6 Fibre Channel Host Bus Adapter: 
        * Package 1.73.08
        * Firmware 8.08.230
        * UEFI 7.02
        * BIOS 3.64
      * Gen7 Fibre Channel Host Bus Adapter:  
        * Package 02.02.18
        * Firmware 09.02.20
        * UEFI 7.08
        * BIOS 0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.12.02" date="1577275200">-     *Fixed the following:**
    
    In extremely rare cases, the following QLogic Fibre Channel (FC) Host Bus
    Adapters (HBAs), SN1100Q, SN1600Q and SN1610Q may cause the host Operating
    System (OS) to stop. Subsequent OS reboot may reveal some filesystem data is
    unavailable or inconsistent. Out of an abundance of caution, HPE updated the
    Firmware/BIOS/UEFI (Boot Image) packages for these adapters to eliminate
    possible exposure to this extremely rare but critical issue.
    
    
    
    Additional issue details will be published when they become available.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.12.03" date="1581595200">-     Updated the Firmware/BIOS/UEFI packages for following:
    
      * Gen4 Fibre Channel Host Bus Adapter: 
        * Package 3.81.05
        * Firmware 8.08.206
        * UEFI 7.00
        * BIOS 3.56
      * Gen5 Fibre Channel Host Bus Adapter: 
        * Package 6.02.01
        * Firmware 8.08.230
        * UEFI 7.02
        * BIOS 3.43
      * Gen6 Fibre Channel Host Bus Adapter: 
        * Package 1.73.08
        * Firmware 8.08.230
        * UEFI 7.02
        * BIOS 3.64
      * Gen7 Fibre Channel Host Bus Adapter:  
        * Package 02.02.18
        * Firmware 09.02.20
        * UEFI 7.08
        * BIOS 0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.12.03" date="1581681600">-     *Fixed the following:**
    
    In extremely rare cases, the following QLogic Fibre Channel (FC) Host Bus
    Adapters (HBAs), SN1100Q, SN1600Q and SN1610Q may cause the host Operating
    System (OS) to stop. Subsequent OS reboot may reveal some filesystem data is
    unavailable or inconsistent. Out of an abundance of caution, HPE updated the
    Firmware/BIOS/UEFI (Boot Image) packages for these adapters to eliminate
    possible exposure to this extremely rare but critical issue.
    
    For more details please go through the document titled "HPE ProLiant, Synergy
    and Superdome Flex Host Bus Adapters (HBA) - Certain Fibre Channel HBA
    Firmware May Cause the Operating System to Halt and Potentially Compromise
    Filesystem Data Integrity" at the following link:  
    [https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a000947
    22en_us](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId
    =a00094722en_us)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.12.05" date="1585742400">-     Updated the Firmware/BIOS/UEFI packages for following:
    
      * Gen4 Fibre Channel Host Bus Adapter: 
        * Package 3.81.05
        * Firmware 8.08.206
        * UEFI 7.00
        * BIOS 3.56
      * Gen5 Fibre Channel Host Bus Adapter: 
        * Package 6.02.01
        * Firmware 8.08.230
        * UEFI 7.02
        * BIOS 3.43
      * Gen6 Fibre Channel Host Bus Adapter: 
        * Package 1.73.08
        * Firmware 8.08.230
        * UEFI 7.02
        * BIOS 3.64
      * Gen7 Fibre Channel Host Bus Adapter:  
        * Package 02.02.18
        * Firmware 09.02.20
        * UEFI 7.08
        * BIOS 0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.12.05" date="1585828800">-     *Fixed the following:**
    
    In extremely rare cases, the following QLogic Fibre Channel (FC) Host Bus
    Adapters (HBAs), SN1100Q, SN1600Q and SN1610Q may cause the host Operating
    System (OS) to stop. Subsequent OS reboot may reveal some filesystem data is
    unavailable or inconsistent. Out of an abundance of caution, HPE updated the
    Firmware/BIOS/UEFI (Boot Image) packages for these adapters to eliminate
    possible exposure to this extremely rare but critical issue.
    
    For more details please go through the document titled "HPE ProLiant, Synergy
    and Superdome Flex Host Bus Adapters (HBA) - Certain Fibre Channel HBA
    Firmware May Cause the Operating System to Halt and Potentially Compromise
    Filesystem Data Integrity" at the following link:  
    [https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a000947
    22en_us](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId
    =a00094722en_us)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2020.09.01" date="1596456000">-     Updated the Firmware/BIOS/UEFI packages for 8 Gb, 16 Gb and 32 Gb products.
    
      * 8Gb Fibre Channel Host Bus Adapter: 
        * Package 3.82.00
        * Firmware 8.08.207
        * UEFI 7.00
        * BIOS 3.56
      * 16Gb Fibre Channel Host Bus Adapter: 
        * Package 6.03.00
        * Firmware 8.08.231
        * UEFI 7.02
        * BIOS 3.43
      * 16Gb/32Gb Fibre Channel Host Bus Adapter: 
        * Package 1.74.07
        * Firmware 9.03.00
        * UEFI 7.02
        * BIOS 3.64
      * 32Gb Fibre Channel Host Bus Adapter:  
        * Package 02.03.06
        * Firmware 09.04.01
        * UEFI 7.08
        * BIOS 0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.02.01" date="1615118400">-     *Added the following:-**
    
      * Added support for Fabric Performance Impact Notifications (FPIN)
    
    
    
    This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    MBI
    
    Firmware
    
    UEFI
    
    Boot Bios
    
    HPE 81Q 8Gb PCIe Fibre Channel Host Bus Adapter  
    8Gb
    
    3.82.00
    
    8.08.207
    
    7.00
    
    3.56
    
    HPE 82Q 8Gb Dual Port PCIe Fibre Channel Host Bus Adapter
    
    8Gb
    
    3.82.00
    
    8.08.207
    
    7.00
    
    3.56
    
    HPE 84Q 8Gb Quad Port Fibre Channel Host Bus Adapter
    
    8Gb
    
    3.82.00
    
    8.08.207
    
    7.00
    
    3.56
    
    HPE SN1000Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    6.04.04
    
    8.08.232
    
    7.04
    
    3.43
    
    HPE SN1000Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    6.04.04
    
    8.08.232
    
    7.04
    
    3.43
    
    HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    1.75.07
    
    9.06.02
    
    7.04
    
    3.64
    
    HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    1.75.07
    
    9.06.02
    
    7.04
    
    3.64
    
    HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    1.75.07
    
    9.06.02
    
    7.04
    
    3.64
    
    HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    1.75.07
    
    9.06.02
    
    7.04
    
    3.64
    
    HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.04.07
    
    09.06.02
    
    7.11
    
    0.0
    
    HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.04.07
    
    09.06.02
    
    7.11
    
    0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.02.01" date="1615204800">-     *Fixed the following:-**
    
      * Enhancements have been made to the firmware to prevent and better recover from any stoppage as described in Customer Advisory available at [https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00094722en_us](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00094722en_us)
      * Fixed a behavior where the number of active Input/Output (IO) exchanges could be reduced under certain fabric conditions, resulting in reduced performance.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.10.01" date="1616500800">-</changelog>
  </package>
  <package pkgid="4e0e84df9084c38f73ae7496914ace4ca9bad2646f6e0861af43a0d4b4f4dae8" name="firmware-ff3fa73ca1" arch="x86_64">
    <version epoch="0" ver="1.24" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22" date="1632830400">-      Update device guid
      * Fixed FW update causing NVME drive missing</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.24" date="1644235200">-     Fix issues</changelog>
  </package>
  <package pkgid="54f92ed5a598f98284830772315a8be3c675c75b09198d46ceff0448f2c6b928" name="firmware-hca-mellanox-vpi-connectx4" arch="x86_64">
    <version epoch="0" ver="1.0.12" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1586865600">-     *Fixes submitted in version 12.27.1016:**
    
      * ZTR counters query was always set to return 0.
      * The adapter card was prevented from going into the bypass mode when the BMC disabled the hardware arbitration.
      * Performance degradation and a high packet drop occurred when SRIOV was enabled and packets went through the FDB default behaviour.
      * Due to the string DB not being updated after Live-Patch, the tracer could not function after Live-Patch.
      * Fixed a rare issue that caused other active functions to receive a malformed CQE during driver (PF or VF) unload or FLR flows.
      * Firmware error was observed when FLR occurred at the same time as the teardown. As a result, the teardown flow took a lock, and never released it because it was being aborted by an FLR.
    
    **Fixes submitted in version 16.27.1016:**
    
      * Fixed an issue that caused the device to perform DMA into memory already returned to the OS during the transition between the pre-boot driver to the OS driver.
      * Out-of-range issue when reading or writing the q_counters.
      * Fixed an issue that in Multi-Host adapter cards that resulted in wrong handling of PERST on auxiliary links.
      * ZTR counters query was always set to return 0.
      * The adapter card was prevented from going into the bypass mode when the BMC disabled the hardware arbitration.
      * A non-standard tool was required to perform the first LFWP patching when used with the GA firmware version.
      * Updated the OOOSLMask behaviour. Firmware now will apply OOOSLMask even if it is set to zero (OOOSLMask = 0).
      * Redundant page consumption in the init_hca.
      * The sw_reset option was not supported when ATS was enabled.
      * When ESWITCH_IPV4_TTL_MODIFY_ENABLE configuration was enabled in mlxconfig, there was performance degradation in small packet sizes.
      * Due to the string DB not being updated after Live-Patch, the tracer could not function after Live-Patch.
      * Fixed a rare issue that caused other active functions to receive a malformed CQE during driver (PF or VF) unload or FLR flows.
      * The PCI link was not getting established when the firmware was corrupted.
      * FW assert was triggerred and resulted in a wrong deallocation of a resource when Packet Pacing was enabled, and a QP was being destroyed.
      * Firmware error was observed when FLR occurred at the same time as the teardown. As a result, the teardown flow took a lock, and never released it because it was being aborted by an FLR.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1601899200">-     *Firmware for the following devices are updated to 12.27.4000:**
    
    825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)  
    825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)  
    
    
    **New Feature and Changes in Version 12.27.4000:**
    
      * Added the following segments, as appeared in the PRM, to the Resource Dump: 
        * PRM_QUERY_QP
        * PRM_QUERY_CQ
        * PRM_QUERY_MKEY
        * QUERY_VNIC_ENV
    
    **Firmware for the following devices are updated to 16.27.2008:**
    
    879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)  
    872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 841QSFP28 Adapter)  
    
    
    **New Feature and Changes in Version 16.27.2008:**
    
    **This release contains important reliability improvements and security hardening enhancements. Upgrade the firmware of the device to this release to improve the devices' firmware security and reliability.**
    
      * Improved init_hca performance in Parallel Function initialization.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1601985600">-     *Following issues have been fixed in firmware version 16.27.2008:**
    
      * Although the effective BER (after FEC) was expected to meet the design targets (e.g. 10e-14 or lower), occasionally it was higher.
      * High BER occured when connecting cables of type 0.5/1m DAC to an HDR speed.
      * The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.
      * The desched_threshold field did not work properly.
      * The "roce_adp_retrans" counter was presenting the values of the "local_ack_timeout_err" counter.
      * If Relaxed Ordering was disabled by running the "setpci" command, it would not be functional even after re-enabling it by running the "setpci" command again.
    
    **Following issues have been fixed in firmware version 12.27.4000:**
    
      * The device hung while running the sw reset flow under heavy stress and with many open resources.
      * Low PXE performance observerd while using the VSC to trigger the send_ring_doorbells.
      * IPoIB and DC would not work together.
      * DC funtionality issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1614254400">-     *Firmware for the following devices are updated to 12.28.1002:**
    
    825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)  
    825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)  
    
    
    **New Feature and Changes in Version 12.28.1002:**
    
      * Increased the maximum XRQ number to 512.
    
    **Firmware for the following devices are updated to 16.29.1016:**
    
    879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)  
    872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 841QSFP28 Adapter)  
    
    
    **New Feature and Changes in Version 16.29.1016:**
    
    Added support for the following features:
    
      * Changed the default value of DCQCN's (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.
      * An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.
      * "InfiniBand" properties set to the Network Device Function Redfish object.
      * HW support for Flow Metering to utilize Advanced Steering Operation (ASO). HW Flow Meter allows higher scale, more accuracy, and better performance compared to the FW Flow Metering.
      * Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.
      * 2 new Mini CQE formats: Responder Mini CQE With Flow Tag Layout Responder Mini CQE With l3_l4_info Layout
      * UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with "ooo_per_sl" field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT command.
      * Steering DP hash flow groups.
      * A new counter per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause "CQE with Error" or "CQE_MOCK".
      * PCIe Rx modifications to prevent the adapter cards from disappearing from the system.
      * ignore_flow_level is now enabled by the TRUST LEVEL access registry. 
      * cq_overrun counter. The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.
      * [Beta] Enabled the capability to allow Virtual Functions to send Pause Frames packets.
      * Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.
      * Hardware steering dump output used for debugging and troubleshooting.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1614340800">-     *Following issues have been fixed in firmware version 16.29.1016:**
    
      * An issue that prevented VXLAN packets with svlan/ cvlan tag from being matched.
      * An issue that caused the eth_wqe_too_small counter to count ODP (On-Demand Paging) page faults.
      * When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.
      * An issue that resulted in low performance after enabling the RoCE Accelerator capability. Note: The fix is available when all ports are set as Ethernet. 
      * On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.
      * The chassis manager calculation for Multi-Host and Socket-Direct adapter cards to allow running NC-SI commands by the chassis manager BMC. Now the chassis manager is count as BMC with index 0, regardless of how many BMC there are.
      * An issue that caused the device to go to down IRISC as one of the firmware semaphores could not be released when a speed change or port state change was triggered. 
    
    **Following issues have been fixed in firmware version 12.28.1002:**
    
      * An issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * An issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10-2.1" date="1628683200">-     *Firmware for the following devices are updated to 12.28.1002:**
    
    825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)  
    825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)  
    
    
    **New Feature and Changes in Version 12.28.1002:**
    
      * Increased the maximum XRQ number to 512.
    
    **Firmware for the following devices are updated to 16.31.1200:**
    
    879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)  
    872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 841QSFP28 Adapter)  
    
    
    **New Feature and Changes in Version 16.31.1200:**
    
      * .Added a new NVconfig per Port for a specific Finisar module which sets the port to work in AN mode and sets the module to No DME. This change does not affect the speed logic, only the FEC logic (FEC override). **Note**: If the port does not come up, switch to Force mode.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10-2.1" date="1628769600">-     *Following issues have been fixed in firmware version 12.28.1002:**
    
      * An issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * An issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **No fixes are included in firmware version 16.31.1200.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1632657600">-     *Firmware for the following devices are updated to 12.28.2006:**
    
    825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)  
    825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)  
    
    
    **New Feature and Changes in Version 12.28.2006:**
    
      * Increased the maximum XRQ number to 512.
    
    
    
    **Firmware for the following devices are updated to 16.31.1200:**
    
    879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)  
    872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 841QSFP28 Adapter)  
    
    
    **New features and changes included in version 16.31.1200:**
    
      * NIC scheduling feature support has been disabled for non-privileged functions.
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * support for Enabling/Disabling NIC and RDMA (port/partition) was included via the UEFI HII system settings.
      * Increased the maximum number of MSIX per VF to 127.
      * Asymmetrical MSIX Configuration: This feature allows the device to be configured with a different number of MSIX vectors per physical PCI functions.To use this feature, please follow these steps: 
        *   Clear NUM_PF_MSIX_VALID to disable global symmetrical MSIX configuration.
        *   Set PF_NUM_PF_MSIX_VALID to enable asymmetrical per Physical Function MSIX configuration.
        *   Configure PF_NUM_PF_MSIX per physical PCI function.
      * RDMA partitioning and RDMA counters in IB mode.
      * Added a new bit ("data_in_order") to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.
      * Enabled UID 0 to create resources with UMEM (User Memory).
      * Receiving and sending native IB packets from/to the software (including all headers) via raw IBL2 QPs.
      * RX RDMA NIC flow table on an IB port. Now the software can steer native IB packets to raw IB receive queues according to the DLID and  the DQPN.
      * Added a new NVconfig per Port for a specific Finisar module. This new NVconfig sets the port to work in AN mode and sets the module to No DME. This change does not affect the speed logic, only the FEC logic (FEC override). **Note:** If the port does not go up, switch to Force mode.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1632744000">-     *Following issues have been fixed in firmware version 12.28.2006:**
    
      * An issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * An issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.31.1200:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * An assert that was caused when trying to open 1024 functions on the device and the maximum number of functions was 1023.
      * Occasional performance issues related to RC QPs using E2E-credits (not connected to SRQ and doing send/receive traffic) when the ROCE_ACCL tx_window was enabled.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * A rare issue that caused RX pipe to hang.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
      * CRT_DCR with index larger than 1 &lt;&lt; 21 occasionally collided with the CRT_SW_RESERVED address.
      * An issue that caused the TX queue to get into an unresponsive state when the VF rate limiter was set.
    
    **Additional Fixes included in version 16.31.1200:**
    
      * Disabled the CNP counter "rp_cnp_ignored " (triggered by OOS (out-of-sequence)) when all ports are IB.
      * Fixed the TMP421 sensor temperature reporting.
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12" date="1641729600">-     *Fixes in version 12.28.2006:**
    
      * Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed n issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.32.1010**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The link status was reported incorrectly and consequently caused the link to go down due to incorrect definition of the RX_LOS polarity in the INI.
      * The system got into an unresponsive state when a peer port went down while using an Optical module.
      * Invalid RNR timeout when trying to set it during the rts2rts_qp transition.
      * A fatal assert 0x81C5 occurred when calling get_vport_mad from the MAD APIs. The firmware was trying to compute the number of vPorts using a global function number. To avoid this issue, the API was updated to remove any assumption on the function number. Note: This issue is affects only IB devices.
      * During events, stress caused the firmware to reset the Arm host of the vPort without sending an event. Thus preventing the software from rearming the vPort as it did not receive any event, and the firmware did not send the event because the vPort had no Arm set.
      * The system could not create more than 128K QPs.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
      * PCIe lane margining capability issues.
      * An issue related to the sl2vl mad that caused a few msec hiccup in the transmission on an InfiniBand network when the SM sent the sl2vl mad to a node in the cluster.</changelog>
  </package>
  <package pkgid="57fc389772d2f412ebf6bb840c33f8f4359232de3daf481d611f051c0380b581" name="firmware-hca-mellanox-vpi-connectx6-mft" arch="x86_64">
    <version epoch="0" ver="1.0.8" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.3" date="1586865600">-     *Fixes submitted in version 20.27.1016:**
    
      * The Adapter card used to get stuck in "polling" state after resetting/power cycling the card.
      * Fixed a PCIe PLL (Phase Locked Loop) varactor calibration logic to address potential silicone variations.
      * An issue that caused the ZTR (Zero Touch RoCE) counters query to always return 0.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1588680000">-     *New Features and Changes in Version 20.27.2008:**
    
      * 200GbE speed rate is at GA level.
      * All Ethernet speeds at GA level including PAM4(Pulse Amplitude Modulation) vs NRZ (non-return-to-zero)and speed detection.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1588766400">-     *The following issues have been fixed in version 20.27.2008:**
    
      * CWDM4(Coarse Wavelength Division Multiplexing) Acousto Optical Modulator(AOM) cable was not supported.
      * Links between ConnectX-6 adapter cards and Spectrum-2 SN3700 switch systems did not come up when using Cisco BiDi module at 100GbE link speed.
      * Occasionally, the link was not raised when working with split 2x100 mode with Optical cables.
      * The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.
      * The desched_threshold field did not work properly.
      * The "roce_adp_retrans" counter was presenting the values of the "local_ack_timeout_err" counter.
      * If Relaxed Ordering was disabled by running the "setpci" command, it would not be functional even after re-enabling it by running the "setpci" command again.
      * Aligned the User Memory page to 2, e.g., the user should use 8k aligned (like 0, 8k, 16k etc., instead of 0, 4k, 12k etc.).
      * NRZ (non-return-to-zero) and PAM4 (Pulse amplitude modulation) Limitations in 100GbE adapter cards: 
        * The default configuration was NRZ speeds in Auto-Neg mode.
        * PAM4 speeds had to be set manually (using the MFT tool - mlxlink).
        * PAM4 speeds had to be configured as single speeds: 50G_1x or 100G_2x.
        * 200G_4x optical cables (including 200G_4x splitter cable) would raise link only after manual configuration of PAM4 speeds (50G_1x or 100G_2x).
      * NRZ and PAM4 Limitations in 200GbE adapter cards: 
        * The default configuration was 200G_x4 in Force mode.
        * NRZ speeds had to be set manually. Configuration could include multiple NRZ speeds (using the MFT tool - mlxlink).
        * PAM4 speeds had to be configured as single speeds: 50G_1x or 100G_2x or 200G_4x.
      * In Ethernet mode, at 25/50/100GbE speeds, only RS-FEC in Force mode was supported. Other user configurations were overridden.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1601899200">-     *Firmware for the following devices are updated to 20.27.6008:**
    
    HPE InfiniBand HDR/Ethernet 200Gb 1-port 940QSFP56 x16 Adapter - P06154-B21  
    HPE InfiniBand HDR100/Ethernet 100Gb 1-port 940QSFP56 x16 Adapter - P06250-B21  
    HPE InfiniBand HDR100/Ethernet 100Gb 2-port 940QSFP56 x16 Adapter - P06251-B21  
    
    
    **New Features and Changes in Version 20.27.6008:**
    
      * The following are the minimal software/firmware versions that support PAM4 link speeds when connected using Mellanox NIC to Mellanox Switch and Mellanox NIC to 3rd Party Switches: 
        * Mellanox Onyx: 3.9.0830-038
        * ConnectX-6: 20.27.2008*  
    *Note: NICs with this firmware version support Mellanox-to-Mellanox connectivity with PAM4 link speeds.
      * Added support for the following features: 
        * Enabled KP4RS FEC on Active Fiber cable up to 30m.
        * FDR protocol.
        * Enabled updating End-to-End (E2E) credit packets instantly.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1601985600">-     *There are no new fixes in firmware version 20.27.6008.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1614254400">-     *Firmware for the following devices are updated to 20.29.1016:**
    
    HPE InfiniBand HDR/Ethernet 200Gb 1-port 940QSFP56 x16 Adapter - P06154-B21  
    HPE InfiniBand HDR100/Ethernet 100Gb 1-port 940QSFP56 x16 Adapter - P06250-B21  
    HPE InfiniBand HDR100/Ethernet 100Gb 2-port 940QSFP56 x16 Adapter - P06251-B21  
    
    
    **New Features and Changes in Version 20.29.1016:**
    
    Added support for following features:
    
      * LinkX module burning via MFT toolset. The new capability enables direct firmware burning from the internal flash storage to reduce the bandwidth and accelerate the burning process, including burning several modules at a time.
      * An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.
      * Improved NRZ link performance (RX algorithm).
      * Improved NRZ link-up time (25G(G@G speeds).
      * Enabled the options to control different Tx sets for the same attribute when connecting a Mellanox-Mellanox vs Mellanox to 3rd party HCA.
      * "InfiniBand" properties set to the Network Device Function Redfish object.
      * Direct Packet Placement (DPP): DPP is a receive side transport service in which the Ethernet packets are scattered to the memory according to a packet sequence number (PSN) carried by the packet, and not by their arrival order.
      * To enable DPP offload, the software should create a special RQ by using the CREATE_RQ command, and set DPP relevant attributes.
      * Added trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.
      * UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with "ooo_per_sl" field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT command.
      * Enhanced IB Congestion Control to support lower minimum rate. Now it uses destination-lid to classify flows to handle larger scale, and achieve better results in GPCNeT benchmark.
      * Hardware steering dump output used for debugging and troubleshooting.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1614340800">-     *The following issues have been fixed in version 20.29.1016:**
    
      * Changed the default value of DCQCN's (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.
      * An issue that prevented VXLAN packets with svlan/cvlan tag from being matched.
      * The eth_wqe_too_small counter to count ODP (On-Demand Paging) page used to fail.
      * An issue related to raising 100GbE link on ConnectX-6 VPI 100Gb/s adapter cards.
      * When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.
      * Low performance occurred after enabling the RoCE Accelerator capability.
      * On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1632657600">-     *Firmware for the following devices are updated to 20.31.1014:**
    
    HPE InfiniBand HDR/Ethernet 200Gb 1-port 940QSFP56 x16 Adapter - P06154-B21  
    HPE InfiniBand HDR100/Ethernet 100Gb 1-port 940QSFP56 x16 Adapter - P06250-B21  
    HPE InfiniBand HDR100/Ethernet 100Gb 2-port 940QSFP56 x16 Adapter - P06251-B21
    
    **New features and changes included in version 20.31.1014:**
    
      * NIC scheduling feature support has been disabled for non-privileged functions.
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * Updated the NC-SI speed reporting output to support 200GbE speed. Now when running the NC-SI command, the output presents 200GbE speed as well.
      * support for Enabling/Disabling NIC and RDMA (port/partition) was included via the UEFI HII system settings.
      * Increased the maximum number of MSIX per VF to 127.
      * Asymmetrical MSIX Configuration: This feature allows the device to be configured with a different number of MSIX vectors per physical PCI functions.To use this feature, please follow these steps: 
        * Clear NUM_PF_MSIX_VALID to disable global symmetrical MSIX configuration.
        * Set PF_NUM_PF_MSIX_VALID to enable asymmetrical per Physical Function MSIX configuration.
        * Configure PF_NUM_PF_MSIX per physical PCI function.
      * RDMA partitioning and RDMA counters in IB mode.
      * Added a new bit ("data_in_order") to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.
      * Enabled UID 0 to create resources with UMEM (User Memory).
      * Receiving and sending native IB packets from/to the software (including all headers) via raw IBL2 QPs.
      * RX RDMA NIC flow table on an IB port. Now the software can steer native IB packets to raw IB receive queues according to the DLID and  the DQPN.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1632744000">-     *The following issues have been fixed in version 20.31.1014:**
    
      * Occasional performance issues related to RC QPs using E2E-credits (not connected to SRQ and doing send/receive traffic) when the ROCE_ACCL tx_window was enabled.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * A rare issue that caused RX pipe to unresponsive state.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
      * CRT_DCR with index larger than 1 &lt;&lt; 21 occasionally collided with the CRT_SW_RESERVED address.
      * An issue that caused the TX queue to get into an unresponsive state when the VF rate limiter was set.
      * In InfiniBand non-virtualization system, due to a corrupted steering root, traffic fails after a warm reboot.  
    
                                                                             
    **Additional Fixes included in version 20.31.1014:**
    
      * Disabled the CNP counter "rp_cnp_ignored " (triggered by OOS (out-of-sequence)) when all ports are IB.
      * Fixed the TMP421 sensor temperature reporting.
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.            
      * Improved PortXmitWait IB counter accuracy.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1641816000">-     *The following issues have been fixed in version 20.32.1010:**
    
      * System could not create more than 128K QPs.
      * Incorrect indication of the PCIe link down in the AER registers on PCIe switch upstream port.
      * Invalid RNR timeout when trying to set it during the rts2rts_qp transition.
      * The flash frequency on boot was lower than expected (under 50Mhz). The issue was fixed by enabling the firmware to increase it on boot2 to normal frequency.
      * A race condition between DC QP flush and DC packets that led to stuck slices in the hardware. To avoid such situation, firmware keeps the TCU drop set until QP flush is done.
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The link status was reported incorrectly and consequently caused the link to go down due to incorrect definition of the RX_LOS polarity in the INI.</changelog>
  </package>
  <package pkgid="b886dc46fa600c20c80cd3fc1e4d4407904cd844e84d7c0a4a01ac5fc3c5c0f0" name="firmware-hca-mellanox-vpi-eth-ib" arch="x86_64">
    <version epoch="0" ver="1.0.12" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1565265600">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5044:**
    
      * Fixed an issue that  prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode 
    
    **Fixes in version 2.42.5052:**
    
      * Fixed Uncorrectable Machine Check Exception issue. The internal resources for handling packets were not allowed to be flushed when the driver was brought down and occasionally caused Red Screen of Death (RSOD). The fix was applied to the ROM code only and has only external timing influences upon the driver's teardown.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8-2.1" date="1570968000">-     *Firmware for the following devices are updated to 2.42.5000:**  
        764282-B21  
        764286-B21  
    
    **Firmware for the following devices are updated to 2.42.5044:**  
        764284-B21  
        764285-B21
    
    **Firmware for the following devices are updated to 2.42.5052:**  
        764283-B21
    
    **New features in firmware version 2.42.5000:**
    
      * Added support for the following features. 
        * new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * A mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
      * Improved the debug ability for command timeout cases
    
    **Smart Component Fixes:**
    
      * Mellanox Infiniband 544 NIC Interface Shows Incorrectly as PCI Bus:Dev.Funtion in Smart Update Manager(SUM) Report.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8-2.1" date="1571054400">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5044:**
    
      * Fixed an issue that  prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode 
    
    **Fixes in version 2.42.5052:**
    
      * Fixed Uncorrectable Machine Check Exception issue. The internal resources for handling packets were not allowed to be flushed when the driver was brought down and occasionally caused Red Screen of Death (RSOD). The fix was applied to the ROM code only and has only external timing influences upon the driver's teardown.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1572868800">-     *Firmware for the following devices are updated to 2.42.5000:**  
        764282-B21  
        764286-B21  
    
    **Firmware for the following devices are updated to 2.42.5052:**  
        764283-B21  
        764284-B21  
        764285-B21
    
    **New features in firmware version 2.42.5000:**
    
      * Added support for the following features. 
        * new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * A mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
      * Improved the debug ability for command timeout cases</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1572955200">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5052:**
    
      * Fixed Uncorrectable Machine Check Exception issue. The internal resources for handling packets were not allowed to be flushed when the driver was brought down and occasionally caused Red Screen of Death (RSOD). The fix was applied to the ROM code only and has only external timing influences upon the driver's teardown.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1592395200">-     *Firmware for the following devices are updated to 2.42.5000:**  
        764282-B21  
        764286-B21  
    
    **Firmware for the following devices are updated to 2.42.5056:**  
        764283-B21  
        764284-B21  
        764285-B21
    
    **New features in firmware version 2.42.5000:**
    
      * Added support for the following features. 
        * new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * A mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
      * Improved the debug ability for command timeout cases.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1592481600">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5056:**
    
      * Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1601899200">-     *Firmware for the following devices are updated to 2.42.5000:**  
        764282-B21  
        764286-B21  
    
    **Firmware for the following devices are updated to 2.42.5056:**  
        764283-B21  
        764284-B21
    
    **Firmware for the following device is updated to 2.42.5700:**  
        764285-B21
    
    **New features in firmware version 2.42.5000:**
    
      * Added support for the following features. 
        * new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * A mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
      * Improved the debug ability for command timeout cases.
    
    **New features and changes in firmware version 2.42.5700.**
    
      * Modified the mlx_cmd_get_mlx_link_status command return value to return "Link Type = Ethernet" in Ethernet adapter cards.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1601985600">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5056:**
    
      * Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12" date="1602849600">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5056:**
    
      * Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</changelog>
  </package>
  <package pkgid="75b29eb0732df011cedc84396aaade3df574c48a38c3ce9c79c3efdacef4b810" name="firmware-hdd-035a863453" arch="x86_64">
    <version epoch="0" ver="HPK3" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1621512000">-      HPK2 FW version addresses an issue observed in conjunction with RHEL 8.3 installation.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3" date="1626177600">-      This Firmware release contains various drive interoperability enhancements and code fixes accumulated since the last firmware release, as well as a change to disable MCTP over PCIe VDM function per requested of HPE, and a PHY setting change for improved compatibility with Intel Ice Lake based Gen10+ DL360 platform. 
      * For more information, refer to HPE Customer Bulletin at the following URL: https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00115201en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-2.1" date="1631880000">-      This Firmware release contains various drive interoperability enhancements and code fixes accumulated since the last firmware release, as well as a change to disable MCTP over PCIe VDM function per requested of HPE, and a PHY setting change for improved compatibility with Intel Ice Lake based Gen10+ DL360 platform. 
      * For more information, refer to HPE Customer Bulletin at the following URL: https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00115201en_us</changelog>
  </package>
  <package pkgid="fe6477bb5e7f17967d4ea0a89766bc57dbb14aa2f084e99e9fcc4ce39c004c0b" name="firmware-hdd-0595c2a887" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1547467200">-      This firmware contains a change to prevent occasional command completion times in the 4-5 second window when command is received just as the drive is transitioning from active to Idle A.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-8.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="a63613ee6797054177927e540f885d97f6adc79869451ae31441977d7d244585" name="firmware-hdd-059b8654a6" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1572868800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1572955200">-      Corrects a potential data integrity issue during unaligned write commands, only found in supplier ongoing lab testing.Includes additional fixes to improve error handling and reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1598097600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1598184000">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1598270400">-      Corrects a potential data integrity issue during unaligned write commands, only found in supplier ongoing lab testing.Includes additional fixes to improve error handling and reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1614772800">-      Added support for RHEL8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1623931200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1624017600">-     Reliability enhancements and VENDOR IDENTIFICATION field change from "HP" to
    HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1624708800">-</changelog>
  </package>
  <package pkgid="df232c24c53169928daf3ab69bb4449e33693ce5ddf5ae6e99b7e5f27e85bd50" name="firmware-hdd-0a38b25661" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1547467200">-      This firmware includes a fix for slow performance during sequential write workloads with small queue depth.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-8.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="5d7c344e7e9011b3870b2e27a84593c0be91bb9b5aa5b44b8bc9eaef677b9779" name="firmware-hdd-0a7010918e" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1547467200">-      Firmware version HPG4 prevents the occurrence of a rare issue which could lead to slow drive performance. This issue has the potential to impact all drives in configurations where the drives might be allowed to be idle for greater than 1 second.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1624708800">-</changelog>
  </package>
  <package pkgid="c5dad34071a3cd8c149be2254c633084ef40cdb8890e6fca558321e1e74706f1" name="firmware-hdd-0a7d4aa47f" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4" date="1547467200">-      This firmware includes a fix for slow performance during sequential write workloads with small queue depth.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-2.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-2.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="b35764e7f22a36fcbcacaa64d1e6926dc5cfd719163656551c7d2f52560a802b" name="firmware-hdd-0b575b5895" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1547467200">-      This firmware has a change that allows the drive to meet the requirements for Azure Stack certification.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="7d421d6751e5d3504eaee9dc790ca1fc0651d02a5d9d478e6fe10bd620e4cb5c" name="firmware-hdd-0f923833e9" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1547467200">-     This firmware:  
    Fixes the cause of internal reboots detected in the MSA system.  
    Removes a vendor unique sense code that the controller does not handle
    properly.  
    Includes changes to eliminate the cause of a potential hang condition.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1565611200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1572955200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-6.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="baa4e6919f0ffaf5f19d0a91fd2bbe45224363113d3f3760745d46d9e5cab69a" name="firmware-hdd-10385ef3e6" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1568635200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1568721600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1568808000">-      This firmware contains a fix for a data integrity issue that could occur during a power cycle while the drive is processing write commands.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1624708800">-</changelog>
  </package>
  <package pkgid="c9f5cc6efe20bf9e289919a39998af3b136ced6bfface0ca8214f878bf0619b5" name="firmware-hdd-12304c1aca" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1583928000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1584014400">-      Fixed a timeout error and improved performance.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1594728000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1594814400">-       Added support for RHEL 8.2.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1594900800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1594987200">-      This update includes a fix that prevents unrecoverable read errors in highly localized write intensive workload, and a new servo code revision that improves performance under specific vibration conditions.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="34d4c135d977aa845b3163a0542d423657b6e01f3ff7f866673eaa1ffc07fd88" name="firmware-hdd-1656c1b14a" arch="x86_64">
    <version epoch="0" ver="4ICDHPK1" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1" date="1614772800">-      This firmware corrects the potential for a drive to become disabled and nonfunctional during certain conditions or workloads.
      * After the drive is upgraded to firmware version HPK1, it cannot be downgraded to firmware version HPK0.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1-2.1" date="1626350400">-      This firmware corrects the potential for a drive to become disabled and nonfunctional during certain conditions or workloads.
      * After the drive is upgraded to firmware version HPK1, it cannot be downgraded to firmware version HPK0.</changelog>
  </package>
  <package pkgid="4a5f02ea55d1c339d9724f1c7cd868c8340422417ed7c224e6e59a421462a822" name="firmware-hdd-18e328f036" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1583928000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1584014400">-      Fixed a timeout error and improved performance.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1598270400">-       Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1614686400">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1614772800">-       Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="555c689fe46d7c2b8af0cb30bc4f287890809d9c3831ce9410c8f4bb1ef147cd" name="firmware-hdd-1a516522d1" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="08b5e4739c00d5c1d94b12c287104151a5a92f7614e0723692c7b2b1ac249cf8" name="firmware-hdd-1cbab97ff0" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-8.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="b3ef0f290f9807eb6c18be2edbbdc8b29592cc0fa84f5fb9e972c6edde800941" name="firmware-hdd-1d7f19120b" arch="x86_64">
    <version epoch="0" ver="HPGB" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-6.1" date="1572782400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-6.1" date="1572868800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-6.1" date="1572955200">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was only found during supplier ongoing reliability testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-7.1" date="1598097600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-7.1" date="1598184000">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-7.1" date="1598270400">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was only found during supplier ongoing reliability testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-8.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-8.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-8.1" date="1614772800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was only found during supplier ongoing reliability testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-9.1" date="1624795200">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was only found during supplier ongoing reliability testing.</changelog>
  </package>
  <package pkgid="951e7ac5dea2f9bbac6555bcdbba6257ed035a03a3beff010849d90be7e20705" name="firmware-hdd-1e51a57347" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1575806400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1575892800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1598097600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1598184000">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1598270400">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1614772800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1624881600">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
  </package>
  <package pkgid="6ae495c2a37a9b5d71f1da1f9df88c4e3a195c5065af020e867b476d40a7fc9c" name="firmware-hdd-24384980ec" arch="x86_64">
    <version epoch="0" ver="HPD1" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1615809600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1615896000">-      VENDOR IDENTIFICATION field change from "HP" to HPE". Support for second source PMIC from IDT.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1630065600">-</changelog>
  </package>
  <package pkgid="a897b7332929ec69c2662d91dad36e9bbfb115d9634b44369fed47d90f4018e6" name="firmware-hdd-24fe569b72" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1627992000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1628078400">-     This firmware fixes a potential reliability condition and the cause of a
    potential hang.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1641124800">-      This firmware mitigates a potential reliability concern.</changelog>
  </package>
  <package pkgid="b159da5d2ed04ba941e0a39c7e5f5351cf666c5b3775e672a47ee66310090729" name="firmware-hdd-252770cdda" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1547467200">-      This firmware includes a fix for slow performance during sequential write workloads with small queue depth.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-7.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="db67bec479da2842cbf8ede007bc36b46a4c126d854f93cf0e6536a3241f9bab" name="firmware-hdd-2a5b65f157" arch="x86_64">
    <version epoch="0" ver="HPK4" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3" date="1524744000">-     *Problems Fixed:**
    
      * HPK3 firmware resolved an issue that caused the disk activity ring, which is located on NVME SSD drive carrier, to constantly spin regardless of drive activity status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4" date="1534334400">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1547294400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1547467200">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1565524800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1565611200">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-4.1" date="1572955200">-      Added support for SLES15SP1.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-6.1" date="1601035200">-</changelog>
  </package>
  <package pkgid="146da2c5f397bf046e2f81bb4225a47780374cb482d7951c6461426d917bd182" name="firmware-hdd-2af7385a1e" arch="x86_64">
    <version epoch="0" ver="HPK5" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1600862400">-      Update MCTP base spec version from 1.2.0 to 1.3.0
    
      * Change firmware to save the telemetry log buffer to smaller pages.
    
      * When reset happens, add to clear ready bit and other bits in health data according to MI 1.0a spec.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3" date="1600948800">-      Improve overhead in handling of first packet to limit the incidence of NACKs due to lost byte from second packet.
      * Maintain Class Code value in a buffer area when link is down. Copy maintained Class Code from buffer to PCIe Config Space on link-up.
      * Change 'Percent Endurance Used' value reported in a Workload Log Page ( D6h ) to report actual endurance value.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5" date="1614772800">-      Optimized T-offset setting.
      * Change MQES setting to 8192.
      * Fixed LED Behavior misaligned specs issue.
      * Fixed performance drop issue when 4+ SSD are installed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-3.1" date="1621339200">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-3.1" date="1621425600">-      Optimized T-offset setting.
      * Change MQES setting to 8192.
      * Fixed LED Behavior misaligned specs issue.
      * Fixed performance drop issue when 4+ SSD are installed.
      * The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-4.1" date="1625140800">-      Optimized T-offset setting.
      * Change MQES setting to 8192.
      * Fixed LED Behavior misaligned specs issue.
      * Fixed performance drop issue when 4+ SSD are installed.
      * The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</changelog>
  </package>
  <package pkgid="e6c592d4444eb8f26333470e9276b3454bed6f5f64f6914eeff8c8e58a6a927a" name="firmware-hdd-2c27a7a9a4" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1568721600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1568808000">-      This firmware fixes an issue where the drive can become inaccessible after an emergency power off, and corrects a potential verification issue during read recovery.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-3.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-3.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-4.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="bcf0cc40eb5af1aa9c482327e32444ac5458b6e42e3f65e45446b072ff8675a9" name="firmware-hdd-2cfaac41db" arch="x86_64">
    <version epoch="0" ver="HPDB" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-3.1" date="1547467200">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-4.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-4.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-5.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-5.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-6.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-8.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="a76a3d1ac1e6183df1c9a31d3595b2bfe8f90276c0eecd6653593aecaf3dd04a" name="firmware-hdd-2e4c61fc63" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1617105600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1617192000">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1624276800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
  </package>
  <package pkgid="459291148d7d30c1d49b966094cfc28ef2f754cdab9d840a5dc46034f85031c5" name="firmware-hdd-2e70ce7412" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1624708800">-</changelog>
  </package>
  <package pkgid="6740b0bdda184cbd47f797633eb0346d76442a8be336ecf0b7cd6e84c61642ad" name="firmware-hdd-2eb810cdd7" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1573646400">-      Fixed a rare occurrence of meta data not being saved during a sudden power loss.
      * Fixed an issue where a performance drop was occurring during a write same operation.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1575806400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.  
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1575892800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1598097600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.  
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1598184000">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1598270400">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1614772800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1624881600">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
  </package>
  <package pkgid="28f139594144b38b16bb27e38910f571d22e7442a3f34c4523fe666d68c7756f" name="firmware-hdd-31f91b8622" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1547467200">-      Fixes a data integrity risk where a recoverable error can prevent a write command from completing properly.
      * Fixes a data integrity risk due to incorrect re-ordering of commands, when overlapped commands occur. 
      * Fixes a data integrity risk during very large blocks of sequential commands with a data transfer between 1020MB and 1024MB.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-8.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-9.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="3ad9cc95a9e996da7ed3802987589cd8c89a78418833f9584f4e3c750d777219" name="firmware-hdd-3243fce9a0" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1547467200">-      This firmware improves potential timeouts that could occur during the write error recovery process, for drives that have head contaminant build up.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="30b7653bb9674a4459e0d3248f37a15cc7ed31fbc77ebf8ceb355544e44c8a06" name="firmware-hdd-326de7c0f2" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-8.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="a77fe1213c36387ce17c340d9384dfb56ae89db66461cff37f93540fd073f227" name="firmware-hdd-35fd24601f" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1599393600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1599480000">-      Increased Queue Size from 32 to 128 to be equal to the max number of chips.
      * Refresh NM SRAM area periodically only when idle as a possible work around on NM SRAM parity error.
      * Change the error response as 0x3 (SP_Busy) or 0x07 ( NO_SESSION_AVAILABLE) when host attempts to open another session while a session is already opened.
      * Disable verify compare if APP_CHK=0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1614772800">-      Modify Drive Vendor Identification String (VID) in Inquiry page from "HP" to "HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="8f7f381d54ff4de86f506316e28abe6ef4d529c6637aaeec6ecf0c12bf3434a1" name="firmware-hdd-3815d4b024" arch="x86_64">
    <version epoch="0" ver="GPK3" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3" date="1626868800">-     This Firmware release address below fixes and additional features:
    
      * FW Transfer Fix
      * Drive Failure Fix
      * Power Loss Protection
      * FW Download Fix
      * Reset Fix
      * Shutdown fix
      * PCIe Improvement
      * Random Write Improvement</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-2.1" date="1631793600">-</changelog>
  </package>
  <package pkgid="d8fe17ba6425a302dc13c6f71ab985adbfad2c4867ae230af4f59de42f907dce" name="firmware-hdd-3ab4c70e64" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1624708800">-</changelog>
  </package>
  <package pkgid="1a53fe68198fbd0ab29512fe4b8548d58dbf1b7ef75b4970e52aff8a01e6f9bb" name="firmware-hdd-3d97759111" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1572955200">-     Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1604318400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1604404800">-      This update improves performance for random read workloads with delays between reads.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1621339200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1621425600">-      This firmware version updates the Vendor ID in the standard inquiry to 'HPE', in previous versions it was 'HP.'</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="2d11c5be1b3f6715c29a2f78f9e460a41c0c24ee4987b196e4b331c3007492ff" name="firmware-hdd-3db7640485" arch="x86_64">
    <version epoch="0" ver="HPGG" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE-2.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE-3.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE-3.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE-4.1" date="1600948800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE-4.1" date="1601035200">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE-5.1" date="1613304000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE-5.1" date="1613390400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG" date="1613476800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG" date="1613563200">-      Improvements to Product Quality and Reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-2.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="62fd85f6152a563f1eeb33b14fb2abf410ea96fef995f0084681d158fe47e8dc" name="firmware-hdd-3e34285be7" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1572782400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1572868800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1572955200">-      Firmware fixes intermittent data corruption issue associated with unaligned sequential write operations.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1598097600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1598184000">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1598270400">-      Firmware fixes intermittent data corruption issue associated with unaligned sequential write operations.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-10.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-10.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-10.1" date="1614772800">-      Firmware fixes intermittent data corruption issue associated with unaligned sequential write operations.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-11.1" date="1624795200">-      Firmware fixes intermittent data corruption issue associated with unaligned sequential write operations.</changelog>
  </package>
  <package pkgid="ea0d7b2c3da3e90bb061e7a36935cf5cf9c4108a55f70a1e1b9a2eaf2fdd5ec1" name="firmware-hdd-40277d55d3" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-10.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="793deed40d5156a4d9654cb1cce2529ecc1684d6a54d4507867679e7f0210d74" name="firmware-hdd-41cdb1c9da" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1568894400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1568980800">-      This firmware fixes an issue where the drive can become inaccessible after an emergency power off, and corrects a potential verification issue during read recovery.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1624708800">-</changelog>
  </package>
  <package pkgid="71d5cd744486c3507a8d3765cc48b6606ab1566ef98ccfd78b5a4b4ceee36362" name="firmware-hdd-42aff4675b" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1626004800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1626091200">-     Firmware release to enable SAS4.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1641729600">-      Fix command timeout and uncorrectable error improvement.
      * Added features for SAS4 auto power swtiching and thermal requirement.</changelog>
  </package>
  <package pkgid="ca9b0723ddf19bd4711a89c8e72d4affabb1cead4ccb501288275b8520536f78" name="firmware-hdd-46fc43ab26" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-8.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="a854c98aa4d350b826f3e97ed9c3e93d6782ed576054d52b3f2843c2ae973c95" name="firmware-hdd-481c8ea9a7" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1584532800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.  
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1584619200">-      The issue affects SSDs with an HPE firmware version prior to HPD7 that results in SSD failure at 40,000 hours of operation (i.e., 4 years, 205 days 16 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us&gt;.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1598097600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1598184000">-       Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1598270400">-      The issue affects SSDs with an HPE firmware version prior to HPD7 that results in SSD failure at 40,000 hours of operation (i.e., 4 years, 205 days 16 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us&gt;.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1614600000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1614686400">-       Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1614772800">-      The issue affects SSDs with an HPE firmware version prior to HPD7 that results in SSD failure at 40,000 hours of operation (i.e., 4 years, 205 days 16 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us&gt;.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1624881600">-      The issue affects SSDs with an HPE firmware version prior to HPD7 that results in SSD failure at 40,000 hours of operation (i.e., 4 years, 205 days 16 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us&gt;.</changelog>
  </package>
  <package pkgid="652410e118092c4827e267b363d898b89eb605c47e993a750fb8a1597b143b1d" name="firmware-hdd-4b4177239b" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1631534400">-</changelog>
  </package>
  <package pkgid="67e1bdf48c1d9195e799eecb22103b5980027343d8bfec44a83d1ddc21aa1658" name="firmware-hdd-4ba9615f90" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1614513600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1614600000">-      This firmware fixes an issue that, under extremely rare conditions, can cause a data miscompare. It eliminates causes of some potential timeouts and hangs. It also addresses some temporary performance degradation conditions.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1627992000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1628078400">-     This firmware release provides additional protection against command timeouts.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1629979200">-      This firmware release provides additional protection against command timeouts.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00117258en_us&gt;</changelog>
  </package>
  <package pkgid="1273ef100fa387731a041c10b556dc617e6ae71fffdcf0c8a0a414d83403e7fe" name="firmware-hdd-4c048aaeb0" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1573646400">-      Fixed a rare occurrence of meta data not being saved during a sudden power loss.
      * Fixed an issue where a performance drop was occurring during a write same operation.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1575806400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1575892800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1598097600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1598184000">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1598270400">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1614772800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1624881600">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
  </package>
  <package pkgid="1ba311c62025b24b9aefe65ac3fa8dfc6609ff93972978307d1abc8005317f55" name="firmware-hdd-54addf5312" arch="x86_64">
    <version epoch="0" ver="HPK3" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1594123200">-      Drive asserts under numerous PCIe link down events without PERST# condition.
      * Improvement to Background Media Scan if the required host idle time never occurs.
      * Check PE6031 VPD content and make appropriate correction if needed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1599825600">-      Drive asserts under numerous PCIe link down events without PERST# condition.
      * Improvement to Background Media Scan if the required host idle time never occurs.
      * Check PE6031 VPD content and make appropriate correction if needed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-4.1" date="1605873600">-      Drive asserts under numerous PCIe link down events without PERST# condition.
      * Improvement to Background Media Scan if the required host idle time never occurs.
      * Check PE6031 VPD content and make appropriate correction if needed</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3" date="1608206400">-      This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-2.1" date="1613995200">-      This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-4.1" date="1616587200">-      This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-5.1" date="1617278400">-      This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-6.1" date="1625140800">-      This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</changelog>
  </package>
  <package pkgid="e48a8c03d6e05fc70af8f0daabab19dcb1600900ede1a9179a2a8ebf581f9184" name="firmware-hdd-5bf9355926" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1547467200">-      Fixed a rare issue that could lead to data loss during an unexpected power loss</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="a5214b72bd050aa762c24819f3acfd2bae59a2153eafecdb3038f7efa3cb2649" name="firmware-hdd-5d9e841607" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1547467200">-      Firmware version HPD3 supports NDU (non-disruptive update) firmware updates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-8.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="4b049698d9e740a6ce74098db3ad999e3c36faf477c6ac57e4fba3aa701048dc" name="firmware-hdd-5dcf26fa42" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-3.1" date="1547467200">-      Removed support of UNMAP command.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="698cdcee4ebb4f7cee980862c01646265789c3e24a83db53fc6cea3f4dd76b57" name="firmware-hdd-624b75c7e2" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1572782400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1572868800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1572955200">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-6.1" date="1598097600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-6.1" date="1598184000">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-6.1" date="1598270400">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1614772800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1624795200">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
  </package>
  <package pkgid="e0c6641a666422eb3f6fe9a663c7477b9be4567dc33bade139cb6eb50d2340c2" name="firmware-hdd-6628fce235" arch="x86_64">
    <version epoch="0" ver="EPK75H3Q" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK72H3Q" date="1605787200">-      Improve overhead in handling of first packet to limit the incidence of NACKs due to lost byte from second packet.
      * Maintain Class Code value in a buffer area when link is down. Copy maintained Class Code from buffer to PCIe Config Space on link-up.
      * Change 'Percent Endurance Used' value reported in a Workload Log Page ( D6h ) to report actual endurance value.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK74H3Q" date="1614686400">-      Optimized T-offset setting.
      * Change MQES setting to 8192.
      * Fixed LED Behavior misaligned specs issue.
      * Fixed performance drop issue when 4+ SSD are installed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4H3Q-2.1" date="1614772800">-      Optimized T-offset setting.
      * Change MQES setting to 8192.
      * Fixed LED Behavior misaligned specs issue.
      * Fixed performance drop issue when 4+ SSD are installed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK75H3Q" date="1619784000">-      Fixed False UECC issue at idle power mode.
      * Old FW download Blocking (EPK70H3Q~EPK74H3Q).
      * FW is changed off the option of TX data alignment for each lane.
      * FW is changed to clear the interrupt after TLP Complete when PCIe config read operation.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00113342en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK75H3Q-2.1" date="1625140800">-      Fixed False UECC issue at idle power mode.
      * Old FW download Blocking (EPK70H3Q~EPK74H3Q).
      * FW is changed off the option of TX data alignment for each lane.
      * FW is changed to clear the interrupt after TLP Complete when PCIe config read operation.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00113342en_us&gt;</changelog>
  </package>
  <package pkgid="1a325ec3874dfeb39c578169ad7f810968cc22e42210e5853ae2c63cb84faf3c" name="firmware-hdd-68b12e54d2" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1565438400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1565524800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1565611200">-      This firmware includes a fix that changes the response to "SMART READ LOG" command from 04/80/80 to 05/26/00, which prevents the drive from incorrectly reporting an error.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="91a57fa53a9cbd5b4e8066639690e9a933cf0168a0b5e4d68515b5d0c6e14064" name="firmware-hdd-693b9a2853" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1617796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1617883200">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1624276800">-</changelog>
  </package>
  <package pkgid="677dd5bbe9e8443b54ffcaa82994a8faeea8c529dbf3554b310980e1a73f070f" name="firmware-hdd-6b7ce3da0e" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1568635200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1568721600">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1568808000">-      This firmware contains a fix for a data integrity issue that could occur during a power cycle while the drive is processing write commands.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1624708800">-</changelog>
  </package>
  <package pkgid="8efaf04d9e9e61b9b3da36960b7c78d9a27729a077c20bfcc517c1631f614e1b" name="firmware-hdd-6d922fc9a8" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1547467200">-      This firmware includes a fix for slow performance during sequential write workloads with small queue depth.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="96293a9ae5efbe833e205dcfe5e0fd5d8896850bfaa52112c23625aac0daba42" name="firmware-hdd-6e3845def5" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1547467200">-      Adds support for the HPE Security Log Page BBh, and improves drive reliability and responsiveness by including the latest firmware maintenance updates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="059bb0a57c67c934bf99546437713f1ddf3d8f5f698769b13cd4160841b30ec3" name="firmware-hdd-6ec35faf90" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1572955200">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1598097600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1598184000">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1598270400">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1614772800">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1623153600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1623240000">-      Reliability enhancements and VENDOR IDENTIFICATION field change from "HP" to HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1624708800">-</changelog>
  </package>
  <package pkgid="ac09d1ba704dca95faada72e851539a860c04f5eeee0c87f6559ba9cd8481597" name="firmware-hdd-6fc985bd3b" arch="x86_64">
    <version epoch="0" ver="GPK3" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3" date="1626868800">-     This Firmware release address below fixes and additional features:
    
      * FW Transfer Fix
      * Drive Failure Fix
      * Power Loss Protection
      * FW Download Fix
      * Reset Fix
      * Shutdown fix
      * PCIe Improvement
      * Random Write Improvement</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-2.1" date="1631793600">-</changelog>
  </package>
  <package pkgid="c4d3d87e1f787f8ee1435d751f968b0a3804ecabeae7f22b49a465ef95289d27" name="firmware-hdd-70e3962f98" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1572782400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1572868800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1572955200">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1598097600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1598184000">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1598270400">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1614772800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1624708800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
  </package>
  <package pkgid="77de3b800a50c9ac870d1dfa73e07fdcef88e29f79a861d4ecf7cb546b26061c" name="firmware-hdd-71af849f3b" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1547467200">-      Added support for SLES15.
      * Firmware version HPD3 supports NDU (non-disruptive update) firmware updates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-8.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="9c39b3867a9f9056cc8ffeff5e07629db5feb1453f80a0b17e57cdf428f5ab44" name="firmware-hdd-7505dfb5ae" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1617105600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1617192000">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="a12765953888ec2a368c9379f3a5f03d53f5567234ac796ee36a1dee530953a4" name="firmware-hdd-7677644a25" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1547467200">-      Fixed a rare issue that could lead to data loss during an unexpected power loss</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="4b6c8034f75207e6f6371a72c49e7bf06b3d6756082a976b37a78d7a1055fb3c" name="firmware-hdd-7c1a1734f9" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-8.1" date="1624363200">-</changelog>
  </package>
  <package pkgid="4afe5829b3fe7527885559296a93169b1e37079df2a33b8bd64ac82c32373959" name="firmware-hdd-7f2a26e6d0" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1568894400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1568980800">-      This firmware fixes an issue where the drive can become inaccessible after an emergency power off, and corrects a potential verification issue during read recovery.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.  
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1624708800">-</changelog>
  </package>
  <package pkgid="b97cadb4e03a7b7ffaca6bede7e9bf2f409b19c458eb75173784f461559633b8" name="firmware-hdd-7fc5497116" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1617105600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1617192000">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="3cc3e525344ed35efe880f780e258a644a544f83bf945219d158dc4cf1e53a18" name="firmware-hdd-805abb7e9c" arch="x86_64">
    <version epoch="0" ver="85032G00" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85030G00-2.1" date="1598270400">-      Added Support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85031G00" date="1623240000">-      This is a maintenance release that contains various drive reliability enhancements and code fixes accumulated since the last initial release, as well as a change to disable MCTP over PCIe VDM function to satisfy certain HPE platform environments.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85032G00" date="1632571200">-      Implements FW-based VPD.
      * ARP setting is changed from "Capable &amp; Discoverable" to "Fixed &amp; Discoverable".
      * A minor tweak to the Foreground Media Scan (FMS) algorithm to ensure critical variables are initialized properly.</changelog>
  </package>
  <package pkgid="8f720c2188c1043d6aca3f2f634eab9884404b6aa27713252b5cdc3a3117ec17" name="firmware-hdd-82894b9e0a" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1568721600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1568808000">-      This firmware fixes an issue where the drive can become inaccessible after an emergency power off, and corrects a potential verification issue during read recovery.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1624708800">-</changelog>
  </package>
  <package pkgid="fb632f3ee6aba8ada2ad32c35fa58b3de3a85acaccc7f144445192dc29b7eaab" name="firmware-hdd-852266afdf" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1614686400">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1619697600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1619784000">-      This firmware provides a change to the Vendor ID in the VPD page that refers to HP instead of HPE.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1627992000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1628078400">-     This firmware fixes a potential reliability condition, a rare data integrity
    issue and the cause of a potential hang.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1641124800">-      This firmware mitigates a potential reliability concern.</changelog>
  </package>
  <package pkgid="fd71d005ed19fbc43bd0a6cf561c18e9da02dd0c18c229fe4fe165e0e233942f" name="firmware-hdd-8a0371a425" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1629979200">-</changelog>
  </package>
  <package pkgid="3ae54b52b5ca510dab6a11dadaab2ff01d23449d989dd35796a9186ad5178d6e" name="firmware-hdd-8a2c06af48" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1547467200">-      Fixes a data integrity risk where stale data is mistakenly used from cache.
      * Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-6.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-6.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="0ba19e76b4ff7500f815ca47fe9ea4b5eb7c17d5f1f0efd8be1844d5bf35fa2e" name="firmware-hdd-8a7ecf7465" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1486468800">-      **Online firmware flashing of drives attached to an HPE Smart Array controller running in Zero Memory (ZM) mode or an HPE ProLiant host bus adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.**
      * **Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the SPP and HP SUM.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1486555200">-     *Problems Fixed:**
    
      * Fixed an issue where wear usage was not being reported correctly in the SmartSSD Wear Gauge Utility</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1615809600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1615896000">-      If Power On Hours exceeds 70,000hrs, PM2R will report Hardware error (04/4C/A8) after the next Power Cycle and will not accept read/write commands. This fix will update storage location reporting when the maximum number of registrations in the Work Load Log read process reaches 70,000; the last registered 70,000th storage location will be modified to be read as the next (70,001st) storage location.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111296en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1633003200">-      If Power On Hours exceeds 70,000hrs, PM2R will report Hardware error (04/4C/A8) after the next Power Cycle and will not accept read/write commands. This fix will update storage location reporting when the maximum number of registrations in the Work Load Log read process reaches 70,000; the last registered 70,000th storage location will be modified to be read as the next (70,001st) storage location.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111296en_us</changelog>
  </package>
  <package pkgid="1a9894b3a18f06c5242b01aea7cc4215b73b345c7df4a8b8048a27cffae85f91" name="firmware-hdd-8b26d1ef02" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1568808000">-      This firmware fixes an issue where the drive can become inaccessible after an emergency power off, and corrects a potential verification issue during read recovery.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.  
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-3.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-3.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-4.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1623153600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1623240000">-      Reliability enhancements and VENDOR IDENTIFICATION field change from "HP" to HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1624708800">-</changelog>
  </package>
  <package pkgid="c560a5798d6d62b6e45890796433f0662dd53a3cadc7e5f5a5de33f6f7b06303" name="firmware-hdd-8c4a212ff9" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-7.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-7.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-8.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-9.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="e40182a4b6711a93c6515c00be1e2e18b2d818a7a980db9746969748ae4358bb" name="firmware-hdd-8d68452816" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1574596800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1574683200">-      Drive would stop responding on read retry Step 50 of Controller code correction.
      * In extremely rare cases, internal drive testing found that if I_T nexus loss is greater than 2 seconds, data loss might occur. If this rare condition occurs, the drive reports sense code 06/29/04 (HDD executed internal reboot), which displays on the screen and is entered in the drive log.
    
      * Drive may report sense code 02/04/02 instead of 02/04/01 if MODE SENSE and MODE SELECT command come before drive ready. The drive name will no longer display in the list, and the system will not be able to access the drive until the system is power-cycled or reset.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1629979200">-</changelog>
  </package>
  <package pkgid="612c2f6cc4fd3decfc8828017d3937573edfb8d35d914bbfdbd27c1ad1e93d8f" name="firmware-hdd-8e1e8083c5" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1585137600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1585224000">-      Fixed a PSuite FwCheck L5005 error at the time of Support Service Pack for ProLiant (SPP) execution.
      * Fixed a L4500 error at the time of device WWN update.
      * Fixed a write CMD timeout at the time of SPL happens during sanitize.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1598270400">-       Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1614686400">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1614772800">-       Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1631880000">-     This FW release deploys an Enhanced Media Scan algorithm that addresses an
    issue when the host system does not provide enough idle time for drive's
    Foreground Media Scan to be activated, which is needed to ensure long term
    drive reliability. It also addresses few minor issues.</changelog>
  </package>
  <package pkgid="1b5db2ef3e67d6622c9299d53614ac77b15b95e68bda7be7b9e14dcb2ae4820c" name="firmware-hdd-8e8ddc5265" arch="x86_64">
    <version epoch="0" ver="HPK1" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK1" date="1519992000">-      Firmware corrects an issue where the drive will be in a failed state after an unexpected power loss. When this occurs the drive will not recover after subsequent power cycles and will not be accessible by the system configuration and Host applications.
      * Refer Customer Bulletin for workarounds &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00042733en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK1-2.1" date="1547380800">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK1-2.1" date="1547467200">-      Firmware corrects an issue where the drive will be in a failed state after an unexpected power loss. When this occurs the drive will not recover after subsequent power cycles and will not be accessible by the system configuration and Host applications.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK1-3.1" date="1640088000">-      Firmware corrects an issue where the drive will be in a failed state after an unexpected power loss. When this occurs the drive will not recover after subsequent power cycles and will not be accessible by the system configuration and Host applications.
      * Refer Customer Bulletin for workarounds &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00042733en_us&gt;</changelog>
  </package>
  <package pkgid="2eba0ad6edf09abe5e5f1648231cf04d060791fd300994bbd51a4e8661e34cc3" name="firmware-hdd-8ed8893abd" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1574251200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1574337600">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1588593600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1588680000">-      Fixed Store Userdata in Crash Occurred.
      * Fixed Log sense returned incorrect length of data.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1614686400">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="b2caa700a47df0f3163d5e690b64bc4f8b5200dee802a89d3c61df95d3ff9b56" name="firmware-hdd-8f501d6cf1" arch="x86_64">
    <version epoch="0" ver="HPD1" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1642075200">-      Fix command timeout and uncorrectable error improvement.
      * Added features for SAS4 auto power swtiching and thermal requirement.</changelog>
  </package>
  <package pkgid="105b9036b26102f746e8df03464bdd6c5239a371e4ab4b60f4294a502355c827" name="firmware-hdd-8f9bf23306" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1621857600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1621944000">-      The updates were included in a regularly scheduled 5300 maintenance release. This firmware has a security version upgrade to include TCGe SKUs and prevent a downloading of a back level firmware version of HPG0 after upgrading to HPG1.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1630065600">-</changelog>
  </package>
  <package pkgid="6185a9bf305a40ab5b66525e4e40eb15d739c714404c92e868c35647d3d10075" name="firmware-hdd-8fafc9efb2" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1580299200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1580385600">-      Enhancement improved perfromance during a raid 5 drive rebuild.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1614686400">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1615464000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1615550400">-      Change Vendor Identification Field (VID data) from "HP" to "HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1632657600">-      TBD</changelog>
  </package>
  <package pkgid="43af617d4d926bb9813cf9992080da54a747b92bf559833caafe3cadf02949bd" name="firmware-hdd-9196d4f720" arch="x86_64">
    <version epoch="0" ver="HPGG" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE" date="1566475200">-      Fix to issue in bootloader download during power loss. 
      * Improvements to error exception.
      * Improvements to Secure lock fix during multi-thread read tests with high freq. power cycling.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE-2.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE-2.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE-3.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE-3.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE-4.1" date="1613476800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE-4.1" date="1613563200">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG" date="1613649600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG" date="1613736000">-      Improvements to Product Quality and Reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-2.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="5fd5069d51b5c8a4b4ab68708bc6fe13d7512e9e5ff36ab60977cac103a4c5b2" name="firmware-hdd-92d876cfea" arch="x86_64">
    <version epoch="0" ver="4ICRHPK3" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3" date="1617105600">-      Fixed issues described in Customer Bulletin at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111900en_us.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-2.1" date="1618142400">-      Added support for Intel VROC platform.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-2.1" date="1618228800">-      The issue affects SSDs with an HPE firmware version prior to 4ICRHPK3 that may result in SSD failure starting at 4,700 hours of operation, neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111900en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-3.1" date="1625140800">-      The issue affects SSDs with an HPE firmware version prior to 4ICRHPK3 that may result in SSD failure starting at 4,700 hours of operation, neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111900en_us&gt;</changelog>
  </package>
  <package pkgid="e76639c6b2d40bce7c717e3806ab6332dd827191ca15453548e84c4054f8becb" name="firmware-hdd-95a2e5abcb" arch="x86_64">
    <version epoch="0" ver="HPK4" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4" date="1547467200">-      Fixed timing issue to pass VMWare VSAN certification. Downgrading to any previous version of firmware is not allowed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1565524800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1565611200">-      Fixed timing issue to pass VMWare VSAN certification. Downgrading to any previous version of firmware is not allowed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1572868800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1572955200">-      Fixed timing issue to pass VMWare VSAN certification. Downgrading to any previous version of firmware is not allowed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-4.1" date="1598270400">-      Added support for RHEL8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-6.1" date="1626350400">-</changelog>
  </package>
  <package pkgid="25d8070d06f0dfc2ae017d05241a02a13db2eed66c5bcf082c3c278df37a321c" name="firmware-hdd-95af9a555e" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1547467200">-      This firmware includes a fix for an issue where the LED would continue blinking after a Sanitize operation completed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-2.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-2.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-4.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-5.1" date="1608724800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-5.1" date="1608811200">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1608897600">-</changelog>
  </package>
  <package pkgid="9f5389940ed7f740dccc881e8e21ff1a5f1bcad2282d36aa280e9b472aafff92" name="firmware-hdd-95b6ae2e85" arch="x86_64">
    <version epoch="0" ver="HPK5" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1600862400">-      Update MCTP base spec version from 1.2.0 to 1.3.0
      * Change firmware to save the telemetry log buffer to smaller pages.
      * When reset happens, add to clear ready bit and other bits in health data according to MI 1.0a spec.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3" date="1600948800">-      Improve overhead in handling of first packet to limit the incidence of NACKs due to lost byte from second packet
      * Maintain Class Code value in a buffer area when link is down. Copy maintained Class Code from buffer to PCIe Config Space on link-up
      * Change 'Percent Endurance Used' value reported in a Workload Log Page ( D6h ) to report actual endurance value</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5" date="1614772800">-      Optimized T-offset setting.
      * Change MQES setting to 8192.
      * Fixed LED Behavior misaligned specs issue.
      * Fixed performance drop issue when 4+ SSD are installed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-3.1" date="1621339200">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-3.1" date="1621425600">-      Optimized T-offset setting.
      * Change MQES setting to 8192.
      * Fixed LED Behavior misaligned specs issue.
      * Fixed performance drop issue when 4+ SSD are installed.
      * The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-4.1" date="1625140800">-      Optimized T-offset setting.
      * Change MQES setting to 8192.
      * Fixed LED Behavior misaligned specs issue.
      * Fixed performance drop issue when 4+ SSD are installed.
      * The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</changelog>
  </package>
  <package pkgid="983e723703552de432232733c6cb3351cde0de17a056619aa9e197ecd28220a9" name="firmware-hdd-9a826ccd8a" arch="x86_64">
    <version epoch="0" ver="HPK4" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4" date="1534334400">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1547294400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1547467200">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1565438400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1565524800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1565611200">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-4.1" date="1572955200">-      Added support for SLES12SP1</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-6.1" date="1601035200">-</changelog>
  </package>
  <package pkgid="1acb9e1bea4e6d0b30a8787828b9184e2939396761e758d624ff12dc0b3bb3aa" name="firmware-hdd-9ad359dac1" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1564574400">-      Improved perfromance during a raid 5 drive rebuild.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1572955200">-      Added support for RHEL8</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1616414400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1616500800">-      Change Vendor Identification Field (VID data) from "HP" to "HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1629979200">-</changelog>
  </package>
  <package pkgid="a577c185a8244c35a12e8bdc20d4ba0c29305a5bcf4d1e3fce3fa81a94d8925a" name="firmware-hdd-9e87eecb3f" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1565611200">-      Fix to issue in bootloader download during power loss. 
      * Change IDF Word 106 report 4K TU for 4/8TB drives to align with Microsoft SQL requirement.
      * Improvements to error exception.
      * Improvements to Secure lock fix during multi-thread read tests with high freq. power cycling.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1611748800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1611835200">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1611921600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1612008000">-      Improved Product Quality and Reliability. Changed Cap Charge Timeout to 14 seconds from 4 seconds to provide additional time for cap charge in marginal power environment.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="7abcc6d7c24f06d94933c8bd07f30c90ec793720602b772118621d53b706679a" name="firmware-hdd-a05f29cef3" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1604318400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1604404800">-      This update improves performance for random read workloads with delays between reads.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1624449600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1624536000">-     This firmware version updates the Vendor ID in the standard inquiry to 'HPE',
    in previous versions it was 'HP.'</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1624536001">-</changelog>
  </package>
  <package pkgid="2f7e659fd43368fc892b27c9a732aa9bcb0b55849f3dee7c24cfe589a9b2b3b1" name="firmware-hdd-a07a420ed1" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1598443200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1598529600">-      Increased Queue Size from 32 to 128 to be equal to the max number of chips.
      * Refresh NM SRAM area periodically only when idle as a possible work around on NM SRAM parity error.
      * Change the error response as 0x3 (SP_Busy) or 0x07 ( NO_SESSION_AVAILABLE) when host attempts to open another session while a session is already opened.
      * Disable verify compare if APP_CHK=0.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1614772800">-      Modify Drive Vendor Identification String (VID) in Inquiry page from "HP" to "HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="0099f45c3cd46547dff8c6aa61b01ffc8e0f9b0af5a6ee8e04b570961651e76a" name="firmware-hdd-a1fd19f9ca" arch="x86_64">
    <version epoch="0" ver="HPG8" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-2.1" date="1565438400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-2.1" date="1565524800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-2.1" date="1565611200">-      Eliminates a potential hang on 4TB under certain pattern-dependent read conditions
      * Eliminates the possibility of a weak read signal under a sequenced combination of read/write conditions
      * Provides reliability enhancements involving head fly height dynamics
      * Enables download Mode 0Eh activation by Mode 0Fh</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-4.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-6.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="8c227bec6d1aa7e426cdd07da87cbc81ba3093a790b9644ad298fe20200c6ea1" name="firmware-hdd-a2d4b5c742" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1547467200">-      Firmware corrects an issue where drives were not found during Power-On Self-Test device discovery.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-10.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="64072393745f5d07d7d3518c2118d3e7b4cfeb1fcbdcba131003e35e4ec876b8" name="firmware-hdd-a629fcea59" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1547467200">-      Reliability enhancement for applications that write data to a narrow range of tracks.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1565611200">-     Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-7.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-7.1" date="1572955200">-     Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-8.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-8.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-9.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-9.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-10.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="7b4b4c6e9d7f93a6784775ee6d6d10cafd9070fbe5390a45db3873b16e7c807d" name="firmware-hdd-a886842a99" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1568808000">-      This firmware fixes an issue where the drive can become inaccessible after an emergency power off, and corrects a potential verification issue during read recovery.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-3.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-3.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-4.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1624536000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1624622400">-     Reliability enhancements and VENDOR IDENTIFICATION field change from "HP" to
    HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1624708800">-</changelog>
  </package>
  <package pkgid="56476706295913a7d25843e813827039484c654334b4790e930de62d5e88dfbf" name="firmware-hdd-aa9e289524" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1547294400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1547467200">-      This firmware adds a feature that will periodically assess the health of the writer element of the head by verifying the data after a write operation to ensure more robust data integrity.
      * When performing format on drives with marginal servo flaws, it takes too long to format or format fails with 03/31 reported across the interface on subsequent commands. This firmware includes a change that moves the servo flaw characterization retries earlier in the sequence of format.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1565611200">-      Added support for RHEL 8</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1572955200">-      Added support for RHEL 8</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1621339200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1621425600">-      This firmware version updates the Vendor ID in the standard inquiry to 'HPE', in previous versions it was 'HP.'</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1632571200">-</changelog>
  </package>
  <package pkgid="98b2f7a6baa30995b628dcf813291ca5b46a01c1dbfbd6db4e7486a406582f72" name="firmware-hdd-aaf1014ede" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1572955200">-      Corrects a potential data integrity issue during unaligned write commands, only found in supplier ongoing lab testing.Includes additional fixes to improve error handling and reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1598097600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1598184000">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1598270400">-      Corrects a potential data integrity issue during unaligned write commands, only found in supplier ongoing lab testing.Includes additional fixes to improve error handling and reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1614772800">-      Corrects a potential data integrity issue during unaligned write commands, only found in supplier ongoing lab testing.Includes additional fixes to improve error handling and reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1621857600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1621944000">-      Reliability enhancements and VENDOR IDENTIFICATION field change from "HP" to HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1624708800">-</changelog>
  </package>
  <package pkgid="9783ac014831f83909fc2c2ba48cfdc3b1594a2f400b531cf13c6b67976ac5e7" name="firmware-hdd-ac20a1e1c6" arch="x86_64">
    <version epoch="0" ver="HPG8" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1566475200">-      Fix to issue in bootloader download during power loss. 
      * Change IDF Word 106 report 4K TU for 4/8TB drives to align with Microsoft SQL requirement.
      * Improvements to error exception.
      * Improvements to Secure lock fix during multi-thread read tests with high freq. power cycling.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA)is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1613736000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1613822400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8" date="1613908800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8" date="1613995200">-      Improvements to Product Quality and Reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-2.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="79606990fd1759244b37b8bd2eb457fbc85be952fa5622b1a0d180a7a82ca6d7" name="firmware-hdd-ac3fda26eb" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-6.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-6.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="1462e5f07486897fc91856d9c86c92ea93b58f7d20fbef62cf2b33d8c2fd1a02" name="firmware-hdd-adb3ab8147" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1584273600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1584360000">-      Fixed a timeout error and improved performance.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1599393600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1599480000">-      This update includes a fix that prevents unrecoverable read errors in highly localized write intensive workload, and a new servo code revision that improves performance under specific vibration conditions.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="11ec77f9eb172cd6d89a2fbf2e675761c8e5da57e70a47ad18559a62db9370d8" name="firmware-hdd-ae6b41e855" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1583928000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1584014400">-      Fixed a timeout error and improved performance.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1598270400">-       Added support for RHEL 8.2.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1614686400">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1614772800">-       Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1619697600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1619784000">-      This firmware version updates the Vendor ID in the standard inquiry to 'HPE', in previous versions it was 'HP.'</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="ed30e9577196baa355b7d7c1a562bf850ea05ae330da367ea33795f87659706a" name="firmware-hdd-aef2a690c9" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-3.1" date="1572782400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-3.1" date="1572868800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-3.1" date="1572955200">-      Fixes a rare link loss issue and adds enhancements for drive reliability.
      * After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.
      * The new drive bootloader code will be activated after the next drive power cycle.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-4.1" date="1598097600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-4.1" date="1598184000">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-4.1" date="1598270400">-      Fixes a rare link loss issue and adds enhancements for drive reliability.
      * After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.
      * The new drive bootloader code will be activated after the next drive power cycle.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-5.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-5.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-5.1" date="1614772800">-      Fixes a rare link loss issue and adds enhancements for drive reliability.
      * After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.
      * The new drive bootloader code will be activated after the next drive power cycle.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1624881600">-      Fixes a rare link loss issue and adds enhancements for drive reliability.
      * After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.
      * The new drive bootloader code will be activated after the next drive power cycle.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us&gt;</changelog>
  </package>
  <package pkgid="9c7aa4eaa53ed6b4ea7722338c75f996e838d75ed05bfc19c52e62d375f1e0bb" name="firmware-hdd-af802bb412" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1547467200">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-6.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-8.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="3596741d9948a3e639a37f44fa240a4232d74ccc6fcd6d28c7d8491d53afa6d1" name="firmware-hdd-b04257b77b" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1624449600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1624536000">-     This firmware version updates the Vendor ID in the standard inquiry to 'HPE',
    in previous versions it was 'HP.'</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="d3e44e7f58f9bca109b9267a6c0b5c0e8e9c0ddc728b6a16911482caf8b9759e" name="firmware-hdd-b1c9eaf74c" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1572350400">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1572436800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1572523200">-      This firmware includes a change to reduce response times on random read/write workloads where commands are sent at slow interval (one every few hundred milliseconds).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1618747200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1618833600">-      This firmware version updates the Vendor ID in the standard inquiry to 'HPE', in previous versions it was 'HP.'</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1624363200">-</changelog>
  </package>
  <package pkgid="c4679daa524b404c66dba9ab3b98ab46c6153a4441cf3ed4c6fd1ca6cef82654" name="firmware-hdd-b45e49679c" arch="x86_64">
    <version epoch="0" ver="HPK4" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1524744000">-      Additional improvements in MCTP functionality.
      * Drive fails to train in BL460 after Windows warm reset or iLO reset.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4" date="1547467200">-      Fixed timing issue to pass VMWare VSAN certification.  Downgrading to any previous version of firmware is not allowed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1565524800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1565611200">-      Fixed timing issue to pass VMWare VSAN certification.  Downgrading to any previous version of firmware is not allowed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1572868800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1572955200">-      Fixed timing issue to pass VMWare VSAN certification.  Downgrading to any previous version of firmware is not allowed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-4.1" date="1598270400">-      Added support for RHEL8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-6.1" date="1626350400">-</changelog>
  </package>
  <package pkgid="91b52eafc6e92aeefc8c47ec17e07341689c4d9b14af90b6997de814fe178a95" name="firmware-hdd-b460823f70" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1565611200">-      Fix to issue in bootloader download during power loss. 
      * Change IDF Word 106 report 4K TU for 4/8TB drives to align with Microsoft SQL requirement.
      * Improvements to error exception.
      * Improvements to Secure lock fix during multi-thread read tests with high freq. power cycling.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1611748800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1611835200">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1611921600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1612008000">-      Improved Product Quality and Reliability. Changed Cap Charge Timeout to 14 seconds from 4 seconds to provide additional time for cap charge in marginal power environment.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="124ce99897e2869af4c3e4e4732431c0ff8230d1d31b4e86ad1aa7582855726f" name="firmware-hdd-b78255e146" arch="x86_64">
    <version epoch="0" ver="HPG7" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1575115200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1575201600">-     *Enhancements/New Features:**
    
      * Improved robustness of Adjacent Track Interference (ATI) mitigation in System.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1575288000">-     *Problems Fixed:**
    
      * Persistent Write Cache release size was miscalculated when disk write operation completed before command complete was reported to host which could result in slow sequential write performance of the drive.
      * Drive would stop operations when disk received COMRESET command during firmware download (DOWNLOAD MICROCODE command).  
    NOTE: If this error occurs, data integrity is maintained and reboot is
    required to restart the drive operation.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7" date="1606132800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7" date="1606219200">-      This firmware revision improves low-temperature performance and Error Correction Code (ECC) error recording for some commands. 
      * It also improves internal logging capabilities for failure analysis.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-2.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-2.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-3.1" date="1624708800">-</changelog>
  </package>
  <package pkgid="8d6a5c5285c180b38b0771f8910be643a17daaf7f167f3b673a658488bb78344" name="firmware-hdd-b7eb905efe" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1572782400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1572868800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1572955200">-      Fixes an issue which caused the drive to become non-functional.
      * Fixes VPD Log D0h reported drive Sanitize times. 
      * Adds support for Security Log Page BBh.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1598097600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1598184000">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1598270400">-      Fixes an issue which caused the drive to become non-functional.
      * Fixes VPD Log D0h reported drive Sanitize times.
      * Adds support for Security Log Page BBh.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1614772800">-      Fixes an issue which caused the drive to become non-functional.
      * Fixes VPD Log D0h reported drive Sanitize times.
      * Adds support for Security Log Page BBh.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1624881600">-      Fixes an issue which caused the drive to become non-functional.
      * Fixes VPD Log D0h reported drive Sanitize times.
      * Adds support for Security Log Page BBh.</changelog>
  </package>
  <package pkgid="5dbf34e986aa3bd64caf93c4c4feb2fc341ff4b383efd666c2787601a724ee45" name="firmware-hdd-b85516c7d2" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1547467200">-      This firmware adds a feature that will periodically assess the health of the writer element of the head by verifying the data after a write operation to ensure more robust data integrity.
      * When performing format on drives with marginal servo flaws, it takes too long to format or format fails with 03/31 reported across the interface on subsequent commands. This firmware includes a change that moves the servo flaw characterization retries earlier in the sequence of format.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1624708800">-</changelog>
  </package>
  <package pkgid="bde3f0f2d75904e31446186ba9b07126aee1cd03556b9a6699c77832a0d805af" name="firmware-hdd-b8a60fbe9a" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1566734400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1566820800">-      Enhancement Improved perfromance during a raid 5 drive rebuild.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="c09121cce35987d6aa92d42cdfb91be6477e6a70669d458a77b9c21f0f79d7cc" name="firmware-hdd-b9340d29be" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1547467200">-      Fixes a data integrity risk where a recoverable error can prevent a write command from completing properly.
      * Fixes a data integrity risk due to incorrect re-ordering of commands, when overlapped commands occur. 
      * Fixes a data integrity risk during very large blocks of sequential commands with a data transfer between 1020MB and 1024MB.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-6.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-6.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="00b0d2d834f31a4b7090ab0aac96d68b47fd607087ca8c4501f0b2ffbf2cc33b" name="firmware-hdd-bdc37cb37f" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1547467200">-      Firmware version HPG2 prevents the occurrence of a rare issue which could lead to slow drive performance. This issue has the potential to impact all drives in configurations where the drives might be allowed to be idle for greater than 1 second.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-7.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-7.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-8.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-9.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="819cab3a5bd278bbac460880068ac02c8fdc7d1c3bdb8d764d5df23819fd954d" name="firmware-hdd-bdfb8e99d9" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1572350400">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1572436800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1572523200">-      This firmware includes a change to reduce response times on random read/write workloads where commands are sent at slow interval (one every few hundred milliseconds).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1614772800">-      Added Support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1618747200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1618833600">-      This firmware version updates the Vendor ID in the standard inquiry to 'HPE', in previous versions it was 'HP.'</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1624276800">-</changelog>
  </package>
  <package pkgid="96e0a2ab469c7b1f453208dab104685973fc4c1946425d829e5d2c610d48e779" name="firmware-hdd-befd42bd64" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1622635200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1622721600">-      The FW version is Changed from HPG0 to HPG1. Changed the thermal throttling scheme. SMART 60 was matched with Tcase 70 and Run the thermal throttling at SMART 65.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1642680000">-      Support new PCB H/W with new temperature sensor.</changelog>
  </package>
  <package pkgid="62cb6ad577fcd16a283ac52854180ef9b6004f900f4fa3c57ce3afb452bf114d" name="firmware-hdd-bfc4af697b" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1563710400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1563796800">-      This firmware includes a fix that changes the response to "SMART READ LOG" command from 04/80/80 to 05/26/00, which prevents the drive from incorrectly reporting an error.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1572782400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1572868800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1572955200">-      This firmware includes a fix that changes the response to "SMART READ LOG" command from 04/80/80 to 05/26/00, which prevents the drive from incorrectly reporting an error.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="908567c77d9ad2ebb4ecf19bdc55454cc259dcbeed22d98ac874d5d989d60fa5" name="firmware-hdd-bfc95f0628" arch="x86_64">
    <version epoch="0" ver="HPGB" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-6.1" date="1572782400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-6.1" date="1572868800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-6.1" date="1572955200">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-7.1" date="1598097600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-7.1" date="1598184000">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-7.1" date="1598270400">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-8.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-8.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-8.1" date="1614772800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-9.1" date="1624795200">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
  </package>
  <package pkgid="a0e694e276c3cd04871e3b6d2cea4f352b56ea654738a95923d2c03d87f98482" name="firmware-hdd-c4355d15c4" arch="x86_64">
    <version epoch="0" ver="4ICSHPK4" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4" date="1621425600">-      Fixed HPK3 drive reports incorrect Device ID issue.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-2.1" date="1621771200">-      Added support for VMD enabled Intel VROC platform.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-2.1" date="1621857600">-      Fixed HPK3 drive reports incorrect Device ID issue.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-3.1" date="1626350400">-</changelog>
  </package>
  <package pkgid="20ab02b06f33abf31695dbaab5524f09000998497f5b9e7ed15b7a4ae45d957a" name="firmware-hdd-c566d63ca0" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1599048000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1599134400">-      HPG6 introduces bug fixes, reliability enhancement and modification in SMART Attributes. Once HPG6 is downloaded, the drive cannot be changed back to an earlier firmware (eg, HPG3).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="dc23294162f7ea94f6d7cd024fa7475940be8f572577d0697523358f1014f8a5" name="firmware-hdd-c5cd837c29" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1616932800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1617019200">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1620561600">-</changelog>
  </package>
  <package pkgid="a1e84bfc3b7253e182db97a2de7f9a7489dd82bb2f721fd34bbcc422e25ed0b6" name="firmware-hdd-c7df7ceedb" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1574596800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1574683200">-      Free up more DRAM for user data to improve DRAM management.
    
      * Drive would stop responding on read retry Step 50 of Controller code correction.
    
      * In extremely rare cases, internal drive testing found that if I_T nexus loss is greater than 2 seconds, data loss might occur. If this rare condition occurs, the drive reports sense code 06/29/04 (HDD executed internal reboot), which displays on the screen and is entered in the drive log.
    
      * Drive may report sense code 02/04/02 instead of 02/04/01 if MODE SENSE and MODE SELECT command come before drive ready. The drive name will no longer display in the list, and the system will not be able to access the drive until the system is power-cycled or reset.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1624968000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1625054400">-     This firmware provides a change to the Vendor ID in the VPD page that refers
    to HP instead of HPE.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1629979200">-</changelog>
  </package>
  <package pkgid="a1c3f264bf9582bd37409cd9044ade1184ac38650bc4a0b51120c84775e495bd" name="firmware-hdd-c993b31232" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4" date="1590580800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4" date="1590667200">-      This firmware release provides additional protections against hangs in certain corner cases, and cleans up some error handling and command behavior issues.
      * It also fixes a firmware bug that caused significant performance degradation in abnormally long data transfers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-2.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-2.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1614686400">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="1a5c00050b444c088e030c723fe56fea6d5059f9e1abf4ee40782f92bb6cdd86" name="firmware-hdd-ca21e169e2" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1568721600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1568808000">-      This firmware fixes an issue where the drive can become inaccessible after an emergency power off, and corrects a potential verification issue during read recovery.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="8f9191ea5e68525d6cd8fc5eac7da47679a8fe322a6ccf5de57993768c4c9c60" name="firmware-hdd-cc819d4bff" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-4.1" date="1572782400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-4.1" date="1572868800">-      Added support for RHEL8</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-4.1" date="1572955200">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-5.1" date="1598097600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-5.1" date="1598184000">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-5.1" date="1598270400">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1614772800">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1624708800">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
  </package>
  <package pkgid="aa7735de3c06901585738a3e440e787b12150cf85fa7c9c87e0d7967d9ea591d" name="firmware-hdd-cea219e4b1" arch="x86_64">
    <version epoch="0" ver="HPK3" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1567512000">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1567598400">-      Fixes an issue where the SSID was not programmed correctly to the drive. This may cause issues with the drive not being identified correctly in the Integrated Lights Out Utility.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1598270400">-      Added support for RHEL8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3" date="1614168000">-      Fixed SSD weargauge report error issue.
      * Fixed Assign FWState as TR_DONE_ERR at the correct location.
      * Prepare proper response data for Get Message Type Supported MCTP Command.
      * Added code to preserve current feature values cross live firmware update.
      * Allocate 4 bytes instead of 2 bytes for parameter code.
      * Changed the value for NLB equal to NSize -1.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-3.1" date="1625140800">-</changelog>
  </package>
  <package pkgid="e5b3d22472b524dd28c68d400af2ad62ff26deb53dfdaf66ee35c4e3972ab470" name="firmware-hdd-cf0b6cabe1" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1626264000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1626350400">-     This firmware version updates the Vendor ID in the standard inquiry to 'HPE',
    in previous versions it was 'HP.'</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1629460800">-</changelog>
  </package>
  <package pkgid="debb2c387dd6b9ef087495ade6f5f80178437df48c63e676443f5d44430c8096" name="firmware-hdd-cfd7436fcc" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1568980800">-      This firmware fixes an issue where the drive can become inaccessible after an emergency power off, and corrects a potential verification issue during read recovery.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.  
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1623672000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1623758400">-      VENDOR IDENTIFICATION field change from "HP" to "HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1624708800">-</changelog>
  </package>
  <package pkgid="c0961437b7d4cf8e11fe4ef5398941ac2bc7f66873acbcd538fe406a3eb19eeb" name="firmware-hdd-d1cf327bc4" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1565611200">-      Fix to issue in bootloader download during power loss. 
      * Change IDF Word 106 report 4K TU for 4/8TB drives to align with Microsoft SQL requirement.
      * Improvements to error exception.
      * Improvements to Secure lock fix during multi-thread read tests with high freq. power cycling.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1611748800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1611835200">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1611921600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1612008000">-      Improved Product Quality and Reliability. Changed Cap Charge Timeout to 14 seconds from 4 seconds to provide additional time for cap charge in marginal power environment.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="8033439cd76714f5a0fde148daf5fe14db3a4f45794dd6adc772b6598bf4c769" name="firmware-hdd-d355375539" arch="x86_64">
    <version epoch="0" ver="HPS4" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-5.1" date="1547467200">-      HPS4 firmware release resolved a firmware timing issue which occurred during drive long self-test and resulted in a timeout condition that caused the drive to become unrecognized by the system.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-6.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-6.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-7.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-7.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-8.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-8.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-9.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-9.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-10.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="00831352811a1dda19e1d87366ebc03edee7622321f611ec8097debbdc7a4f8f" name="firmware-hdd-d39e7a7e75" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1598184000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="a1944bd38bac4dbdce3ac8de0be93c2bd8db3cb9a7f7e67be3e697de09860ffd" name="firmware-hdd-d550523365" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1631361600">-      VENDOR IDENTIFICATION field changed from "HP" to "HPE" and Reliability improvements.</changelog>
  </package>
  <package pkgid="8b52a6bc7b26a899369c32f3ecb9f38f84a1b0e853b7bbab6351cbf0524d9c74" name="firmware-hdd-d64642c780" arch="x86_64">
    <version epoch="0" ver="HPK4" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3" date="1524744000">-     *Problems Fixed:**
    
      * HPK3 firmware resolved an issue that caused the disk activity ring, which is located on NVME SSD drive carrier, to constantly spin regardless of drive activity status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4" date="1534334400">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1547294400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..,</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1547380800">-      Added support for SLES15.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1547467200">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1565524800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1565611200">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-4.1" date="1572955200">-      Added support for SLES15SP1.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-6.1" date="1601035200">-</changelog>
  </package>
  <package pkgid="02acde5394f15cfd710871eef87d0bf56d3d79b574027555ecab3932d9f68087" name="firmware-hdd-d7af557f47" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1576497600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1576584000">-      Fix issue with Drive Hang on Read Retry Step 50 Controller code correction - When "command aging timer expire" AND "I_T nexus loss" occurs at the same time, HDD reports sense code, 06-29-04 Sense code correction.
      * Drive may report sense 02/04/02 instead of 02/04/01 if MODE SENSE and MODE SELECT command come before drive ready.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1617796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1617883200">-      This firmware provides a change to the Vendor ID in the VPD page that refers to HP instead of HPE.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="45571c285ac585d673e3863fe4e37b89977a56bfa11c5b6b4527f96e504a8198" name="firmware-hdd-db687966b4" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1585483200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1585569600">-      Fixed a bug which is related to SSDs returning unexpected data when drive statistics are queried and could result in server instability.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097984en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1594728000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1594814400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4" date="1594900800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4" date="1594987200">-      PrefetchClear logic error on Write CMD.
      * ICRC Data Integrity improvement.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-2.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-2.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="de6b645e9b816637a2380deddc3b804e16f012f7d6ea76e95d3b4c21ade522c8" name="firmware-hdd-df22f7effd" arch="x86_64">
    <version epoch="0" ver="HPDB" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-3.1" date="1547467200">-      This firmware improves potential timeouts that could occur during the write error recovery process (causing the drive to internally reset), and corrects possible data mismanagement issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-4.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-4.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-5.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-5.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-6.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-8.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="3b5f55f6a1771bd371dd1712ef7f726cca65eced1f896e2cf5407605ca336880" name="firmware-hdd-e320db791d" arch="x86_64">
    <version epoch="0" ver="MPK75H5Q" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK71H5Q" date="1605787200">-      Improve overhead in handling of first packet to limit the incidence of NACKs due to lost byte from second packet
      * Maintain Class Code value in a buffer area when link is down. Copy maintained Class Code from buffer to PCIe Config Space on link-up
      * Change 'Percent Endurance Used' value reported in a Workload Log Page ( D6h ) to report actual endurance value</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK73H5Q" date="1614686400">-      Optimized T-offset setting .
      * Change MQES setting to 8192.
      * Code change to set 'Slot Clock Configuration bit in Link Status register.
      * Fixed LED Behavior misaligned specs issue.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3H5Q-2.1" date="1614772800">-      Optimized T-offset setting .
      * Change MQES setting to 8192.
      * Code change to set 'Slot Clock Configuration bit in Link Status register.
      * Fixed LED Behavior misaligned specs issue.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK75H5Q" date="1619784000">-      Fixed False UECC issue at idle power mode (12.8TB and 15.36TB only).
      * Apply PCLK running PHY option, PLL clock disable can be avoided in lane 0 missing case.
      * Old FW download Blocking.
      * FW is changed off the option of TX data alignment for each lane.
      * FW is changed to clear the interrupt after TLP Complete when PCIe config read operation.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00113342en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK75H5Q-2.1" date="1621771200">-      Added support for VMD enabled Intel VROC platform</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK75H5Q-2.1" date="1621857600">-      Fixed False UECC issue at idle power mode (12.8TB and 15.36TB only).
      * Apply PCLK running PHY option, PLL clock disable can be avoided in lane 0 missing case.
      * Old FW download Blocking.
      * FW is changed off the option of TX data alignment for each lane.
      * FW is changed to clear the interrupt after TLP Complete when PCIe config read operation.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00113342en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK75H5Q-3.1" date="1625140800">-      Fixed False UECC issue at idle power mode (12.8TB and 15.36TB only).
      * Apply PCLK running PHY option, PLL clock disable can be avoided in lane 0 missing case.
      * Old FW download Blocking.
      * FW is changed off the option of TX data alignment for each lane.
      * FW is changed to clear the interrupt after TLP Complete when PCIe config read operation.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00113342en_us&gt;</changelog>
  </package>
  <package pkgid="07a9ee773700047c90dfbc042e0a86a56b27eef6f7ed17a2e746c9347ee2882e" name="firmware-hdd-e4f147cdd2" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1629979200">-</changelog>
  </package>
  <package pkgid="2b54b19d81d27636a56a8cb666b746386c128e7ecf0dbd93d0d7e751bc40512a" name="firmware-hdd-e800e8d3b9" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1547467200">-      This firmware includes a fix for slow performance during sequential write workloads with small queue depth.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="23de8957d1156ab66549f8306f311735300135014b878b500d3bbcebcd2e0be8" name="firmware-hdd-ec908c3650" arch="x86_64">
    <version epoch="0" ver="HPG8" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-3.1" date="1547467200">-      This firmware updates the drive to indicate NDU compliance.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-4.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-4.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-5.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-5.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-6.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-8.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="18a11330e80f168cd7ad46a4fa175460771fa5f5ca2d828a61ab558cd3370709" name="firmware-hdd-edf6dcd906" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1574251200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1574337600">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1587643200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1587729600">-      Fixed Store Userdata in Crash Occurred
      * Fixed Log sense returned incorrect length of data.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1614686400">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="138eb28e4bd5eb03eccf3878146f8a1ee2c86f871b6cb9a05a9be0d8a5e89403" name="firmware-hdd-ef93133161" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-4.1" date="1589284800">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for Proliantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-4.1" date="1589371200">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1589457600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1589544000">-      Needed to support Samsung 16G DRAM.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1598529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1598616000">-      This release corrects logical block address mismatches that could results in partial or total data loss.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="00e1079b3155f93aed7b974a7eb6737aa1e5e9aa46188c92b08b40903ad68043" name="firmware-hdd-f0c91d2fe3" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1616932800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1617019200">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1624276800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
  </package>
  <package pkgid="bd64ac749d94477a5e8b4d1a250014a6693459f4223c1a9d347202a4bb00a207" name="firmware-hdd-f3faa195ff" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1572782400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1572868800">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1572955200">-      Fixes a data integrity risk where stale data is mistakenly used from cache.
      * Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1598097600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1598184000">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1598270400">-      Fixes a data integrity risk where stale data is mistakenly used from cache.
      * Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-7.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-7.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-7.1" date="1614772800">-      Fixes a data integrity risk where stale data is mistakenly used from cache.
      * Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-8.1" date="1624536000">-      Fixes a data integrity risk where stale data is mistakenly used from cache.
      * Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
  </package>
  <package pkgid="6937687d75a34a6aa5aa193df15300fdcf95d49289f8b7a84522de2cc42d9c90" name="firmware-hdd-f42438de3d" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1547467200">-      Fix to the error recovery algorithm to improve the overall reliability of the device.
      * Fix to insure complete support of internal logging during a sudden power off event which prevents the device entering into a degraded state.
      * Fixed a mishandling of error handling data during back ground media activities prevent a data issue.
      * Fix to  correct a buffer management timing issue internal to the device allowing for a more robust internal movement of data.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1565524800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="13bc24d7a0c3c05d661d3f6c1930ee3a0afbc01392fc2491931c4d780ef57485" name="firmware-hdd-f693ccc138" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1571832000">-      Fixed an issue with performance drops during mixed workload operations.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1586088000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1586174400">-      When SSD statistics are queried, erroneous drive temperatures may be reported. When this occurs, the system may encounter any of the two following conditions, leaving the server in an unstable state. 
        * Server shutdown
        * In VMware vSAN environment, storage volume taken offline.
      * For important information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097984en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1599048000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1599134400">-      PrefetchClear logic error on Write CMD.
      * ICRC Data Integrity improvement.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1624881600">-</changelog>
  </package>
  <package pkgid="a44f8ec8193998498cfe12b388011360384f40b1bfc8e7572879da0bb72e3cc6" name="firmware-hdd-f6d00bd17e" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1576497600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1576584000">-      Fix issue with drive Hang on read retry Step 50 Controller code correction - When "command aging timer expire" AND "I_T nexus loss" occurs at the same time, HDD reports sense code, 06-29-04 Sense code correction.
      * Drive may report sense 02/04/02 instead of 02/04/01 if MODE SENSE and MODE SELECT command come before drive ready.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1616328000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1616414400">-      There is no compelling reason to update this firmware. Risk is that whoever looks at the Vendor ID in the VPD page will notice that it refers to HP instead of HPE. There is no functional risk if not upgraded.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1624536000">-</changelog>
  </package>
  <package pkgid="40b34869521624edcd949b0bcc3fa6846215de984f8897e49497311923eb40a3" name="firmware-hdd-fa46c607d6" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1572868800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1622635200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1622721600">-      This firmware version updates the Vendor ID in the standard inquiry to 'HPE', in previous versions it was 'HP.'</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1624795200">-</changelog>
  </package>
  <package pkgid="21f135ae9af629d218c007772123d4a565cd60f2aed4520f108552ab78c86308" name="firmware-hdd-faf39e0ff7" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1591790400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1591876800">-      This firmware release provides additional protections against hangs in certain corner cases, and cleans up some error handling and command behavior issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1614772800">-      This firmware release provides additional protections against hangs in certain corner cases, and cleans up some error handling and command behavior issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1627992000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1628078400">-     This firmware release provides additional protection against command timeouts.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1629979200">-      This firmware release provides additional protection against command timeouts.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00117258en_us&gt;</changelog>
  </package>
  <package pkgid="f5d14a7968e74d69875cd3ad47a464f8af244cfe6f1e4b0d48ba26e4372702e3" name="firmware-hdd-fe9c474847" arch="x86_64">
    <version epoch="0" ver="HPK3" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1567598400">-      Fixes an issue where the SSID was not programmed correctly to the drive. This may cause issues with the drive not being identified correctly in the Integrated Lights Out Utility.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3" date="1614772800">-      Fixed SSD weargauge report error issue.
      * Fixed Assign FWState as TR_DONE_ERR at the correct location.
      * Prepare proper response data for Get Message Type Supported MCTP Command.
      * Added code to preserve current feature values cross live firmware update.
      * Allocate 4 bytes instead of 2 bytes for parameter code.
      * Changed the value for NLB equal to NSize -1.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-3.1" date="1625140800">-</changelog>
  </package>
  <package pkgid="50b19f6f3b29ee5b109cfe4aae757c142ef0c768d869f4ed8e7048613ce10618" name="firmware-iegen10" arch="x86_64">
    <version epoch="0" ver="0.2.3.0" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.1.5.2" date="1512993600">-     *Important Notes:**
    
     HPE Innovation Engine (IE) Firmware 0.1.4.4 has been removed from the web for
    the following reasons:
    
    1\. Systems could experience a rare issue where processor and memory
    temperatures stop reporting, resulting in increased system fan speeds. This
    issue is seen during a system reboot and is only recovered by another system
    reset. This issue did not exist with previous versions of the Innovation
    Engine Firmware.
    
    2\. Systems configured with Jitter Smoothing support could experience a rare
    issue where on a given boot the functionality does not function. Resetting the
    system typically corrects the issue. This issue did not exist with previous
    versions of the Innovation Engine Firmware.
    
    3\. Systems configured with the Intel Xeon Scalable 6143 Gold and 8165
    Platinum processors with HPE's Core Boosting support enabled could experience
    a rare issue where on a given boot the functionality does not function.
    Resetting the system typically corrects the issue. This issue did not exist
    with previous versions of the Innovation Engine Firmware.
    
    This is a new release of HPE Gen10 Innovation Engine (IE) Firmware revision
    0.1.5.2 to replace IE version 0.1.4.4. If updating from IE version 0.1.4.4,
    follow the installation notes. If updating from an IE version prior to 0.1.4.4
    please read the following note.
    
    System ROM V1.26 must be installed prior to updating to IE FW 0.1.5.2. This
    revision of the IE FW is required for updating the Intel Platform Service
    (SPS) Firmware revision 04.00.04.288 and later. It should be installed prior
    to updating to SPS FW 04.00.04.288 or later. SPS FW 04.00.04.288 mitigates
    security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-
    bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org
    /cgi-bin/cvename.cgi?name=2017-5709). The details regarding these security
    vulnerabilities were published to these links on November 20,2017. These
    security vulnerabilities are not unique to HPE servers.
    
    **Firmware Dependencies:**
    
    System ROM V1.26 or later  
    
    **Problems Fixed:**
    
    Addressed an issue where systems configured with Innovation Engine Firmware
    0.1.4.4 could experience a rare issue where processor and memory temperatures
    stop reporting, resulting in increased system fan speeds. This issue is seen
    during a system reboot and is only recovered by another system reset. This
    issue did not exist with previous versions of the Innovation Engine Firmware.
    
    Addressed an issue where systems configured with Innovation Engine Firmware
    0.1.4.4 and Jitter Smoothing support could experience a rare issue where on a
    given boot the functionality does not function. Resetting the system typically
    corrects the issue. This issue did not exist with previous versions of the
    Innovation Engine Firmware.
    
    Addressed an issue where systems configured with Innovation Engine Firmware
    0.1.4.4 and the Intel Xeon Scalable 6143 Gold and 8165 Platinum processors
    with HPE's Core Boosting support enabled could experience a rare issue where
    on a given boot the functionality does not function. Resetting the system
    typically corrects the issue. This issue did not exist with previous versions
    of the Innovation Engine Firmware.
    
    **Known Issues:**
    
    This flash component will report the Current Revision of the Innovation Engine
    FW as "n/a" when updating the Innovation Engine FW. This does not affect the
    flash update or impact how the Innovation Engine FW operates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.1.6.1" date="1525780800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    System ROM V1.26 or later
    
    **Problems Fixed:**
    
    Addressed an issue where the Integrated Lights-Out (iLO) web interface may
    incorrectly report the Innovation Engine is running in a degraded state.
    
    Addressed an issue where memory telemetry data may not be reported properly in
    the Integrated Lights-Out (iLO) web interface or through the HPE RESTful API.
    
    Addressed an issue where the Innovation Engine Firmware flash would fail if a
    previous flash attempt was interrupted and not completed successfully.
    
    **Known Issues:**
    
    This flash component will report the Current Revision of the Innovation Engine
    FW as "n/a" when updating the Innovation Engine FW. This does not affect the
    flash update or impact how the Innovation Engine FW operates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.1.6.1-3.1" date="1544184000">-     *Important Notes:**
    
    Ver. 0.1.6.1(C) contains updates to the component packaging and is
    functionally equivalent to ver. 0.1.6.1.  It is not necessary to upgrade with
    Revision C if a previous component Revision was used to upgrade the firmware
    to version 0.1.6.1.
    
    **Firmware Dependencies:**
    
    System ROM V1.26 or later  
    
    **Problems Fixed:**
    
    Addressed an issue where the Integrated Lights-Out (iLO) web interface may
    incorrectly report the Innovation Engine is running in a degraded state.
    
    Addressed an issue where memory telemetry data may not be reported properly in
    the Integrated Lights-Out (iLO) web interface or through the HPE RESTful API.
    
    Addressed an issue where the Innovation Engine Firmware flash would fail if a
    previous flash attempt was interrupted and not completed successfully.
    
    **Known Issues:**
    
    This flash component will report the Current Revision of the Innovation Engine
    FW as "n/a" when updating the Innovation Engine FW. This does not affect the
    flash update or impact how the Innovation Engine FW operates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.0.11" date="1550059200">-     Added support for Intel Xeon Scalable Performance 3200, 4200, 5200, 6200 and
    8200 series processors.
    
    Added support for HPE system performance monitoring and workload performance
    advisor. This feature also requires Integrated Lights-Out (iLO) firmware
    version 1.40 or later.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.0.11" date="1550145600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where updates to the Intel Server Platform
    Services (SPS) firmware may fail.
    
    **Known Issues:**
    
    This flash component will report the Current Revision of the Innovation Engine
    FW as "n/a" when updating the Innovation Engine FW. This does not affect the
    flash update or impact how the Innovation Engine FW operates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.1.2-2.1" date="1561982400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for HPE Persistent Memory featuring Intel Optane DC Persistent
    Memory.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.2.0" date="1585742400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where Processor or Memory temperature
    reporting may not be collected properly by the platform and the system fans
    may be running faster than expected. This issue has been seen occasionally
    after a server reboot and is typically corrected with a subsequent server
    reboot.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.2.2" date="1623153600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where processor or memory temperature
    reporting may stop reporting properly or report a constant reading after
    servers have been operating over an extended period of time without an AC
    power cycle.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.2.3" date="1630065600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Address an issue where Innovation Engine (IE) Firmware may be unresponsive and
    iLO Firmware may report "Update Failed" after flashing the Innovation Engine
    (IE) Firmware via RESTful update.  The flash will have been performed
    successfully, but the system must be reset for IE Firmware to function
    properly.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.3.0" date="1647864000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Innovation Engine (IE) may improperly reset every 24
    hours.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="036e2e96215c4a0382387dede69602555be69d7f2ae5ac8c2bb19541eea5b187" name="firmware-iegen10plus" arch="x86_64">
    <version epoch="0" ver="1.0.0.20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.0.20" date="1562328000">-</changelog>
  </package>
  <package pkgid="710084048cbfe1e5cca8b9fc75a46ceb8416061385bb31dd90cebee121b2751f" name="firmware-ilo5" arch="x86_64">
    <version epoch="0" ver="2.71" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60-1.1" date="1642593600">-      Added Support for HPE Synergy Gen 10/Gen10 Plus Systems for addressing the following. 
        * https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=hpesbhf04211en_us
      *   Support for Automatic SSL Certificate Enrollment using Simple Certificate Enrollment Protocol.
      *   Addition of DIMM Manufacture date in RedFISH output of Memory Resource.
      *   Added monitoring of User-defined temperature threshold for PCI Zone sensors on Edgeline servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60-1.1" date="1642680000">-      Fixed an issue where Network Tab page in iLO GUI doesn't refresh automatically post Server Reset.
      * "StructuredName" Redfish Property is hidden when the value of this field is an empty string.
      * Improved monitoring of temperature sensors on N3000 option cards.
      * Fixed an issue where iLO may become inaccessible after consecutive setting of factory defaults.
      * Improved power supply information reporting on Edgeline servers.
      * Intelligent Provisioning not accessible after a rare server reboot.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.63" date="1642852800">-     *Recommended**: For supported HPE ProLiant, Apollo Gen10 and Gen10 Plus systems.
    
    Is not supported for HPE Edgeline, Synergy Gen10 and Gen10 Plus systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.63" date="1642939200">-      Support for Cloud based management with Compute Ops Manager (COM).
      * Support for Enhanced Download Performance 
        * This option allows to improve the performance of iLO Scriptable Virtual Media and URL based Firmware update in environments with high network latencies.
      * Support  for NVIDIA A2 PCIE GPU card</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.63" date="1643025600">-     None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.65" date="1647864000">-      Validation of LDAPv3 based authentication using OpenLDAP based directory server.
      * Added Support for RDE Read and Write operations.
      * Added Support for Firmware update using Common PLDM based Package for Direct Attached UBMs (1/2/3/4).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.65" date="1647950400">-      Deployment needs to be run twice to reflect Firmware baseline successfully.
      * Change in response of Redfish API causes Oneview not to fully discover the Port Map Information.
      * RF subscription gets exhausted in certain situations.
      * Oneview marks Server as "Critical" when a Critical IML event has been manually marked as repaired in iLO GUI.
      * iLO not able to auto recover when an IML corruption happens.
      * Adapter Virtualization Mode not persistent across reboots.
      * On Edgeline Platforms, iLO GUI doesn't render in the first attempt when IP address is used.
      * iLO webserver becomes unresponsive after running RIBCL scripts for modifying SSO permissions.
      * AMD Gen10 servers might take up to 5 mins to complete POST when encryption is enabled.
      * Nvidia P1000 may not be detected if installed on an EL1000 chassis.
      * Intel N3000 network endpoints are not properly reported on e910t servers.
      * ipmitool lists incorrect number of network port links.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70" date="1653220800">-      Type-D Component Firmware update experience for Compute Ops Management.
      * Support for easy transition to Compute Ops Management for nodes that are currently under OneView management.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70" date="1653307200">-      Port Status of 331i &amp; 562FLR Network Adapter cards do not change from "unknown" to "ok" in rare occasions.
      * "show swid" command displays HPE Smart Array P408i-a SR Gen10 card twice.
      * iLO fails to send Support Events even when Embedded Remote Support has been enabled.
      * iLO responds with wrong Network port information during Ports collection and Network Device Functions collection.
      * Server boot gets stuck on POST while loading Encryption keys for secure boot.
      * EID Table information is retained in AHS though MCTP discovery is disabled.
      * Front Display Port (DP) on Universal Media bay does not work in certain instances.
      * Unable to adjust fan settings on Edgeline e910/e920 Thermal Configuration page.
      * iLO unable to authenticate users intermittently when directory authentication is enabled.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.71" date="1656763200">-      Fix for multiple security issues</changelog>
  </package>
  <package pkgid="15013716e283819d9413490e6a7ac0f6f8a3e4d60ac8ff61caef96824febd7cf" name="firmware-microservergen10plussps" arch="x86_64">
    <version epoch="0" ver="05.01.04.400" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.03.094" date="1581076800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.113" date="1591617600">-     This image contains the latest Intel Server Platform Services (SPS) Firmware
    which contains mitigations for a variety of security vulnerabilities. The
    following vulnerabilities have been addressed in this SPS release:
    CVE-2020-0545 and CVE-2020-0586. These issues are not unique to HPE Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.208" date="1604923200">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2020-8755. This security
    vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.303" date="1623067200">-     See the release document in Download Product Binaries page from Product
    Summary of the firmware product.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.303" date="1623153600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services (SPS) Firmware provides
    mitigations for SPS security vulnerabilities documented as CVE-2020-24509.
    These security vulnerabilities are documented in Intel Security Advisory
    INTEL-SA-00459.  These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.400" date="1645704000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services (SPS) Firmware provides
    mitigations for SPS security vulnerabilities documented as CVE-2021-0060. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="7e5f9be41a4a00e38687a04acccc4ccf9f90367c6eac4c3f9c677d5b11837697" name="firmware-ml30gen10plus_me" arch="x86_64">
    <version epoch="0" ver="06.00.03.039" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.039" date="1645358400">-</changelog>
  </package>
  <package pkgid="fb2272350b7eaca813eb697cab6ad0a488e9eeae28d66feb7f8db3e73846e738" name="firmware-nic-bcm-nxe" arch="x86_64">
    <version epoch="0" ver="1.12.1" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.3.56" date="1534161600">-     N/A</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.4.2" date="1541419200">-     This product now supports Red Hat Enterprise Linux 6 Update 10.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.5.11" date="1549022400">-     This product corrects an issue where adapters incorrectly send a NULL padded
    System Description LLDP (Link Layer Discovery Protocol) TLV.
    
    This product corrects an issue where an incorrect device (Network Controller)
    name is displayed in the RBSU.
    
    This product corrects an issue where adapters become Firmware corruption
    during rebooting.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4" date="1565611200">-     This product addresses an issue where firmware is corrupted during multiple
    system reboots.
    
    This product addresses an LLDP message issue where adapters send incorrect
    System Description, System Name, Chassis ID and Management Address.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.7.6" date="1572609600">-     This product now remove supports Synergy and Blade Server.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.8.1" date="1582459200">-     This product now supports Red Hat Enterprise Linux 7.7
    
    This product now supports  SUSE Linux Enterprise Server 15 SP1
    
    This product now supports the following network adapters.
    
      * HPE Ethernet 10Gb 2-port 537SFP+ Adapter
      * HPE Ethernet 10Gb 2-port 537SFP+ FLR Adapter</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.9.3" date="1594987200">-      This product corrects wrong names of adapters which show up while doing firmware update.
      * This product corrects an issue about 2 ports in a port bond both being disconnected if we were just disconnecting 1 port.
      * This product corrects an issue about LLDP nearest bridge packet not being disabled while that option under NIC HII was disabled.
      * This product corrects the wrong LED behavior while attaching SFP-RJ45 tranceiver.
      * This product corrects an issue about firmware not being actually updated even seeing it was reported as successfully by update utility.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.9.5" date="1605182400">-     This product addresses a package loss issue while running under multicast UDP
    traffic.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.11.3" date="1635508800">-     This product addresses an issue where network interface could not be brought
    up under OS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.12.1" date="1642852800">-      This product addresses an issue a packet missing problem after some amounts of multicast UDP streams transmitted.
      * This product addresses an issue the port identifier LED problem on HPE Ethernet 10Gb 2-port 535T Adapter .</changelog>
  </package>
  <package pkgid="088b93fa64c47001004567c55f5302a14369c16f4c7ceee72e68d73de73c5ab6" name="firmware-nic-bcm-open" arch="x86_64">
    <version epoch="0" ver="2.28.50" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.3" date="1631880000">-     Initial version</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.50" date="1634904000">-</changelog>
  </package>
  <package pkgid="b9ef47f1074a0c21399168eff4195a71b7f115ec368e4cd5bc241904e39d9296" name="firmware-nic-broadcom" arch="x86_64">
    <version epoch="0" ver="2.29.0" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.23.10" date="1549022400">-     This product corrects an issue where the component fails to update adapter
    firmware when running on ESXi 6.7.  
    This product corrects an issue where an incorrect device (Network Controller)
    name is displayed in the RBSU.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.23.11" date="1559908800">-     This product corrects an issue where random PXE boot installation failures
    occur when booting in UEFI mode.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.24.2" date="1572609600">-     This product now remove supports Synergy and Blade Server.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.25.1" date="1583755200">-     This product addresses an issue where Legacy Boot Protocol(System Utilities -&gt;
    System Configuration -&gt; NIC HII menu -&gt; BA Configuration Menu) changes from
    None to PXE.  
    This product addresses an issue where it would be forced to exit System
    Utilities when select Port 2 &amp; Port 3(System Utilities -&gt; System Configuration
    -&gt; NIC HII menu).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.26.1" date="1594987200">-     This product corrects the wrong spare number while it was originally not the
    same as what was written on the label of package.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.27.6" date="1614859200">-      This product addresses an issue about lack of information under AHS log.
      * This product addresses an RSOD issue which appeared intermittently during POST after having a warm reboot.
      * This product addresses a modification on help string of Family Firmware Version.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.4" date="1636286400">-     This product now supports Red Hat Enterprise Linux 8 update 4 and SUSE Linux
    Enterprise Server 15 Service Pack 3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.4" date="1636372800">-     This product addresses an issue about lost connection under S5 if adapter was
    running under 1G.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.50" date="1637582400">-      This product addressed the firmware update failure problem while running the installation under Linux OS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.29.0" date="1641816000">-     TBD</changelog>
  </package>
  <package pkgid="c2d38d44bcbb1aff1de93f6936d3a28bf19f2a2a12b92e1dc86c360428d154eb" name="firmware-nic-intel" arch="x86_64">
    <version epoch="0" ver="1.22.50" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.19.11-2.1" date="1585569600">-      This product addresses an issue where LLDP are disabled.
      * This product addresses an issue where "Firmware Image Properties", "Device Level Configuration", and "Link Speed Status" options in NIC HII menu will disappear when F7 is pressed.
      * This product addresses an issue where Firmware upgrade fail in SLES15 with secureboot enabled.
      * This product addresses an issue where POST when ESC Is Pressed to Enter The BIOS Setup Utility with HP Ethernet 1Gb 4-port 366FLR Adapter.
      * This product addresses an issue where there is no VLAN function under Legacy mode.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.19.30" date="1585656000">-     This product addresses an WOL issue that system wakes up automatically if any
    magic packet being sent before system was shut down.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.19.35" date="1594814400">-     This product addresses an WOL issue that system wakes up automatically if any
    magic packet being sent before system was shut down.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20.10" date="1594900800">-     This product addresses an issue where ECC error occurs when running failed
    recovery with HPE Ethernet 10Gb 2-port 562T Adapter and HPE Ethernet 10Gb
    2-port 562FLR-T Adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20.10-2.1" date="1602158400">-     This product now supports Red Hat Enterprise Linux 6.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20.10-2.1" date="1602244800">-     This product addresses an issue where ECC error occurs when running failed
    recovery with HPE Ethernet 10Gb 2-port 562T Adapter and HPE Ethernet 10Gb
    2-port 562FLR-T Adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20.30" date="1602331200">-     This product addresses an WOL issue that system wakes up automatically if any
    magic packet being sent before system was shut down.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.21.6" date="1614859200">-     This product addresses an issue where Systems Insight Display (SID) modul is
    green when there's no Network connection.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22.6" date="1631793600">-     This product now supports Red Hat Enterprise Linux 8 update 4 and SUSE Linux
    Enterprise Server 15 Service Pack 3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22.50" date="1638360000">-     TBD</changelog>
  </package>
  <package pkgid="7b87956f4a898c932ca53c6e68817492145e9db9fb14e4bcc8def0c79ff3e1fc" name="firmware-nic-intel-opa-hfi" arch="x86_64">
    <version epoch="0" ver="1.11.0" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.8.1" date="1552305600">-     *Changes and New Features in version 1.8.1.0.0 :**
    
      * Added hfi1_eprom **v10_8_0_0_13.**
      * Loader ROM **HfiPcieGen3Loader_1.8.1.0.0.rom** and driver EFI **HfiPcieGen3_1.8.1.0.0.efi** were added.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.11.0" date="1631016000">-     *Fixes included in version 1.11.0:**
    
      * **The following issue has been fixed in Unified Extensible Firmware Interafce (UEFI) ROM: **On some platforms, the hfi1 device was not showing up in BIOS/UEFI boot menus and was not available as a PXE boot device. This was caused by the platform not loading the UEFI driver for the hfi1 adapter.</changelog>
  </package>
  <package pkgid="249393ccab92b3ee7100e400b81752cddc07940ea6c03ff8c50c3a1801ab7f24" name="firmware-nic-is-intel" arch="x86_64">
    <version epoch="0" ver="1.23.50" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.19.10" date="1572609600">-     Initial release.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20.11" date="1594900800">-      This product now supports SUSE Linux Enterprise Server 12 SP5.
      * This product now supports HPE ProLiant MicroServer Gen10 Plus and HPE ProLiant XL225n Gen10 Plus.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.21.5" date="1601899200">-     This product now supports the following network adapters:
    
      * Intel X710-DA2 Ethernet 10Gb 2-port SFP+ OCP3 Adapter for HPE
      * Intel X710-DA2 Ethernet 10Gb 2-port SFP+ Adapter for HPE</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22.11" date="1614859200">-      This product now supports SUSE Linux Enterprise Server 15 SP2.
      * This product now supports Red Hat Enterprise Linux 8, Update 2 and Update 3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22.50" date="1617883200">-     This product corrects an issue where iLO returns invalid JSON response format.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22.55" date="1631707200">-     This product addresses an link issue for Intel X710-DA2 Ethernet 10Gb 2-port
    SFP+ OCP3 Adapter for HPE.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.5" date="1631793600">-     This product now supports Red Hat Enterprise Linux 8 update 4 and SUSE Linux
    Enterprise Server 15 Service Pack 3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.50" date="1638360000">-     TBD</changelog>
  </package>
  <package pkgid="6c7e0140b1e269f2ccd03cda67aee4f19398b58dbacaf715998436922b2dde83" name="firmware-nic-mellanox-eth-only-mft" arch="x86_64">
    <version epoch="0" ver="1.0.6" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.0" date="1560513600">-     *Fixes in version** **14.24.9000**
    
      * Fixed an issue that prevented the first iSCSI target parameters to be reset to their default values.
      * Fixed an issue which cause the link not to raise in the second port which was set as IB when the first port was ETH in PXE.
      * Fixed wrong default value of Boot-To-Target in FlexBoot configuration.
      * When connecting a pre-configured port with VLAN to an IB fabric, the port runs as Ethernet port with the VLAN tag.
      * Booting PXE using Grub2.X over HP G9/G8 servers results in system hang.
      * If the client gets "PXE boot menu" when contacting the DHCP, it will PXE boot first regardless of the boot priority.
      * If the PMM fails to allocate memory, the system hangs since FlexBoot cannot load from the expansion ROM.
      * In ConnectX-4, the PXE boot time measurement over TFTP Ethernet was 1:30 min for image size of 1GB, TFTP InfiniBand was 1:20 min, and iSCSI boot time measurement was 8 seconds for image size of 25 MB.
      * In hybrid BIOSes, if the BIOS loads legacy driver without closing the UEFI driver, the legacy driver fails to load.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.1" date="1572868800">-     *Firmware for the following device is updated to 14.26.1040:**
    
    P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.1" date="1572955200">-     *Fixes in version** **14.26.XXXX :**
    
      * Fixed an issue that caused a function to misbehave when a PCIe Transaction Layer Packet (TLP) was set with a poisoned indication.
      * Fixed a rare issue that resulted in "destroy mkey " command getting stuck when rebooting the hypervisor.
      * The total firmware reset time is increased by 1 second.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.3" date="1601899200">-     *Firmware for the following device is updated to 14.27.4000:**
    
    P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)
    
    **Following New features and Changes are included in version 14.27.4000:**
    
      * Added mlxconfig support for power reduction: PCI CAP AUTO_POWER_SAVE_LINK_DOWN 
        * PCI CAP
        * AUTO_POWER_SAVE_LINK_DOWN
      * Added the following segments, as appeared in the PRM, to the Resource Dump: 
        * PRM_QUERY_QP
        * PRM_QUERY_CQ
        * PRM_QUERY_MKEY
        * QUERY_VNIC_ENV</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.3" date="1601985600">-     *Following issues have been fixed in version 14.27.4000:**
    
      * An issue that caused the sent packet to hang while the device entered FLR mode.
      * Enabled Bar configuration bytewise by applying the write_en bitmask.
      * A rare case where the the device froze while running the sw reset flow under heavy stress and with many open resources.
      * Low PXE performance while using the VSC to trigger the send_ring_doorbells.
      * An error that prevented the completions (CQ) from being completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.
      * An issue that caused the fragmented IP packets to drop was fixed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1614254400">-     *Firmware for the following device is updated to 14.28.1002:**
    
    P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)
    
    **Following New features and Changes are included in version 14.28.1002:**
    
      * Added mlxconfig support for power reduction: PCI CAP AUTO_POWER_SAVE_LINK_DOWN 
        * PCI CAP
        * AUTO_POWER_SAVE_LINK_DOWN
      * Added the following segments, as appeared in the PRM, to the Resource Dump: 
        * PRM_QUERY_QP
        * PRM_QUERY_CQ
        * PRM_QUERY_MKEY
        * QUERY_VNIC_ENV</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1614340800">-     *Following issues have been fixed in version 14.29.1016:**
    
      * An issue that caused the sent packet to hang while the device entered FLR mode.
      * Enabled Bar configuration bytewise by applying the write_en bitmask.
      * A rare case where the the device froze while running the sw reset flow under heavy stress and with many open resources.
      * Low PXE performance while using the VSC to trigger the send_ring_doorbells.
      * An error that prevented the completions (CQ) from being completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.
      * An issue that caused the fragmented IP packets to drop was fixed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1632657600">-     *Firmware for the following device is updated to 14.31.1014:**
    
      * P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)
    
    **New features and changes included in version 14.31.1014:**
    
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * support for Enabling/Disabling NIC and RDMA (port/partition) was included via the UEFI HII system settings.
      * Increased the maximum number of MSIX per VF to 127.
      * Added a new bit ("data_in_order") to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1632744000">-     *Following issues have been fixed in version 14.31.1014:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
    
    **Additional Fixes included in version 14.31.1014:**
    
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1641729600">-     *The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</changelog>
  </package>
  <package pkgid="d293440ad6ff9285b3ae359172324eb90a39e4b93a1855ddb50ab800e9c2d4fc" name="firmware-nic-mellanox-ethernet-only" arch="x86_64">
    <version epoch="0" ver="1.0.16" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.13" date="1601985600">-     *Fixes submitted in version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **Following issues have been fixed in firmware version 14.27.4000:**
    
      * The sent packet hung while the device entered FLR mode.
      * Enabled Bar configuration bytewise by applying the write_en bitmask.
      * The device hung while running the sw reset flow under heavy stress and with many open resources.
      * The completions (CQ)completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow. 
      * The fragmented IP packets were dropped.
    
    **Following issues have been fixed in firmware version 16.27.2008:**
    
      * Although the effective BER (after FEC) was expected to meet the design targets (e.g. 10e-14 or lower), occasionally it was higher.
      * High BER occured when connecting cables of type 0.5/1m DAC to an HDR speed.
      * The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.
      * The desched_threshold field did not work properly.
      * The "roce_adp_retrans" counter was presenting the values of the "local_ack_timeout_err" counter.
      * If Relaxed Ordering was disabled by running the "setpci" command, it would not be functional even after re-enabling it by running the "setpci" command again.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.14" date="1614254400">-     *Firmware for the following devices are updated to 2.42.5044 :**
    
       779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)  
       779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)
    
    **Firmware for the following devices are updated to 14.29.1016:**
    
       817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)
    
    **Firmware for the following devices are updated to 14.29.1016:**  
       817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)
    
    **Firmware for the following device is updated to 16.29.1016:**
    
       874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)
    
    **New features and changes in version 14.29.1016:**
    
    Added support for the following features:
    
      * A new counter per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause "CQE with Error" or "CQE_MOCK".
      * cq_overrun counter: This counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.
      * Enabled the capability to allow Virtual Functions to send Pause Frames packets.
      * Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.
      * Hardware steering dump output used for debugging and troubleshooting.
    
    **New features and changes in version 16.29.1016:**
    
    Added support for following features:
    
      * An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.
      * "InfiniBand" properties set to the Network Device Function Redfish object.
      * HW support for Flow Metering to utilize Advanced Steering Operation (ASO). HW Flow Meter allows higher scale, more accuracy, and better performance compare to the FW Flow Metering.
      * Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.
      * 2 new Mini CQE formats: Responder Mini CQE With Flow Tag Layout Responder Mini CQE With l3_l4_info Layout
      * UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with "ooo_per_sl" field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT command.
      * Steering DP hash flow groups.
      * A new counter per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause "CQE with Error" or "CQE_MOCK".
      * PCIe Rx modifications to prevent the adapter cards from disappearing from the system.
      * ignore_flow_level is now enabled by the TRUST LEVEL access registry. 
      * cq_overrun counter. The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.
      * [Beta] Enabled the capability to allow Virtual Functions to send Pause Frames packets.
      * Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.
      * Hardware steering dump output used for debugging and troubleshooting.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.14" date="1614340800">-     *ixes submitted in version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **Following issues have been fixed in firmware version 14.29.1016:**
    
      * Changed the default value of DCQCN's (Data center- Quantized Congestion Notification)  NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.
      * An issue that caused packets to drop due to header size issues and/or failing checks. The issue was caused due to a Linux issue that caused VFs to set the wrong header size value in wqe_inline_header_mode input.
      * When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs were configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.
      * On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.
      *  An issue that caused the device to go to dead IRISC as one of the firmware semaphores could not be released when a speed change or port state change was triggered. 
    
    **Following issues have been fixed in firmware version 16.29.1016:**
    
      * Changed the default value of DCQCN's (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.
      *  An issue that prevented VXLAN packets with svlan/ cvlan tag from being matched.
      * The eth_wqe_too_small counter to count ODP page used to fail.
      * When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.
      * An issue that resulted in low performance after enabling the RoCE Accelerator capability.
      * On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.
      * The chassis manager calculation for Multi-Host and Socket-Direct adapter cards to allow running NC-SI commands by the chassis manager BMC. Now the chassis manager is count as BMC with index 0, regardless of how many BMC there are.
      * An issue that caused the device to go to dead IRISC as one of the firmware semaphores could not be released when a speed change or port state change was triggered.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.14-2.1" date="1628683200">-     *Firmware for the following devices are updated to 2.42.5044 :**
    
       779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)  
       779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)
    
    **Firmware for the following devices are updated to 14.31.1200:**
    
       817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)
    
       817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)
    
    **Firmware for the following device is updated to 16.29.1016:**
    
       874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)
    
    **New Features and Changes included in version 16.31.1200:**
    
      * Added a new NVconfig per Port for a specific Finisar module. This new NVconfig sets the port to work in AN mode and sets the module to No Data Management Engine (DME). This change does not affect the speed logic, only the forward error correction (FEC) logic (FEC override). **Note:** If the port does not come up, switch to Force mode. 
    
    **New features and changes included  in version 16.29.1016:**
    
      * An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.
      * "InfiniBand" properties set to the Network Device Function Redfish object.
      * HW support for Flow Metering to utilize Advanced Steering Operation (ASO). HW Flow Meter allows higher scale, more accuracy, and better performance compare to the FW Flow Metering.
      * Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.
      * 2 new Mini CQE formats: Responder Mini CQE With Flow Tag Layout Responder Mini CQE With l3_l4_info Layout
      * UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with "ooo_per_sl" field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT command.
      * Steering DP hash flow groups.
      * A new counter per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause "CQE with Error" or "CQE_MOCK".
      * PCIe Rx modifications to prevent the adapter cards from disappearing from the system.
      * ignore_flow_level is now enabled by the TRUST LEVEL access registry. 
      * cq_overrun counter. The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.
      * [Beta] Enabled the capability to allow Virtual Functions to send Pause Frames packets.
      * Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.
      * Hardware steering dump output used for debugging and troubleshooting.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.14-2.1" date="1628769600">-     *Fixes included in  firmware version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **Fixes included in firmware version 14.29.1016:**
    
      * Changed the default value of DCQCN's (Data center- Quantized Congestion Notification)  NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.
      * An issue that caused packets to drop due to header size issues and/or failing checks. The issue was caused due to a Linux issue that caused VFs to set the wrong header size value in wqe_inline_header_mode input.
      * When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs were configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.
      * On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.
      *  An issue that caused the device to go to dead IRISC as one of the firmware semaphores could not be released when a speed change or port state change was triggered. 
    
    **No fixes are included in firmware version 14.31.1200.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.15" date="1632657600">-     *Firmware for the following devices are updated to 2.42.5044 :**
    
       779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)  
       779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)
    
    **Firmware for the following devices are updated to 14.31.1200:**
    
       817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)
    
    **Firmware for the following devices are updated to 14.31.1200:**  
       817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)
    
    **Firmware for the following device is updated to 16.31.1014:**
    
       874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)
    
      
    **New features and changes in version 14.31.1200:**
    
      * NVconfig per Port for a Specific Finisar Module: Added a new NVconfig per Port for a specific Finisar module. This new NVconfig sets the port to work in AN mode and sets the module to No DME. This change does not affect the speed logic, only the FEC logic (FEC override).  
    **Note:** If the port does not go up, switch to Force mode. 
    
    **New features and changes in version 16.31.1014:**
    
      * NIC scheduling feature support has been disabled for non-privileged functions.
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * Added support for Enabling/Disabling NIC and RDMA (port/partition) via the UEFI HII system settings.  
    **Note:** Values set in this option only take effect when is Ethernet mode.
      * Increased the maximum number of MSIX per VF to 127.
      * Asymmetrical MSIX Configuration: This feature allows the device to be configured with a different number of MSIX  
    vectors per physical PCI functions.  
    To use this feature, please follow these steps:
    
        * Clear NUM_PF_MSIX_VALID to disable global symmetrical MSIX configuration.
        * Set PF_NUM_PF_MSIX_VALID to enable asymmetrical per Physical Function MSIX configuration.
        * Configure PF_NUM_PF_MSIX per physical PCI function.
      * Support for RDMA partitioning and RDMA counters in IB mode.
      * A new bit ("data_in_order") was added to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.  
    Pages are returned by the driver to the kernel without issuing the
    MANAGE_PAGES commands to the firmare.
    
      * Enabled UID 0 to create resources with UMEM (User Memory).
      * Receiving and sending native IB packets from/to the software (including all headers) via raw IBL2 QPs.
      * RX RDMA NIC flow table on an IB port. Now the software can steer native IB packets to raw IB receive queues according to the DLID and  
    the DQPN.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.15" date="1632744000">-     *Fixes included in  firmware version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **The following issues have been fixed in version 14.31.1200:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
    
    **Additional Fixes included in version 14.31.1200:**
    
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.
    
    **The following issues have been fixed in version 16.31.1014:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * An assert that was caused when trying to open 1024 functions on the device and the maximum number of functions was 1023.
      * Occasional performance issues related to RC QPs using E2E-credits (not connected to SRQ and doing send/receive traffic) when the ROCE_ACCL tx_window was enabled.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * A rare issue that caused RX pipe to hang.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
      * CRT_DCR with index larger than 1 &lt;&lt; 21 occasionally collided with the CRT_SW_RESERVED address.
      * An issue that caused the TX queue to get into an unresponsive state when the VF rate limiter was set.
    
    **Additional Fixes included in version 16.31.1014:**
    
      * Disabled the CNP counter "rp_cnp_ignored " (triggered by OOS (out-of-sequence)) when all ports are IB.
      * Fixed the TMP421 sensor temperature reporting.
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.15-2.1" date="1639310400">-     *Firmware for the following devices are updated to 2.42.5044 :**
    
       779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)  
       779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)
    
    **Firmware for the following devices are updated to 14.31.1200:**
    
       817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)
    
    **Firmware for the following devices are updated to 14.31.1200:**  
       817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)
    
    **Firmware for the following device is updated to 16.31.1014:**
    
       874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)
    
    
    
    **Updated mstflint from version 4.13 to 4.16**
    
      
    **New features and changes in version 14.31.1200:**
    
      * NVconfig per Port for a Specific Finisar Module: Added a new NVconfig per Port for a specific Finisar module. This new NVconfig sets the port to work in AN mode and sets the module to No DME. This change does not affect the speed logic, only the FEC logic (FEC override).  
    **Note:** If the port does not go up, switch to Force mode. 
    
    **New features and changes in version 16.31.1014:**
    
      * NIC scheduling feature support has been disabled for non-privileged functions.
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * Added support for Enabling/Disabling NIC and RDMA (port/partition) via the UEFI HII system settings.  
    **Note:** Values set in this option only take effect when is Ethernet mode.
      * Increased the maximum number of MSIX per VF to 127.
      * Asymmetrical MSIX Configuration: This feature allows the device to be configured with a different number of MSIX  
    vectors per physical PCI functions.  
    To use this feature, please follow these steps:
    
        * Clear NUM_PF_MSIX_VALID to disable global symmetrical MSIX configuration.
        * Set PF_NUM_PF_MSIX_VALID to enable asymmetrical per Physical Function MSIX configuration.
        * Configure PF_NUM_PF_MSIX per physical PCI function.
      * Support for RDMA partitioning and RDMA counters in IB mode.
      * A new bit ("data_in_order") was added to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.  
    Pages are returned by the driver to the kernel without issuing the
    MANAGE_PAGES commands to the firmare.
    
      * Enabled UID 0 to create resources with UMEM (User Memory).
      * Receiving and sending native IB packets from/to the software (including all headers) via raw IBL2 QPs.
      * RX RDMA NIC flow table on an IB port. Now the software can steer native IB packets to raw IB receive queues according to the DLID and  
    the DQPN.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.15-2.1" date="1639396800">-     *Fixes included in  firmware version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **The following issues have been fixed in version 14.31.1200:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
    
    **Additional Fixes included in version 14.31.1200:**
    
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.
    
    **The following issues have been fixed in version 16.31.1014:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * An assert that was caused when trying to open 1024 functions on the device and the maximum number of functions was 1023.
      * Occasional performance issues related to RC QPs using E2E-credits (not connected to SRQ and doing send/receive traffic) when the ROCE_ACCL tx_window was enabled.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * A rare issue that caused RX pipe to hang.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
      * CRT_DCR with index larger than 1 &lt;&lt; 21 occasionally collided with the CRT_SW_RESERVED address.
      * An issue that caused the TX queue to get into an unresponsive state when the VF rate limiter was set.
    
    **Additional Fixes included in version 16.31.1014:**
    
      * Disabled the CNP counter "rp_cnp_ignored " (triggered by OOS (out-of-sequence)) when all ports are IB.
      * Fixed the TMP421 sensor temperature reporting.
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.16" date="1641643200">-     *The following issues have been fixed in version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    
    
    **The following issues have been fixed in version 16.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The link status was reported incorrectly and consequently caused the link to go down due to incorrect definition of the RX_LOS polarity in the INI.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * The system could not create more than 128K QPs.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
      * PCIe lane margining capability issues.</changelog>
  </package>
  <package pkgid="4492dcbe341228c3e6fe0e5645356a9cfefb40d1463684981b45be57da611841" name="firmware-nic-mellanox-ib-cx4-cx5" arch="x86_64">
    <version epoch="0" ver="1.0.9" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1572955200">-     *Fixes submitted in version 12.26.1040:**
    
      * IPoIB could not to function when there were Dynamically Connected Transport (DC) CNAK Queue Pairs (QPs) active.
      * On rare occasions, when firmware coalesce Host stuck events occur, a async event might be delayed to be reported, and not be triggered until the next time the PCIe hangs on one of the hosts.
      * Renamed the GMP Mellanox Vendor Specific External Capability mask enum from IsDiagnosticCountersSupported to IsDiagnosticDataSupported.
      * Fixed an issue that caused a function to misbehave when a PCIe Transaction Layer Packet (TLP) was set with a poisoned indication.
    
    **Fixes submitted in version 16.26.1040:**
    
      * On rare occasions, when firmware coalesce Host stuck events occur, a async event might be delayed to be reported, and not be triggered until the next time the PCIe hangs on one of the hosts.
      * Unexpected queue pairs transitioned to error in lossy tests.
      * Limited the maximum amount of dumps created on a PF.
      * Renamed the GMP Mellanox Vendor Specific External Capability mask enum from IsDiagnosticCountersSupported to IsDiagnosticDataSupported.
      * Stability issues with RDMA over Converged Ethernet (RoCE) retransmissions under stress were affecting Zero-Touch-RoCE.
      * Fixed an issue that caused a function to misbehave when a PCIe Transaction Layer Packet (TLP) was set with a poisoned indication.
      * Large number of packets dropped when running Jumbo frames with TTL rewrite.
      * Limited the number of the elements in the Quality of Service (QoS) tree 2K.  
    Note: Creating more than 250 Vport_tc for every TC is not allowed.
    
      * Queue Pair (QP) flow query was always taking port 1, Firmware will now reply the proper port, 1 or 2, for the dual port RoCE net device.
      * The nack counters constantly reported as "0".
      * In a rare scenario when the driver is executing the "2err" command and the QP is in Send Queue (SQ) drain state, the firmware might post event of broken Work Queue (WQ) instead of sending error Completion Queue Element (CQEs) on all the Work Queue Entry (WQEs).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1586779200">-     *Firmware for the following devices are updated to 12.27.1016:**
    
    843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)
    
    **Firmware for the following devices are updated to 16.27.1016:**
    
    872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)  
    872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)
    
    **Changes and New Features in firmware version 12.27.1016 and 16.27.1016:**
    
      * RoCE Selective Repeat introduces a new QP retransmission mode in RoCE: recovery from packet drop by resending the dropped packet and not only all the PSN window (Go-Back-N protocol),  
    This new capability comes with the following limitations:
    
        * Selective repeat cannot be used with AR
        * Does not work with signature (T10-DIF)
        * Does not work with Tag Matching enabled
      * Allows BMC to query and control NIC over RedFish API (https://www.dmtf.org/standards/redfish). Currently, the NIC supports reading data and setting basic Ethernet and InfiniBand parameters.
      * Enables matching of source_vhca_port in the FDB flow for ECMP hardware offload on a single FDB.
      * Added support for dumping hardware steering entries (raw data) using the resource dump API.
      * The eth_link_down_counter now counts logical link downs as well.
    
    **Changes and New Features in firmware version 16.27.1016:**
    
      * Removed power consumption limitation. This new capability removes the necessity to disable the port due to insufficient power. When this feature is enabled, an event will be sent on every transition between the following power states: 
        * Power limit is not advertised
        * Sufficient power detected
        * Insufficient power detected
      * Firmware can be now updated as well as DB strings while performing Live Firmware Patch.
      * Enables the device to generate events that will notify the user about any resource dumps updates. The resource dump owner (PF/ECPF) will be notified on the VF command failures by events that will contain the needed information to call the resource_dump command. The device will dump the resource in the standard resource dump sequence.
      * Added support for the following features: 
        * RSS based on inner headers of GTP-U tunneled packets.
        * Relaxed ordering read when using the create_mkey flag.  
    Note: This capability is not supported when using Multi-Host cards and when in
    PCIe-Switch  
    mode.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1586865600">-     *Fixes submitted in version 12.27.1016:**
    
      * ZTR counters query was always set to return 0.
      * The adapter card was prevented from going into the bypass mode when the BMC disabled the hardware arbitration.
      * Performance degradation and a high packet drop occurred when SRIOV was enabled and packets went through the FDB default behaviour.
      * Due to the string DB not being updated after Live-Patch, the tracer could not function after Live-Patch.
      * Fixed a rare issue that caused other active functions to receive a malformed CQE during driver (PF or VF) unload or FLR flows.
      * Firmware error was observed when FLR occurred at the same time as the teardown. As a result, the teardown flow took a lock, and never released it because it was being aborted by an FLR.
    
    **Fixes submitted in version 16.27.1016:**
    
      * Fixed an issue that caused the device to perform DMA into memory already returned to the OS during the transition between the pre-boot driver to the OS driver.
      * Out-of-range issue when reading or writing the q_counters.
      * Fixed an issue that in Multi-Host adapter cards that resulted in wrong handling of PERST on auxiliary links.
      * ZTR counters query was always set to return 0.
      * The adapter card was prevented from going into the bypass mode when the BMC disabled the hardware arbitration.
      * A non-standard tool was required to perform the first LFWP patching when used with the GA firmware version.
      * Updated the OOOSLMask behaviour. Firmware now will apply OOOSLMask even if it is set to zero (OOOSLMask = 0).
      * Redundant page consumption in the init_hca.
      * The sw_reset option was not supported when ATS was enabled.
      * When ESWITCH_IPV4_TTL_MODIFY_ENABLE configuration was enabled in mlxconfig, there was performance degradation in small packet sizes.
      * Due to the string DB not being updated after Live-Patch, the tracer could not function after Live-Patch.
      * Fixed a rare issue that caused other active functions to receive a malformed CQE during driver (PF or VF) unload or FLR flows.
      * The PCI link was not getting established when the firmware was corrupted.
      * FW assert was triggerred and resulted in a wrong deallocation of a resource when Packet Pacing was enabled, and a QP was being destroyed.
      * Firmware error was observed when FLR occurred at the same time as the teardown. As a result, the teardown flow took a lock, and never released it because it was being aborted by an FLR.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1601899200">-     *Firmware for the following devices are updated to 12.27.4000:**
    
    843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)  
      
    **New Feature and Changes in Version 12.27.4000:**
    
      * Added the following segments, as appeared in the PRM, to the Resource Dump: 
        * PRM_QUERY_QP
        * PRM_QUERY_CQ
        * PRM_QUERY_MKEY
        * QUERY_VNIC_ENV
    
      
    **Firmware for the following devices are updated to 16.27.2008:**
    
    872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)  
    872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)  
    
    
    **New Feature and Changes in Version 16.27.2008:**
    
    **This release contains important reliability improvements and security hardening enhancements. Upgrade the firmware of the device to this release to improve the devices' firmware security and reliability.**
    
      * Improved init_hca performance in Parallel Function initialization.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1601985600">-     *Following issues have been fixed in firmware version 16.27.2008:**
    
      * Although the effective BER (after FEC) was expected to meet the design targets (e.g. 10e-14 or lower), occasionally it was higher.
      * High BER occured when connecting cables of type 0.5/1m DAC to an HDR speed.
      * The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.
      * The desched_threshold field did not work properly.
      * The "roce_adp_retrans" counter was presenting the values of the "local_ack_timeout_err" counter.
      * If Relaxed Ordering was disabled by running the "setpci" command, it would not be functional even after re-enabling it by running the "setpci" command again.
    
    **Following issues have been fixed in firmware version 12.27.4000:**
    
      * The device hung while running the sw reset flow under heavy stress and with many open resources.
      * Low PXE performance observered while using the VSC to trigger the send_ring_doorbells.
      * IPoIB and DC would not work together.
      * DC funtionality issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1614254400">-     *Firmware for the following devices are updated to 12.28.1002:**
    
    843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)  
      
    **New Feature and Changes in Version 12.28.1002:**
    
      * Increased the maximum XRQ number to 512.
    
      
    **Firmware for the following devices are updated to 16.29.1016:**
    
    872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)  
    872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)  
    
    
    **New Feature and Changes in Version 16.29.1016:**
    
    Added support for following features:
    
      * Changed the default value of DCQCN's (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of the cluster.
      * An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.
      * "InfiniBand" properties set to the Network Device Function Redfish object.
      * HW support for Flow Metering to utilize Advanced Steering Operation (ASO). HW Flow Meter allows higher scale, more accuracy, and better performance compared to the FW Flow Metering.
      * Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.
      * 2 new Mini CQE formats: Responder Mini CQE With Flow Tag Layout Responder Mini CQE With l3_l4_info Layout
      * UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with "ooo_per_sl" field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT command.
      * Steering DP hash flow groups.
      * A new counter per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause "CQE with Error" or "CQE_MOCK".
      * PCIe Rx modifications to prevent the adapter cards from disappearing from the system.
      * ignore_flow_level is now enabled by the TRUST LEVEL access registry. 
      * cq_overrun counter. The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.
      * [Beta] Enabled the capability to allow Virtual Functions to send Pause Frames packets.
      * Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.
      * Hardware steering dump output used for debugging and troubleshooting.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1614340800">-     *Following issues have been fixed in firmware version 16.29.1016:**
    
      * An issue that prevented VXLAN packets with svlan/ cvlan tag from being matched.
      * An issue that caused the eth_wqe_too_small counter to count ODP (On-Demand Paging) page faults.
      * When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.
      *  Ani ssue that resulted in low performance after enabling the RoCE Accelerator capability. Note: The fix is available when all ports are set as Ethernet. 
      * On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.
      * The chassis manager calculation for Multi-Host and Socket-Direct adapter cards to allow running NC-SI commands by the chassis manager BMC. Now the chassis manager is count as BMC with index 0, regardless of how many BMC there are.
      * An issue that caused the device to go to down IRISC as one of the firmware semaphores could not be released when a speed change or port state change was triggered. 
    
    **Following issues have been fixed in firmware version 12.28.1002:**
    
      * An issue that caused the DCR (DC Resources) to be destroyed before the retry option managed to work when the retry timeout is too big. in this case, the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * An issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1632657600">-     *Firmware for the following devices are updated to 12.28.2006:**
    
    843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)  
    
    
    **Firmware for the following devices are updated to 16.31.1014:**
    
    872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)  
    872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)
    
    
    
    **New features and changes in version 12.28.2006:**
    
      * Increased the maximum XRQ number to 512.
    
    **New features and changes in version 16.31.1014:**
    
      * NIC scheduling feature support has been disabled for non-privileged functions.
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * support for Enabling/Disabling NIC and RDMA (port/partition) was included via the UEFI HII system settings.
      * Increased the maximum number of MSIX per VF to 127.
      * Asymmetrical MSIX Configuration: This feature allows the device to be configured with a different number of MSIX vectors per physical PCI functions.To use this feature, please follow these steps:
      *         Clear NUM_PF_MSIX_VALID to disable global symmetrical MSIX configuration.
      *         Set PF_NUM_PF_MSIX_VALID to enable asymmetrical per Physical Function MSIX configuration.
      *         Configure PF_NUM_PF_MSIX per physical PCI function.
      * RDMA partitioning and RDMA counters in IB mode.
      * Added a new bit ("data_in_order") to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.
      * Enabled UID 0 to create resources with UMEM (User Memory).
      * Receiving and sending native IB packets from/to the software (including all headers) via raw IBL2 QPs.
      * RX RDMA NIC flow table on an IB port. Now the software can steer native IB packets to raw IB receive queues according to the DLID and  the DQPN.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1632744000">-     *The following issues have been fixed in version 12.28.2006:**
    
      * An issue that caused the DCR (DC Resources) to be destroyed before the retry option managed to work when the retry timeout is too big. in this case, the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * An issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.31.1014:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * An assert that was caused when trying to open 1024 functions on the device and the maximum number of functions was 1023.
      * Occasional performance issues related to RC QPs using E2E-credits (not connected to SRQ and doing send/receive traffic) when the ROCE_ACCL tx_window was enabled.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * A rare issue that caused RX pipe to hang.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
      * CRT_DCR with index larger than 1 &lt;&lt; 21 occasionally collided with the CRT_SW_RESERVED address.
      * An issue that caused the TX queue to get into an unresponsive state when the VF rate limiter was set.
    
    **Additional Fixes included in version 16.31.1014:**
    
      * Disabled the CNP counter "rp_cnp_ignored " (triggered by OOS (out-of-sequence)) when all ports are IB.
      * Fixed the TMP421 sensor temperature reporting.
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1641816000">-     *Fixes in version 12.28.2006:**
    
      * Fixed an issue that caused the DCR (DC Resources) to be destroyed before the retry option managed to work when the retry timeout is too big. in this case, the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.32.1010**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The link status was reported incorrectly and consequently caused the link to go down due to incorrect definition of the RX_LOS polarity in the INI.
      * The system got into an unresponsive state when a peer port went down while using an Optical module.
      * Invalid RNR timeout when trying to set it during the rts2rts_qp transition.
      * A fatal assert 0x81C5 occurred when calling get_vport_mad from the MAD APIs. The firmware was trying to compute the number of vPorts using a global function number. To avoid this issue, the API was updated to remove any assumption on the function number. Note: This issue is affects only IB devices.
      * During events, stress caused the firmware to reset the Arm host of the vPort without sending an event. Thus preventing the software from rearming the vPort as it did not receive any event, and the firmware did not send the event because the vPort had no Arm set.
      * The system could not create more than 128K QPs.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
      * PCIe lane margining capability issues.
      * An issue related to the sl2vl mad that caused a few msec hiccup in the transmission on an InfiniBand network when the SM sent the sl2vl mad to a node in the cluster.</changelog>
  </package>
  <package pkgid="4f76c61acc0e13bb027f3e34511d56eef96eaabd9d08c30870b9bcef5685b2b8" name="firmware-nic-open-mellanox-eth-mft" arch="x86_64">
    <version epoch="0" ver="1.0.6" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.3" date="1601985600">-     *Following issues have been fixed in firmware version 16.27.2008:**
    
      * Although the effective BER (after FEC) was expected to meet the design targets (e.g. 10e-14 or lower), occasionally it was higher.
      * High BER occured when connecting cables of type 0.5/1m DAC to an HDR speed.
      * The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.
      * The desched_threshold field did not work properly.
      * The "roce_adp_retrans" counter was presenting the values of the "local_ack_timeout_err" counter.
      * If Relaxed Ordering was disabled by running the "setpci" command, it would not be functional even after re-enabling it by running the "setpci" command again.
    
    **Following issues have been fixed in firmware version 14.27.4000:**
    
      * The device hung while running the sw reset flow under heavy stress and with many open resources.
      * Low PXE performance observerd while using the VSC to trigger the send_ring_doorbells.
      * IPoIB and DC would not work together.
      * DC funtionality issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1606737600">-     *Firmware for the following devices is updated to 14.29.1016:**
    
    P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)  
    P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)
    
    **Firmware for the following devices is updated to 16.29.1016:**
    
    P13188-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX512F-ACAT Adapter)  
    P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)  
    P10112-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX562A-ACAI OCP3 Adapter)
    
    **This release contains important reliability improvements and security hardening enhancements. Upgrade the firmware of the device to this release to improve the devices' firmware security and reliability.**
    
    **New Feature and Changes in Version 14.29.1016 and 16.29.1016:**
    
      * Ethernet wqe_too_small Mode: A per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause "CQE with Error" or "CQE_MOCK".
      * Hardware steering dump output used for debugging and troubleshooting.
    
    Added support for the following features:
    
      * cq_overrun counter: The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.
      * Enabled the capability to allow Virtual Functions to send Pause Frames packets. (Beta)
      * Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.
    
    **New Feature and Changes in Version 16.29.1016:**
    
      * Hardware steering dump output used for debugging and troubleshooting.
    
    Added support for the following features:
    
      * HW support for Flow Metering to utilize Advanced Steering Operation (ASO). HW Flow Meter allows higher scale, more accuracy, and better performance compare to the FW Flow Metering.
      * Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.
      * 2 new Mini CQE formats:
      * Responder Mini CQE With Flow Tag Layout.
      * Responder Mini CQE With l3_l4_info Layout.
      * Steering DP hash flow groups.
      * ignore_flow_level is now enabled by the TRUST LEVEL access registry.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1606824000">-     *Following issues have been fixed in firmware version 14.29.1016 and 16.29.1016:**
    
      * Changed the default value of DCQCN's NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.
      * An issue that caused packets to drop due to header size issues and/or failing checks. This issue was caused due to a Linux issue that caused VFs to set the wrong header size value in wqe_inline_header_mode input.
      * When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) might take longer than when MKEY_BY_NAME was disabled.
      * In rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.
      * An issue that caused the device to go to dead IRISC as one of the firmware semaphores could not be released when a speed change or port state change was triggered.
    
    **Following issues have been fixed in firmware version 16.29.1016:**
    
      * An issue that caused the eth_wqe_too_small counter to count ODP page faults.
      * A low performance was observed after enabling the RoCE Accelerator capability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-3.1" date="1606910400">-     *Firmware for the following devices is updated to 14.29.1016:**
    
    P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)
    
    **Firmware for the following devices is updated to 14.31.1200:**  
    P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)
    
    **Firmware for the following devices is updated to 16.29.1016:**
    
    P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)
    
    **This release contains important reliability improvements and security hardening enhancements. Upgrade the firmware of the device to this release to improve the devices' firmware security and reliability.**
    
    **New Feature and Changes in Version 14.29.1016 and 16.29.1016:**
    
      * Ethernet wqe_too_small Mode: A per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause "CQE with Error" or "CQE_MOCK".
      * Hardware steering dump output used for debugging and troubleshooting.
      * cq_overrun counter: The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.
      * Enabled the capability to allow Virtual Functions to send Pause Frames packets. (Beta).
      * Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.
    
    **New Feature and Changes in Version 16.29.1016:**
    
      * Hardware steering dump output used for debugging and troubleshooting.
      * HW support for Flow Metering to utilize Advanced Steering Operation (ASO). HW Flow Meter allows higher scale, more accuracy, and better performance compare to the FW Flow Metering.
      * Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.
      * 2 new Mini CQE formats:
      * Responder Mini CQE With Flow Tag Layout.
      * Responder Mini CQE With l3_l4_info Layout.
      * Steering DP hash flow groups.
      * ignore_flow_level is now enabled by the TRUST LEVEL access registry. 
    
    **New Feature and Changes in Version 14.31.1200:**
    
      * Added a new NVconfig per Port for a specific Finisar module which sets the port to work in AN mode and sets the module to No DME. This change does not affect the speed logic, only the FEC logic (FEC override). **Note**: If the port does not come up, switch to Force mode.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-3.1" date="1606996800">-     *Following issues have been fixed in firmware version 14.29.1016 and 16.29.1016:**
    
      * Changed the default value of DCQCN's NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.
      * An issue that caused packets to drop due to header size issues and/or failing checks. This issue was caused due to a Linux issue that caused VFs to set the wrong header size value in wqe_inline_header_mode input.
      * When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) might take longer than when MKEY_BY_NAME was disabled.
      * In rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.
      * An issue that caused the device to go to dead IRISC as one of the firmware semaphores could not be released when a speed change or port state change was triggered.
    
    **Following issues have been fixed in firmware version 16.29.1016:**
    
      * An issue that caused the eth_wqe_too_small counter to count ODP page faults.
      * A low performance was observed after enabling the RoCE Accelerator capability.
    
    **No fixes are included in firmware version 14.31.1200.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-2.1" date="1607083200">-     *Firmware for the following devices is updated to 16.28.4200:**
    
    P13188-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX512F-ACAT Adapter)  
    P10112-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX562A-ACAI OCP3 Adapter)
    
    **New Feature and Changes in Version 16.28.4200:**
    
    **This release contains important reliability improvements and security hardening enhancements. Upgrade the firmware of the device to this release to improve the devices' firmware security and reliability.**
    
      * Enabled ASN1 and OCBB (DCi) MCTP HPE specific protocols.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-2.1" date="1607169600">-     *Following issues have been fixed in firmware version 16.28.4200:**
    
      * Although the effective BER (after FEC) was expected to meet the design targets (e.g. 10e-14 or lower), occasionally it was higher.
      * High BER occured when connecting cables of type 0.5/1m DAC to an HDR speed.
      * The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.
      * The desched_threshold field did not work properly.
      * The "roce_adp_retrans" counter was presenting the values of the "local_ack_timeout_err" counter.
      * If Relaxed Ordering was disabled by running the "setpci" command, it would not be functional even after re-enabling it by running the "setpci" command again.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1632657600">-     *Firmware for the following devices is updated to 14.31.1014:**
    
    P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)
    
    **Firmware for the following devices is updated to 14.31.1200:**
    
    P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)
    
    **Firmware for the following devices is updated to 16.31.1014:**
    
    P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)
    
    
    
    **New features and changes included in version 14.31.1014:**
    
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * support for Enabling/Disabling NIC and RDMA (port/partition) was included via the UEFI HII system settings.
      * Increased the maximum number of MSIX per VF to 127.
      * Added a new bit ("data_in_order") to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.
    
    **New features and changes included in version 14.31.1200:**
    
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * support for Enabling/Disabling NIC and RDMA (port/partition) was included via the UEFI HII system settings.
      * Increased the maximum number of MSIX per VF to 127.
      * Added a new bit ("data_in_order") to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.                                                                                                                                
      * Added a new NVconfig per Port for a specific Finisar module. This new NVconfig sets the port to work in AN mode and sets the module to No DME. This change does not affect the speed logic, only the FEC logic (FEC override). Note: If the port does not go up, switch to Force mode.                                                                                                                        
    
    **New features and changes included in version 16.31.1014:**
    
      * NIC scheduling feature support has been disabled for non-privileged functions.
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * support for Enabling/Disabling NIC and RDMA (port/partition) was included via the UEFI HII system settings.
      * Increased the maximum number of MSIX per VF to 127.
      * Asymmetrical MSIX Configuration: This feature allows the device to be configured with a different number of MSIX vectors per physical PCI functions.To use this feature, please follow these steps:
      *         Clear NUM_PF_MSIX_VALID to disable global symmetrical MSIX configuration.
      *         Set PF_NUM_PF_MSIX_VALID to enable asymmetrical per Physical Function MSIX configuration.
      *         Configure PF_NUM_PF_MSIX per physical PCI function.
      * RDMA partitioning and RDMA counters in IB mode.
      * Added a new bit ("data_in_order") to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.
      * Enabled UID 0 to create resources with UMEM (User Memory).
      * Receiving and sending native IB packets from/to the software (including all headers) via raw IBL2 QPs.
      * RX RDMA NIC flow table on an IB port. Now the software can steer native IB packets to raw IB receive queues according to the DLID and  the DQPN.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1632744000">-     *The following issues have been fixed in version 14.31.1014:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
    
    **Additional Fixes included in version 14.31.1014:**
    
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.
    
    
    
    **The following issues have been fixed in version 14.31.1200:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
    
    **Additional Fixes included in version 14.31.1200:**
    
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.  
    
    
    **The following issues have been fixed in version 16.31.1014:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * An assert that was caused when trying to open 1024 functions on the device and the maximum number of functions was 1023.
      * Occasional performance issues related to RC QPs using E2E-credits (not connected to SRQ and doing send/receive traffic) when the ROCE_ACCL tx_window was enabled.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * A rare issue that caused RX pipe to hang.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
      * CRT_DCR with index larger than 1 &lt;&lt; 21 occasionally collided with the CRT_SW_RESERVED address.
      * An issue that caused the TX queue to get into an unresponsive state when the VF rate limiter was set.
    
    **Additional Fixes included in version 16.31.1014:**
    
      * Disabled the CNP counter "rp_cnp_ignored " (triggered by OOS (out-of-sequence)) when all ports are IB.
      * Fixed the TMP421 sensor temperature reporting.
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1641643200">-     *The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    
    
    **The following issues have been fixed in version 16.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The link status was reported incorrectly and consequently caused the link to go down due to incorrect definition of the RX_LOS polarity in the INI.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * The system could not create more than 128K QPs.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
      * PCIe lane margining capability issues.</changelog>
  </package>
  <package pkgid="357e920a20f21ecaa7e677316e35a1e6c579ec4408263106d9f7e42ffd801ce7" name="firmware-nic-qlogic-flq" arch="x86_64">
    <version epoch="0" ver="1.20.1" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.27" date="1549022400">-     This product corrects an issue where the WWPN information is missing in an
    adapter's FCoE configuration menu (under 'System Utilities'-&gt;'System
    Configuration' menu).  
    This product corrects an issue where server hangs during POST when a network
    adapter is connected to the HPE Synergy 20Gb Interconnect Link Module.  
    This product corrects an issue where the initiator does not stay logged into
    the target in an FCoE connection.  
    This product corrects an issue where the link status continues to show as UP
    on the switch side even after a network adapter is disabled in the OS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.50" date="1559563200">-     This product now supports the HPE Ethernet 10Gb 2-port 524SFP+ Adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.7.16" date="1565524800">-     This product now supports the HPE Synergy 6820C 25/50Gb Converged Network
    Adapter.
    
    This product now allows modification of the settings under the 'Port Level
    Configuration' sub-menu under the adapter's configuration menu (located at
    'System Utilities'(F9 at POST)-&gt;'System Configuration') when OneView Profile
    with 'manage manually' option is applied to the server.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.7.16" date="1565611200">-     This product corrects an issue where the firmware update fails when the first
    port is disabled on the network adapter.
    
    This product corrects an issue where not all devices are discovered as part of
    firmware update on a multi-root-complex platforms like Integrity, Superdome
    etc.
    
    This product corrects an issue where the system hangs during POST with red
    screen when iSCSI boot LUN is re-exported (after a previous unexport
    operation) from the iSCSI host (HPE 3PAR StoreServ Storage).
    
    This product corrects an issue where 'HPE Synergy 4820C 10/20/25Gb Converged
    Network Adapter' disappears after changing its link speed under its
    configuration menu (located at 'System Utilities'(F9 at POST)-&gt;'System
    Configuration').
    
    This product corrects an issue where the configuration settings of the
    adapter, connected to a server managed by OneView profile, may be reset to
    defaults after a system reboot.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.8.12" date="1572523200">-     This product now remove supports Synergy and Blade Server.
    
    This product now supports Red Hat Enterprise Linux 8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.8.12" date="1572609600">-     This product addresses an issue where 2nd port reports "function type:
    disabled" with HPE Ethernet 10Gb 2-port 524SFP+ Adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.9.8" date="1594987200">-      This product corrects the abnormal disconnection of iLO web page while performing under Shared Networking on Flexible-LOM.
      * This product addresses an issue where the HPE Ethernet 10/25Gb 2-port 622FLR-SFP28 adapter and  HPE Ethernet 10/25Gb 2-port 621SFP28 Adapter UMCE (Uncorrectable Machine Check Exception) was followed by Unrecoverable I/O error, Uncorrectable PCI express error on Server and one of the ports suddenly no longer can send or receive traffic.
      * This product addresses an issue where driver doesn't load upon booting up by correct memory relocation.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.10.10" date="1614859200">-     This product contains support PLDM firmware upgrade base improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.11.0" date="1635508800">-     This product addresses an issue where the modification on string format of
    firmware update payload.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20.1" date="1641211200">-     This product addresses the problem that the MAC being modified after Firmware
    update</changelog>
  </package>
  <package pkgid="1c1e6a8117eae5d2b078a0c3c3071dbc189d56bb2d516680888a70b35d697837" name="firmware-nic-qlogic-nx2" arch="x86_64">
    <version epoch="0" ver="2.30.2" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.25.10" date="1565611200">-     This product corrects an issue where the link status is not updated
    immediately to the switch when network adapter interface is brought down in
    the Operating System.
    
    This product corrects an issue where not all devices are discovered as part of
    firmware update on a multi-root-complex platforms like Integrity, Superdome,
    etc.
    
    This product corrects an issue where the system hangs with red screen when
    attempting to update the firmware via 'Firmware Update' feature under the
    'System Utilities &gt; Embedded Applications' menu.
    
    This product corrects an issue where a firmware update fails.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.26.7" date="1572523200">-     This product now remove supports Synergy and Blade Server.
    
    This product now supports the following operatings systems:
    
      * Red Hat Enterprise Linux 7 Update 7
      * Red Hat Enterprise Linux 8 Update 0
      * SUSE Linux Enterprise Server 15 SP1</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.26.7" date="1572609600">-     This product addresses an incorrect local sequence number in the Link Layer
    Discovery Protocol (LLDP).
    
    This product addresses an issue where boot mode is not restored to the default
    value after a factory reset.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.26.30" date="1583236800">-     This product addresses an Overheat issue that system shuts down automatically
    due to NIC temperature exceeding threshold.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.27.8" date="1594987200">-      This product corrects the display problem of the adapter name under RBSU.
      * This products corrects some issues about the thermal reporting and temperature threadshold control of the adapter.
      * This product addresses an issue where unexpected UMCE(Uncorrectable Machine Check Exception) appeared when powering on the system with NPAR(Network Partitioning) enabled.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.27.50" date="1602244800">-     This product addresses an issue where the Firmware installation failure when
    enabling secure boot under SUSE Linux Enterprise Server 15 SP2.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.6" date="1614859200">-     This product addresses an issue that platform would be randomly waked up by
    WOL packet.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.50" date="1627387200">-      **This product addressed the firmware update failure problem which may cause NIC FW corruption.**
      * **This product addressed the firmware update failure problem while the platform secure boot being enabled.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.29.2" date="1631793600">-     This product now supports Red Hat Enterprise Linux 8 update 4 and SUSE Linux
    Enterprise Server 15 Service Pack 3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.30.2" date="1641211200">-     TBD</changelog>
  </package>
  <package pkgid="517c7899ba8e09e8617491cefd3d69d73271a59be176df475471d8378bc18ac0" name="firmware-nvdimm-16gb" arch="x86_64">
    <version epoch="0" ver="1.04" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.04" date="1504785600">-     Initial release.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.04" date="1504872000">-     Initial release.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.04-1.1" date="1554120000">-     Initial release.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.04-1.1" date="1554206400">-     Initial release.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.04-3.1" date="1625486400">-</changelog>
  </package>
  <package pkgid="71e2557ebb4d52a15504186b4558b2f0338aab63187e826e0ecbdbae2656f35b" name="firmware-powerpic-gen10" arch="x86_64">
    <version epoch="0" ver="1.0.8" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.2" date="1496750400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1503489600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM version
    1.20 or later
    
    **Enhancements/New Features:**
    
    Added support for Dynamic Power Capping. For proper operation, please ensure
    that Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM
    version 1.20 or later are updated on the server.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-2.1" date="1541419200">-     *Important Notes:**
    
    Ver. 1.0.4 (B) contains support for new server products.  It is functionally
    equivalent to ver. 1.0.4.  It is not necessary to upgrade with Revision (B) if
    a previous component revision was used to upgrade the firmware to ver. 1.0.4.
    
    **Firmware Dependencies:**
    
    Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM version
    1.20 or later
    
    **Enhancements/New Features:**
    
    Added support for Dynamic Power Capping. For proper operation, please ensure
    that Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM
    version 1.20 or later are updated on the server.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-4.1" date="1548936000">-     *Important Notes:**
    
    Ver. 1.0.4 (D) contains updates to the component packaging and is functionally
    equivalent to ver. 1.0.4.  It is not necessary to upgrade with Revision (D) if
    a previous component revision was used to upgrade the firmware to ver. 1.0.4.
    
    **Firmware Dependencies:**
    
    Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM version
    1.20 or later
    
    **Enhancements/New Features:**
    
    Added support for Dynamic Power Capping. For proper operation, please ensure
    that Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM
    version 1.20 or later are updated on the server.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1566820800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for AMD EPYC 7002 Generation Processors. ROM version 2.00 or
    later is required to enable the support. This version of firmware does not
    include any changes for platforms with Intel Processors or AMD EPYC 7001
    Generation Processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7-2.1" date="1583755200">-     *Important Notes:**
    
    Ver. 1.0.7 (B) contains updates to the component packaging and is functionally
    equivalent to ver. 1.0.7. It is not necessary to upgrade with Revision (B) if
    a previous component revision was used to upgrade the firmware to ver.
    1.0.7.This is the initial version for HPE Gen10 Plus servers.  
    
    
    **Firmware Dependencies:**
    
    For HPE ProLiant DL325/DL385 Gen10 servers, ROM version 2.00 or later is
    required to enable the support. iLO5 version 1.40 or above is required to
    upgrade to this version.
    
    **Enhancements/New Features:**
    
    Added support for AMD EPYC 7002 Generation Processors on HPE ProLiant
    DL325/DL385 Gen10 servers. ROM version 2.00 or later is required to enable the
    support. This version of firmware does not include any changes for Gen10
    platforms with Intel Processors or AMD EPYC 7001 Generation Processors. iLO5
    version 1.40 or above is required to upgrade to this version.
    
    This is the initial version for HPE Gen10 Plus servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7-3.1" date="1612958400">-     *Important Notes:**
    
    Ver. 1.0.7 (C) contains updates to the component packaging and is functionally
    equivalent to ver. 1.0.7. It is not necessary to upgrade with Revision (C) if
    a previous component revision was used to upgrade the firmware to ver.
    1.0.7.This is the initial version for HPE Gen10 Plus servers.
    
    **Firmware Dependencies:**
    
    For HPE ProLiant DL325/DL385 Gen10 servers, ROM version 2.00 or later is
    required to enable the support. iLO5 version 1.40 or above is required to
    upgrade to this version.
    
    **Enhancements/New Features:**
    
    Added support for AMD EPYC 7002 Generation Processors on HPE ProLiant
    DL325/DL385 Gen10 servers. ROM version 2.00 or later is required to enable the
    support. This version of firmware does not include any changes for Gen10
    platforms with Intel Processors or AMD EPYC 7001 Generation Processors. iLO5
    version 1.40 or above is required to upgrade to this version.
    
    This is the initial version for HPE Gen10 Plus servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1631448000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Fixed an issue of inaccurate temperature readings when the actual temperature
    exceeds 100 C on Proliant Gen10 Plus servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="567b355d7422d48706082dc10a58b6b0bdcf6157c081d3ccbd0c498b339be0e7" name="firmware-smartarray-1f19a4a64d" arch="x86_64">
    <version epoch="0" ver="5.14" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.21" date="1537444800">-     The following issues are resolved in version 4.21:
    
      * Expander may reset during heavy SSACLI polling
      * SATA drives may take longer to spin up, not be initially detected, and then hot add later. This can prevent system boot or affect the logical drive status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.22" date="1564488000">-      Fixes an issue where false Smart Carrier authenication errors may happen.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.08" date="1616328000">-      Added support for Gen10 plus UBM type 1/2/3 backplanes</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.08" date="1616414400">-      Smart Carrier Authentication Failure issue</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.09" date="1622635200">-      Added support for Gen10 plus UBM type 1/2/3 backplanes</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.09" date="1622721600">-      Intermittent failures on Smart Carrier authentication</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.10" date="1630929600">-      To make Valid flag is always set to true initially so that CRC check can be performed on initstring partition and test if it is really valid.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.12" date="1652356800">-     Users need to update HPE SAS 12G Expander FW version 5.12 for FW compatibility
    due to a specific SPI flash devices is used on the Expander card. Carry over
    issue resolution with reference SID8638.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.12" date="1652443200">-     1\. In support of Micron 256Mb SPI ROM on the latest Shiner board
    
    2\. Provided a proper downgrade restriction to ensure FW compatibility with
    the latest HW</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.14-2.1" date="1658318400">-</changelog>
  </package>
  <package pkgid="3a287767ebf5e385e4db61b71e05d431c3eb50b42ecc3bb8378cd50859b10c47" name="firmware-smartarray-40023de47f" arch="x86_64">
    <version epoch="0" ver="1.20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.16-2.1" date="1632830400">-      Update device guid</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20" date="1647950400">-     Fix issues</changelog>
  </package>
  <package pkgid="4f113a18a193c5e9aaa0629638bd089c827e9e0c32fa533bb3e1fa026644dc66" name="firmware-smartarray-7b5e8400dd" arch="x86_64">
    <version epoch="0" ver="1.27" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.27" date="1609675200">-</changelog>
  </package>
  <package pkgid="11987792f8b3a1e8638c019551350096d2aa497299df0347c2c1f834bee048a4" name="firmware-smartarray-815b1ae26d" arch="x86_64">
    <version epoch="0" ver="1.56" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00" date="1502884800">-     Initial Release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56" date="1526558400">-           Supports Drive Zoning</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56-2.1" date="1540209600">-     *Note:** If version 1.56 was previously installed, then it is not necessary to upgrade to version 1.56 (B).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56-2.1" date="1540296000">-      Added support for SUSE Linux Enterprise Server 15 OS</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56-3.1" date="1541246400">-</changelog>
  </package>
  <package pkgid="8a640ddb3b3bee9511d08ea6931588a918b5dfac9b66733c62568ca751450b46" name="firmware-smartarray-9f082dffb4" arch="x86_64">
    <version epoch="0" ver="1.00" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00" date="1526558400">-     Initial Release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00-2.1" date="1539345600">-</changelog>
  </package>
  <package pkgid="63b2032d5769f094ffdb9f38b2ecd55fa9d72b3fb092214e10b504b3aa4a645a" name="firmware-smartarray-f18fdefd0b" arch="x86_64">
    <version epoch="0" ver="1.79" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.03" date="1434024000">-      1.03 is the initial firmware release.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.25" date="1446638400">-      Added support for new 6 HDD SFF backplane.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.26" date="1474459200">-      Added support for new 6 SFF HDD backplane.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.26" date="1474545600">-      In rare circumstances after multiple, successive reboots, a system with 28 large form factor drives might become unresponsive. Firmware v1.26 resolves the issue.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.26-2.1" date="1496145600">-      **Customers who already installed firmware version 1.26 do not need to update to 1.26 (B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.26-2.1" date="1496232000">-      Updated to support Service Pack for ProLiant version 2017.07.0
    
              **Note:** If version 1.26 was previously installed, then it is not necessary to upgrade to version 1.26 (B).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50" date="1523448000">-      Enhanced debug capabilities</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50-2.1" date="1526558400">-      Enhanced debug capabilities</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.78-1.1" date="1549368000">-      Added HPE Smart Array P824i-p controller support</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.79" date="1587038400">-     Drive may show up missing after a system reboot.</changelog>
  </package>
  <package pkgid="217679101cb7af351df2afb753536de2735cda20ef8fe0ac44af9d786dcaca08" name="firmware-smartarray-f36d4ef431" arch="x86_64">
    <version epoch="0" ver="0.39" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.37" date="1616414400">-     Initial Release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.39-2.1" date="1633780800">-      Modify Product ID's to "A4200 Gen10P LFF" and "A4200 Gen10P SFF" to distinguish the generation.</changelog>
  </package>
  <package pkgid="5b39c87ab4a50be6b5d542c4ff3d2fb9ad953602323ed074fd9c9acda694ff3f" name="firmware-smartarray-f7c07bdbbd" arch="x86_64">
    <version epoch="0" ver="5.00" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00" date="1597147200">-     The following issues have been fixed in Smart Array controller firmware  
       v3.00:
    
         * Background surface scan might not repair media errors on 12G SAS  
           drives in RAID 1, 5, 10, and 50 logical drives.
    
         * In some I/O workloads, the file system or application might read  
           incorrect data from encrypted RAID 0 (with two or more physical  
           drives) or RAID 10/10ADM (with four or more physical drives) logical  
           drives.
    
         * A controller might hang when a Test Unit Ready command fails during  
           SSD logical drive Rapid Parity Initialization.
    
         * During a rebuild and extreme simultaneous host I/O writes, the rebuild  
           operation might use old data, resulting in subsequent host reads that  
           might return old data.
    
         * A host might read incorrect data after background parity  
           initialization finishes on a logical drive on a single array with  
           multiple logical drives.
    
         * A controller lockup issue might occur during the repair of an  
           unrecoverable read error (URE) on a RAID 5 volume.
    
         * A controller lockup issue might occur during SmartCache error  
           handling.
    
         * A controller lockup issue might occur during controller boot when  
           SmartCache is enabled.
    
         * A file system or application might read incorrect data when a  
           coalesced host request encounters a fatal error.
    
         * A failed drive installed during controller boot is not identified as a  
           failed drive.
    
         * The failed drive status LED is not illuminated when a good drive is  
           replaced with a failed drive in a backplane.
    
         * In configurations with backplanes, a failed drive installed as a  
           replacement for a previously configured RAID volume is not identified  
           as a failed drive.
    
         * A rebuild of a logical drive created from SSD drives fails to start  
           within 1,200 seconds.
    
         * A performance drop during 16k to 256k sequential reads with low queue  
           depth occurs on a logical drive with cache enabled.
    
         * A controller lockup issue might occur during a simultaneous host write  
           and background cache flush operation.
    
         * Incorrect connector information is displayed for SATA drives after  
           certain physical events in a dual I/O module enclosure configuration.
    
         * A failed drive that is physically present in a drive bay is not  
           reported correctly.
    
         * Devices might drop out of a configuration after multiple create or  
           delete drive zone group commands are issued.
    
         * The drive status LED does not flash during sanitize operations if  
           drives are attached to an expander.
    
         * Cache disable status is not updated correctly when backup power source  
           charging times out.
    
         * The clear configuration command might not clear the configuration if  
           SmartCache is enabled and the system was previously shut down  
           ungracefully.
    
         * The clear configuration command fails if a SmartCache volume has  
           multiple UREs within a SmartCache page block size.
    
         * A controller lockup issue might occur when toggling a path to an  
           enclosure in a dual domain configuration.
    
         * The controller runs in survival mode if a temperature sensor is not  
           detected.
    
         * The clear configuration command might report failures when it  
           encounters an installed drive with failed status.
    
         * A performance drop occurs during sequential workloads.
    
         * A controller failure might occur when running concurrent I/O to  
           unassigned drives and drives in a RAID logical drive.
    
         * After a reboot, a bad drive might prevent controller discovery or  
           operating system startup.
    
         * A host request is incorrectly returned as Failed when a failed drive  
           in a degraded volume is replaced.
    
         * Modifying the spare configuration under an active spare rebuild causes  
           the rebuild process to stop.
    
         * Incorrect device location reporting occurs when direct-attach drives  
           are not attached to a backplane and an enclosure management schema is  
           not defined.
    
         * RAID volume configuration settings are not applied when a disk drive  
           transitions from unassigned to RAID usage during runtime.
    
         * A RAID volume with a failed drive reappears after a clear  
           configuration operation completes and the system is rebooted.
    
         * A controller might hang during a SmartCache flush task that encounters  
           multiple unrecoverable media errors (UREs).
    
         * A response of all zeros is sent for ATA PASSTHROUGH commands, such as  
           SMART READ DATA, through Out of Band (OOB) host transport.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.21" date="1604577600">-     Official one-off release for FW 3.21 for key customer issue fixed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.21-1.1" date="1616155200">-      Enhanced the performance of sequential READ I/Os greater than 256KiB for cached logical drives.
      * Added support for user-configurable expander scan duration parameters.
      * Improved background consistency check to scan logical drives more efficiently.
      * Added support for Port Discovery Protocol host tool option to support SGPIO or UBM backplanes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.21-1.1" date="1616241600">-      A controller lockup issue occurs when clearing the configuration of an encryption-enabled controller.
      * When unconfigured drives are directly attached, the PHY ID is always 0 in the ADU report or lsscsi output.
      * A file system or application might read incorrect data when there is pending read or write operation and an array transformation is in progress on the logical drives.
      * A rekey operation on a SmartCache volume pauses when the controller firmware is upgraded and the server is warm rebooted.
      * A SMART READ DATA command sent with an out-of-band method returns a response of all zeros.
      * The Maximum Connection Number calculation for an indirectly attached wide-port end-target is incorrect.
      * A firmware exception might occur during task management abort handling for a non-NCQ SATA command.
      * A controller lockup issue might occur when the PHYs fluctuate between link up/link down status.
      * Open frames cause an I/O timeout that results in an Open Reject Bad Destination response and a host I/O timeout. This situation causes a server node to be evicted from a cluster.
      * Removing a redundant fan module in an attached JBOD causes Failed JBOD status.
      * The controller might not respond for up to 15 minutes when a drive reports a hardware failure.
      * Specifying an incorrect serial number in the API when attempting to HALON flash a drive does not result in the expected error.
      * A SmartCache write bypass might result in a cache line getting stuck on a pending queue if the write to the primary logical drive is retried.
      * A controller might not respond if it is repeatedly forced between SIS (Inbox) and PQI I/O submission modes at the same time as an I/O timeout.
      * An issue in the write coalescing logic might cause a partially coalesced opportunity to be abandoned under high queue depth workloads.
      * The OS driver reports a lockup code that does not match the code provided by the firmware.
      * SATA drives are unnecessarily reset during a power-on self-test.
      * The bay number of a non-hot-plug drive is reported as 255/0xFF when the device inventory re-query API is initiated.
      * A controller might not respond when a clear configuration action is initiated at the same time that a degraded volume is undergoing Rapid Parity Initialization.
      * I/O coalescing is not enabled when DDR cache is not present or enabled.
      * A drive incorrectly reports failed status if it is spun down and then used to create a volume with Rapid Parity Initialization.
      * SmartCache metadata is lost after a new volume is created while running I/O traffic.
      * An abnormal volume state is observed with multiple SmartCache volumes configured using 512e drives.
      * A controller might not respond during volume transformation if the backup power source goes off line, is spuriously hot-removed, or indicates a cabling error.
      * A LUN reset issue occurs during heavy write I/O workloads on cache enabled volumes.
      * An incorrect spare SSD physical drive state is reported during a rebuild.
      * An I/O latency issue occurs during periodic disk write metadata operations.
      * A drive failure code might be incorrectly updated with a generic drive failure code.
      * When an expanding SmartCache volume is migrated to another controller after an ungraceful shutdown, the volume is not configured correctly.
      * A controller might not respond when an expanding volume is migrated from a controller that supports DDR cache to a controller that does not support DDR cache.
      * In a split mirror configuration, the cache ratio is reset to the default values after a backup cable error.
      * A controller might not respond after a cold boot during volume rekeying.
      * A controller lockup issue might occur in an HBA SAS drive dual path configuration.
      * A device reset command initiated by a host utility has a timeout issue in minimum power mode.
      * If you use the identify all LED command frequently, the command might not affect all drive LEDs.
      * A controller might not respond when you run the Internal Test Unit Ready command during drive hot removal or addition.
      * A controller lock up issue might occur when resuming a rebuild operation after a reboot.
      * A surface scan inconsistency check event is not logged for RAID 1 volumes.
      * A controller lock up issue might occur when activating a spare drive for an encrypted volume during I/Os.
      * A drive that failed due to read capacity is presented to the host.
      * A periodic background drive temperature check might skip every other minute.
      * A controller lock up issue might occur during expansion after multiple subsequent attempts to abort the expansion process.
      * An unknown error occurred during execution when Recover Cache Module in SSA.
      * Encryption host management commands are processed for a SmartCache volume, even though these commands do not apply to SmartCache volumes.
      * A host might read incorrect data after an array expansion operation.
      * High severity events logged when a controller is in the critical event buffer overflow condition are not prioritized.
      * Redundant surface scan pass complete events might be posted for the same surface scan iteration if the controller is rebooted during the scan.
      * During an expander firmware upgrade (reduced functionality mode), the last management device index remains open for processing I/Os, and an I/O timeout might occur.
      * A performance drop is observed on certain queue depths for the 4 kB sequential write workload on RAID logical volumes with SmartPath and DDR caching disabled.
      * A command timeout issue occurs during expander firmware upgrade with Non-Disruptive Soft Reset.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.53" date="1616328000">-      Added UBM type3 backplane support
      * Added support for long device model/product ID for SATA drives.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.53" date="1616414400">-      An issue where the controller might become unresponsive while waiting for a non-existent pre-fetch queue entry.
      * Host I/O timeouts might occur due to continuing firmware attempts to discover devices during an expander configuration.
      * A controller lockup problem (with code 0x1E10) might occur when a bad drive with an unsupported block size is connected into slot 0.
      * A Controller hangs issue when multiple hot-plug and hot remove events (drives or JBODs) were being processed.
      * A Controller hangs issue on DDR caching enabled logical volumes with sequential read towards the end of the volume.
      * A Controller hangs issue with outstanding I/Os on a degraded logical volume when the physical drive fails.
      * A Controller hangs issue if a host I/O and background consistency check simultaneously encounter a RAID-1 ADM stripe in which all drives have URE's on the same LBA.
      * A Controller hangs issue when a drive is failed from a RAID6/60 logical drive when the host issues a Clear Controller Configuration command or any other configuration change command.
      * The SSD data drive might be set offline (with reason code 0x37) when hot-remove and re-insert during a spare rebuild in progress.
      * A drive might not be exposed to the OS after reboot if the system is rebooted just after the sanitize erase finishes.
      * UBM backplanes are not detected properly when connected to specific ports (port 7 or above) in an expander card configuration.
      * A Controller hangs issue when processing idle time followed by a short burst of I/Os.
      * The controller might return the previous drive firmware version, after a drive firmware update on SATA drives.
      * The controller might fail drives (with reason code 0x49, I/O freeze timeout) during expander firmware upgrade on a multi-expander enclosure configuration.
      * Hot-added drive LED control fails on specific fan-out expander type external enclosure models.
      * sequential I/Os and the firmware coalescing logic can't get the memory.
      * Filesystem or application might read old data when SmartCache configurations encounter intermittent write I/O errors to a primary logical drive.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.11" date="1632398400">-      Fixed an issue where SSD SmartPath is not enabled on logical drives created on the same array in certain scenarios.
      * Fixed a problem where WRITE and READ fails with URE on a RAID6 volume where it could have completed successfully in certain error recovery scenarios.
      * Fixed a problem where events were not getting logged in certain scenarios.
      * Fixed an issue where a Windows memory dump process was taking longer than 30 minutes.
      * Fixed a problem in Gen10+ server where FAULT LED was not turning on for the drives failing during device discovery.
      * Fixed a problem where the critical event "Controller memory ECC error limit exceeded" was reported in the AHS IML log after upgrading to 3.53 B0 firmware build.
      * Fixed a problem where the host WRITE I/O failed on the SmartCache logical drive with UREs present on the primary logical drive.
      * Fixed an issue where the controller may be non-responsive after drive failure with SSD SmartPath enabled under a high queue depth workload.
      * Fixed a performance issue when the host is submitting large sequential IO streams at high queue depth.
      * Fixed an issue where OS filesystem is not available after making configuration changes in HII.
      * Fixed an issue where error was observed while selecting edit SmartCache Logical drive option when SmartCache logical drive is in Degraded mode.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.00" date="1647777600">-      Added support for DMTF PLDM Monitoring and Control for enhanced thermal monitoring
      * Added support for DMTF PLDM Redfish Device Enablement for Redfish Storage, StorageController, Port, Drive, Volume, &amp; CollectionCapabilities
      * Added support for DMTF PLDM Redfish Device Enablement for Volume POST &amp; DEL operations
      * Added support for DMTF Redfish StorageDevice.1.0.1 Events
      * Added support in firmware to enable logical drive transformation without backup power source on the controllers supporting data preservation.
      * Added support to return NCQ Priority Information for SATA drive to host.
      * Added support to blink the drive Predictive Failure (PF) LED during Predictive Spare Rebuilding (PSR) for drives that can be safely removed and replaced without causing a logical drive failure.
      * Added support to configure default setting for the drive write cache.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.00" date="1647864000">-      Fixed a rare problem where backup power status was incorrectly reporting Charging instead of Failed.
      * Fixed an issue where obsoleted SCSI pass through command fails.
      * Loss of redundant path message is incorrectly reported on logical drive failure with single domain configuration.
      * Fixed an issue where SmartPath may not be used after LUN Reset
      * Fixed a potential controller lockup 0x1BC0 during write then read I/O with drive URE's.
      * Fixed an issue that Apollo 4200 Gen10 plus LFF expander backplanes are not discovered by controller.
      * Fixed an issue that range locked SED failed with reason error erasing RAID metadata during reboot and remains failed after clear configuration.
      * Fixed an issue where the file system may read incorrect data from a degraded RAID 5 or 6 logical drive.
      * Fixed an issue where the file system or application may read incorrect data when a backup power source is discharged completely, and system power loss occurs during a transformation.
      * Fixed an issue where the drive Fault LED is not turned ON when firmware fails a bad HBA drive connected to an expander during device discovery or hot-plug.
      * Fixed an issue of auto-rebuild not starting if two drives fail at the same time on a RAID10 or RAID6 logical drive having only one "Auto-Replace Drives" spare drive.
      * Fixed an issue where the drive Fault LED is turned ON for a few seconds when multiple configured drives are hot removed from a SES enclosure and then hot added
      * Fixed an issue where rebuild did not start after multiple iterations of drive failures.
      * Fixed an issue where the controller might fail to discover devices after a cable is hot-added.
      * Fixed a potential problem of inability to delete a SmartCache write-back logical drive.
      * Fixed an issue where 0x1789 POST message error code is displayed as healthy and there is no information in HII when all logical drives in the controller are offline.
      * Fixed an issue where the last logical drive in an array cannot be deleted in UEFI configuration tool.
      * Fixed an issue where build method is not listed for RAID 6 array creation in UEFI configuration tool.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.00-2.1" date="1653739200">-      Fixed a rare problem where backup power status was incorrectly reporting Charging instead of Failed.
      * Fixed an issue where obsoleted SCSI pass through command fails.
      * Loss of redundant path message is incorrectly reported on logical drive failure with single domain configuration.
      * Fixed an issue where SmartPath may not be used after LUN Reset
      * Fixed a potential controller lockup 0x1BC0 during write then read I/O with drive URE's.
      * Fixed an issue that Apollo 4200 Gen10 plus LFF expander backplanes are not discovered by controller.
      * Fixed an issue that range locked SED failed with reason error erasing RAID metadata during reboot and remains failed after clear configuration.
      * Fixed an issue where the file system may read incorrect data from a degraded RAID 5 or 6 logical drive.
      * Fixed an issue where the file system or application may read incorrect data when a backup power source is discharged completely, and system power loss occurs during a transformation.
      * Fixed an issue where the drive Fault LED is not turned ON when firmware fails a bad HBA drive connected to an expander during device discovery or hot-plug.
      * Fixed an issue of auto-rebuild not starting if two drives fail at the same time on a RAID10 or RAID6 logical drive having only one "Auto-Replace Drives" spare drive.
      * Fixed an issue where the drive Fault LED is turned ON for a few seconds when multiple configured drives are hot removed from a SES enclosure and then hot added
      * Fixed an issue where rebuild did not start after multiple iterations of drive failures.
      * Fixed an issue where the controller might fail to discover devices after a cable is hot-added.
      * Fixed a potential problem of inability to delete a SmartCache write-back logical drive.
      * Fixed an issue where 0x1789 POST message error code is displayed as healthy and there is no information in HII when all logical drives in the controller are offline.
      * Fixed an issue where the last logical drive in an array cannot be deleted in UEFI configuration tool.
      * Fixed an issue where build method is not listed for RAID 6 array creation in UEFI configuration tool.</changelog>
  </package>
  <package pkgid="082c5c5a2b43d45b2e3af6c03d2a9f7046403f1a00d7d664a253d068afb2cb8a" name="firmware-spsgen10" arch="x86_64">
    <version epoch="0" ver="04.01.04.601" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.00.04.393" date="1536753600">-     *Important Notes:**
    
    This revision has mitigated security vulnerability CVE-2018-3643
    (https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3643) and CVE-2018-3655
    (https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3655). It is anticipated
    that details regarding these security vulnerabilities will be published to
    these links on September 11,2018. These security vulnerabilities are not
    unique to HPE servers.
    
    **Firmware Dependencies:**
    
    HPE Gen10 system ROM version 1.26 or later
    
    HPE Gen10 Innovation Engine (IE) Firmware version 0.1.5.2 or later
    
    **Problems Fixed:**
    
    This revision has mitigated security vulnerability CVE-2018-3643
    (https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3643) and CVE-2018-3655
    (https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3655). It is anticipated
    that details regarding these security vulnerabilities will be published to
    these links on September 11, 2018. These security vulnerabilities are not
    unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.251" date="1550145600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for Intel Xeon Scalable Performance 3200, 4200, 5200, 6200 and
    8200 series processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.296" date="1561982400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an intermittent issue where an optional PCIe device may not properly
    report its thermal data or other telemetry data as seen through the Integrated
    Lights-Out (iLO) interface. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.339" date="1572868800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This image contains the latest Intel Server Platform Services (SPS) Firmware
    which contains mitigations for a variety of security vulnerabilities. The
    following vulnerabilities have been addressed in this SPS release:
    CVE-2019-11090 and CVE-2019-11109. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.381" date="1591617600">-     This image contains the latest Intel Server Platform Services (SPS) Firmware
    which contains mitigations for security vulnerability CVE-2020-0545. This
    issue is not unique to HPE Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.381-2.1" date="1597924800">-     This image contains the latest Intel Server Platform Services (SPS) Firmware
    which contains mitigations for security vulnerability CVE-2020-0545. This
    issue is not unique to HPE Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.381-2.1" date="1598011200">-     *Important Notes:**
    
    The Ver. 04.01.04.381(B) flash component contains an updated flash image. The
    actual firmware is exactly the same as was delivered with the original ver.
    04.01.04.381 flash component. The previous flash component had an issue that
    caused flashing to intermittently fail. It is not necessary to upgrade with
    Revision B if a previous component Revision was successfully used to upgrade
    the firmware to version 04.01.04.381 or for systems that originally shipped
    with version 04.01.04.381 firmware.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where systems configured with older versions of the Server
    Platform Services (SPS) Firmware, such as version 04.00.00.288 or older, may
    become inoperable after flashing to SPS firmware version 04.01.04.381. This
    releases contains an updated flash component for SPS Firmware 04.01.04.381
    which allows direct flashing from older firmware versions to the latest.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.423" date="1604923200">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2020-8755. This security
    vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.505" date="1623153600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version of the Server Platform Services (SPS) Firmware addresses an issue
    where not all PCIe devices will be managed properly by the system when there
    are more than 16 PCIe devices present in the platform. This would include PCIe
    devices in PCIe slots or NVMe drives. This issue would typically manifest
    itself as iLO Firmware not properly reporting thermals from a device when a
    server was in this heavily loaded configuration.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.601" date="1645876800">-</changelog>
  </package>
  <package pkgid="875b8561e5ddb7d0f32f61b4d782f8902a8c20b40ca9bc4862bf0acb24655a57" name="firmware-spsgen10plus" arch="x86_64">
    <version epoch="0" ver="04.04.04.062" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.04.04.053" date="1623326400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.04.04.058" date="1626436800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for Intel Optane Persistent Memory.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.04.04.062" date="1645876800">-</changelog>
  </package>
  <package pkgid="63de6a9ce2df3cd4b1a6d575a9dfb162eaa81f8e2280a76bef0257d2def9a274" name="firmware-system-a40" arch="x86_64">
    <version epoch="0" ver="2.56_2022_02_10" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.42_07-17-2020" date="1597406400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where uncorrectable memory errors are seen when running
    memory intensive workloads with LRDIMMs.
    
    Address an issue that could cause a slight degradation of performance.
    
    Resolved an issue with NVMe hot add or removal which may result in an
    unrecoverable I/O error reported in the Integrated Management Log (IML).
    
    Addressed an issue where the UEFI Shell command GetPciRom may not display
    information for PCI expansion device drivers.
    
    Addressed an extremely intermittent issue with AMD Epyc 1st Gen processors
    that would cause a critical error and system reset.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.44_10-29-2020" date="1604664000">-     Added a new BIOS/Platform Configuration (RBSU) for dual bifurcation
    (quadfurcation) of PCIe Adapters to the Advanced PCIe Configuration Options.
    This option will allow a x16 PCIe device to be bifurcated into four x4
    devices.  This option would only be used for PCIe Adapters that support his
    level of bifurcation.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.44_10-29-2020" date="1604750400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system may hang during boot up after a warm reset
    from the OS.
    
    Addressed an issue where the Advanced Options for Secure Boot failed to export
    all keys.
    
    Addressed an issue where One-Button Secure Erase was not completed when
    SmartRAID SW RAID support is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.46_06-08-2021" date="1626350400">-     Added Boot time IPMI Watchdog timer support.
    
    Updated and improved thermal definition.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.46_06-08-2021" date="1626436800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) in cases when they should
    not be logged.  The system monitors corrected errors and notifies the user
    when action is required due to an increased risk of an Uncorrected Memory
    Error.  Corrected Memory errors are a normal and expected occurrence and do
    not always indicate a higher risk of an Uncorrected Memory Error.  Previous
    revisions of the System ROM were incorrectly logging Corrected Memory Error
    Threshold Events to the IML when action should not have been required,
    resulting in unnecessary scheduled downtime to replace DIMMs.  It is
    recommended that the System ROM be updated to this version before replacing
    DIMMs due to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-08-2021" date="1629028800">-     Added a new BIOS/Platform Configuration (RBSU) option to Server Security
    called UEFI Variable Access Firmware Control. This option, when enabled, can
    be used to block UEFI Variable writes, such as to the UEFI Boot Order, from
    the Operating System or a third-party utility. HPE recommends leaving this
    capability disabled unless the user specifically wants to prevent the
    operating system's normal operation of writing to UEFI Variables, which
    typically occur during OS install.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-08-2021" date="1629115200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Tianocore
    Edk2 Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and
    CVE-2021-28210. These security vulnerabilities are documented in Tianocore
    Edk2 CVE details site. These issues are not unique to HPE servers.
    
    Addressed an issue with Pensando Distributed Services Platform DSC-25
    Enterprise 10/25Gb 2-port SFP28 Card missing in system information page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-28-2021" date="1636459200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of AMD security
    patch (AMD-SN-1021) which provides mitigations for BIOS advisories and
    security vulnerabilities documented as CVE-2020-12954, CVE-2020-12961,
    CVE-2021-26331, CVE-2021-26335, CVE-2021-26315, CVE-2020-12946,
    CVE-2020-12951. CVE-2021-26336, CVE-2021-26337, CVE-2021-26338,
    CVE-2021-26320, CVE-2020-12944, CVE-2020-12988, CVE-2021-26329,
    CVE-2021-26330, CVE-2021-26321, CVE-2021-26323, CVE-2021-26325,
    CVE-2021-26326, CVE-2021-26322, CVE-2021-26327, and CVE-2021-26312. These
    issues are not unique to HPE servers.
    
    Addressed an issue where in the OS does not display the true CPU Max Core
    Frequency.
    
    Addressed an issue with AMD EPYC 1st Generation processors that can result in
    Corrected Memory Error Threshold Events being logged to the Integrated
    Management Log (IML) in cases when they should not be logged. The system
    monitors corrected errors and notifies the user when action is required due to
    an increased risk of an Uncorrected Memory Error. Corrected Memory errors are
    a normal and expected occurrence and do not always indicate a higher risk of
    an Uncorrected Memory Error. Previous revisions of the System ROM were
    incorrectly logging Corrected Memory Error Threshold Events to the IML when
    action should not have been required, resulting in unnecessary scheduled
    downtime to replace DIMMs. It is recommended that the System ROM be updated to
    this version before replacing DIMMs due to Corrected Memory Error Threshold
    Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_12-03-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_02-10-2022" date="1645185600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where RAID volumes will be lost when using the "Restore
    Default Manufacturing Settings" feature.
    
    Addressed an issue where if the Administrator Password and Power-On Password
    are set, after clearing power-on password, Administrator Password is also
    cleared.
    
    Addressed and issue where a system with Microsoft BitLocker enabled may
    incorrectly and intermittently prompt the user to unlock drives after a
    graceful OS reboot.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="920efccf6a99ee93d7d33f4deb27007e842d1a138f90019e643918671744a1b1" name="firmware-system-a41" arch="x86_64">
    <version epoch="0" ver="2.56_2022_02_10" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.42_07-17-2020" date="1597406400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where uncorrectable memory errors are seen when running
    memory intensive workloads with LRDIMMs.
    
    Address an issue that could cause a slight degradation of performance.
    
    Resolved an issue with NVMe hot add or removal which may result in an
    unrecoverable I/O error reported in the Integrated Management Log (IML).
    
    Addressed an issue where the UEFI Shell command GetPciRom may not display
    information for PCI expansion device drivers.
    
    Addressed an extremely intermittent issue with AMD Epyc 1st Gen processors
    that would cause a critical error and system reset.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.44_11-13-2020" date="1605700800">-     Added a new BIOS/Platform Configuration (RBSU) for dual bifurcation
    (quadfurcation) of PCIe Adapters to the Advanced PCIe Configuration Options.
    This option will allow a x16 PCIe device to be bifurcated into four x4
    devices. This option would only be used for PCIe Adapters that support his
    level of bifurcation.
    
    Added support to increase the maximum amount of system memory to 8TB.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.44_11-13-2020" date="1605787200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed a rare issue where the system may fail to boot after a warm reset.
    
    Addressed an issue where the Advanced Options for Secure Boot failed to export
    all keys.
    
    Addressed an issue where One-Button Secure Erase was not completed when
    SmartRAID SW RAID support is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.46_06-08-2021" date="1626350400">-     Added Boot time IPMI Watchdog timer support.
    
    Updated and improved thermal definition.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.46_06-08-2021" date="1626436800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) in cases when they should
    not be logged.  The system monitors corrected errors and notifies the user
    when action is required due to an increased risk of an Uncorrected Memory
    Error.  Corrected Memory errors are a normal and expected occurrence and do
    not always indicate a higher risk of an Uncorrected Memory Error.  Previous
    revisions of the System ROM were incorrectly logging Corrected Memory Error
    Threshold Events to the IML when action should not have been required,
    resulting in unnecessary scheduled downtime to replace DIMMs.  It is
    recommended that the System ROM be updated to this version before replacing
    DIMMs due to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-08-2021" date="1629028800">-     Added a new BIOS/Platform Configuration (RBSU) option to Server Security
    called UEFI Variable Access Firmware Control. This option, when enabled, can
    be used to block UEFI Variable writes, such as to the UEFI Boot Order, from
    the Operating System or a third-party utility. HPE recommends leaving this
    capability disabled unless the user specifically wants to prevent the
    operating system's normal operation of writing to UEFI Variables, which
    typically occur during OS install.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-08-2021" date="1629115200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Tianocore
    Edk2 Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and
    CVE-2021-28210. These security vulnerabilities are documented in Tianocore
    Edk2 CVE details site. These issues are not unique to HPE servers.
    
    Addressed an issue with Pensando Distributed Services Platform DSC-25
    Enterprise 10/25Gb 2-port SFP28 Card missing in system information page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-28-2021" date="1636459200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of AMD security
    patch (AMD-SN-1021) which provides mitigations for BIOS advisories and
    security vulnerabilities documented as CVE-2020-12954, CVE-2020-12961,
    CVE-2021-26331, CVE-2021-26335, CVE-2021-26315, CVE-2020-12946,
    CVE-2020-12951. CVE-2021-26336, CVE-2021-26337, CVE-2021-26338,
    CVE-2021-26320, CVE-2020-12944, CVE-2020-12988, CVE-2021-26329,
    CVE-2021-26330, CVE-2021-26321, CVE-2021-26323, CVE-2021-26325,
    CVE-2021-26326, CVE-2021-26322, CVE-2021-26327, and CVE-2021-26312. These
    issues are not unique to HPE servers.
    
    Addressed an issue where in the OS does not display the true CPU Max Core
    Frequency.
    
    Addressed an issue with AMD EPYC 1st Generation processors that can result in
    Corrected Memory Error Threshold Events being logged to the Integrated
    Management Log (IML) in cases when they should not be logged. The system
    monitors corrected errors and notifies the user when action is required due to
    an increased risk of an Uncorrected Memory Error. Corrected Memory errors are
    a normal and expected occurrence and do not always indicate a higher risk of
    an Uncorrected Memory Error. Previous revisions of the System ROM were
    incorrectly logging Corrected Memory Error Threshold Events to the IML when
    action should not have been required, resulting in unnecessary scheduled
    downtime to replace DIMMs. It is recommended that the System ROM be updated to
    this version before replacing DIMMs due to Corrected Memory Error Threshold
    Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_12-03-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_02-10-2022" date="1645185600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where RAID volumes will be lost when using the "Restore
    Default Manufacturing Settings" feature.
    
    Addressed an issue where if the Administrator Password and Power-On Password
    are set, after clearing power-on password, Administrator Password is also
    cleared.
    
    Addressed and issue where a system with Microsoft BitLocker enabled may
    incorrectly and intermittently prompt the user to unlock drives after a
    graceful OS reboot.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="5c0d69eb4359ff407126b69bae10d50ae160204444d53729f6fe793731338664" name="firmware-system-a42" arch="x86_64">
    <version epoch="0" ver="2.56_2022_02_10" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.40_02-23-2021" date="1618833600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where the Real Time Clock may become
    corrupted on a server boot. This was typically seen as an unexpected change to
    the RTC Year field but could impact other parts of the Date and Time. This
    issue is not unique to HPE servers.
    
    Addressed an issue where the fan runs at a higher than expected speed after
    upgrading the firmware of HPE Smart Array E208i or E408i to version 3.0.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.42_04-29-2021" date="1621857600">-     Updated HPE Smart Array SR100i Gen10 Plus SW RAID UEFI driver to version
    v3.3.14.1004.
    
    Added a new BIOS/Platform Configuration (RBSU) option for No-Execute
    Protection. This option allows disabling processor No-Execution protection to
    work around an issue where the system hangs with a blank screen when entering
    Recovery mode with Windows Server 2016. This issue is not unique to HPE
    servers, and disabling No-Execute protection is required on any system that
    defaults to No-Execute enabled to address this issue.
    
    Updated OpenSSL module to version 1.1.1h.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.42_04-29-2021" date="1621944000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Address an issue where the Industry Standard SMBIOS Type 17 tables will
    indicate the Manufacture ID as "Unknown" for LRDIMMs.
    
    Addressed a rare issue where the time zone cannot be changed successfully in
    BIOS/Platform Configuration (RBSU).
    
    Addressed an issue preventing array creation on HPE Smart Array SR100i Gen10
    Plus SW RAID through the Redfish API.
    
    Addressed an issue where the system may become unresponsive during POST when
    the server is configured with 24 Xilinx NVMe drives.
    
    Addressed an issue where the AMD Fmax Boost value is inconsistent between
    BIOS/Platform Configuration (RBSU) and Redfish API.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.44_06-08-2021" date="1626436800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) in cases when they should
    not be logged.  The system monitors corrected errors and notifies the user
    when action is required due to an increased risk of an Uncorrected Memory
    Error.  Corrected Memory errors are a normal and expected occurrence and do
    not always indicate a higher risk of an Uncorrected Memory Error.  Previous
    revisions of the System ROM were incorrectly logging Corrected Memory Error
    Threshold Events to the IML when action should not have been required,
    resulting in unnecessary scheduled downtime to replace DIMMs.  It is
    recommended that the System ROM be updated to this version before replacing
    DIMMs due to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_08-09-2021" date="1629288000">-     Added support for Microsoft Windows Server 2022. Windows Server 2022 adds a
    new security feature called Secured-core. Secured-core is only supported on
    AMD Gen 3 EPYC processors. Secured-core servers use a combination of hardware
    features, firmware enablement and Windows Server operating system capabilities
    to provide protection against malware and rootkit security exploits.
    
    Added a new BIOS/Platform Configuration (RBSU) option for Microsoft Secured-
    core Support. Enabling this setting makes the following policy changes and
    configures the corresponding options: AMD I/O Virtualization Technology
    enabled, TPM visible, DMA remapping enabled, AMD DRTM enabled, and Secure Boot
    enabled. Disabling any of these features while Secured-core is enabled can
    prevent Secured-core from working properly.
    
    Added a new BIOS/Platform Configuration (RBSU) option to Server Availability
    called IPMI Watchdog Timer. When enabled, the system will start an IPMI based
    watchdog timer during boot which can be used to protect against a boot hang or
    other unexpected system boot issue. It is the responsibility of the user to
    disable the IPMI watchdog timer once the operating system has booted. Failure
    to disable the timer can result in an unexpected server reset or shutdown.
    
    Added new RBSU option to Omit Boot Device Event in TPM PCR[4] following EDK2.
    Warning: changing the setting will affect TPM measurements and can impact
    software functionality which utilizes the TPM PCR registers such as Microsoft
    BitLocker. PCR[4] is the register that records the process of attempting to
    boot different hardware paths like from a a hard drive or CD, and what boot
    devices are attempted, and the Initial Program Loader (IPL) code that is
    loaded and executed from the device. If boot from one device fails,
    measurements in PCR[4] record the attempt to boot the next device or boot
    path. If recording which device attempted to boot is omitted with this option
    (i.e. enable this option), the BIOS records the event type
    EV_OMIT_BOOT_DEVICE_EVENTS in PCR[4], otherwise the event is not recorded.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_08-09-2021" date="1629374400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Tianocore
    Edk2 Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and
    CVE-2021-28210. These security vulnerabilities are documented in Tianocore
    Edk2 CVE details site. These issues are not unique to HPE servers.
    
    Addressed an issue with Pensando Distributed Services Platform DSC-25
    Enterprise 10/25Gb 2-port SFP28 Card missing in pre-boot System Utilities
    System Information Page.
    
    Addressed an issue with hot-adding drives after removing them from Bay 1 when
    using the HPE SR100i Software RAID solution for systems and the UBM4 2SFF
    backplane. In this situation the HDD cannot be detected after re-insertion.
    
    Addressed an issue with hot adding NVMe drives with VMware ESXi when a drive
    bay is empty at boot up. Drive may fail to be added.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-29-2021" date="1636372800">-     Added a new BIOS/Platform Configuration (RBSU) option for Dynamic PCIe Rate
    Change. This option should be enabled for certain PCIe devices that change
    their advertised speed during training. The option is disabled by default, and
    should only be enabled if the system is configured with a device which is
    training at a less than advertised speed.
    
    Added a new BIOS/Platform Configuration (RBSU) option for MCTP Broadcast
    Support. This option is used to control the PCIe Management Component
    Transport Protocol (MCTP) support for a given slot. This option can be used to
    disable MCTP support to a given PCIe endpoint that may not properly support
    this protocol. It is recommended that this option remain enabled for full
    system functionality.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-29-2021" date="1636459200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of AMD security
    patch (AMD-SN-1021) which provides mitigations for BIOS advisories and
    security vulnerabilities documented as CVE-2020-12954, CVE-2020-12961,
    CVE-2021-26331, CVE-2021-26335, CVE-2021-26315, CVE-2020-12946,
    CVE-2020-12951. CVE-2021-26336, CVE-2021-26337, CVE-2021-26338,
    CVE-2021-26320, CVE-2020-12944, CVE-2020-12988, CVE-2021-26329,
    CVE-2021-26330, CVE-2021-26321, CVE-2021-26323, CVE-2021-26325,
    CVE-2021-26326, CVE-2021-26322, CVE-2021-26327, and CVE-2021-26312. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of AMD security
    patch (AMD-SN-1007) which provides mitigation for AMD vulnerability with PSP
    Code Execution documented by AMD. This issue is not unique to HPE servers.
    
    Addressed an issue where in the OS does not display the true CPU Max Core
    Frequency.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_12-03-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_02-10-2022" date="1642075200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Correctable Memory Error Threshold
    Events on DIMM slots 9/10/13/14/15/16 with AMD EPYC 7773/7573/7473/7373 CPU
    SKUs not being reported in the IML (Integrated Management Log).
    
    Addressed an issue where RAID volumes will be lost when using the "Restore
    Default Manufacturing Settings" feature.
    
    Addressed an issue where if the Administrator Password and Power-On Password
    are set, after clearing power-on password, Administrator Password is also
    cleared.
    
    Addressed and issue where a system with Microsoft BitLocker enabled may
    incorrectly and intermittently prompt the user to unlock drives after a
    graceful OS reboot.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="cb1d065c9c66036ec7fa139a32c445921cde21d08ef47991765a0f21482f32cb" name="firmware-system-a43" arch="x86_64">
    <version epoch="0" ver="2.56_2022_02_10" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.40_02-23-2021" date="1618833600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where the Real Time Clock may become
    corrupted on a server boot. This was typically seen as an unexpected change to
    the RTC Year field but could impact other parts of the Date and Time. This
    issue is not unique to HPE servers.
    
    Addressed an issue where the fan runs at a higher than expected speed after
    upgrading the firmware of HPE Smart Array E208i or E408i to version 3.0.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.42_04-29-2021" date="1621857600">-     Updated HPE Smart Array SR100i Gen10 Plus SW RAID UEFI driver to version
    v3.3.14.1004.
    
    Added a new BIOS/Platform Configuration (RBSU) option for No-Execute
    Protection. This option allows disabling processor No-Execution protection to
    work around an issue where the system hangs with a blank screen when entering
    Recovery mode with Windows Server 2016. This issue is not unique to HPE
    servers, and disabling No-Execute protection is required on any system that
    defaults to No-Execute enabled to address this issue.
    
    Updated OpenSSL module to version 1.1.1h.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.42_04-29-2021" date="1621944000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Address an issue where the Industry Standard SMBIOS Type 17 tables will
    indicate the Manufacture ID as "Unknown" for LRDIMMs.
    
    Addressed a rare issue where the time zone cannot be changed successfully in
    BIOS/Platform Configuration (RBSU).
    
    Addressed an issue preventing array creation on HPE Smart Array SR100i Gen10
    Plus SW RAID through the Redfish API.
    
    Addressed an issue where the system may become unresponsive during POST when
    the server is configured with 24 Xilinx NVMe drives.
    
    Addressed an issue where the AMD Fmax Boost value is inconsistent between
    BIOS/Platform Configuration (RBSU) and Redfish API.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.44_06-08-2021" date="1626436800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) in cases when they should
    not be logged.  The system monitors corrected errors and notifies the user
    when action is required due to an increased risk of an Uncorrected Memory
    Error.  Corrected Memory errors are a normal and expected occurrence and do
    not always indicate a higher risk of an Uncorrected Memory Error.  Previous
    revisions of the System ROM were incorrectly logging Corrected Memory Error
    Threshold Events to the IML when action should not have been required,
    resulting in unnecessary scheduled downtime to replace DIMMs.  It is
    recommended that the System ROM be updated to this version before replacing
    DIMMs due to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_08-09-2021" date="1629288000">-     Added support for Microsoft Windows Server 2022. Windows Server 2022 adds a
    new security feature called Secured-core. Secured-core is only supported on
    AMD Gen 3 EPYC processors. Secured-core servers use a combination of hardware
    features, firmware enablement and Windows Server operating system capabilities
    to provide protection against malware and rootkit security exploits.
    
    Added a new BIOS/Platform Configuration (RBSU) option for Microsoft Secured-
    core Support. Enabling this setting makes the following policy changes and
    configures the corresponding options: AMD I/O Virtualization Technology
    enabled, TPM visible, DMA remapping enabled, AMD DRTM enabled, and Secure Boot
    enabled. Disabling any of these features while Secured-core is enabled can
    prevent Secured-core from working properly.
    
    Added a new BIOS/Platform Configuration (RBSU) option to Server Availability
    called IPMI Watchdog Timer. When enabled, the system will start an IPMI based
    watchdog timer during boot which can be used to protect against a boot hang or
    other unexpected system boot issue. It is the responsibility of the user to
    disable the IPMI watchdog timer once the operating system has booted. Failure
    to disable the timer can result in an unexpected server reset or shutdown.
    
    Added new RBSU option to Omit Boot Device Event in TPM PCR[4] following EDK2.
    Warning: changing the setting will affect TPM measurements and can impact
    software functionality which utilizes the TPM PCR registers such as Microsoft
    BitLocker. PCR[4] is the register that records the process of attempting to
    boot different hardware paths like from a a hard drive or CD, and what boot
    devices are attempted, and the Initial Program Loader (IPL) code that is
    loaded and executed from the device. If boot from one device fails,
    measurements in PCR[4] record the attempt to boot the next device or boot
    path. If recording which device attempted to boot is omitted with this option
    (i.e. enable this option), the BIOS records the event type
    EV_OMIT_BOOT_DEVICE_EVENTS in PCR[4], otherwise the event is not recorded.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_08-09-2021" date="1629374400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Tianocore
    Edk2 Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and
    CVE-2021-28210. These security vulnerabilities are documented in Tianocore
    Edk2 CVE details site. These issues are not unique to HPE servers.
    
    Addressed an issue with Pensando Distributed Services Platform DSC-25
    Enterprise 10/25Gb 2-port SFP28 Card missing in pre-boot System Utilities
    System Information Page.
    
    Addressed an issue with hot-adding drives after removing them from Bay 1 when
    using the HPE SR100i Software RAID solution for systems and the UBM4 2SFF
    backplane. In this situation the HDD cannot be detected after re-insertion.
    
    Addressed an issue with hot adding NVMe drives with VMware ESXi when a drive
    bay is empty at boot up. Drive may fail to be added.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-29-2021" date="1636372800">-     Added a new BIOS/Platform Configuration (RBSU) option for Dynamic PCIe Rate
    Change. This option should be enabled for certain PCIe devices that change
    their advertised speed during training. The option is disabled by default, and
    should only be enabled if the system is configured with a device which is
    training at a less than advertised speed.
    
    Added a new BIOS/Platform Configuration (RBSU) option for MCTP Broadcast
    Support. This option is used to control the PCIe Management Component
    Transport Protocol (MCTP) support for a given slot. This option can be used to
    disable MCTP support to a given PCIe endpoint that may not properly support
    this protocol. It is recommended that this option remain enabled for full
    system functionality.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-29-2021" date="1636459200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of AMD security
    patch (AMD-SN-1021) which provides mitigations for BIOS advisories and
    security vulnerabilities documented as CVE-2020-12954, CVE-2020-12961,
    CVE-2021-26331, CVE-2021-26335, CVE-2021-26315, CVE-2020-12946,
    CVE-2020-12951. CVE-2021-26336, CVE-2021-26337, CVE-2021-26338,
    CVE-2021-26320, CVE-2020-12944, CVE-2020-12988, CVE-2021-26329,
    CVE-2021-26330, CVE-2021-26321, CVE-2021-26323, CVE-2021-26325,
    CVE-2021-26326, CVE-2021-26322, CVE-2021-26327, and CVE-2021-26312. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of AMD security
    patch (AMD-SN-1007) which provides mitigation for AMD vulnerability with PSP
    Code Execution documented by AMD. This issue is not unique to HPE servers.
    
    Addressed an issue where in the OS does not display the true CPU Max Core
    Frequency.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_12-03-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_02-10-2022" date="1642075200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Correctable Memory Error Threshold
    Events on DIMM slots 9/10/13/14/15/16 with AMD EPYC 7773/7573/7473/7373 CPU
    SKUs not being reported in the IML (Integrated Management Log).
    
    Addressed an issue where RAID volumes will be lost when using the "Restore
    Default Manufacturing Settings" feature.
    
    Addressed an issue where if the Administrator Password and Power-On Password
    are set, after clearing power-on password, Administrator Password is also
    cleared.
    
    Addressed and issue where a system with Microsoft BitLocker enabled may
    incorrectly and intermittently prompt the user to unlock drives after a
    graceful OS reboot.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="0363d07c1a62c6a587051457042f5161a96087a06a47f1c889a0b61ddc3ef650" name="firmware-system-a46" arch="x86_64">
    <version epoch="0" ver="2.56_2022_02_10" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.40_01-21-2021" date="1618488000">-     Added support for AMD EPYC 7003 processors.
    
    Added support for BIOS switches to control RAS (handles by OS/Firmware first).
    
    Added support for OCP 3.0 NIC.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.40_01-21-2021" date="1618574400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    System Programable Logic CPLD version 34
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where the Real Time Clock may become
    corrupted on a server boot. This was typically seen as an unexpected change to
    the RTC Year field but could impact other parts of the Date and Time. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.42_02-23-2021" date="1618833600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    System Programable Logic CPLD version 34
    
    **Enhancements/New Features:**
    
    Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add
    Dublin/London (UTC+1). This support also requires the latest version of iLO
    Firmware, version 2.40 or later.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.44_05-21-2021" date="1621598400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    System Programable Logic CPLD version 38
    
    **Enhancements/New Features:**
    
    Added support for the 4SFF 24G x4NVMe/SAS UBM1 Storage Controller backplane.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-29-2021" date="1629720000">-     \- Added support for Microsoft Windows Server 2022. Windows Server 2022 adds a
    new security feature called Secured-core. Secured-core is only supported on
    AMD Gen 3 EPYC processors. Secured-core servers use a combination of hardware
    features, firmware enablement and Windows Server operating system capabilities
    to provide protection against malware and rootkit security exploits.
    
    \- Added a new BIOS/Platform Configuration (RBSU) option for Microsoft
    Secured-core Support. Enabling this setting makes the following policy changes
    and configures the corresponding options: AMD I/O Virtualization Technology
    enabled, TPM visible, DMA remapping enabled, AMD DRTM enabled, and Secure Boot
    enabled. Disabling any of these features while Secured-core is enabled can
    prevent Secured-core from working properly.
    
    \- Added a new BIOS/Platform Configuration (RBSU) option to Server
    Availability called IPMI Watchdog Timer. When enabled, the system will start
    an IPMI based watchdog timer during boot which can be used to protect against
    a boot hang or other unexpected system boot issue. It is the responsibility of
    the user to disable the IPMI watchdog timer once the operating system has
    booted. Failure to disable the timer can result in an unexpected server reset
    or shutdown.
    
    \- Added new RBSU option to Omit Boot Device Event in TPM PCR[4] following
    EDK2. Warning: changing the setting will affect TPM measurements and can
    impact software functionality which utilizes the TPM PCR registers such as
    Microsoft BitLocker. PCR[4] is the register that records the process of
    attempting to boot different hardware paths like from a a hard drive or CD,
    and what boot devices are attempted, and the Initial Program Loader (IPL) code
    that is loaded and executed from the device. If boot from one device fails,
    measurements in PCR[4] record the attempt to boot the next device or boot
    path. If recording which device attempted to boot is omitted with this option
    (i.e. enable this option), the BIOS records the event type
    EV_OMIT_BOOT_DEVICE_EVENTS in PCR[4], otherwise the event is not recorded.
    
    \- Added support for the 4SFF 24G x4NVMe/SAS UBM1 Storage Controller
    backplane.
    
    \- Added an enhancement to existing processor current monitoring in order to
    avoid potential overcurrent shutdowns.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-29-2021" date="1629806400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    \- This revision of the System ROM includes the latest revision of the
    Tianocore Edk2 Code which provides mitigations for BIOS advisories and
    security vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and
    CVE-2021-28210. These security vulnerabilities are documented in Tianocore
    Edk2 CVE details site. These issues are not unique to HPE servers.
    
    \- Addressed an issue with Pensando Distributed Services Platform DSC-25
    Enterprise 10/25Gb 2-port SFP28 Card missing in pre-boot System Utilities
    System Information Page.
    
    \- Addressed an issue with hot-adding drives after removing them from Bay 1
    when using the HPE SR100i Software RAID solution for systems and the UBM4 2SFF
    backplane. In this situation the HDD cannot be detected after re-insertion.
    
    \- Addressed an issue with hot adding a NVMe drives with VMware ESXi when a
    drive bay is empty at boot up. Drive may fail to be added.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-29-2021" date="1636372800">-     \- Added a new BIOS/Platform Configuration (RBSU) option for Dynamic PCIe Rate
    Change. This option should be enabled for certain PCIe devices that change
    their advertised speed during training. The option is disabled by default, and
    should only be enabled if the system is configured with a device which is
    training at a less than advertised speed.
    
    \- Added a new BIOS/Platform Configuration (RBSU) option for MCTP Broadcast
    Support. This option is used to control the PCIe Management Component
    Transport Protocol (MCTP) support for a given slot. This option can be used to
    disable MCTP support to a given PCIe endpoint that may not properly support
    this protocol. It is recommended that this option remain enabled for full
    system functionality.
    
    \- Added support for reporting CPU PPIN/Serial Number in SMBIOS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-29-2021" date="1636459200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    \- This revision of the System ROM includes the latest revision of AMD
    security patch (AMD-SN-1021) which provides mitigations for BIOS advisories
    and security vulnerabilities documented as CVE-2020-12954, CVE-2020-12961,
    CVE-2021-26331, CVE-2021-26335, CVE-2021-26315, CVE-2020-12946,
    CVE-2020-12951. CVE-2021-26336, CVE-2021-26337, CVE-2021-26338,
    CVE-2021-26320, CVE-2020-12944, CVE-2020-12988, CVE-2021-26329,
    CVE-2021-26330, CVE-2021-26321, CVE-2021-26323, CVE-2021-26325,
    CVE-2021-26326, CVE-2021-26322, CVE-2021-26327, and CVE-2021-26312. These
    issues are not unique to HPE servers.
    
    \- This revision of the System ROM includes the latest revision of AMD
    security patch (AMD-SN-1007) which provides mitigation for AMD vulnerability
    with PSP Code Execution documented by AMD. This issue is not unique to HPE
    servers.
    
    \- Addressed an issue where in the OS does not display the true CPU Max Core
    Frequency.
    
    \- Addressed an issue where BootMode and UefiOptimizedBoot settings are not
    accessible through Redfish on class 3 systems.
    
    \- Addressed an issue where the controller's name is missing in BIOS/Platform
    Configuration (RBSU) and One Time Boot Menu if HPE SR416i-a x16 Lanes 4GB
    Cache NVMe/SAS 24G Gen10 Plus Controller or HPE SR932i-p x32 Lanes 8GB Wide
    Cache NVMe/SAS 24G PCIe4 x16 Gen10 Plus Controller is installed.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_12-03-2021" date="1639483200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    \- Addressed an issue that can result in Corrected Memory Error Threshold
    Events being logged to the Integrated Management Log (IML) incorrectly. The
    system monitors corrected memory errors and notifies the user via a Corrected
    Memory Error Threshold Event when action is recommended due to an increased
    risk of an uncorrected memory error. Previous versions of the System ROM may
    log a Corrected Memory Error Threshold Event in cases where the system is not
    at an increased risk of an uncorrected memory error. It is strongly
    recommended that the System ROM be updated to this version or later before
    replacing DIMMs due to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_02-10-2022" date="1642248000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Correctable Memory Error Threshold
    Events on DIMM slots 9/10/13/14/15/16 with AMD EPYC 7773/7573/7473/7373 CPU
    SKUs not being reported in the IML (Integrated Management Log).
    
    Addressed an issue where RAID volumes will be lost when using the "Restore
    Default Manufacturing Settings" feature.
    
    Addressed an issue where if the Administrator Password and Power-On Password
    are set, after clearing power-on password, Administrator Password is also
    cleared.
    
    Addressed and issue where a system with Microsoft BitLocker enabled may
    incorrectly and intermittently prompt the user to unlock drives after a
    graceful OS reboot.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="7c4b557aa6bd769cdb40afa71a37c15ce62e64decb551a7b712ebd1d5b242df2" name="firmware-system-a47" arch="x86_64">
    <version epoch="0" ver="2.56_2022_02_10" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.38_11-06-2020" date="1618574400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.40_02-23-2021" date="1618747200">-     Added support for AMD EPYC 7003 processors.
    
    Added support for Direct Liquid Cooling solution.
    
    Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add
    Dublin/London (UTC+1). This support also requires the latest version of iLO
    Firmware, version 2.40 or later.
    
    Added a new BIOS/Platform Configuration (RBSU) for Platform RAS Policy to
    control the Platform Resiliency and Serviceability (RAS) policy. This option
    controls whether platform firmware or the operating system has control of
    corrected error handling and reporting.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.40_02-23-2021" date="1618833600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    HPE ProLiant XL675d Gen10Plus CPLD version 0F
    
    HPE Apollo 6500 Gen10 Plus Chassis CPLD version 0909
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where the Real Time Clock may become
    corrupted on a server boot. This was typically seen as an unexpected change to
    the RTC Year field but could impact other parts of the Date and Time. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-29-2021" date="1629720000">-     \- Added support for Microsoft Windows Server 2022. Windows Server 2022 adds a
    new security feature called Secured-core. Secured-core is only supported on
    AMD Gen 3 EPYC processors. Secured-core servers use a combination of hardware
    features, firmware enablement and Windows Server operating system capabilities
    to provide protection against malware and rootkit security exploits.
    
    \- Added a new BIOS/Platform Configuration (RBSU) option for Microsoft
    Secured-core Support. Enabling this setting makes the following policy changes
    and configures the corresponding options: AMD I/O Virtualization Technology
    enabled, TPM visible, DMA remapping enabled, AMD DRTM enabled, and Secure Boot
    enabled. Disabling any of these features while Secured-core is enabled can
    prevent Secured-core from working properly.
    
    \- Added a new BIOS/Platform Configuration (RBSU) option to Server
    Availability called IPMI Watchdog Timer. When enabled, the system will start
    an IPMI based watchdog timer during boot which can be used to protect against
    a boot hang or other unexpected system boot issue. It is the responsibility of
    the user to disable the IPMI watchdog timer once the operating system has
    booted. Failure to disable the timer can result in an unexpected server reset
    or shutdown.
    
    \- Added new RBSU option to Omit Boot Device Event in TPM PCR[4] following
    EDK2. Warning: changing the setting will affect TPM measurements and can
    impact software functionality which utilizes the TPM PCR registers such as
    Microsoft BitLocker. PCR[4] is the register that records the process of
    attempting to boot different hardware paths like from a a hard drive or CD,
    and what boot devices are attempted, and the Initial Program Loader (IPL) code
    that is loaded and executed from the device. If boot from one device fails,
    measurements in PCR[4] record the attempt to boot the next device or boot
    path. If recording which device attempted to boot is omitted with this option
    (i.e. enable this option), the BIOS records the event type
    EV_OMIT_BOOT_DEVICE_EVENTS in PCR[4], otherwise the event is not recorded.
    
    \- Added an enhancement to existing processor current monitoring in order to
    avoid potential overcurrent shutdowns.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-29-2021" date="1629806400">-     *Important Notes:**
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    \- This revision of the System ROM includes the latest revision of the
    Tianocore Edk2 Code which provides mitigations for BIOS advisories and
    security vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and
    CVE-2021-28210. These security vulnerabilities are documented in Tianocore
    Edk2 CVE details site. These issues are not unique to HPE servers.
    
    \- Addressed an issue with Pensando Distributed Services Platform DSC-25
    Enterprise 10/25Gb 2-port SFP28 Card missing in pre-boot System Utilities
    System Information Page.
    
    \- Addressed an issue with hot-adding drives after removing them from Bay 1
    when using the HPE SR100i Software RAID solution for systems and the UBM4 2SFF
    backplane. In this situation the HDD cannot be detected after re-insertion.
    
    \- Addressed an issue with hot adding a NVMe drives with VMware ESXi when a
    drive bay is empty at boot up. Drive may fail to be added.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-29-2021" date="1636372800">-     \- Added a new BIOS/Platform Configuration (RBSU) option for Dynamic PCIe Rate
    Change. This option should be enabled for certain PCIe devices that change
    their advertised speed during training. The option is disabled by default, and
    should only be enabled if the system is configured with a device which is
    training at a less than advertised speed.
    
    \- Added a new BIOS/Platform Configuration (RBSU) option for MCTP Broadcast
    Support. This option is used to control the PCIe Management Component
    Transport Protocol (MCTP) support for a given slot. This option can be used to
    disable MCTP support to a given PCIe endpoint that may not properly support
    this protocol. It is recommended that this option remain enabled for full
    system functionality.
    
    \- Added support for reporting CPU PPIN/Serial Number in SMBIOS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-29-2021" date="1636459200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    \- This revision of the System ROM includes the latest revision of AMD
    security patch (AMD-SN-1021) which provides mitigations for BIOS advisories
    and security vulnerabilities documented as CVE-2020-12954, CVE-2020-12961,
    CVE-2021-26331, CVE-2021-26335, CVE-2021-26315, CVE-2020-12946,
    CVE-2020-12951. CVE-2021-26336, CVE-2021-26337, CVE-2021-26338,
    CVE-2021-26320, CVE-2020-12944, CVE-2020-12988, CVE-2021-26329,
    CVE-2021-26330, CVE-2021-26321, CVE-2021-26323, CVE-2021-26325,
    CVE-2021-26326, CVE-2021-26322, CVE-2021-26327, and CVE-2021-26312. These
    issues are not unique to HPE servers.
    
    \- This revision of the System ROM includes the latest revision of AMD
    security patch (AMD-SN-1007) which provides mitigation for AMD vulnerability
    with PSP Code Execution documented by AMD. This issue is not unique to HPE
    servers.
    
    \- Addressed an issue where in the OS does not display the true CPU Max Core
    Frequency.
    
    \- Addressed an issue that can result in Corrected Memory Error Threshold
    Events being logged to the Integrated Management Log (IML) in cases when they
    should not be logged. The system monitors corrected errors and notifies the
    user when action is required due to an increased risk of an Uncorrected Memory
    Error. Corrected Memory errors are a normal and expected occurrence and do not
    always indicate a higher risk of an Uncorrected Memory Error. Previous
    revisions of the System ROM were incorrectly logging Corrected Memory Error
    Threshold Events to the IML when action should not have been required,
    resulting in unnecessary scheduled downtime to replace DIMMs. It is
    recommended that the System ROM be updated to this version before replacing
    DIMMs due to Corrected Memory Error Threshold Events.
    
    \- Addressed an issue where BootMode and UefiOptimizedBoot settings are not
    accessible through Redfish on class 3 systems.
    
    \- Addressed an issue where the controller's name is missing in BIOS/Platform
    Configuration (RBSU) and One Time Boot Menu if HPE SR416i-a x16 Lanes 4GB
    Cache NVMe/SAS 24G Gen10 Plus Controller or HPE SR932i-p x32 Lanes 8GB Wide
    Cache NVMe/SAS 24G PCIe4 x16 Gen10 Plus Controller is installed.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_12-03-2021" date="1639483200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    \- Addressed an issue that can result in Corrected Memory Error Threshold
    Events being logged to the Integrated Management Log (IML) incorrectly. The
    system monitors corrected memory errors and notifies the user via a Corrected
    Memory Error Threshold Event when action is recommended due to an increased
    risk of an uncorrected memory error. Previous versions of the System ROM may
    log a Corrected Memory Error Threshold Event in cases where the system is not
    at an increased risk of an uncorrected memory error. It is strongly
    recommended that the System ROM be updated to this version or later before
    replacing DIMMs due to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_02-10-2022" date="1642248000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Correctable Memory Error Threshold
    Events on DIMM slots 9/10/13/14/15/16 with AMD EPYC 7773/7573/7473/7373 CPU
    SKUs not being reported in the IML (Integrated Management Log).
    
    Addressed an issue where RAID volumes will be lost when using the "Restore
    Default Manufacturing Settings" feature.
    
    Addressed an issue where if the Administrator Password and Power-On Password
    are set, after clearing power-on password, Administrator Password is also
    cleared.
    
    Addressed and issue where a system with Microsoft BitLocker enabled may
    incorrectly and intermittently prompt the user to unlock drives after a
    graceful OS reboot.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="18f7f95bef98c4abda8e3d84cfeb93058c539969c76c3037d7215d772cc7c425" name="firmware-system-a48" arch="x86_64">
    <version epoch="0" ver="2.56_2022_02_10" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.38_12-23-2020" date="1618574400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.40_02-24-2021" date="1618747200">-     Added support for AMD EPYC 7003 processors.
    
    Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add
    Dublin/London (UTC+1). This support also requires the latest version of iLO
    Firmware, version 2.40 or later.
    
    Added a new BIOS/Platform Configuration (RBSU) for Platform RAS Policy to
    control the Platform Resiliency and Serviceability (RAS) policy. This option
    controls whether platform firmware or the operating system has control of
    corrected error handling and reporting.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.40_02-24-2021" date="1618833600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where the Real Time Clock may become
    corrupted on a server boot. This was typically seen as an unexpected change to
    the RTC Year field but could impact other parts of the Date and Time. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.44_05-21-2021" date="1623153600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where PCI slot information will not be reported in SMBIOS
    when the HPE XL645d Gen10 Plus 12Gb NVMe 2-port Adapter is installed.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-29-2021" date="1629720000">-     \- Added support for Microsoft Windows Server 2022. Windows Server 2022 adds a
    new security feature called Secured-core. Secured-core is only supported on
    AMD Gen 3 EPYC processors. Secured-core servers use a combination of hardware
    features, firmware enablement and Windows Server operating system capabilities
    to provide protection against malware and rootkit security exploits.
    
    \- Added a new BIOS/Platform Configuration (RBSU) option for Microsoft
    Secured-core Support. Enabling this setting makes the following policy changes
    and configures the corresponding options: AMD I/O Virtualization Technology
    enabled, TPM visible, DMA remapping enabled, AMD DRTM enabled, and Secure Boot
    enabled. Disabling any of these features while Secured-core is enabled can
    prevent Secured-core from working properly.
    
    \- Added a new BIOS/Platform Configuration (RBSU) option to Server
    Availability called IPMI Watchdog Timer. When enabled, the system will start
    an IPMI based watchdog timer during boot which can be used to protect against
    a boot hang or other unexpected system boot issue. It is the responsibility of
    the user to disable the IPMI watchdog timer once the operating system has
    booted. Failure to disable the timer can result in an unexpected server reset
    or shutdown.
    
    \- Added new RBSU option to Omit Boot Device Event in TPM PCR[4] following
    EDK2. Warning: changing the setting will affect TPM measurements and can
    impact software functionality which utilizes the TPM PCR registers such as
    Microsoft BitLocker. PCR[4] is the register that records the process of
    attempting to boot different hardware paths like from a a hard drive or CD,
    and what boot devices are attempted, and the Initial Program Loader (IPL) code
    that is loaded and executed from the device. If boot from one device fails,
    measurements in PCR[4] record the attempt to boot the next device or boot
    path. If recording which device attempted to boot is omitted with this option
    (i.e. enable this option), the BIOS records the event type
    EV_OMIT_BOOT_DEVICE_EVENTS in PCR[4], otherwise the event is not recorded.
    
    \- Added an enhancement to existing processor current monitoring in order to
    avoid potential overcurrent shutdowns.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-29-2021" date="1629806400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    \- This revision of the System ROM includes the latest revision of the
    Tianocore Edk2 Code which provides mitigations for BIOS advisories and
    security vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and
    CVE-2021-28210. These security vulnerabilities are documented in Tianocore
    Edk2 CVE details site. These issues are not unique to HPE servers.
    
    \- Addressed an issue with Pensando Distributed Services Platform DSC-25
    Enterprise 10/25Gb 2-port SFP28 Card missing in pre-boot System Utilities
    System Information Page.
    
    \- Addressed an issue with hot-adding drives after removing them from Bay 1
    when using the HPE SR100i Software RAID solution for systems and the UBM4 2SFF
    backplane. In this situation the HDD cannot be detected after re-insertion.
    
    \- Addressed an issue with hot adding a NVMe drives with VMware ESXi when a
    drive bay is empty at boot up. Drive may fail to be added.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-29-2021" date="1636372800">-     \- Added a new BIOS/Platform Configuration (RBSU) option for Dynamic PCIe Rate
    Change. This option should be enabled for certain PCIe devices that change
    their advertised speed during training. The option is disabled by default, and
    should only be enabled if the system is configured with a device which is
    training at a less than advertised speed.
    
    \- Added a new BIOS/Platform Configuration (RBSU) option for MCTP Broadcast
    Support. This option is used to control the PCIe Management Component
    Transport Protocol (MCTP) support for a given slot. This option can be used to
    disable MCTP support to a given PCIe endpoint that may not properly support
    this protocol. It is recommended that this option remain enabled for full
    system functionality.
    
    \- Added support for reporting CPU PPIN/Serial Number in SMBIOS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-29-2021" date="1636459200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    \- This revision of the System ROM includes the latest revision of AMD
    security patch (AMD-SN-1021) which provides mitigations for BIOS advisories
    and security vulnerabilities documented as CVE-2020-12954, CVE-2020-12961,
    CVE-2021-26331, CVE-2021-26335, CVE-2021-26315, CVE-2020-12946,
    CVE-2020-12951. CVE-2021-26336, CVE-2021-26337, CVE-2021-26338,
    CVE-2021-26320, CVE-2020-12944, CVE-2020-12988, CVE-2021-26329,
    CVE-2021-26330, CVE-2021-26321, CVE-2021-26323, CVE-2021-26325,
    CVE-2021-26326, CVE-2021-26322, CVE-2021-26327, and CVE-2021-26312. These
    issues are not unique to HPE servers.
    
    \- This revision of the System ROM includes the latest revision of AMD
    security patch (AMD-SN-1007) which provides mitigation for AMD vulnerability
    with PSP Code Execution documented by AMD. This issue is not unique to HPE
    servers.
    
    \- Addressed an issue where in the OS does not display the true CPU Max Core
    Frequency.
    
    \- Addressed an issue where the system would encounter an unexpected long
    pause during early POST during a warm boot.
    
    \- Addressed an issue where BootMode and UefiOptimizedBoot settings are not
    accessible through Redfish on class 3 systems.
    
    \- Addressed an issue where the controller's name is missing in BIOS/Platform
    Configuration (RBSU) and One Time Boot Menu if HPE SR416i-a x16 Lanes 4GB
    Cache NVMe/SAS 24G Gen10 Plus Controller or HPE SR932i-p x32 Lanes 8GB Wide
    Cache NVMe/SAS 24G PCIe4 x16 Gen10 Plus Controller is installed.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_12-03-2021" date="1639483200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    \- Addressed an issue that can result in Corrected Memory Error Threshold
    Events being logged to the Integrated Management Log (IML) incorrectly. The
    system monitors corrected memory errors and notifies the user via a Corrected
    Memory Error Threshold Event when action is recommended due to an increased
    risk of an uncorrected memory error. Previous versions of the System ROM may
    log a Corrected Memory Error Threshold Event in cases where the system is not
    at an increased risk of an uncorrected memory error. It is strongly
    recommended that the System ROM be updated to this version or later before
    replacing DIMMs due to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_02-10-2022" date="1642248000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Correctable Memory Error Threshold
    Events on DIMM slots 9/10/13/14/15/16 with AMD EPYC 7773/7573/7473/7373 CPU
    SKUs not being reported in the IML (Integrated Management Log).
    
    Addressed an issue where RAID volumes will be lost when using the "Restore
    Default Manufacturing Settings" feature.
    
    Addressed an issue where if the Administrator Password and Power-On Password
    are set, after clearing power-on password, Administrator Password is also
    cleared.
    
    Addressed and issue where a system with Microsoft BitLocker enabled may
    incorrectly and intermittently prompt the user to unlock drives after a
    graceful OS reboot.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="8b10709d1ea4c1fa93d64c3b3303076db590f6901fab9a8be7e30a062727cd0b" name="firmware-system-u30" arch="x86_64">
    <version epoch="0" ver="2.62_2022_03_08" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.42_01-23-2021" date="1612267200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides a fix for a potential machine check exception under
    heavy stress with short loops of instructions. This may result in a machine
    check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in
    the Integrated Management Log (IML). The Intel microcode patches included in
    this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID
    50657). This issue only impacts 2nd generation Intel Xeon Scalable Performance
    processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides a fix for a potential machine check exception when
    high levels of posted interrupt traffic occurs on PCIe. This may result in a
    machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in
    the Integrated Management Log (IML). The Intel microcode patches included in
    this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656)
    and 0x05003005 (CPUID 50657). As part of this change, a new BIOS/Platform
    Configuration (RBSU) option in Advanced Performance Options has been added to
    allow a customer to disable this mitigation. This issue is not unique to HPE
    servers.
    
    Addressed an extremely rare issue where the Real Time Clock may become
    corrupted on a server boot. This was typically seen as an unexpected change to
    the RTC Year field but could impact other parts of the Date and Time. This
    issue is not unique to HPE servers.
    
    Addressed an issue where the Extended Memory Test is not run when configured
    in BIOS/Platform Configuration (RBSU) to Enabled. Note that this option is
    Disabled by default. This issue was introduced in the v2.40 revision of the
    System ROM.
    
    Addressed an issue where the server system fans may run higher than
    anticipated when a server is configured with AHCI SATA drives.
    
    Addressed an issue where a bad LRDIMM memory device could be mapped out but
    was not properly reported in the Integrated Memory Log (IML). This issue only
    impacted systems configured with LRDIMMs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623067200">-     Added a new BIOS/Platform Configuration (RBSU) option to Server Availability
    called IPMI Watchdog Timer. When enabled, the system will start an IPMI based
    watchdog timer during boot which can be used to protect against a boot hang or
    other unexpected system boot issue. It is the responsibility of the user to
    disable the IPMI watchdog timer once the operating system has booted. Failure
    to disable the timer can result in an unexpected server reset or shutdown.
    
    Added a new BIOS/Platform Configuration (RBSU) option to Server Security
    called UEFI Variable Access Firmware Control. This option, when enabled, can
    be used to block UEFI Variable writes, such as to the UEFI Boot Order, from
    the Operating System or a third-party utility. HPE recommends leaving this
    capability disabled unless the user specifically wants to prevent the
    operating system's normal operation of writing to UEFI Variables, which
    typically occur during OS install.
    
    Updated the BIOS TPM 1.2 support for Windows 2022.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623153600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance. HPE recommends that customers using
    Intel Optane Persistent Memory update to this version of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system may experience an Unexpected Shutdown or a
    Bank 4 or a Bank 6 Machine Check with Intel Optane DC Persistent Memory
    installed and configured for Memory Mode (2LM) or Mixed Mode. This issue only
    impacts systems configured with Intel Optane DC Persistent Memory in one of
    these modes. HPE recommends updating to this version of the System ROM for any
    customer using Intel Optane DC Persistent Memory in Memory Mode (2LM) or Mixed
    Mode. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2020-24511. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-464. The Intel microcode patches included in this
    release are version 0x02006B06 (CPUID 50654) and 0x05003103 (CPUID 50567).
    These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2020-12358, CVE-2020-12360, and
    CVE-2020-24486. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00463. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which address various functional issues documented in the Intel
    Technical Specification update. These issues are documented as the EIBRS
    Guest/Host and REP MOVS* MCE on Memory Not Access Issue. These issues are not
    unique to HPE servers.
    
    Addressed an issue where the server may become unresponsive during POST or
    take an unexpected long time to complete POST when the RBSU Extended Memory
    Test option was enabled.
    
    Addressed an issue where the server was allowed to boot when mixed SKUs of
    Intel Xeon Scalable Processors are installed. The server should display an
    error message and halt boot in these configurations.
    
    Addressed an issue where the System ROM was logging a mismatched power supply
    condition with the latest version of the HPE Power Supplies. When this issue
    occurred, Dynamic Power Capping and High Efficiency Power Supply Mode were
    also disabled. To properly mitigate this issue, iLO Firmware version 2.50 or
    later is also needed.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1628683200">-     Added Custom time server PCI riser support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1628769600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the second port of HPE InfiniBand FDR/Ethernet
    10Gb/40Gb 2-port 544 FLR-QSFP Adapter shows "null string" in RBSU system
    information page.
    
    This revision of the System ROM includes the EDK2 patches which provides
    mitigations for BIOS advisories and security vulnerabilities documented as
    CVE-2019-14584, CVE-2021-28211 and CVE-2021-28210.
    
    Addressed an issue where the memory channel numbering is incorrect for
    Correctable Memory Errors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_09-03-2021" date="1632657600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Uncorrectable Memory Errors may be reported and
    logged to the Integrated Management Log (IML) with certain DIMMs installed and
    the RBSU "Extended Memory Test" option enabled after updating the System ROM
    to v2.50 or later. The "Extended Memory Test" option is disabled by default
    and this issue would only impact customers who had specifically configured
    this option to enabled. The reported Uncorrected Memory Errors were due to an
    issue with the impacted System ROM revisions and do NOT indicate an issue with
    the DIMMs themselves.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_10-28-2021" date="1636372800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2021-0157. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-0562. The Intel microcode patch included in this
    release is version 0x05003208 (CPUID 50567). These issues impacts 2nd
    Generation Intel Xeon Scalable Processors. They does NOT impact 1st Generation
    Intel Xeon Scalable Processors. These issues are not unique to HPE servers.
    
    Addressed an issue in which a server may fail to boot and experience a Machine
    Check Exception indicating "x64 Exception type 0x12: An uncorrectable machine
    check exception had occurred on CPU1" when a Fastcom SuperFSCC/4 PCIe card is
    installed.
    
    Addressed an issue where servers with an HPE NS204i-p OS Boot Device may
    shutdown and log a "System Overheating" error message in the Integrated
    Management Log (IML).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_11-24-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues
    are not unique to HPE servers.
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1647864000">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="739f252ca0c7cd32432ab71a0a6be69a353d01ea045f57a2fac37296546082a3" name="firmware-system-u31" arch="x86_64">
    <version epoch="0" ver="2.62_2022_03_08" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.42_01-23-2021" date="1612267200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides a fix for a potential machine check exception under
    heavy stress with short loops of instructions. This may result in a machine
    check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in
    the Integrated Management Log (IML). The Intel microcode patches included in
    this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID
    50657). This issue only impacts 2nd generation Intel Xeon Scalable Performance
    processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides a fix for a potential machine check exception when
    high levels of posted interrupt traffic occurs on PCIe. This may result in a
    machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in
    the Integrated Management Log (IML). The Intel microcode patches included in
    this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656)
    and 0x05003005 (CPUID 50657). As part of this change, a new BIOS/Platform
    Configuration (RBSU) option in Advanced Performance Options has been added to
    allow a customer to disable this mitigation. This issue is not unique to HPE
    servers.
    
    Addressed an extremely rare issue where the Real Time Clock may become
    corrupted on a server boot. This was typically seen as an unexpected change to
    the RTC Year field but could impact other parts of the Date and Time. This
    issue is not unique to HPE servers.
    
    Addressed an issue where the Extended Memory Test is not run when configured
    in BIOS/Platform Configuration (RBSU) to Enabled. Note that this option is
    Disabled by default. This issue was introduced in the v2.40 revision of the
    System ROM.
    
    Addressed an issue where the server system fans may run higher than
    anticipated when a server is configured with AHCI SATA drives.
    
    Addressed an issue where a bad LRDIMM memory device could be mapped out but
    was not properly reported in the Integrated Memory Log (IML). This issue only
    impacted systems configured with LRDIMMs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623067200">-     Added a new BIOS/Platform Configuration (RBSU) option to Server Availability
    called IPMI Watchdog Timer. When enabled, the system will start an IPMI based
    watchdog timer during boot which can be used to protect against a boot hang or
    other unexpected system boot issue. It is the responsibility of the user to
    disable the IPMI watchdog timer once the operating system has booted. Failure
    to disable the timer can result in an unexpected server reset or shutdown.
    
    Added a new BIOS/Platform Configuration (RBSU) option to Server Security
    called UEFI Variable Access Firmware Control. This option, when enabled, can
    be used to block UEFI Variable writes, such as to the UEFI Boot Order, from
    the Operating System or a third-party utility. HPE recommends leaving this
    capability disabled unless the user specifically wants to prevent the
    operating system's normal operation of writing to UEFI Variables, which
    typically occur during OS install.
    
    Updated the BIOS TPM 1.2 support for Windows 2022.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623153600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance. HPE recommends that customers using
    Intel Optane Persistent Memory update to this version of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system may experience an Unexpected Shutdown or a
    Bank 4 or a Bank 6 Machine Check with Intel Optane DC Persistent Memory
    installed and configured for Memory Mode (2LM) or Mixed Mode. This issue only
    impacts systems configured with Intel Optane DC Persistent Memory in one of
    these modes. HPE recommends updating to this version of the System ROM for any
    customer using Intel Optane DC Persistent Memory in Memory Mode (2LM) or Mixed
    Mode. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2020-24511. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-464. The Intel microcode patches included in this
    release are version 0x02006B06 (CPUID 50654) and 0x05003103 (CPUID 50567).
    These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2020-12358, CVE-2020-12360, and
    CVE-2020-24486. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00463. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which address various functional issues documented in the Intel
    Technical Specification update. These issues are documented as the EIBRS
    Guest/Host and REP MOVS* MCE on Memory Not Access Issue. These issues are not
    unique to HPE servers.
    
    Addressed an issue where the server may become unresponsive during POST or
    take an unexpected long time to complete POST when the RBSU Extended Memory
    Test option was enabled.
    
    Addressed an issue where the server was allowed to boot when mixed SKUs of
    Intel Xeon Scalable Processors are installed. The server should display an
    error message and halt boot in these configurations.
    
    Addressed an issue where the System ROM was logging a mismatched power supply
    condition with the latest version of the HPE Power Supplies. When this issue
    occurred, Dynamic Power Capping and High Efficiency Power Supply Mode were
    also disabled. To properly mitigate this issue, iLO Firmware version 2.50 or
    later is also needed.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1628683200">-     Added Custom time server PCI riser support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1628769600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the second port of HPE InfiniBand FDR/Ethernet
    10Gb/40Gb 2-port 544 FLR-QSFP Adapter shows "null string" in RBSU system
    information page.
    
    This revision of the System ROM includes the EDK2 patches which provides
    mitigations for BIOS advisories and security vulnerabilities documented as
    CVE-2019-14584, CVE-2021-28211 and CVE-2021-28210.
    
    Addressed an issue where the memory channel numbering is incorrect for
    Correctable Memory Errors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_09-03-2021" date="1632657600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Uncorrectable Memory Errors may be reported and
    logged to the Integrated Management Log (IML) with certain DIMMs installed and
    the RBSU "Extended Memory Test" option enabled after updating the System ROM
    to v2.50 or later. The "Extended Memory Test" option is disabled by default
    and this issue would only impact customers who had specifically configured
    this option to enabled. The reported Uncorrected Memory Errors were due to an
    issue with the impacted System ROM revisions and do NOT indicate an issue with
    the DIMMs themselves.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_10-28-2021" date="1636372800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2021-0157. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-0562. The Intel microcode patch included in this
    release is version 0x05003208 (CPUID 50567). These issues impacts 2nd
    Generation Intel Xeon Scalable Processors. They does NOT impact 1st Generation
    Intel Xeon Scalable Processors. These issues are not unique to HPE servers.
    
    Addressed an issue in which a server may fail to boot and experience a Machine
    Check Exception indicating "x64 Exception type 0x12: An uncorrectable machine
    check exception had occurred on CPU1" when a Fastcom SuperFSCC/4 PCIe card is
    installed.
    
    Addressed an issue where servers with an HPE NS204i-p OS Boot Device may
    shutdown and log a "System Overheating" error message in the Integrated
    Management Log (IML).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_11-24-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues
    are not unique to HPE servers.
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1647864000">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="48d291e1a1a72472b14d14957b6a2f2434b5c8173dcf5ee6ee5758d5a41249f1" name="firmware-system-u32" arch="x86_64">
    <version epoch="0" ver="2.62_2022_03_08" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623067200">-     Added a new BIOS/Platform Configuration (RBSU) option to Server Availability
    called IPMI Watchdog Timer. When enabled, the system will start an IPMI based
    watchdog timer during boot which can be used to protect against a boot hang or
    other unexpected system boot issue. It is the responsibility of the user to
    disable the IPMI watchdog timer once the operating system has booted. Failure
    to disable the timer can result in an unexpected server reset or shutdown.
    
    Added a new BIOS/Platform Configuration (RBSU) option to Server Security
    called UEFI Variable Access Firmware Control. This option, when enabled, can
    be used to block UEFI Variable writes, such as to the UEFI Boot Order, from
    the Operating System or a third-party utility. HPE recommends leaving this
    capability disabled unless the user specifically wants to prevent the
    operating system's normal operation of writing to UEFI Variables, which
    typically occur during OS install.
    
    Updated the BIOS TPM 1.2 support for Windows 2022.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623153600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance. HPE recommends that customers using
    Intel Optane Persistent Memory update to this version of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system may experience an Unexpected Shutdown or a
    Bank 4 or a Bank 6 Machine Check with Intel Optane DC Persistent Memory
    installed and configured for Memory Mode (2LM) or Mixed Mode. This issue only
    impacts systems configured with Intel Optane DC Persistent Memory in one of
    these modes. HPE recommends updating to this version of the System ROM for any
    customer using Intel Optane DC Persistent Memory in Memory Mode (2LM) or Mixed
    Mode. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2020-24511. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-464. The Intel microcode patches included in this
    release are version 0x02006B06 (CPUID 50654) and 0x05003103 (CPUID 50567).
    These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2020-12358, CVE-2020-12360, and
    CVE-2020-24486. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00463. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which address various functional issues documented in the Intel
    Technical Specification update. These issues are documented as the EIBRS
    Guest/Host and REP MOVS* MCE on Memory Not Access Issue. These issues are not
    unique to HPE servers.
    
    Addressed an issue where the server may become unresponsive during POST or
    take an unexpected long time to complete POST when the RBSU Extended Memory
    Test option was enabled.
    
    Addressed an issue where the server was allowed to boot when mixed SKUs of
    Intel Xeon Scalable Processors are installed. The server should display an
    error message and halt boot in these configurations.
    
    Addressed an issue where the System ROM was logging a mismatched power supply
    condition with the latest version of the HPE Power Supplies. When this issue
    occurred, Dynamic Power Capping and High Efficiency Power Supply Mode were
    also disabled. To properly mitigate this issue, iLO Firmware version 2.50 or
    later is also needed.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1628683200">-     Added Custom time server PCI riser support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1628769600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the second port of HPE InfiniBand FDR/Ethernet
    10Gb/40Gb 2-port 544 FLR-QSFP Adapter shows "null string" in RBSU system
    information page.
    
    This revision of the System ROM includes the EDK2 patches which provides
    mitigations for BIOS advisories and security vulnerabilities documented as
    CVE-2019-14584, CVE-2021-28211 and CVE-2021-28210.
    
    Addressed an issue where the memory channel numbering is incorrect for
    Correctable Memory Errors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_09-03-2021" date="1632657600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Uncorrectable Memory Errors may be reported and
    logged to the Integrated Management Log (IML) with certain DIMMs installed and
    the RBSU "Extended Memory Test" option enabled after updating the System ROM
    to v2.50 or later. The "Extended Memory Test" option is disabled by default
    and this issue would only impact customers who had specifically configured
    this option to enabled. The reported Uncorrected Memory Errors were due to an
    issue with the impacted System ROM revisions and do NOT indicate an issue with
    the DIMMs themselves.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_09-03-2021-2.1" date="1634040000">-     *Important Notes:**
    
    The 2.54_09-03-2021(B) flash component contains the 2.54 ROM flash image. The
    previous flash component had an issue that caused system upgrade to version
    2.52 instead of version 2.54.  For any systems where the previous flash
    component was utilized, the system should be updated again with this flash
    component to properly install the version 2.54 System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Uncorrectable Memory Errors may be reported and
    logged to the Integrated Management Log (IML) with certain DIMMs installed and
    the RBSU "Extended Memory Test" option enabled after updating the System ROM
    to v2.50 or later. The "Extended Memory Test" option is disabled by default
    and this issue would only impact customers who had specifically configured
    this option to enabled. The reported Uncorrected Memory Errors were due to an
    issue with the impacted System ROM revisions and do NOT indicate an issue with
    the DIMMs themselves.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_10-28-2021" date="1636372800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2021-0157. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-0562. The Intel microcode patch included in this
    release is version 0x05003208 (CPUID 50567). These issues impacts 2nd
    Generation Intel Xeon Scalable Processors. They does NOT impact 1st Generation
    Intel Xeon Scalable Processors. These issues are not unique to HPE servers.
    
    Addressed an issue in which a server may fail to boot and experience a Machine
    Check Exception indicating "x64 Exception type 0x12: An uncorrectable machine
    check exception had occurred on CPU1" when a Fastcom SuperFSCC/4 PCIe card is
    installed.
    
    Addressed an issue where servers with an HPE NS204i-p OS Boot Device may
    shutdown and log a "System Overheating" error message in the Integrated
    Management Log (IML).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_11-24-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues
    are not unique to HPE servers.
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1647864000">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="1f7a4b531eaa0026890aae047aa3e942493c3a1070b6fb5e2b85bf6a4c9571b5" name="firmware-system-u33" arch="x86_64">
    <version epoch="0" ver="2.62_2022_03_08" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.42_01-23-2021" date="1612267200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides a fix for a potential machine check exception under
    heavy stress with short loops of instructions. This may result in a machine
    check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in
    the Integrated Management Log (IML). The Intel microcode patches included in
    this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID
    50657). This issue only impacts 2nd generation Intel Xeon Scalable Performance
    processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides a fix for a potential machine check exception when
    high levels of posted interrupt traffic occurs on PCIe. This may result in a
    machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in
    the Integrated Management Log (IML). The Intel microcode patches included in
    this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656)
    and 0x05003005 (CPUID 50657). As part of this change, a new BIOS/Platform
    Configuration (RBSU) option in Advanced Performance Options has been added to
    allow a customer to disable this mitigation. This issue is not unique to HPE
    servers.
    
    Addressed an extremely rare issue where the Real Time Clock may become
    corrupted on a server boot. This was typically seen as an unexpected change to
    the RTC Year field but could impact other parts of the Date and Time. This
    issue is not unique to HPE servers.
    
    Addressed an issue where the Extended Memory Test is not run when configured
    in BIOS/Platform Configuration (RBSU) to Enabled. Note that this option is
    Disabled by default. This issue was introduced in the v2.40 revision of the
    System ROM.
    
    Addressed an issue where the server system fans may run higher than
    anticipated when a server is configured with AHCI SATA drives.
    
    Addressed an issue where a bad LRDIMM memory device could be mapped out but
    was not properly reported in the Integrated Memory Log (IML). This issue only
    impacted systems configured with LRDIMMs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623067200">-     Added a new BIOS/Platform Configuration (RBSU) option to Server Availability
    called IPMI Watchdog Timer. When enabled, the system will start an IPMI based
    watchdog timer during boot which can be used to protect against a boot hang or
    other unexpected system boot issue. It is the responsibility of the user to
    disable the IPMI watchdog timer once the operating system has booted. Failure
    to disable the timer can result in an unexpected server reset or shutdown.
    
    Added a new BIOS/Platform Configuration (RBSU) option to Server Security
    called UEFI Variable Access Firmware Control. This option, when enabled, can
    be used to block UEFI Variable writes, such as to the UEFI Boot Order, from
    the Operating System or a third-party utility. HPE recommends leaving this
    capability disabled unless the user specifically wants to prevent the
    operating system's normal operation of writing to UEFI Variables, which
    typically occur during OS install.
    
    Updated the BIOS TPM 1.2 support for Windows 2022.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623153600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance. HPE recommends that customers using
    Intel Optane Persistent Memory update to this version of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system may experience an Unexpected Shutdown or a
    Bank 4 or a Bank 6 Machine Check with Intel Optane DC Persistent Memory
    installed and configured for Memory Mode (2LM) or Mixed Mode. This issue only
    impacts systems configured with Intel Optane DC Persistent Memory in one of
    these modes. HPE recommends updating to this version of the System ROM for any
    customer using Intel Optane DC Persistent Memory in Memory Mode (2LM) or Mixed
    Mode. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2020-24511. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-464. The Intel microcode patches included in this
    release are version 0x02006B06 (CPUID 50654) and 0x05003103 (CPUID 50567).
    These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2020-12358, CVE-2020-12360, and
    CVE-2020-24486. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00463. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which address various functional issues documented in the Intel
    Technical Specification update. These issues are documented as the EIBRS
    Guest/Host and REP MOVS* MCE on Memory Not Access Issue. These issues are not
    unique to HPE servers.
    
    Addressed an issue where the server may become unresponsive during POST or
    take an unexpected long time to complete POST when the RBSU Extended Memory
    Test option was enabled.
    
    Addressed an issue where the server was allowed to boot when mixed SKUs of
    Intel Xeon Scalable Processors are installed. The server should display an
    error message and halt boot in these configurations.
    
    Addressed an issue where the System ROM was logging a mismatched power supply
    condition with the latest version of the HPE Power Supplies. When this issue
    occurred, Dynamic Power Capping and High Efficiency Power Supply Mode were
    also disabled. To properly mitigate this issue, iLO Firmware version 2.50 or
    later is also needed.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1628683200">-     Added Custom time server PCI riser support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1628769600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the second port of HPE InfiniBand FDR/Ethernet
    10Gb/40Gb 2-port 544 FLR-QSFP Adapter shows "null string" in RBSU system
    information page.
    
    This revision of the System ROM includes the EDK2 patches which provides
    mitigations for BIOS advisories and security vulnerabilities documented as
    CVE-2019-14584, CVE-2021-28211 and CVE-2021-28210.
    
    Addressed an issue where the memory channel numbering is incorrect for
    Correctable Memory Errors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_09-03-2021" date="1632657600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Uncorrectable Memory Errors may be reported and
    logged to the Integrated Management Log (IML) with certain DIMMs installed and
    the RBSU "Extended Memory Test" option enabled after updating the System ROM
    to v2.50 or later. The "Extended Memory Test" option is disabled by default
    and this issue would only impact customers who had specifically configured
    this option to enabled. The reported Uncorrected Memory Errors were due to an
    issue with the impacted System ROM revisions and do NOT indicate an issue with
    the DIMMs themselves.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_10-28-2021" date="1636372800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2021-0157. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-0562. The Intel microcode patch included in this
    release is version 0x05003208 (CPUID 50567). These issues impacts 2nd
    Generation Intel Xeon Scalable Processors. They does NOT impact 1st Generation
    Intel Xeon Scalable Processors. These issues are not unique to HPE servers.
    
    Addressed an issue in which a server may fail to boot and experience a Machine
    Check Exception indicating "x64 Exception type 0x12: An uncorrectable machine
    check exception had occurred on CPU1" when a Fastcom SuperFSCC/4 PCIe card is
    installed.
    
    Addressed an issue where servers with an HPE NS204i-p OS Boot Device may
    shutdown and log a "System Overheating" error message in the Integrated
    Management Log (IML).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_11-24-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues
    are not unique to HPE servers.
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1649073600">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="0f86c42024c3cb61d67603720f727ca8f23d0c789e4e7357d1a9325976cf67a2" name="firmware-system-u34" arch="x86_64">
    <version epoch="0" ver="2.62_2022_03_08" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.42_01-23-2021" date="1612267200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides a fix for a potential machine check exception under
    heavy stress with short loops of instructions. This may result in a machine
    check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in
    the Integrated Management Log (IML). The Intel microcode patches included in
    this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID
    50657). This issue only impacts 2nd generation Intel Xeon Scalable Performance
    processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides a fix for a potential machine check exception when
    high levels of posted interrupt traffic occurs on PCIe. This may result in a
    machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in
    the Integrated Management Log (IML). The Intel microcode patches included in
    this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656)
    and 0x05003005 (CPUID 50657). As part of this change, a new BIOS/Platform
    Configuration (RBSU) option in Advanced Performance Options has been added to
    allow a customer to disable this mitigation. This issue is not unique to HPE
    servers.
    
    Addressed an extremely rare issue where the Real Time Clock may become
    corrupted on a server boot. This was typically seen as an unexpected change to
    the RTC Year field but could impact other parts of the Date and Time. This
    issue is not unique to HPE servers.
    
    Addressed an issue where the Extended Memory Test is not run when configured
    in BIOS/Platform Configuration (RBSU) to Enabled. Note that this option is
    Disabled by default. This issue was introduced in the v2.40 revision of the
    System ROM.
    
    Addressed an issue where the server system fans may run higher than
    anticipated when a server is configured with AHCI SATA drives.
    
    Addressed an issue where a bad LRDIMM memory device could be mapped out but
    was not properly reported in the Integrated Memory Log (IML). This issue only
    impacted systems configured with LRDIMMs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623067200">-     Added a new BIOS/Platform Configuration (RBSU) option to Server Availability
    called IPMI Watchdog Timer. When enabled, the system will start an IPMI based
    watchdog timer during boot which can be used to protect against a boot hang or
    other unexpected system boot issue. It is the responsibility of the user to
    disable the IPMI watchdog timer once the operating system has booted. Failure
    to disable the timer can result in an unexpected server reset or shutdown.
    
    Added a new BIOS/Platform Configuration (RBSU) option to Server Security
    called UEFI Variable Access Firmware Control. This option, when enabled, can
    be used to block UEFI Variable writes, such as to the UEFI Boot Order, from
    the Operating System or a third-party utility. HPE recommends leaving this
    capability disabled unless the user specifically wants to prevent the
    operating system's normal operation of writing to UEFI Variables, which
    typically occur during OS install.
    
    Updated the BIOS TPM 1.2 support for Windows 2022.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623153600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance. HPE recommends that customers using
    Intel Optane Persistent Memory update to this version of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system may experience an Unexpected Shutdown or a
    Bank 4 or a Bank 6 Machine Check with Intel Optane DC Persistent Memory
    installed and configured for Memory Mode (2LM) or Mixed Mode. This issue only
    impacts systems configured with Intel Optane DC Persistent Memory in one of
    these modes. HPE recommends updating to this version of the System ROM for any
    customer using Intel Optane DC Persistent Memory in Memory Mode (2LM) or Mixed
    Mode. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2020-24511. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-464. The Intel microcode patches included in this
    release are version 0x02006B06 (CPUID 50654) and 0x05003103 (CPUID 50567).
    These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2020-12358, CVE-2020-12360, and
    CVE-2020-24486. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00463. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which address various functional issues documented in the Intel
    Technical Specification update. These issues are documented as the EIBRS
    Guest/Host and REP MOVS* MCE on Memory Not Access Issue. These issues are not
    unique to HPE servers.
    
    Addressed an issue where the server may become unresponsive during POST or
    take an unexpected long time to complete POST when the RBSU Extended Memory
    Test option was enabled.
    
    Addressed an issue where the server was allowed to boot when mixed SKUs of
    Intel Xeon Scalable Processors are installed. The server should display an
    error message and halt boot in these configurations.
    
    Addressed an issue where the System ROM was logging a mismatched power supply
    condition with the latest version of the HPE Power Supplies. When this issue
    occurred, Dynamic Power Capping and High Efficiency Power Supply Mode were
    also disabled. To properly mitigate this issue, iLO Firmware version 2.50 or
    later is also needed.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1628683200">-     Added Custom time server PCI riser support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1628769600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the second port of HPE InfiniBand FDR/Ethernet
    10Gb/40Gb 2-port 544 FLR-QSFP Adapter shows "null string" in RBSU system
    information page.
    
    This revision of the System ROM includes the EDK2 patches which provides
    mitigations for BIOS advisories and security vulnerabilities documented as
    CVE-2019-14584, CVE-2021-28211 and CVE-2021-28210.
    
    Addressed an issue where the memory channel numbering is incorrect for
    Correctable Memory Errors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_09-03-2021" date="1632657600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Uncorrectable Memory Errors may be reported and
    logged to the Integrated Management Log (IML) with certain DIMMs installed and
    the RBSU "Extended Memory Test" option enabled after updating the System ROM
    to v2.50 or later. The "Extended Memory Test" option is disabled by default
    and this issue would only impact customers who had specifically configured
    this option to enabled. The reported Uncorrected Memory Errors were due to an
    issue with the impacted System ROM revisions and do NOT indicate an issue with
    the DIMMs themselves.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_10-28-2021" date="1636372800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2021-0157. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-0562. The Intel microcode patch included in this
    release is version 0x05003208 (CPUID 50567). These issues impacts 2nd
    Generation Intel Xeon Scalable Processors. They does NOT impact 1st Generation
    Intel Xeon Scalable Processors. These issues are not unique to HPE servers.
    
    Addressed an issue in which a server may fail to boot and experience a Machine
    Check Exception indicating "x64 Exception type 0x12: An uncorrectable machine
    check exception had occurred on CPU1" when a Fastcom SuperFSCC/4 PCIe card is
    installed.
    
    Addressed an issue where servers with an HPE NS204i-p OS Boot Device may
    shutdown and log a "System Overheating" error message in the Integrated
    Management Log (IML).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_11-24-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues
    are not unique to HPE servers.
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1647864000">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="80db2113e6ad9d3f3d36ecaae57641999a18fe6095e7ae3ea16ceff612b929fc" name="firmware-system-u37" arch="x86_64">
    <version epoch="0" ver="2.62_2022_03_08" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.42_01-23-2021" date="1612267200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides a fix for a potential machine check exception under
    heavy stress with short loops of instructions. This may result in a machine
    check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in
    the Integrated Management Log (IML). The Intel microcode patches included in
    this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID
    50657). This issue only impacts 2nd generation Intel Xeon Scalable Performance
    processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides a fix for a potential machine check exception when
    high levels of posted interrupt traffic occurs on PCIe. This may result in a
    machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in
    the Integrated Management Log (IML). The Intel microcode patches included in
    this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656)
    and 0x05003005 (CPUID 50657). As part of this change, a new BIOS/Platform
    Configuration (RBSU) option in Advanced Performance Options has been added to
    allow a customer to disable this mitigation. This issue is not unique to HPE
    servers.
    
    Addressed an extremely rare issue where the Real Time Clock may become
    corrupted on a server boot. This was typically seen as an unexpected change to
    the RTC Year field but could impact other parts of the Date and Time. This
    issue is not unique to HPE servers.
    
    Addressed an issue where the Extended Memory Test is not run when configured
    in BIOS/Platform Configuration (RBSU) to Enabled. Note that this option is
    Disabled by default. This issue was introduced in the v2.40 revision of the
    System ROM.
    
    Addressed an issue where the server system fans may run higher than
    anticipated when a server is configured with AHCI SATA drives.
    
    Addressed an issue where a bad LRDIMM memory device could be mapped out but
    was not properly reported in the Integrated Memory Log (IML). This issue only
    impacted systems configured with LRDIMMs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623067200">-     Added a new BIOS/Platform Configuration (RBSU) option to Server Availability
    called IPMI Watchdog Timer. When enabled, the system will start an IPMI based
    watchdog timer during boot which can be used to protect against a boot hang or
    other unexpected system boot issue. It is the responsibility of the user to
    disable the IPMI watchdog timer once the operating system has booted. Failure
    to disable the timer can result in an unexpected server reset or shutdown.
    
    Added a new BIOS/Platform Configuration (RBSU) option to Server Security
    called UEFI Variable Access Firmware Control. This option, when enabled, can
    be used to block UEFI Variable writes, such as to the UEFI Boot Order, from
    the Operating System or a third-party utility. HPE recommends leaving this
    capability disabled unless the user specifically wants to prevent the
    operating system's normal operation of writing to UEFI Variables, which
    typically occur during OS install.
    
    Updated the BIOS TPM 1.2 support for Windows 2022.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623153600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance.
    
    HPE recommends that customers using Intel Optane Persistent Memory update to
    this version of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system may experience an Unexpected Shutdown or a
    Bank 4 or a Bank 6 Machine Check with Intel Optane DC Persistent Memory
    installed and configured for Memory Mode (2LM) or Mixed Mode. This issue only
    impacts systems configured with Intel Optane DC Persistent Memory in one of
    these modes. HPE recommends updating to this version of the System ROM for any
    customer using Intel Optane DC Persistent Memory in Memory Mode (2LM) or Mixed
    Mode. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2020-24511. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-464. The Intel microcode patches included in this
    release are version 0x02006B06 (CPUID 50654) and 0x05003103 (CPUID 50567).
    These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2020-12358, CVE-2020-12360, and
    CVE-2020-24486. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00463. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which address various functional issues documented in the Intel
    Technical Specification update. These issues are documented as the EIBRS
    Guest/Host and REP MOVS* MCE on Memory Not Access Issue. These issues are not
    unique to HPE servers.
    
    Addressed an issue where the server may become unresponsive during POST or
    take an unexpected long time to complete POST when the RBSU Extended Memory
    Test option was enabled.
    
    Addressed an issue where the server was allowed to boot when mixed SKUs of
    Intel Xeon Scalable Processors are installed. The server should display an
    error message and halt boot in these configurations.
    
    Addressed an issue where the System ROM was logging a mismatched power supply
    condition with the latest version of the HPE Power Supplies. When this issue
    occurred, Dynamic Power Capping and High Efficiency Power Supply Mode were
    also disabled. To properly mitigate this issue, iLO Firmware version 2.50 or
    later is also needed.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1629720000">-     Added Custom time server PCI riser support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1629806400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the second port of HPE InfiniBand FDR/Ethernet
    10Gb/40Gb 2-port 544 FLR-QSFP Adapter shows "null string" in RBSU system
    information page.
    
    This revision of the System ROM includes the EDK2 patches which provides
    mitigations for BIOS advisories and security vulnerabilities documented as
    CVE-2019-14584, CVE-2021-28211 and CVE-2021-28210.
    
    Addressed an issue where the memory channel numbering is incorrect for
    Correctable Memory Errors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_09-03-2021" date="1632830400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Uncorrectable Memory Errors may be reported and
    logged to the Integrated Management Log (IML) with certain DIMMs installed and
    the RBSU "Extended Memory Test" option enabled after updating the System ROM
    to v2.50 or later. The "Extended Memory Test" option is disabled by default
    and this issue would only impact customers who had specifically configured
    this option to enabled. The reported Uncorrected Memory Errors were due to an
    issue with the impacted System ROM revisions and do NOT indicate an issue with
    the DIMMs themselves.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_10-28-2021" date="1636372800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2021-0157. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-0562. The Intel microcode patch included in this
    release is version 0x05003208 (CPUID 50567). These issues impacts 2nd
    Generation Intel Xeon Scalable Processors. They does NOT impact 1st Generation
    Intel Xeon Scalable Processors. These issues are not unique to HPE servers.
    
    Addressed an issue in which a server may fail to boot and experience a Machine
    Check Exception indicating "x64 Exception type 0x12: An uncorrectable machine
    check exception had occurred on CPU1" when a Fastcom SuperFSCC/4 PCIe card is
    installed.
    
    Addressed an issue where servers with an HPE NS204i-p OS Boot Device may
    shutdown and log a "System Overheating" error message in the Integrated
    Management Log (IML).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_11-24-2021" date="1639483200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092. These issues are not unique to HPE servers.
    CVE-2021-0093, CVE-2021-0144
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the IPMI Watchdog Timer stops after a cold boot with
    IPMI watch dog timer enabled in RBSU
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1647950400">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="5670a086261e5985a93d5cbbfd3e875d9eef0e11b91e8bcb869c7991d2c3506e" name="firmware-system-u38" arch="x86_64">
    <version epoch="0" ver="2.62_2022_03_08" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623067200">-     Added a new BIOS/Platform Configuration (RBSU) option to Server Availability
    called IPMI Watchdog Timer. When enabled, the system will start an IPMI based
    watchdog timer during boot which can be used to protect against a boot hang or
    other unexpected system boot issue. It is the responsibility of the user to
    disable the IPMI watchdog timer once the operating system has booted. Failure
    to disable the timer can result in an unexpected server reset or shutdown.
    
    Added a new BIOS/Platform Configuration (RBSU) option to Server Security
    called UEFI Variable Access Firmware Control. This option, when enabled, can
    be used to block UEFI Variable writes, such as to the UEFI Boot Order, from
    the Operating System or a third-party utility. HPE recommends leaving this
    capability disabled unless the user specifically wants to prevent the
    operating system's normal operation of writing to UEFI Variables, which
    typically occur during OS install.
    
    Updated the BIOS TPM 1.2 support for Windows 2022.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623153600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance.
    
    HPE recommends that customers using Intel Optane Persistent Memory update to
    this version of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system may experience an Unexpected Shutdown or a
    Bank 4 or a Bank 6 Machine Check with Intel Optane DC Persistent Memory
    installed and configured for Memory Mode (2LM) or Mixed Mode. This issue only
    impacts systems configured with Intel Optane DC Persistent Memory in one of
    these modes. HPE recommends updating to this version of the System ROM for any
    customer using Intel Optane DC Persistent Memory in Memory Mode (2LM) or Mixed
    Mode. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2020-24511. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-464. The Intel microcode patches included in this
    release are version 0x02006B06 (CPUID 50654) and 0x05003103 (CPUID 50567).
    These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2020-12358, CVE-2020-12360, and
    CVE-2020-24486. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00463. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which address various functional issues documented in the Intel
    Technical Specification update. These issues are documented as the EIBRS
    Guest/Host and REP MOVS* MCE on Memory Not Access Issue. These issues are not
    unique to HPE servers.
    
    Addressed an issue where the server may become unresponsive during POST or
    take an unexpected long time to complete POST when the RBSU Extended Memory
    Test option was enabled.
    
    Addressed an issue where the server was allowed to boot when mixed SKUs of
    Intel Xeon Scalable Processors are installed. The server should display an
    error message and halt boot in these configurations.
    
    Addressed an issue where the System ROM was logging a mismatched power supply
    condition with the latest version of the HPE Power Supplies. When this issue
    occurred, Dynamic Power Capping and High Efficiency Power Supply Mode were
    also disabled. To properly mitigate this issue, iLO Firmware version 2.50 or
    later is also needed.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1629720000">-     Added Custom time server PCI riser support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1629806400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the second port of HPE InfiniBand FDR/Ethernet
    10Gb/40Gb 2-port 544 FLR-QSFP Adapter shows "null string" in RBSU system
    information page.
    
    This revision of the System ROM includes the EDK2 patches which provides
    mitigations for BIOS advisories and security vulnerabilities documented as
    CVE-2019-14584, CVE-2021-28211 and CVE-2021-28210.
    
    Addressed an issue where the memory channel numbering is incorrect for
    Correctable Memory Errors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_09-03-2021" date="1632830400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Uncorrectable Memory Errors may be reported and
    logged to the Integrated Management Log (IML) with certain DIMMs installed and
    the RBSU "Extended Memory Test" option enabled after updating the System ROM
    to v2.50 or later. The "Extended Memory Test" option is disabled by default
    and this issue would only impact customers who had specifically configured
    this option to enabled. The reported Uncorrected Memory Errors were due to an
    issue with the impacted System ROM revisions and do NOT indicate an issue with
    the DIMMs themselves.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_10-28-2021" date="1636372800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2021-0157. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-0562. The Intel microcode patch included in this
    release is version 0x05003208 (CPUID 50567). These issues impacts 2nd
    Generation Intel Xeon Scalable Processors. They does NOT impact 1st Generation
    Intel Xeon Scalable Processors. These issues are not unique to HPE servers.
    
    Addressed an issue in which a server may fail to boot and experience a Machine
    Check Exception indicating "x64 Exception type 0x12: An uncorrectable machine
    check exception had occurred on CPU1" when a Fastcom SuperFSCC/4 PCIe card is
    installed.
    
    Addressed an issue where servers with an HPE NS204i-p OS Boot Device may
    shutdown and log a "System Overheating" error message in the Integrated
    Management Log (IML).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_11-24-2021" date="1639483200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_11-24-2021-2.1" date="1643371200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092. These issues are not unique to HPE servers.
    CVE-2021-0093, CVE-2021-0144
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the IPMI Watchdog Timer stops after a cold boot with
    IPMI watch dog timer enabled in RBSU
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1647950400">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="92834c4f07723d5dbc27e61ed2c2c5b05feca08081f9e64cb8ac129182c151a9" name="firmware-system-u39" arch="x86_64">
    <version epoch="0" ver="2.62_2022_03_08" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.42_01-23-2021" date="1612267200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides a fix for a potential machine check exception under
    heavy stress with short loops of instructions. This may result in a machine
    check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in
    the Integrated Management Log (IML). The Intel microcode patches included in
    this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID
    50657). This issue only impacts 2nd generation Intel Xeon Scalable Performance
    processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides a fix for a potential machine check exception when
    high levels of posted interrupt traffic occurs on PCIe. This may result in a
    machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in
    the Integrated Management Log (IML). The Intel microcode patches included in
    this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656)
    and 0x05003005 (CPUID 50657). As part of this change, a new BIOS/Platform
    Configuration (RBSU) option in Advanced Performance Options has been added to
    allow a customer to disable this mitigation. This issue is not unique to HPE
    servers.
    
    Addressed an extremely rare issue where the Real Time Clock may become
    corrupted on a server boot. This was typically seen as an unexpected change to
    the RTC Year field but could impact other parts of the Date and Time. This
    issue is not unique to HPE servers.
    
    Addressed an issue where the Extended Memory Test is not run when configured
    in BIOS/Platform Configuration (RBSU) to Enabled. Note that this option is
    Disabled by default. This issue was introduced in the v2.40 revision of the
    System ROM.
    
    Addressed an issue where the server system fans may run higher than
    anticipated when a server is configured with AHCI SATA drives.
    
    Addressed an issue where a bad LRDIMM memory device could be mapped out but
    was not properly reported in the Integrated Memory Log (IML). This issue only
    impacted systems configured with LRDIMMs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623067200">-     Added a new BIOS/Platform Configuration (RBSU) option to Server Availability
    called IPMI Watchdog Timer. When enabled, the system will start an IPMI based
    watchdog timer during boot which can be used to protect against a boot hang or
    other unexpected system boot issue. It is the responsibility of the user to
    disable the IPMI watchdog timer once the operating system has booted. Failure
    to disable the timer can result in an unexpected server reset or shutdown.
    
    Added a new BIOS/Platform Configuration (RBSU) option to Server Security
    called UEFI Variable Access Firmware Control. This option, when enabled, can
    be used to block UEFI Variable writes, such as to the UEFI Boot Order, from
    the Operating System or a third-party utility. HPE recommends leaving this
    capability disabled unless the user specifically wants to prevent the
    operating system's normal operation of writing to UEFI Variables, which
    typically occur during OS install.
    
    Updated the BIOS TPM 1.2 support for Windows 2022.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623153600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance. HPE recommends that customers using
    Intel Optane Persistent Memory update to this version of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system may experience an Unexpected Shutdown or a
    Bank 4 or a Bank 6 Machine Check with Intel Optane DC Persistent Memory
    installed and configured for Memory Mode (2LM) or Mixed Mode. This issue only
    impacts systems configured with Intel Optane DC Persistent Memory in one of
    these modes. HPE recommends updating to this version of the System ROM for any
    customer using Intel Optane DC Persistent Memory in Memory Mode (2LM) or Mixed
    Mode. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2020-24511. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-464. The Intel microcode patches included in this
    release are version 0x02006B06 (CPUID 50654) and 0x05003103 (CPUID 50567).
    These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2020-12358, CVE-2020-12360, and
    CVE-2020-24486. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00463. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which address various functional issues documented in the Intel
    Technical Specification update. These issues are documented as the EIBRS
    Guest/Host and REP MOVS* MCE on Memory Not Access Issue. These issues are not
    unique to HPE servers.
    
    Addressed an issue where the server may become unresponsive during POST or
    take an unexpected long time to complete POST when the RBSU Extended Memory
    Test option was enabled.
    
    Addressed an issue where the server was allowed to boot when mixed SKUs of
    Intel Xeon Scalable Processors are installed. The server should display an
    error message and halt boot in these configurations.
    
    Addressed an issue where the System ROM was logging a mismatched power supply
    condition with the latest version of the HPE Power Supplies. When this issue
    occurred, Dynamic Power Capping and High Efficiency Power Supply Mode were
    also disabled. To properly mitigate this issue, iLO Firmware version 2.50 or
    later is also needed.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1628683200">-     Added Custom time server PCI riser support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1628769600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the second port of HPE InfiniBand FDR/Ethernet
    10Gb/40Gb 2-port 544 FLR-QSFP Adapter shows "null string" in RBSU system
    information page.
    
    This revision of the System ROM includes the EDK2 patches which provides
    mitigations for BIOS advisories and security vulnerabilities documented as
    CVE-2019-14584, CVE-2021-28211 and CVE-2021-28210.
    
    Addressed an issue where the memory channel numbering is incorrect for
    Correctable Memory Errors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_09-03-2021" date="1632657600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Uncorrectable Memory Errors may be reported and
    logged to the Integrated Management Log (IML) with certain DIMMs installed and
    the RBSU "Extended Memory Test" option enabled after updating the System ROM
    to v2.50 or later. The "Extended Memory Test" option is disabled by default
    and this issue would only impact customers who had specifically configured
    this option to enabled. The reported Uncorrected Memory Errors were due to an
    issue with the impacted System ROM revisions and do NOT indicate an issue with
    the DIMMs themselves.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_10-28-2021" date="1636372800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2021-0157. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-0562. The Intel microcode patch included in this
    release is version 0x05003208 (CPUID 50567). These issues impacts 2nd
    Generation Intel Xeon Scalable Processors. They does NOT impact 1st Generation
    Intel Xeon Scalable Processors. These issues are not unique to HPE servers.
    
    Addressed an issue in which a server may fail to boot and experience a Machine
    Check Exception indicating "x64 Exception type 0x12: An uncorrectable machine
    check exception had occurred on CPU1" when a Fastcom SuperFSCC/4 PCIe card is
    installed.
    
    Addressed an issue where servers with an HPE NS204i-p OS Boot Device may
    shutdown and log a "System Overheating" error message in the Integrated
    Management Log (IML).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_11-24-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues
    are not unique to HPE servers.
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1649073600">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="2f42afef7abe7d0d7bbf2949d41b3a52b0dddb8ffe48aea0de76b5ce1efdd073" name="firmware-system-u40" arch="x86_64">
    <version epoch="0" ver="2.62_2022_03_08" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.42_01-23-2021" date="1612267200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides a fix for a potential machine check exception under
    heavy stress with short loops of instructions. This may result in a machine
    check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in
    the Integrated Management Log (IML). The Intel microcode patches included in
    this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID
    50657). This issue only impacts 2nd generation Intel Xeon Scalable Performance
    processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides a fix for a potential machine check exception when
    high levels of posted interrupt traffic occurs on PCIe. This may result in a
    machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in
    the Integrated Management Log (IML). The Intel microcode patches included in
    this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656)
    and 0x05003005 (CPUID 50657). As part of this change, a new BIOS/Platform
    Configuration (RBSU) option in Advanced Performance Options has been added to
    allow a customer to disable this mitigation. This issue is not unique to HPE
    servers.
    
    Addressed an extremely rare issue where the Real Time Clock may become
    corrupted on a server boot. This was typically seen as an unexpected change to
    the RTC Year field but could impact other parts of the Date and Time. This
    issue is not unique to HPE servers.
    
    Addressed an issue where the Extended Memory Test is not run when configured
    in BIOS/Platform Configuration (RBSU) to Enabled. Note that this option is
    Disabled by default. This issue was introduced in the v2.40 revision of the
    System ROM.
    
    Addressed an issue where the server system fans may run higher than
    anticipated when a server is configured with AHCI SATA drives.
    
    Addressed an issue where a bad LRDIMM memory device could be mapped out but
    was not properly reported in the Integrated Memory Log (IML). This issue only
    impacted systems configured with LRDIMMs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623067200">-     Added a new BIOS/Platform Configuration (RBSU) option to Server Availability
    called IPMI Watchdog Timer. When enabled, the system will start an IPMI based
    watchdog timer during boot which can be used to protect against a boot hang or
    other unexpected system boot issue. It is the responsibility of the user to
    disable the IPMI watchdog timer once the operating system has booted. Failure
    to disable the timer can result in an unexpected server reset or shutdown.
    
    Added a new BIOS/Platform Configuration (RBSU) option to Server Security
    called UEFI Variable Access Firmware Control. This option, when enabled, can
    be used to block UEFI Variable writes, such as to the UEFI Boot Order, from
    the Operating System or a third-party utility. HPE recommends leaving this
    capability disabled unless the user specifically wants to prevent the
    operating system's normal operation of writing to UEFI Variables, which
    typically occur during OS install.
    
    Updated the BIOS TPM 1.2 support for Windows 2022.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623153600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance. HPE recommends that customers using
    Intel Optane Persistent Memory update to this version of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system may experience an Unexpected Shutdown or a
    Bank 4 or a Bank 6 Machine Check with Intel Optane DC Persistent Memory
    installed and configured for Memory Mode (2LM) or Mixed Mode. This issue only
    impacts systems configured with Intel Optane DC Persistent Memory in one of
    these modes. HPE recommends updating to this version of the System ROM for any
    customer using Intel Optane DC Persistent Memory in Memory Mode (2LM) or Mixed
    Mode. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2020-24511. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-464. The Intel microcode patches included in this
    release are version 0x02006B06 (CPUID 50654) and 0x05003103 (CPUID 50567).
    These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2020-12358, CVE-2020-12360, and
    CVE-2020-24486. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00463. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which address various functional issues documented in the Intel
    Technical Specification update. These issues are documented as the EIBRS
    Guest/Host and REP MOVS* MCE on Memory Not Access Issue. These issues are not
    unique to HPE servers.
    
    Addressed an issue where the server may become unresponsive during POST or
    take an unexpected long time to complete POST when the RBSU Extended Memory
    Test option was enabled.
    
    Addressed an issue where the server was allowed to boot when mixed SKUs of
    Intel Xeon Scalable Processors are installed. The server should display an
    error message and halt boot in these configurations.
    
    Addressed an issue where the System ROM was logging a mismatched power supply
    condition with the latest version of the HPE Power Supplies. When this issue
    occurred, Dynamic Power Capping and High Efficiency Power Supply Mode were
    also disabled. To properly mitigate this issue, iLO Firmware version 2.50 or
    later is also needed.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1628683200">-     Added Custom time server PCI riser support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1628769600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the second port of HPE InfiniBand FDR/Ethernet
    10Gb/40Gb 2-port 544 FLR-QSFP Adapter shows "null string" in RBSU system
    information page.
    
    This revision of the System ROM includes the EDK2 patches which provides
    mitigations for BIOS advisories and security vulnerabilities documented as
    CVE-2019-14584, CVE-2021-28211 and CVE-2021-28210.
    
    Addressed an issue where the memory channel numbering is incorrect for
    Correctable Memory Errors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_09-03-2021" date="1632657600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Uncorrectable Memory Errors may be reported and
    logged to the Integrated Management Log (IML) with certain DIMMs installed and
    the RBSU "Extended Memory Test" option enabled after updating the System ROM
    to v2.50 or later. The "Extended Memory Test" option is disabled by default
    and this issue would only impact customers who had specifically configured
    this option to enabled. The reported Uncorrected Memory Errors were due to an
    issue with the impacted System ROM revisions and do NOT indicate an issue with
    the DIMMs themselves.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_10-28-2021" date="1636372800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2021-0157. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-0562. The Intel microcode patch included in this
    release is version 0x05003208 (CPUID 50567). These issues impacts 2nd
    Generation Intel Xeon Scalable Processors. They does NOT impact 1st Generation
    Intel Xeon Scalable Processors. These issues are not unique to HPE servers.
    
    Addressed an issue in which a server may fail to boot and experience a Machine
    Check Exception indicating "x64 Exception type 0x12: An uncorrectable machine
    check exception had occurred on CPU1" when a Fastcom SuperFSCC/4 PCIe card is
    installed.
    
    Addressed an issue where servers with an HPE NS204i-p OS Boot Device may
    shutdown and log a "System Overheating" error message in the Integrated
    Management Log (IML).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_11-24-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues
    are not unique to HPE servers.
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1649073600">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="fccdde45aa5e5ec345cc6128e15269ebe3a52c601efee89fe5b9c8fabe041a2e" name="firmware-system-u41" arch="x86_64">
    <version epoch="0" ver="2.62_2022_03_08" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.42_01-23-2021" date="1612267200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides a fix for a potential machine check exception under
    heavy stress with short loops of instructions. This may result in a machine
    check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in
    the Integrated Management Log (IML). The Intel microcode patches included in
    this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID
    50657). This issue only impacts 2nd generation Intel Xeon Scalable Performance
    processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides a fix for a potential machine check exception when
    high levels of posted interrupt traffic occurs on PCIe. This may result in a
    machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in
    the Integrated Management Log (IML). The Intel microcode patches included in
    this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656)
    and 0x05003005 (CPUID 50657). As part of this change, a new BIOS/Platform
    Configuration (RBSU) option in Advanced Performance Options has been added to
    allow a customer to disable this mitigation. This issue is not unique to HPE
    servers.
    
    Addressed an extremely rare issue where the Real Time Clock may become
    corrupted on a server boot. This was typically seen as an unexpected change to
    the RTC Year field but could impact other parts of the Date and Time. This
    issue is not unique to HPE servers.
    
    Addressed an issue where the Extended Memory Test is not run when configured
    in BIOS/Platform Configuration (RBSU) to Enabled. Note that this option is
    Disabled by default. This issue was introduced in the v2.40 revision of the
    System ROM.
    
    Addressed an issue where the server system fans may run higher than
    anticipated when a server is configured with AHCI SATA drives.
    
    Addressed an issue where a bad LRDIMM memory device could be mapped out but
    was not properly reported in the Integrated Memory Log (IML). This issue only
    impacted systems configured with LRDIMMs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623067200">-     Added a new BIOS/Platform Configuration (RBSU) option to Server Availability
    called IPMI Watchdog Timer. When enabled, the system will start an IPMI based
    watchdog timer during boot which can be used to protect against a boot hang or
    other unexpected system boot issue. It is the responsibility of the user to
    disable the IPMI watchdog timer once the operating system has booted. Failure
    to disable the timer can result in an unexpected server reset or shutdown.
    
    Added a new BIOS/Platform Configuration (RBSU) option to Server Security
    called UEFI Variable Access Firmware Control. This option, when enabled, can
    be used to block UEFI Variable writes, such as to the UEFI Boot Order, from
    the Operating System or a third-party utility. HPE recommends leaving this
    capability disabled unless the user specifically wants to prevent the
    operating system's normal operation of writing to UEFI Variables, which
    typically occur during OS install.
    
    Updated the BIOS TPM 1.2 support for Windows 2022.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623153600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance. HPE recommends that customers using
    Intel Optane Persistent Memory update to this version of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system may experience an Unexpected Shutdown or a
    Bank 4 or a Bank 6 Machine Check with Intel Optane DC Persistent Memory
    installed and configured for Memory Mode (2LM) or Mixed Mode. This issue only
    impacts systems configured with Intel Optane DC Persistent Memory in one of
    these modes. HPE recommends updating to this version of the System ROM for any
    customer using Intel Optane DC Persistent Memory in Memory Mode (2LM) or Mixed
    Mode. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2020-24511. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-464. The Intel microcode patches included in this
    release are version 0x02006B06 (CPUID 50654) and 0x05003103 (CPUID 50567).
    These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2020-12358, CVE-2020-12360, and
    CVE-2020-24486. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00463. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which address various functional issues documented in the Intel
    Technical Specification update. These issues are documented as the EIBRS
    Guest/Host and REP MOVS* MCE on Memory Not Access Issue. These issues are not
    unique to HPE servers.
    
    Addressed an issue where the server may become unresponsive during POST or
    take an unexpected long time to complete POST when the RBSU Extended Memory
    Test option was enabled.
    
    Addressed an issue where the server was allowed to boot when mixed SKUs of
    Intel Xeon Scalable Processors are installed. The server should display an
    error message and halt boot in these configurations.
    
    Addressed an issue where the System ROM was logging a mismatched power supply
    condition with the latest version of the HPE Power Supplies. When this issue
    occurred, Dynamic Power Capping and High Efficiency Power Supply Mode were
    also disabled. To properly mitigate this issue, iLO Firmware version 2.50 or
    later is also needed.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1628683200">-     Added Custom time server PCI riser support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1628769600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the second port of HPE InfiniBand FDR/Ethernet
    10Gb/40Gb 2-port 544 FLR-QSFP Adapter shows "null string" in RBSU system
    information page.
    
    This revision of the System ROM includes the EDK2 patches which provides
    mitigations for BIOS advisories and security vulnerabilities documented as
    CVE-2019-14584, CVE-2021-28211 and CVE-2021-28210.
    
    Addressed an issue where the memory channel numbering is incorrect for
    Correctable Memory Errors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_09-03-2021" date="1632657600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Uncorrectable Memory Errors may be reported and
    logged to the Integrated Management Log (IML) with certain DIMMs installed and
    the RBSU "Extended Memory Test" option enabled after updating the System ROM
    to v2.50 or later. The "Extended Memory Test" option is disabled by default
    and this issue would only impact customers who had specifically configured
    this option to enabled. The reported Uncorrected Memory Errors were due to an
    issue with the impacted System ROM revisions and do NOT indicate an issue with
    the DIMMs themselves.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_10-28-2021" date="1636372800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2021-0157. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-0562. The Intel microcode patch included in this
    release is version 0x05003208 (CPUID 50567). These issues impacts 2nd
    Generation Intel Xeon Scalable Processors. They does NOT impact 1st Generation
    Intel Xeon Scalable Processors. These issues are not unique to HPE servers.
    
    Addressed an issue in which a server may fail to boot and experience a Machine
    Check Exception indicating "x64 Exception type 0x12: An uncorrectable machine
    check exception had occurred on CPU1" when a Fastcom SuperFSCC/4 PCIe card is
    installed.
    
    Addressed an issue where servers with an HPE NS204i-p OS Boot Device may
    shutdown and log a "System Overheating" error message in the Integrated
    Management Log (IML).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_11-24-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues
    are not unique to HPE servers.
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1649332800">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="7e96b9fc391cdc438b8939cceaaf5893139bc11cb1fee589743ab55158de59ad" name="firmware-system-u43" arch="x86_64">
    <version epoch="0" ver="2.56_2022_01_20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-27-2020" date="1604836800">-     Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called
    Refresh Watermarks. When selecting the Low Watermark setting, the memory
    controller will help reduce susceptibility to a DDR4 RowHammer attack. It is
    expected that a memory performance impact will be seen when enabling the Low
    Watermark setting. The default operation of the system has not changed and
    customers wanting to provide additional RowHammer protection should enable
    this setting.
    
    Added support to BIOS/Platform Configuration (RBSU) to allow importing and
    exporting Secure Boot signature lists as a signed binary file. This is useful
    to import the Microsoft revocation list binary file into the Secure Boot DBX
    as found on the UEFI forum at https://uefi.org/revocationlistfile.
    
    Updated the System ROM support for One Button Secure Erase functionality with
    the latest HPE option devices.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-27-2020" date="1604923200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2020.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381 and
    INTEL-SA-00389. The Intel microcode patches included in this release are
    version 0x000000DE (CPUIDs 906ED, 906EC, 906EB and 906EA). These issues are
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2020-0593. These security vulnerabilities
    are documented in Intel Security Advisory INTEL-SA-00358. These issues are not
    unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.30_05-24-2021" date="1623067200">-     Updated the language translations (non-English modes) for System Utilities.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.30_05-24-2021" date="1623153600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for the Intel sightings CVE-2020-24511
    and CVE-2020-24512. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00464. The Intel microcode patches included in this
    release are version 0x000000EA (CPUID 906ED, CPUID 906EC, CPUID 906EB and
    CPUID 906EA). This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2020-8670 and CVE-2020-12357. These security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00463.
    These issues are not unique to HPE servers.
    
    Addressed an extremely rare issue where the Real Time Clock may become
    corrupted on a server boot. This was typically seen as an unexpected change to
    the RTC Year field but could impact other parts of the Date and Time. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.32_06-10-2021" date="1625745600">-     *Important Notes:**
    
    This version of the System ROM contains the fix for the Hynix 16G DDR4 DIMM
    compatibility issue. Please see advisory:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00115788en_us.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where systems running System ROM 2.20 (or later) and
    configured with an Intel Xeon E-2224 CPU and Hynix 16G DDR4 DIMM may
    occasionally encounter the error message "Unknown Initialization Error" in the
    Integrated Management Log (IML).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-20-2021" date="1630065600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Tianocore
    Edk2 Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and
    CVE-2021-28210. These security vulnerabilities are documented in Tianocore
    Edk2 CVE details site. These issues are not unique to HPE servers.
    
    Addressed an issue with Pensando Distributed Services Platform DSC-25
    Enterprise 10/25Gb 2-port SFP28 Card missing in system information page.
    
    Addressed an issue where a PCIe device or an NVMe M.2 device may not show up
    correctly in iLO 5 Device Inventory or storage page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_09-16-2021" date="1632312000">-     Improved boot time by removing unneeded delay.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_09-16-2021" date="1632398400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where High Precision Event Timer in Windows was not showing
    up in device manager.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_10-21-2021" date="1636372800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2021.2 which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0157. These security vulnerabilities
    are documented in the CVE report site. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_01-20-2022" date="1645876800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2 which
    provides mitigations for security vulnerabilities CVE-2021-0092,
    CVE-2021-0127, CVE-2021-0156 and CVE-2021-0157. These issues are not unique to
    HPE servers.
    
    Fixed an issue where system boot mode changed to Legacy mode from UEFI mode
    after IP flash complete and system may hang when entering IP after setting to
    UEFI mode.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="61d778735f70740116e424a411060f83f60e5a273d267a81d571dcd20d33e677" name="firmware-system-u44" arch="x86_64">
    <version epoch="0" ver="2.56_2022_01_20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-27-2020" date="1604923200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2020.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381 and
    INTEL-SA-00389. The Intel microcode patches included in this release are
    version 0x000000DE (CPUIDs 906ED, 906EC, 906EB and 906EA). These issues are
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2020-0593. These security vulnerabilities
    are documented in Intel Security Advisory INTEL-SA-00358. These issues are not
    unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.30_05-24-2021" date="1623067200">-     Updated the language translations (non-English modes) for System Utilities.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.30_05-24-2021" date="1623153600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for the Intel sightings CVE-2020-24511
    and CVE-2020-24512. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00464. The Intel microcode patches included in this
    release are version 0x000000EA (CPUID 906ED, CPUID 906EC, CPUID 906EB and
    CPUID 906EA). This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2020-8670 and CVE-2020-12357. These security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00463.
    These issues are not unique to HPE servers.
    
    Addressed an extremely rare issue where the Real Time Clock may become
    corrupted on a server boot. This was typically seen as an unexpected change to
    the RTC Year field but could impact other parts of the Date and Time. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.32_06-10-2021" date="1625745600">-     *Important Notes:**
    
    This version of the System ROM contains the fix for the Hynix 16G DDR4 DIMM
    compatibility issue. Please see advisory:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00115788en_us.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where systems running System ROM 2.20 (or later) and
    configured with an Intel Xeon E-2224 CPU and Hynix 16G DDR4 DIMM may
    occasionally encounter the error message "Unknown Initialization Error" in the
    Integrated Management Log (IML).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-20-2021" date="1628164800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Tianocore
    Edk2 Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and
    CVE-2021-28210. These security vulnerabilities are documented in Tianocore
    Edk2 CVE details site.  These issues are not unique to HPE servers.
    
    Addressed an issue with Pensando Distributed Services Platform DSC-25
    Enterprise 10/25Gb 2-port SFP28 Card missing in system information page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-20-2021-2.1" date="1629115200">-     *Important Notes:**
    
    Ver. 2.50_07-20-2021(B) contains updates to the firmware packaging and is
    functionally equivalent to ver. 2.50_07-20-2021. It is not necessary to
    upgrade with Revision B if a previous component revision was used to upgrade
    the firmware to version 2.50_07-20-2021.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Tianocore
    Edk2 Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and
    CVE-2021-28210. These security vulnerabilities are documented in Tianocore
    Edk2 CVE details site.  These issues are not unique to HPE servers.
    
    Addressed an issue with Pensando Distributed Services Platform DSC-25
    Enterprise 10/25Gb 2-port SFP28 Card missing in system information page.
    
    Addressed an issue where a PCIe device or an NVMe M.2 device may not show up
    correctly in iLO 5 Device Inventory or storage page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_09-16-2021" date="1632312000">-     Improved boot time by removing unneeded delay.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_09-16-2021" date="1632398400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where High Precision Event Timer in Windows was not showing
    up in device manager.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_10-21-2021" date="1636372800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2021.2 which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0157. These security vulnerabilities
    are documented in the CVE report site. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_01-20-2022" date="1645876800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2 which
    provides mitigations for security vulnerabilities CVE-2021-0092,
    CVE-2021-0127, CVE-2021-0156 and CVE-2021-0157. These issues are not unique to
    HPE servers.
    
    Fixed an issue where system boot mode changed to Legacy mode from UEFI mode
    after IP flash complete and system may hang when entering IP after setting to
    UEFI mode.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="3866c785d6ce8ae16e70baaaffbe36ad0245e1d9930b80223032e21245b77630" name="firmware-system-u45" arch="x86_64">
    <version epoch="0" ver="2.62_2022_03_08" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.42_01-23-2021" date="1612267200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides a fix for a potential machine check exception under
    heavy stress with short loops of instructions. This may result in a machine
    check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in
    the Integrated Management Log (IML). The Intel microcode patches included in
    this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID
    50657). This issue only impacts 2nd generation Intel Xeon Scalable Performance
    processors. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides a fix for a potential machine check exception when
    high levels of posted interrupt traffic occurs on PCIe. This may result in a
    machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in
    the Integrated Management Log (IML). The Intel microcode patches included in
    this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656)
    and 0x05003005 (CPUID 50657). As part of this change, a new BIOS/Platform
    Configuration (RBSU) option in Advanced Performance Options has been added to
    allow a customer to disable this mitigation. This issue is not unique to HPE
    servers.
    
    Addressed an extremely rare issue where the Real Time Clock may become
    corrupted on a server boot. This was typically seen as an unexpected change to
    the RTC Year field but could impact other parts of the Date and Time. This
    issue is not unique to HPE servers.
    
    Addressed an issue where the Extended Memory Test is not run when configured
    in BIOS/Platform Configuration (RBSU) to Enabled. Note that this option is
    Disabled by default. This issue was introduced in the v2.40 revision of the
    System ROM.
    
    Addressed an issue where the server system fans may run higher than
    anticipated when a server is configured with AHCI SATA drives.
    
    Addressed an issue where a bad LRDIMM memory device could be mapped out but
    was not properly reported in the Integrated Memory Log (IML). This issue only
    impacted systems configured with LRDIMMs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623067200">-     Added a new BIOS/Platform Configuration (RBSU) option to Server Availability
    called IPMI Watchdog Timer. When enabled, the system will start an IPMI based
    watchdog timer during boot which can be used to protect against a boot hang or
    other unexpected system boot issue. It is the responsibility of the user to
    disable the IPMI watchdog timer once the operating system has booted. Failure
    to disable the timer can result in an unexpected server reset or shutdown.
    
    Added a new BIOS/Platform Configuration (RBSU) option to Server Security
    called UEFI Variable Access Firmware Control. This option, when enabled, can
    be used to block UEFI Variable writes, such as to the UEFI Boot Order, from
    the Operating System or a third-party utility. HPE recommends leaving this
    capability disabled unless the user specifically wants to prevent the
    operating system's normal operation of writing to UEFI Variables, which
    typically occur during OS install.
    
    Updated the BIOS TPM 1.2 support for Windows 2022.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_05-24-2021" date="1623153600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance.
    
    HPE recommends that customers using Intel Optane Persistent Memory update to
    this version of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system may experience an Unexpected Shutdown or a
    Bank 4 or a Bank 6 Machine Check with Intel Optane DC Persistent Memory
    installed and configured for Memory Mode (2LM) or Mixed Mode. This issue only
    impacts systems configured with Intel Optane DC Persistent Memory in one of
    these modes. HPE recommends updating to this version of the System ROM for any
    customer using Intel Optane DC Persistent Memory in Memory Mode (2LM) or Mixed
    Mode. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2020-24511. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-464. The Intel microcode patches included in this
    release are version 0x02006B06 (CPUID 50654) and 0x05003103 (CPUID 50567).
    These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2020-12358, CVE-2020-12360, and
    CVE-2020-24486. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00463. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which address various functional issues documented in the Intel
    Technical Specification update. These issues are documented as the EIBRS
    Guest/Host and REP MOVS* MCE on Memory Not Access Issue. These issues are not
    unique to HPE servers.
    
    Addressed an issue where the server may become unresponsive during POST or
    take an unexpected long time to complete POST when the RBSU Extended Memory
    Test option was enabled.
    
    Addressed an issue where the server was allowed to boot when mixed SKUs of
    Intel Xeon Scalable Processors are installed. The server should display an
    error message and halt boot in these configurations.
    
    Addressed an issue where the System ROM was logging a mismatched power supply
    condition with the latest version of the HPE Power Supplies. When this issue
    occurred, Dynamic Power Capping and High Efficiency Power Supply Mode were
    also disabled. To properly mitigate this issue, iLO Firmware version 2.50 or
    later is also needed.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1629720000">-     Added Custom time server PCI riser support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_07-08-2021" date="1629806400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the second port of HPE InfiniBand FDR/Ethernet
    10Gb/40Gb 2-port 544 FLR-QSFP Adapter shows "null string" in RBSU system
    information page.
    
    This revision of the System ROM includes the EDK2 patches which provides
    mitigations for BIOS advisories and security vulnerabilities documented as
    CVE-2019-14584, CVE-2021-28211 and CVE-2021-28210.
    
    Addressed an issue where the memory channel numbering is incorrect for
    Correctable Memory Errors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_09-03-2021" date="1632830400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Uncorrectable Memory Errors may be reported and
    logged to the Integrated Management Log (IML) with certain DIMMs installed and
    the RBSU "Extended Memory Test" option enabled after updating the System ROM
    to v2.50 or later. The "Extended Memory Test" option is disabled by default
    and this issue would only impact customers who had specifically configured
    this option to enabled. The reported Uncorrected Memory Errors were due to an
    issue with the impacted System ROM revisions and do NOT indicate an issue with
    the DIMMs themselves.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_10-28-2021" date="1636372800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2021-0157. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-0562. The Intel microcode patch included in this
    release is version 0x05003208 (CPUID 50567). These issues impacts 2nd
    Generation Intel Xeon Scalable Processors. They does NOT impact 1st Generation
    Intel Xeon Scalable Processors. These issues are not unique to HPE servers.
    
    Addressed an issue in which a server may fail to boot and experience a Machine
    Check Exception indicating "x64 Exception type 0x12: An uncorrectable machine
    check exception had occurred on CPU1" when a Fastcom SuperFSCC/4 PCIe card is
    installed.
    
    Addressed an issue where servers with an HPE NS204i-p OS Boot Device may
    shutdown and log a "System Overheating" error message in the Integrated
    Management Log (IML).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_11-24-2021" date="1639483200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092. These issues are not unique to HPE servers.
    CVE-2021-0093, CVE-2021-0144
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the IPMI Watchdog Timer stops after a cold boot with
    IPMI watch dog timer enabled in RBSU
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1647950400">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="55d826f3a00b1dc8347208905850c1537a5d39fad04ebd1e7ff8373ca6c31ba7" name="firmware-system-u46" arch="x86_64">
    <version epoch="0" ver="1.58_2022_01_13" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.40_04-28-2021" date="1623326400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.42_05-26-2021" date="1624190400">-     Added a new BIOS/Platform Configuration (RBSU) option called Enhanced
    Processor Performance Profile. This option provides additional processor
    performance profiles that can be used to improve overall performance under
    certain workloads.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.42_05-26-2021" date="1624276800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system may report an Unsupported Memory
    Configuration error when Intel DC Optane Persistent Memory is present with an
    Intel Xeon Silver 4314 processor. This issue does not impact systems
    configured with an Intel Xeon Gold or Platinum SKU processor.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50_08-27-2021" date="1631016000">-     Added support for Microsoft Windows Server 2022. Windows Server 2022 adds a
    new security feature called Secured-core. Secured-core is only supported on
    3rd Generation Intel Xeon Scalable Processors. Secured-core servers use a
    combination of hardware features, firmware enablement and Windows Server
    operating system capabilities to provide protection against malware and
    rootkit security exploits.
    
    Added a new BIOS/Platform Configuration (RBSU) option for Microsoft Secured-
    core Support. Enabling this setting makes the following policy changes and
    configures the corresponding options: Intel Virtualization Technology
    enabled, Intel VT-d enabled, Intel TXT Support enabled, Secure Boot enabled,
    TPM enabled in 2.0 mode. Disabling any of these features while Secured-core is
    enabled can prevent Secured-core from working properly.
    
    Added new RBSU option to Omit Boot Device Event in TPM PCR[4] following EDK2.
    Warning: changing the setting will affect TPM measurements and can impact
    software functionality which utilizes the TPM PCR registers such as Microsoft
    BitLocker. PCR[4] is the register that records the process of attempting to
    boot different hardware paths like from a a hard drive or CD, and what boot
    devices are attempted, and the Initial Program Loader (IPL) code that is
    loaded and executed from the device. If boot from one device fails,
    measurements in PCR[4] record the attempt to boot the next device or boot
    path. If recording which device attempted to boot is omitted with this option
    (i.e. enable this option), the BIOS records the event type
    EV_OMIT_BOOT_DEVICE_EVENTS in PCR[4], otherwise the event is not recorded.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50_08-27-2021" date="1631102400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Intel VROC SATA and sSATA Controller shows as Unknown
    under firmware information page in RBSU.
    
    Addressed an issue where an error "Incorrect firmware file or no supported
    device" occurs when flashing the firmware of Intel E810 Ethernet Adapters.
    
    Addressed an issue where the server hangs when launching Embedded iPXE when
    IPv4 certification is enrolled and Network location is set as iPXE Auto-Start-
    Script.
    
    Addressed an issue where the server hangs at POST when configured with Intel
    Xeon Silver 4314 Processor and Intel OptaneTM Persistent Memory 200 Series
    installed.
    
    Addressed an issue where the server hangs when running Safe Mode boot without
    a DIMM installed on DIMM slot1.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.52_09-22-2021" date="1633262400">-     Added support for updating NVMe/SATA drive firmware managed by Intel VROC via
    Firmware Update page in UEFI System Utilities.
    
    Added a new BIOS/Platform Configuration (RBSU) option for PCIe HotPlug Error
    Control. Use this option to select PCIe (NVMe) Hot-Plug support for the
    platform. When Hot-Plug Surprise is selected, the platform will attempt to
    protect the platform from experiencing an error on a surprise removal event.
    This option should be selected for older Operating Systems that do not support
    Enhanced Downstream Port Containment (eDPC). When eDPC Firmware Control is
    selected, the platform firmware and OS will properly negotiate and log all
    hot-plug events. This option is currently not supported by all Operating
    Systems. When eDPC OS Control is selected hot-plug events are handled by the
    Operating System with no involvement by the platform. All logging of events in
    this mode will be limited to the Operating System only. It is important that
    this option be set properly based on the Operating System to ensure hot-plug
    events and surprise removal events are handled properly by the platform.
    Please consult Operating System documentation for additional details. Note it
    is always recommended to perform a graceful device removal from the Operating
    System before performing a hot-plug event.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.52_09-22-2021" date="1633348800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where NVMe SSDs May Be Listed As "UEFI Misc Device" in
    BIOS/Platform Configuration (RBSU) "One-Time Boot Menu" if Intel NVMe VROC is
    Enabled (Document ID: a00113593en_us).
    
    Addressed an issue where The NVMe Storage Drives Will Not De Displayed in the
    Integrated Lights-Out (iLO) Pages if Intel NVMe VROC (CPU/VMD) is Enabled
    (Document ID: a00113587en_us).
    
    Addressed an issue where Uncorrectable Memory Errors may be reported and
    logged to the Integrated Management Log (IML) with certain DIMMs installed and
    the RBSU "Extended Memory Test" option enabled. The "Extended Memory Test"
    option is disabled by default and this issue would only impact customers who
    had specifically configured this option to enabled. The reported Uncorrected
    Memory Errors were due to an issue with the impacted System ROM revisions and
    do NOT indicate an issue with the DIMMs themselves.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.54_11-03-2021" date="1636718400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where I/O devices accessing memory during heavy workloads
    with Intel Optane Persistent Memory 200 Series installed can experience slow
    response times, resulting in completion timeout errors on the I/O device. This
    can result in a Blue Screen in Windows, a kernel panic in Linux, or a Purple
    Screen in VMWare.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56_11-29-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.58_01-13-2022" date="1644840000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where if the administrator password and power-on password
    are set, after clearing power-on password, administrator password is also
    cleared.
    
    Addressed an issue (https://support.hpe.com/hpesc/public/docDisplay?docId=a001
    19362en_us&amp;docLocale=en_US) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).</changelog>
  </package>
  <package pkgid="576889224e2fd94a676ed13fddfffe4b3bf56631e9582f9a5c002fc13ca23279" name="firmware-system-u47" arch="x86_64">
    <version epoch="0" ver="1.58_2022_01_13" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.40_04-28-2021" date="1623153600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50_08-27-2021" date="1631534400">-     Added support for Microsoft Windows Server 2022. Windows Server 2022 adds a
    new security feature called Secured-core. Secured-core is only supported on
    3rd Generation Intel Xeon Scalable Processors. Secured-core servers use a
    combination of hardware features, firmware enablement and Windows Server
    operating system capabilities to provide protection against malware and
    rootkit security exploits.
    
    Added a new BIOS/Platform Configuration (RBSU) option for Microsoft Secured-
    core Support. Enabling this setting makes the following policy changes and
    configures the corresponding options: Intel Virtualization Technology
    enabled, Intel VT-d enabled, Intel TXT Support enabled, Secure Boot enabled,
    TPM enabled in 2.0 mode. Disabling any of these features while Secured-core is
    enabled can prevent Secured-core from working properly.
    
    Added new RBSU option to Omit Boot Device Event in TPM PCR[4] following EDK2.
    Warning: changing the setting will affect TPM measurements and can impact
    software functionality which utilizes the TPM PCR registers such as Microsoft
    BitLocker. PCR[4] is the register that records the process of attempting to
    boot different hardware paths like from a a hard drive or CD, and what boot
    devices are attempted, and the Initial Program Loader (IPL) code that is
    loaded and executed from the device. If boot from one device fails,
    measurements in PCR[4] record the attempt to boot the next device or boot
    path. If recording which device attempted to boot is omitted with this option
    (i.e. enable this option), the BIOS records the event type
    EV_OMIT_BOOT_DEVICE_EVENTS in PCR[4], otherwise the event is not recorded.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50_08-27-2021" date="1631620800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Intel VROC SATA and sSATA Controller shows as Unknown
    under firmware information page in RBSU.
    
    Addressed an issue where an error "Incorrect firmware file or no supported
    device" occurs when flashing the firmware of Intel E810 Ethernet Adapters.
    
    Addressed an issue where the server hangs when launching Embedded iPXE when
    IPv4 certification is enrolled and Network location is set as iPXE Auto-Start-
    Script.
    
    Addressed an issue where the server hangs at POST when configured with Intel
    Xeon Silver 4314 Processor and Intel OptaneTM Persistent Memory 200 Series
    installed.
    
    Addressed an issue where the server hangs when running Safe Mode boot without
    a DIMM installed on DIMM slot1.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.52_09-22-2021" date="1633435200">-     Added support for updating NVMe/SATA drive firmware managed by Intel VROC via
    Firmware Update page in UEFI System Utilities.
    
    Added a new BIOS/Platform Configuration (RBSU) option for PCIe HotPlug Error
    Control. Use this option to select PCIe (NVMe) Hot-Plug support for the
    platform. When Hot-Plug Surprise is selected, the platform will attempt to
    protect the platform from experiencing an error on a surprise removal event.
    This option should be selected for older Operating Systems that do not support
    Enhanced Downstream Port Containment (eDPC). When eDPC Firmware Control is
    selected, the platform firmware and OS will properly negotiate and log all
    hot-plug events. This option is currently not supported by all Operating
    Systems. When eDPC OS Control is selected hot-plug events are handled by the
    Operating System with no involvement by the platform. All logging of events in
    this mode will be limited to the Operating System only. It is important that
    this option be set properly based on the Operating System to ensure hot-plug
    events and surprise removal events are handled properly by the platform.
    Please consult Operating System documentation for additional details. Note it
    is always recommended to perform a graceful device removal from the Operating
    System before performing a hot-plug event.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.52_09-22-2021" date="1633521600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where NVMe SSDs May Be Listed As "UEFI Misc Device" in
    BIOS/Platform Configuration (RBSU) "One-Time Boot Menu" if Intel NVMe VROC is
    Enabled (Document ID: a00113593en_us).
    
    Addressed an issue where The NVMe Storage Drives Will Not De Displayed in the
    Integrated Lights-Out (iLO) Pages if Intel NVMe VROC (CPU/VMD) is Enabled
    (Document ID: a00113587en_us).
    
    Addressed an issue where Uncorrectable Memory Errors may be reported and
    logged to the Integrated Management Log (IML) with certain DIMMs installed and
    the RBSU "Extended Memory Test" option enabled. The "Extended Memory Test"
    option is disabled by default and this issue would only impact customers who
    had specifically configured this option to enabled. The reported Uncorrected
    Memory Errors were due to an issue with the impacted System ROM revisions and
    do NOT indicate an issue with the DIMMs themselves.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.54_11-03-2021" date="1636372800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where I/O devices accessing memory during heavy workloads
    with Intel Optane Persistent Memory 200 Series installed can experience slow
    response times, resulting in completion timeout errors on the I/O device. This
    can result in a Blue Screen in Windows, a kernel panic in Linux, or a Purple
    Screen in VMWare.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56_11-29-2021" date="1639483200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.58_01-13-2022" date="1644840000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where if the administrator password and power-on password
    are set, after clearing power-on password, administrator password is also
    cleared.
    
    Addressed an issue
    (https://support.hpe.com/hpesc/public/docDisplay?docId=a00119362en_us) where
    the systems with HPE NS204i-p NVMe OS Boot Device may shut down intermittently
    and may log the following System Overheating message in the Integrated
    Management Log (IML): "System Overheating (Temperature Sensor 47, Location I/O
    Board, Temperature61) ACTION:Check fans, processor heat sink and air baffles
    installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="1fb2d30d15dd346416df08d893df3427eb9b715e68e3a9e8bd158a17019a1975" name="firmware-system-u48" arch="x86_64">
    <version epoch="0" ver="2.56_2022_01_20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-27-2020" date="1604836800">-     Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called
    Refresh Watermarks. When selecting the Low Watermark setting, the memory
    controller will help reduce susceptibility to a DDR4 RowHammer attack. It is
    expected that a memory performance impact will be seen when enabling the Low
    Watermark setting. The default operation of the system has not changed and
    customers wanting to provide additional RowHammer protection should enable
    this setting.
    
    Added support to BIOS/Platform Configuration (RBSU) to allow importing and
    exporting Secure Boot signature lists as a signed binary file. This is useful
    to import the Microsoft revocation list binary file into the Secure Boot DBX
    as found on the UEFI forum at https://uefi.org/revocationlistfile.
    
    Updated the System ROM support for One Button Secure Erase functionality with
    the latest HPE option devices.
    
    Updated the RESTful API HPE BIOS Attribute Registry resources to match the
    latest BIOS/Platform Configuration options.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.20_10-27-2020" date="1604923200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2020.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerabilities documented
    as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381 and
    INTEL-SA-00389. The Intel microcode patches included in this release are
    version 0x000000DE (CPUIDs 906ED, 906EC, 906EB and 906EA). These issues are
    not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2020-0593. These security vulnerabilities
    are documented in Intel Security Advisory INTEL-SA-00358.  These issues are
    not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.30_05-24-2021" date="1623067200">-     Updated the language translations (non-English modes) for System Utilities.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.30_05-24-2021" date="1623153600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for the Intel sightings CVE-2020-24511
    and CVE-2020-24512. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00464. The Intel microcode patches included in this
    release are version 0x000000EA (CPUID 906ED, CPUID 906EC, CPUID 906EB and
    CPUID 906EA). This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2020-8670 and CVE-2020-12357. These security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00463.
    These issues are not unique to HPE servers.
    
    Addressed an extremely rare issue where the Real Time Clock may become
    corrupted on a server boot. This was typically seen as an unexpected change to
    the RTC Year field but could impact other parts of the Date and Time. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.32_06-10-2021" date="1625745600">-     *Important Notes:**
    
    This version of the System ROM contains the fix for the Hynix 16G DDR4 DIMM
    compatibility issue. Please see advisory:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00115788en_us.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where systems running System ROM 2.20 (or later) and
    configured with an Intel Xeon E-2224 CPU and Hynix 16G DDR4 DIMM may
    occasionally encounter the error message "Unknown Initialization Error" in the
    Integrated Management Log (IML).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-08-2021" date="1629720000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance. None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Tianocore
    Edk2 Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and
    CVE-2021-28210. These security vulnerabilities are documented in Tianocore
    Edk2 CVE details site. These issues are not unique to HPE servers.
    
    Addressed an issue with HPE Infiniband NIC missing in system information page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_09-16-2021" date="1632312000">-     Improved boot time by removing unneeded delay.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_09-16-2021" date="1632398400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance. None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where High Precision Event Timer in Windows was not showing
    up in device manager.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_10-21-2021" date="1636372800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance. None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2021.2 which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0157. These security vulnerabilities
    are documented in the CVE report site. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_01-20-2022" date="1645876800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2 which
    provides mitigations for security vulnerabilities CVE-2021-0092,
    CVE-2021-0127, CVE-2021-0156 and CVE-2021-0157. These issues are not unique to
    HPE servers.
    
    Fixed an issue where system boot mode changed to Legacy mode from UEFI mode
    after IP flash complete and system may hang when entering IP after setting to
    UEFI mode.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="cdfbdfe69284e7de6822e97e264d2f58b8912e0c44aae33eda85e71d72b9e061" name="firmware-system-u50" arch="x86_64">
    <version epoch="0" ver="1.58_2022_01_13" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.40_04-28-2021" date="1623326400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.42_05-26-2021" date="1624190400">-     Added a new BIOS/Platform Configuration (RBSU) option called Enhanced
    Processor Performance Profile. This option provides additional processor
    performance profiles that can be used to improve overall performance under
    certain workloads.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.42_05-26-2021" date="1624276800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system may report an Unsupported Memory
    Configuration error when Intel DC Optane Persistent Memory is present with an
    Intel Xeon Silver 4314 processor. This issue does not impact systems
    configured with an Intel Xeon Gold or Platinum SKU processor.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50_08-27-2021" date="1631016000">-     Added support for Microsoft Windows Server 2022. Windows Server 2022 adds a
    new security feature called Secured-core. Secured-core is only supported on
    3rd Generation Intel Xeon Scalable Processors. Secured-core servers use a
    combination of hardware features, firmware enablement and Windows Server
    operating system capabilities to provide protection against malware and
    rootkit security exploits.
    
    Added a new BIOS/Platform Configuration (RBSU) option for Microsoft Secured-
    core Support. Enabling this setting makes the following policy changes and
    configures the corresponding options: Intel Virtualization Technology
    enabled, Intel VT-d enabled, Intel TXT Support enabled, Secure Boot enabled,
    TPM enabled in 2.0 mode. Disabling any of these features while Secured-core is
    enabled can prevent Secured-core from working properly.
    
    Added new RBSU option to Omit Boot Device Event in TPM PCR[4] following EDK2.
    Warning: changing the setting will affect TPM measurements and can impact
    software functionality which utilizes the TPM PCR registers such as Microsoft
    BitLocker. PCR[4] is the register that records the process of attempting to
    boot different hardware paths like from a a hard drive or CD, and what boot
    devices are attempted, and the Initial Program Loader (IPL) code that is
    loaded and executed from the device. If boot from one device fails,
    measurements in PCR[4] record the attempt to boot the next device or boot
    path. If recording which device attempted to boot is omitted with this option
    (i.e. enable this option), the BIOS records the event type
    EV_OMIT_BOOT_DEVICE_EVENTS in PCR[4], otherwise the event is not recorded.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50_08-27-2021" date="1631102400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Intel VROC SATA and sSATA Controller shows as Unknown
    under firmware information page in RBSU.
    
    Addressed an issue where an error "Incorrect firmware file or no supported
    device" occurs when flashing the firmware of Intel E810 Ethernet Adapters.
    
    Addressed an issue where the server hangs when launching Embedded iPXE when
    IPv4 certification is enrolled and Network location is set as iPXE Auto-Start-
    Script.
    
    Addressed an issue where the server hangs at POST when configured with Intel
    Xeon Silver 4314 Processor and Intel OptaneTM Persistent Memory 200 Series
    installed.
    
    Addressed an issue where the server hangs when running Safe Mode boot without
    a DIMM installed on DIMM slot1.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.52_09-22-2021" date="1633262400">-     Added support for updating NVMe/SATA drive firmware managed by Intel VROC via
    Firmware Update page in UEFI System Utilities.
    
    Added a new BIOS/Platform Configuration (RBSU) option for PCIe HotPlug Error
    Control. Use this option to select PCIe (NVMe) Hot-Plug support for the
    platform. When Hot-Plug Surprise is selected, the platform will attempt to
    protect the platform from experiencing an error on a surprise removal event.
    This option should be selected for older Operating Systems that do not support
    Enhanced Downstream Port Containment (eDPC). When eDPC Firmware Control is
    selected, the platform firmware and OS will properly negotiate and log all
    hot-plug events. This option is currently not supported by all Operating
    Systems. When eDPC OS Control is selected hot-plug events are handled by the
    Operating System with no involvement by the platform. All logging of events in
    this mode will be limited to the Operating System only. It is important that
    this option be set properly based on the Operating System to ensure hot-plug
    events and surprise removal events are handled properly by the platform.
    Please consult Operating System documentation for additional details. Note it
    is always recommended to perform a graceful device removal from the Operating
    System before performing a hot-plug event.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.52_09-22-2021" date="1633348800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where NVMe SSDs May Be Listed As "UEFI Misc Device" in
    BIOS/Platform Configuration (RBSU) "One-Time Boot Menu" if Intel NVMe VROC is
    Enabled (Document ID: a00113593en_us).
    
    Addressed an issue where The NVMe Storage Drives Will Not De Displayed in the
    Integrated Lights-Out (iLO) Pages if Intel NVMe VROC (CPU/VMD) is Enabled
    (Document ID: a00113587en_us).
    
    Addressed an issue where Uncorrectable Memory Errors may be reported and
    logged to the Integrated Management Log (IML) with certain DIMMs installed and
    the RBSU "Extended Memory Test" option enabled. The "Extended Memory Test"
    option is disabled by default and this issue would only impact customers who
    had specifically configured this option to enabled. The reported Uncorrected
    Memory Errors were due to an issue with the impacted System ROM revisions and
    do NOT indicate an issue with the DIMMs themselves.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.54_11-03-2021" date="1636718400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where I/O devices accessing memory during heavy workloads
    with Intel Optane Persistent Memory 200 Series installed can experience slow
    response times, resulting in completion timeout errors on the I/O device. This
    can result in a Blue Screen in Windows, a kernel panic in Linux, or a Purple
    Screen in VMWare.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56_11-29-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.58_01-13-2022" date="1643889600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where if the administrator password and power-on password
    are set, after clearing power-on password, administrator password is also
    cleared.
    
    Addressed an issue (https://support.hpe.com/hpesc/public/docDisplay?docId=a001
    19362en_us&amp;docLocale=en_US) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).</changelog>
  </package>
  <package pkgid="f6707719cb625f32ec6d5b633c186389aff82056c609029cdbd924cadf831ce7" name="firmware-system-u56" arch="x86_64">
    <version epoch="0" ver="1.58_2022_01_13" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.40_04-28-2021" date="1623326400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.42_05-26-2021" date="1624190400">-     Added a new BIOS/Platform Configuration (RBSU) option called Enhanced
    Processor Performance Profile. This option provides additional processor
    performance profiles that can be used to improve overall performance under
    certain workloads.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.42_05-26-2021" date="1624276800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system may report an Unsupported Memory
    Configuration error when Intel DC Optane Persistent Memory is present with an
    Intel Xeon Silver 4314 processor. This issue does not impact systems
    configured with an Intel Xeon Gold or Platinum SKU processor.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.52_09-22-2021" date="1633262400">-     Added new RBSU option to Omit Boot Device Event in TPM PCR[4] following EDK2.
    Warning: changing the setting will affect TPM measurements and can impact
    software functionality which utilizes the TPM PCR registers such as Microsoft
    BitLocker. PCR[4] is the register that records the process of attempting to
    boot different hardware paths like from a a hard drive or CD, and what boot
    devices are attempted, and the Initial Program Loader (IPL) code that is
    loaded and executed from the device. If boot from one device fails,
    measurements in PCR[4] record the attempt to boot the next device or boot
    path. If recording which device attempted to boot is omitted with this option
    (i.e. enable this option), the BIOS records the event type
    EV_OMIT_BOOT_DEVICE_EVENTS in PCR[4], otherwise the event is not recorded.
    
    Added support for updating NVMe/SATA drive firmware managed by Intel VROC via
    Firmware Update page in UEFI System Utilities.
    
    Added a new BIOS/Platform Configuration (RBSU) option for PCIe HotPlug Error
    Control. Use this option to select PCIe (NVMe) Hot-Plug support for the
    platform. When Hot-Plug Surprise is selected, the platform will attempt to
    protect the platform from experiencing an error on a surprise removal event.
    This option should be selected for older Operating Systems that do not support
    Enhanced Downstream Port Containment (eDPC). When eDPC Firmware Control is
    selected, the platform firmware and OS will properly negotiate and log all
    hot-plug events. This option is currently not supported by all Operating
    Systems. When eDPC OS Control is selected hot-plug events are handled by the
    Operating System with no involvement by the platform. All logging of events in
    this mode will be limited to the Operating System only. It is important that
    this option be set properly based on the Operating System to ensure hot-plug
    events and surprise removal events are handled properly by the platform.
    Please consult Operating System documentation for additional details. Note it
    is always recommended to perform a graceful device removal from the Operating
    System before performing a hot-plug event.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.52_09-22-2021" date="1633348800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Intel VROC SATA and sSATA Controller shows as Unknown
    under firmware information page in RBSU.
    
    Addressed an issue where an error "Incorrect firmware file or no supported
    device" occurs when flashing the firmware of Intel E810 Ethernet Adapters.
    
    Addressed an issue where the server hangs when launching Embedded iPXE when
    IPv4 certification is enrolled and Network location is set as iPXE Auto-Start-
    Script.
    
    Addressed an issue where the server hangs at POST when configured with Intel
    Xeon Silver 4314 Processor and Intel OptaneTM Persistent Memory 200 Series
    installed.
    
    Addressed an issue where the server hangs when running Safe Mode boot without
    a DIMM installed on DIMM slot1.
    
    Addressed an issue where NVMe SSDs May Be Listed As "UEFI Misc Device" in
    BIOS/Platform Configuration (RBSU) "One-Time Boot Menu" if Intel NVMe VROC is
    Enabled (Document ID: a00113593en_us).
    
    Addressed an issue where The NVMe Storage Drives Will Not De Displayed in the
    Integrated Lights-Out (iLO) Pages if Intel NVMe VROC (CPU/VMD) is Enabled
    (Document ID: a00113587en_us).
    
    Addressed an issue where Uncorrectable Memory Errors may be reported and
    logged to the Integrated Management Log (IML) with certain DIMMs installed and
    the RBSU "Extended Memory Test" option enabled. The "Extended Memory Test"
    option is disabled by default and this issue would only impact customers who
    had specifically configured this option to enabled. The reported Uncorrected
    Memory Errors were due to an issue with the impacted System ROM revisions and
    do NOT indicate an issue with the DIMMs themselves.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.52_09-22-2021-2.1" date="1634040000">-     Added new RBSU option to Omit Boot Device Event in TPM PCR[4] following EDK2.
    Warning: changing the setting will affect TPM measurements and can impact
    software functionality which utilizes the TPM PCR registers such as Microsoft
    BitLocker. PCR[4] is the register that records the process of attempting to
    boot different hardware paths like from a a hard drive or CD, and what boot
    devices are attempted, and the Initial Program Loader (IPL) code that is
    loaded and executed from the device. If boot from one device fails,
    measurements in PCR[4] record the attempt to boot the next device or boot
    path. If recording which device attempted to boot is omitted with this option
    (i.e. enable this option), the BIOS records the event type
    EV_OMIT_BOOT_DEVICE_EVENTS in PCR[4], otherwise the event is not recorded.
    
    Added support for updating NVMe/SATA drive firmware managed by Intel VROC via
    Firmware Update page in UEFI System Utilities.
    
    Added a new BIOS/Platform Configuration (RBSU) option for PCIe HotPlug Error
    Control. Use this option to select PCIe (NVMe) Hot-Plug support for the
    platform. When Hot-Plug Surprise is selected, the platform will attempt to
    protect the platform from experiencing an error on a surprise removal event.
    This option should be selected for older Operating Systems that do not support
    Enhanced Downstream Port Containment (eDPC). When eDPC Firmware Control is
    selected, the platform firmware and OS will properly negotiate and log all
    hot-plug events. This option is currently not supported by all Operating
    Systems. When eDPC OS Control is selected hot-plug events are handled by the
    Operating System with no involvement by the platform. All logging of events in
    this mode will be limited to the Operating System only. It is important that
    this option be set properly based on the Operating System to ensure hot-plug
    events and surprise removal events are handled properly by the platform.
    Please consult Operating System documentation for additional details. Note it
    is always recommended to perform a graceful device removal from the Operating
    System before performing a hot-plug event.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.52_09-22-2021-2.1" date="1634126400">-     *Important Notes:**
    
    Ver. 1.52_09-22-2021(B) contains updates to the firmware packaging and is
    functionally equivalent to ver. 1.52_09-22-2021. It is not necessary to
    upgrade with Revision B if a previous component revision was used to upgrade
    the firmware to version 1.52_09-22-2021.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Intel VROC SATA and sSATA Controller shows as Unknown
    under firmware information page in RBSU.
    
    Addressed an issue where an error "Incorrect firmware file or no supported
    device" occurs when flashing the firmware of Intel E810 Ethernet Adapters.
    
    Addressed an issue where the server hangs when launching Embedded iPXE when
    IPv4 certification is enrolled and Network location is set as iPXE Auto-Start-
    Script.
    
    Addressed an issue where the server hangs at POST when configured with Intel
    Xeon Silver 4314 Processor and Intel OptaneTM Persistent Memory 200 Series
    installed.
    
    Addressed an issue where the server hangs when running Safe Mode boot without
    a DIMM installed on DIMM slot1.
    
    Addressed an issue where NVMe SSDs May Be Listed As "UEFI Misc Device" in
    BIOS/Platform Configuration (RBSU) "One-Time Boot Menu" if Intel NVMe VROC is
    Enabled (Document ID: a00113593en_us).
    
    Addressed an issue where The NVMe Storage Drives Will Not De Displayed in the
    Integrated Lights-Out (iLO) Pages if Intel NVMe VROC (CPU/VMD) is Enabled
    (Document ID: a00113587en_us).
    
    Addressed an issue where Uncorrectable Memory Errors may be reported and
    logged to the Integrated Management Log (IML) with certain DIMMs installed and
    the RBSU "Extended Memory Test" option enabled. The "Extended Memory Test"
    option is disabled by default and this issue would only impact customers who
    had specifically configured this option to enabled. The reported Uncorrected
    Memory Errors were due to an issue with the impacted System ROM revisions and
    do NOT indicate an issue with the DIMMs themselves.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.54_11-03-2021" date="1636718400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where I/O devices accessing memory during heavy workloads
    with Intel Optane Persistent Memory 200 Series installed can experience slow
    response times, resulting in completion timeout errors on the I/O device. This
    can result in a Blue Screen in Windows, a kernel panic in Linux, or a Purple
    Screen in VMWare.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56_11-29-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.58_01-13-2022" date="1643889600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where if the administrator password and power-on password
    are set, after clearing power-on password, administrator password is also
    cleared.
    
    Addressed an issue (https://support.hpe.com/hpesc/public/docDisplay?docId=a001
    19362en_us&amp;docLocale=en_US) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).</changelog>
  </package>
  <package pkgid="e7a1179be2c2927161fa483c9c41940dce090333870bda2d6d70b3e53a02b0f6" name="firmware-system-u60" arch="x86_64">
    <version epoch="0" ver="1.54_2022_01_13" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.54_01-13-2022" date="1639828800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the power-on password and the administrator passwords
    were both cleared when clearing one or the other. With this fix the two
    passwords will be treated independently as intended.
    
    Removed Dynamic Power Capping Functionality option from the RBSU menu as this
    option is not supported on this platform.
    
    Removed TPM1.2 option from the RBSU menu as this option is not supported on
    this platform.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="1c185ae0e08840f27ab1393168b3a1a109abce83bac524ab491f4e29ad67927d" name="firmware-system-u61" arch="x86_64">
    <version epoch="0" ver="1.54_2022_01_13" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.54_01-13-2022" date="1639828800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the power-on password and the administrator passwords
    were both cleared when clearing one or the other. With this fix the two
    passwords will be treated independently as intended.
    
    Removed Dynamic Power Capping Functionality option from the RBSU menu as this
    option is not supported on this platform.
    
    Removed TPM1.2 option from the RBSU menu as this option is not supported on
    this platform.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="7f6fe1d5a77c0ea4a333c3b0a7786168e4540a31e9ea830a0678def268d9c066" name="hp-i40e-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.17.4_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.17.4-1.sles12sp5" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="14fa2fd13776219dc28653c8c636908379bac927ff521a14da2508ecf3f13c89" name="hp-i40e-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.17.4_k5.3.18_22" rel="1.sles15sp2"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.17.4-1.sles15sp2" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="8504ebbca28de3dd00bb3bc76837e88eee14e75405ab9c39715c4397f1baf573" name="hp-i40e-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.17.4_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.17.4-1.sles15sp3" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="1d4fd107fdfe6ab74dcc8df18c5d4690b4c9805042979171efe27307bb34bfe7" name="hp-iavf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.2.7_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="cd266d0a3c91dfd5e50cccd7e50e6603227b5e2203b8c6e0dfcb749731b26598" name="hp-iavf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.2.7_k5.3.18_22" rel="1.sles15sp2"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="2b3340ac8bf22b66a357a403b0343a20c93fc5d470a17b248ff9e3b734b03419" name="hp-iavf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.2.7_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="b1d1bb433b96c281c0f7d6c3be009a60c592a15ba258773cc3fc2ed09486a141" name="hp-igb-kmp-default" arch="x86_64">
    <version epoch="0" ver="6.8.5_k4.12.14_120" rel="2.sles12sp5"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="e5481eb3cb2451763b7cb5b925eb6000f6a5e0737fa47851128332c1cbe3a1a9" name="hp-igb-kmp-default" arch="x86_64">
    <version epoch="0" ver="6.8.5_k5.3.18_22" rel="2.sles15sp2"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="331f8380f5ae54c5592d1b7f41daf45a3f6a6db6a81521774266e25d073f1758" name="hp-igb-kmp-default" arch="x86_64">
    <version epoch="0" ver="6.8.5_k5.3.18_57" rel="2.sles15sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="5be457207e7bf02e8c8658e6392842288cece2e5418e0ecdb1d0d24477b9cb28" name="hp-ixgbe-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.13.4_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="9550478b27b8b48202c8eefeae3b25b20f8ea883e85c6efb671ab04c5694463b" name="hp-ixgbe-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.13.4_k5.3.18_22" rel="1.sles15sp2"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="ed5677150f42e8e323f934805bbd99e8a72c2b340de80d93e465a0f74a515154" name="hp-ixgbe-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.13.4_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="7806192c2076d943f00a100ab9e022e1477897b1838e633d7177ce8688cf5624" name="hp-ixgbevf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.13.3_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="4a515c28cb40cb210d5ed9c29a1f24fb49abe495eef7a53f689b61dc1cb63387" name="hp-ixgbevf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.13.3_k5.3.18_22" rel="1.sles15sp2"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="9247109d0f338c3e72d85eed3eeb757a89e3beb8bbdd586a2a5acedf73ef01e5" name="hp-ixgbevf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.13.3_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="be64037b44b0efa03c423a5aa893d0e11c5d01055d8cdf1023444f8d12c1d736" name="hpe-emulex-smartsan-enablement-kit" arch="x86_64">
    <version epoch="0" ver="1.0.0.0" rel="4"/>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-1" date="1446465600">- Initial development</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-2" date="1469016000">- Added support the HPE StoreFabric 84E 4-port Fibre Channel Host Bus Adapter</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-3" date="1478174400">- Added support for HPE StoreFabric SN1200E 1P &amp; 2P, HPE StoreFabric SN1600E 1P &amp; 2P</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-4" date="1480334400">- Added support for HPE Synergy 3530C</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-4" date="1480507200">- Added Obsoletes tag since the rpm has been changed from noarch to x86_64 bit</changelog>
  </package>
  <package pkgid="7845d621ff27b64d87a57fa8173e7fabcf377e3f7c7b84fe0d5d203960f9290b" name="hpe-qlogic-smartsan-enablement-kit" arch="x86_64">
    <version epoch="0" ver="3.3" rel="3"/>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 3.3-1" date="1448280000">- Initial development</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 3.3-2" date="1479384000">- Added support for SN1600Q 1P &amp; 2P devices</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 3.3-3" date="1480334400">- Added support for 84Q and 3830C devices</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 3.3-3" date="1480507200">- Added Obsoletes tag since the rpm has been changed from noarch to x86_64 bit</changelog>
  </package>
  <package pkgid="1cb0d04aba5504a35b5925e262bc0a5a9d7827d3f34075b7f8e9444a19d55f32" name="hponcfg" arch="x86_64">
    <version epoch="0" ver="5.6.0" rel="0"/>
    <changelog author="Naveen N &lt;naveen.n2@hp.com&gt; 4.5.0-0" date="1426507200">- v4.5.0 is mainly targeted for iLO 4 2.20 and  iLO 3 1.80</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hp.com&gt; 4.6.0-0" date="1431345600">- v4.6.0 is mainly targeted for iLO 4 2.20 and  iLO 3 1.80</changelog>
    <changelog author="Suhas MG &lt;suhas.mg@hpe.com&gt; 5.0.0-0" date="1459252800">- v5.0.0 is mainly targeted for iLO 5 1.10</changelog>
    <changelog author="Suhas MG &lt;suhas.mg@hpe.com&gt; 5.1.0-0" date="1502193600">- v5.1.0 is mainly targeted for iLO 5 1.15</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.2.0-0" date="1506340800">- v5.2.0 is mainly targeted for iLO 5 1.20</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.3.0-0" date="1521633600">- v5.3.0 is mainly targeted for iLO 5 1.30</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.4.0-0" date="1532606400">- Changes include to select correct libssl.so file when multiple Openssl installed (32-bit and 64-bit)</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.4.0-0" date="1555416000">- Changes to remove the low level openSSL calls.</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.5.0-0" date="1559217600">-Updated the OpenSSL API calls to support Host's OpenSSL FIPS mode.</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.6.0-0" date="1590494400">- Changes to handle multiple OpenSSL library installed.</changelog>
  </package>
  <package pkgid="8d31eab6c2baadd87a241d1cd9efc9d7c17d84174445a42e1c3a2f321e1728fe" name="ice-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.6.4_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="2412179a6fbc7e32de406fae760f97d3b10fd9e5a11545cb0c95c8da358adeac" name="ice-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.6.4_k5.3.18_22" rel="1.sles15sp2"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="a165041a9eb6d7e2b3583b566e7443c3d59e120832b43c47d71ffddc506d1be3" name="ice-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.6.4_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="6bbb637574535abc1805c3b4b58bc51ebfe208db3b21206f1f3f2fb6d1da9e02" name="kernel-mft-mlnx-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.18.0_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 4.18.0_k4.12.14_120-1.sles12sp5</changelog>
  </package>
  <package pkgid="e35c17c5a0f77cd1099f6debbe77eb07ba3bc296d7da44b99bc842412b572aa5" name="kernel-mft-mlnx-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.18.0_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 4.18.0_k4.12.14_94.41-1.sles12sp4</changelog>
  </package>
  <package pkgid="8082abdb0940f45a067d4c64b47ca7b2bcd5fc6d650302b414383681ad2a515d" name="kernel-mft-mlnx-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.18.0_k5.3.18_22" rel="1.sles15sp2"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 4.18.0_k5.3.18_22-1.sles15sp2</changelog>
  </package>
  <package pkgid="0e052461bb7dd224842954704017b6f4985e899a3a2fc3315567e58afe9cd2cc" name="kernel-mft-mlnx-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.18.0_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 4.18.0_k5.3.18_57-1.sles15sp3</changelog>
  </package>
  <package pkgid="17f15fbcbe38df0620efa254ab755fd83451275e3f89f41fc6a0ae2bde442462" name="kmod-be2iscsi" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0" rel="1.rhel7u8"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="5675006a67396f2401392b2c072994103e7612c343f924f6186f404a79eb42e7" name="kmod-be2iscsi" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0" rel="1.rhel7u9"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="5577f012f3f220b3302abe7921b39cde6f27537841bddd227ef7e494f72bfbb3" name="kmod-be2iscsi" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0" rel="1.rhel8u2"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="f5e2689fceed4ea7c656cea2a034189409843e59945db9b25fde5beaa8f2aee8" name="kmod-be2iscsi" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0" rel="1.rhel8u3"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="aaec77c43844c77f0994a01ebb1151b558f73692576cb7406a6c178521936093" name="kmod-be2net" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0" rel="1.rhel7u8"/>
  </package>
  <package pkgid="610ae40c2edbf12b63029f14e5e8ba1e130d2c9f8aafaabe97cec62715426390" name="kmod-be2net" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0" rel="1.rhel7u9"/>
  </package>
  <package pkgid="679bf91bd128e1d787ec53c9f3e60ca03036776c5c8495cc3475d23b337aad7f" name="kmod-be2net" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0" rel="1.rhel8u2"/>
  </package>
  <package pkgid="f7b347d38d0708bf063509f1023b58f3c9fb8476b9309bd9e1c4bcda7c44c44c" name="kmod-be2net" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0" rel="1.rhel8u3"/>
  </package>
  <package pkgid="033e390aa59d84c4c2f2e9c3fee0baac4796dd4dd8fa925894037b46d779c47e" name="kmod-bnxt_en" arch="x86_64">
    <version epoch="0" ver="1.10.2" rel="219.0.55.0.rhel7u8"/>
  </package>
  <package pkgid="d629f8aff3f863a795a040f1dbfcbb6b81b63ced91f721341f0d11ada3b70f78" name="kmod-bnxt_en" arch="x86_64">
    <version epoch="0" ver="1.10.2" rel="219.0.55.0.rhel7u9"/>
  </package>
  <package pkgid="bb78a8af47dc8efa799372527bb98edd30e3bb19d2ec668ab70b0fd93dba7063" name="kmod-bnxt_en" arch="x86_64">
    <version epoch="0" ver="1.10.2" rel="219.0.55.0.rhel8u3"/>
  </package>
  <package pkgid="108195fd12be1099c1fb465b5c7ae84da585d486891f279840ed9a83797a4d06" name="kmod-bnxt_en" arch="x86_64">
    <version epoch="0" ver="1.10.2" rel="219.0.55.0.rhel8u4"/>
  </package>
  <package pkgid="bdcb1c044d7e967f53790715ad284e56b78e9b88f8666b4d7c50a9dd9f81f561" name="kmod-brcmfcoe" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0" rel="1.rhel7u8"/>
    <changelog author="Emulex Corporation &lt;ecd-tech.support@broadcom.com&gt; 12.0.1342.0" date="1605009600">- Built driver for rhel7</changelog>
  </package>
  <package pkgid="56ecf7a8365243f1b96453e7064e1896aadb45d4f3b28c1ccf4846e2dc31cd60" name="kmod-brcmfcoe" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0" rel="1.rhel7u9"/>
    <changelog author="Emulex Corporation &lt;ecd-tech.support@broadcom.com&gt; 12.0.1342.0" date="1605009600">- Built driver for rhel7</changelog>
  </package>
  <package pkgid="926f14e5fb04b81a0d0e49db0d12aecd32fd65fdeb42790ae4e0abee0ec6bcc1" name="kmod-brcmfcoe" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0" rel="1.rhel8u3"/>
    <changelog author="Emulex Corporation &lt;ecd-tech.support@broadcom.com&gt; 12.0.1342.0" date="1605009600">- Built driver for rhel8</changelog>
  </package>
  <package pkgid="62d8ec3b10dd112e26b34fb41f8cb4672726c306919549b9c0833436780d0b6e" name="kmod-elx-lpfc" arch="x86_64">
    <version epoch="0" ver="12.8.528.24" rel="1.rhel8u5"/>
    <changelog author="Emulex Automated Build User&#13;" date="1442750400">- Changed version to 10.7&#13;
- Added support for RHEL 6U8&#13;
- Added support for RHEL 7U2&#13;
- Added support for SLES12 SP1</changelog>
    <changelog author="Emulex Automated Build User&#13;" date="1453723200">- Changed version to 11.0</changelog>
    <changelog author="Emulex Automated Build User&#13;" date="1472472000">- Changed version to 11.1&#13;
- Added support for RHEL 7U3&#13;
- Added support for SLES 12 SP2&#13;
- Removed support for RHEL 6U5</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1497441600">- Changed version to 11.2&#13;
- Added support for RHEL 6U9&#13;
- Added support for RHEL 7U4&#13;
- Added support for SLES 12 SP3&#13;
- Removed support for RHEL 7U0&#13;
- Removed support for SLES 12 SP0</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1505908800">- Changed version to 11.4&#13;
- Removed support for RHEL 6U6&#13;
- Removed support for RHEL 7U1&#13;
- Added support for RHEL 7U5&#13;
- Added support for SLES 15 SP0</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1507550400">- Changed version to 12.0&#13;
- Removed support for RHEL 6U7&#13;
- Removed support for SLES 12 SP1&#13;
- Added support for RHEL 6U10&#13;
- Added support for RHEL 7U6&#13;
- Added support for RHEL 8U0&#13;
- Added support for SLES 12 SP4&#13;
- Added support for SLES 15 SP1</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1556539200">- Changed version to 12.2&#13;
- Removed support for SLES 11 SP3&#13;
- Removed support for SLES 11 SP4&#13;
- Removed support for RHEL 6U8&#13;
- Removed support for RHEL 7U2&#13;
- Removed support for RHEL 7U3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1566820800">- Changed version to 12.4&#13;
- Added support for RHEL 7U7&#13;
- Added support for RHEL 8U1&#13;
- Added support for SLES 12 SP5&#13;
- Removed support for RHEL 6U9&#13;
- Removed support for RHEL 6U10&#13;
- Removed support for RHEL 7U4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1583150400">- Changed version to 12.6&#13;
- Added support for RHEL 7U8&#13;
- Added support for RHEL 8U2&#13;
- Added support for SLES 15 SP2&#13;
- Removed support for SLES 12 SP2&#13;
- Removed support for SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1587384000">- Changed version to 12.8&#13;
- Initial build</changelog>
  </package>
  <package pkgid="dad76d94b954d64262622e76e0bcf25818115651cb9e525c7efd9ea887060689" name="kmod-elx-lpfc" arch="x86_64">
    <version epoch="0" ver="12.8.528.29_k3.10.0_1160.36.2" rel="1.rhel7u9"/>
    <changelog author="Emulex Automated Build User&#13;" date="1442750400">- Changed version to 10.7&#13;
- Added support for RHEL 6U8&#13;
- Added support for RHEL 7U2&#13;
- Added support for SLES12 SP1</changelog>
    <changelog author="Emulex Automated Build User&#13;" date="1453723200">- Changed version to 11.0</changelog>
    <changelog author="Emulex Automated Build User&#13;" date="1472472000">- Changed version to 11.1&#13;
- Added support for RHEL 7U3&#13;
- Added support for SLES 12 SP2&#13;
- Removed support for RHEL 6U5</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1497441600">- Changed version to 11.2&#13;
- Added support for RHEL 6U9&#13;
- Added support for RHEL 7U4&#13;
- Added support for SLES 12 SP3&#13;
- Removed support for RHEL 7U0&#13;
- Removed support for SLES 12 SP0</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1505908800">- Changed version to 11.4&#13;
- Removed support for RHEL 6U6&#13;
- Removed support for RHEL 7U1&#13;
- Added support for RHEL 7U5&#13;
- Added support for SLES 15 SP0</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1507550400">- Changed version to 12.0&#13;
- Removed support for RHEL 6U7&#13;
- Removed support for SLES 12 SP1&#13;
- Added support for RHEL 6U10&#13;
- Added support for RHEL 7U6&#13;
- Added support for RHEL 8U0&#13;
- Added support for SLES 12 SP4&#13;
- Added support for SLES 15 SP1</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1556539200">- Changed version to 12.2&#13;
- Removed support for SLES 11 SP3&#13;
- Removed support for SLES 11 SP4&#13;
- Removed support for RHEL 6U8&#13;
- Removed support for RHEL 7U2&#13;
- Removed support for RHEL 7U3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1566820800">- Changed version to 12.4&#13;
- Added support for RHEL 7U7&#13;
- Added support for RHEL 8U1&#13;
- Added support for SLES 12 SP5&#13;
- Removed support for RHEL 6U9&#13;
- Removed support for RHEL 6U10&#13;
- Removed support for RHEL 7U4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1583150400">- Changed version to 12.6&#13;
- Added support for RHEL 7U8&#13;
- Added support for RHEL 8U2&#13;
- Added support for SLES 15 SP2&#13;
- Removed support for SLES 12 SP2&#13;
- Removed support for SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1587384000">- Changed version to 12.8&#13;
- Initial build</changelog>
  </package>
  <package pkgid="716f42f0a7d7823c88ea71e7c01e738e8bd605b8a779e33d54c093c721eaee91" name="kmod-elx-lpfc" arch="x86_64">
    <version epoch="0" ver="12.8.528.7" rel="1.rhel7u8"/>
    <changelog author="Emulex Automated Build User&#13;" date="1442750400">- Changed version to 10.7&#13;
- Added support for RHEL 6U8&#13;
- Added support for RHEL 7U2&#13;
- Added support for SLES12 SP1</changelog>
    <changelog author="Emulex Automated Build User&#13;" date="1453723200">- Changed version to 11.0</changelog>
    <changelog author="Emulex Automated Build User&#13;" date="1472472000">- Changed version to 11.1&#13;
- Added support for RHEL 7U3&#13;
- Added support for SLES 12 SP2&#13;
- Removed support for RHEL 6U5</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1497441600">- Changed version to 11.2&#13;
- Added support for RHEL 6U9&#13;
- Added support for RHEL 7U4&#13;
- Added support for SLES 12 SP3&#13;
- Removed support for RHEL 7U0&#13;
- Removed support for SLES 12 SP0</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1505908800">- Changed version to 11.4&#13;
- Removed support for RHEL 6U6&#13;
- Removed support for RHEL 7U1&#13;
- Added support for RHEL 7U5&#13;
- Added support for SLES 15 SP0</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1507550400">- Changed version to 12.0&#13;
- Removed support for RHEL 6U7&#13;
- Removed support for SLES 12 SP1&#13;
- Added support for RHEL 6U10&#13;
- Added support for RHEL 7U6&#13;
- Added support for RHEL 8U0&#13;
- Added support for SLES 12 SP4&#13;
- Added support for SLES 15 SP1</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1556539200">- Changed version to 12.2&#13;
- Removed support for SLES 11 SP3&#13;
- Removed support for SLES 11 SP4&#13;
- Removed support for RHEL 6U8&#13;
- Removed support for RHEL 7U2&#13;
- Removed support for RHEL 7U3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1566820800">- Changed version to 12.4&#13;
- Added support for RHEL 7U7&#13;
- Added support for RHEL 8U1&#13;
- Added support for SLES 12 SP5&#13;
- Removed support for RHEL 6U9&#13;
- Removed support for RHEL 6U10&#13;
- Removed support for RHEL 7U4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1583150400">- Changed version to 12.6&#13;
- Added support for RHEL 7U8&#13;
- Added support for RHEL 8U2&#13;
- Added support for SLES 15 SP2&#13;
- Removed support for SLES 12 SP2&#13;
- Removed support for SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1587384000">- Changed version to 12.8&#13;
- Initial build</changelog>
  </package>
  <package pkgid="ac76f5004eaa3a8e315257ce7176f9d2506939cfd25de92ab0419ccec8cd23cc" name="kmod-elx-lpfc" arch="x86_64">
    <version epoch="0" ver="12.8.528.7" rel="1.rhel8u4"/>
    <changelog author="Emulex Automated Build User&#13;" date="1442750400">- Changed version to 10.7&#13;
- Added support for RHEL 6U8&#13;
- Added support for RHEL 7U2&#13;
- Added support for SLES12 SP1</changelog>
    <changelog author="Emulex Automated Build User&#13;" date="1453723200">- Changed version to 11.0</changelog>
    <changelog author="Emulex Automated Build User&#13;" date="1472472000">- Changed version to 11.1&#13;
- Added support for RHEL 7U3&#13;
- Added support for SLES 12 SP2&#13;
- Removed support for RHEL 6U5</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1497441600">- Changed version to 11.2&#13;
- Added support for RHEL 6U9&#13;
- Added support for RHEL 7U4&#13;
- Added support for SLES 12 SP3&#13;
- Removed support for RHEL 7U0&#13;
- Removed support for SLES 12 SP0</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1505908800">- Changed version to 11.4&#13;
- Removed support for RHEL 6U6&#13;
- Removed support for RHEL 7U1&#13;
- Added support for RHEL 7U5&#13;
- Added support for SLES 15 SP0</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1507550400">- Changed version to 12.0&#13;
- Removed support for RHEL 6U7&#13;
- Removed support for SLES 12 SP1&#13;
- Added support for RHEL 6U10&#13;
- Added support for RHEL 7U6&#13;
- Added support for RHEL 8U0&#13;
- Added support for SLES 12 SP4&#13;
- Added support for SLES 15 SP1</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1556539200">- Changed version to 12.2&#13;
- Removed support for SLES 11 SP3&#13;
- Removed support for SLES 11 SP4&#13;
- Removed support for RHEL 6U8&#13;
- Removed support for RHEL 7U2&#13;
- Removed support for RHEL 7U3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1566820800">- Changed version to 12.4&#13;
- Added support for RHEL 7U7&#13;
- Added support for RHEL 8U1&#13;
- Added support for SLES 12 SP5&#13;
- Removed support for RHEL 6U9&#13;
- Removed support for RHEL 6U10&#13;
- Removed support for RHEL 7U4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1583150400">- Changed version to 12.6&#13;
- Added support for RHEL 7U8&#13;
- Added support for RHEL 8U2&#13;
- Added support for SLES 15 SP2&#13;
- Removed support for SLES 12 SP2&#13;
- Removed support for SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1587384000">- Changed version to 12.8&#13;
- Initial build</changelog>
  </package>
  <package pkgid="5f0789cb5c8010a72fc811df0575d463094ea30b1444621e486eb23c8f402049" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.17.4" rel="1.rhel7u8"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.17.4-1.rhel7u8" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="db70d033e16fe545d57e8d9a060f64581484f644e6e770d8a60c324222278eef" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.17.4" rel="1.rhel7u9"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.17.4-1.rhel7u9" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="48d1fee73e1141719179c62e99df6d34459b14749002a91bea2d161c6a7ff53a" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.17.4" rel="1.rhel8u3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.17.4-1.rhel8u3" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="6290cdc090d8cddc97f1084cef431b3477393fe194965bfdbc22db788a7da8e9" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.17.4" rel="1.rhel8u4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.17.4-1.rhel8u4" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="e7c23a5bddbc1649bbdd6ed910199320db1816171d8091460de658fa5c6d1fa1" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="4.2.7" rel="1.rhel7u8"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="297ef2738e59d7a4a73e9127404c0de1f12d325d16fbc115e7707308e5ae1e9f" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="4.2.7" rel="1.rhel7u9"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="c4a8da9b54e17a78e4eb99be1a47fc385871cc9ab5cae312ae15b55820fe991d" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="4.2.7" rel="1.rhel8u3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="7c560e3ed6516236e637bdc24156e9326cfbfff40eb6994116b08c8061e34871" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="4.2.7" rel="1.rhel8u4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="d532a6b12e46e4b2b6f4a6d477d9e2615e9ee1c89371c71d527ad3a612dbcb15" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="6.8.5" rel="2.rhel7u8"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="0e56f057a59581190d9a0cc9a307fa168ee55bec9a971ed859257d1258df383c" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="6.8.5" rel="2.rhel7u9"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="0cd79a703b7840141562362f9c6e13694606dbd74b855c310778aff21dfd4d8a" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="6.8.5" rel="2.rhel8u3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="b531e676f3b45287cc935fa61432ec7895a666f94a4fc05293afa11c797afe26" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="6.8.5" rel="2.rhel8u4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="d1e578888bb54025a219763cefbd3f89ee69cc47be93642b8bf1a72b86675eeb" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.13.4" rel="1.rhel7u8"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="018dd324cd4a6dd21190d3a3b837b895df765a443c9d6e99267ef4ccf18d5bf2" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.13.4" rel="1.rhel7u9"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="384eab25fa3b016fc8a0ad0edd185b005664faf699aacf637afa7df2b4675fec" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.13.4" rel="1.rhel8u3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="204f472f0d99a309d1d030534a705aa457e13e58e818447ee1ffd7c5ebbbf501" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.13.4" rel="1.rhel8u4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="e14184f93b45f64cc467b67e8c26fedfadd7637b27647c3cc6d83ed3981d15f2" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.13.3" rel="1.rhel7u8"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="73bd74754ca3dd5cbede001f66aae7a0e85e0212d86a7378a3a3ef60a255983b" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.13.3" rel="1.rhel7u9"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="ad40bd2d34f21df0a1a6795a6fb83755ca5edc9e553c53cb4df0ef32123a9da8" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.13.3" rel="1.rhel8u3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="960cd3eae4f8c0fda7e78f28cf7d3174444d2a71abdb16ce190f6edeb8f8688b" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.13.3" rel="1.rhel8u4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="6a4782ebb153dc092f44a6ff973054c5e0e28ad2166437b9956625027b29a688" name="kmod-ice" arch="x86_64">
    <version epoch="0" ver="1.6.4" rel="1.rhel7u8"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="60d73d8bf3736cab57def18f34782c8e7145a2ada88514b0f7dcf3cebd58a5d5" name="kmod-ice" arch="x86_64">
    <version epoch="0" ver="1.6.4" rel="1.rhel7u9"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="3b18d396129e7810b39589c7cd5091d78cab1e5eb5cb2373e335abdbc4074329" name="kmod-ice" arch="x86_64">
    <version epoch="0" ver="1.6.4" rel="1.rhel8u3"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="25ae7d0dd7eff455987e9e7a41ce7c82b6f42df9d4ada75dd2c69f89827737db" name="kmod-ice" arch="x86_64">
    <version epoch="0" ver="1.6.4" rel="1.rhel8u4"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="d63bed5720a0359973122639aa5befe966fa8dfb507e1d8cae79d0c47413f2bc" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.18.0" rel="1.rhel7u8"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 4.18.0-1.rhel7u8</changelog>
  </package>
  <package pkgid="f7a9d9b0c3264447f8f259f7374304a59c20f6300c17c01ce85d427b17b934c9" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.18.0" rel="1.rhel7u9"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 4.18.0-1.rhel7u9</changelog>
  </package>
  <package pkgid="00af5e1ca295b4550fd57b97845496aa310ff19b37fd6cf972c83c5d0bb02895" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.18.0" rel="1.rhel8u4"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 4.18.0-1.rhel8u4</changelog>
  </package>
  <package pkgid="f5e93f6dd6bc45d17ada7aca15615e18f99672c87b988a69ef0b5a4f9fc4531d" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.18.0" rel="1.rhel8u5"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 4.18.0-1.rhel8u5</changelog>
  </package>
  <package pkgid="f30f0681ce8957e76bb598ff23ab3c8c9f9f71054a72e6d4d167fd044238f2cc" name="kmod-megaraid_sas" arch="x86_64">
    <version epoch="0" ver="07.706.05.00" rel="14.rhel7u5"/>
  </package>
  <package pkgid="254b6c12dfb1c47226a5bbd95a5fe7176c0409e90717aaebbed090c0dacbc308" name="kmod-megaraid_sas" arch="x86_64">
    <version epoch="0" ver="07.706.05.00" rel="14.rhel7u6"/>
  </package>
  <package pkgid="d324ca1c8aa90669312cde65ecd208183e6421ecfde8f884347717cd33e14216" name="kmod-megaraid_sas" arch="x86_64">
    <version epoch="0" ver="07.716.02.00" rel="1.rhel7u8"/>
  </package>
  <package pkgid="0137a6351e184902b94d7a8c34bf0a77cd8c9bb496039dcc12eb7df7fe2c0e44" name="kmod-megaraid_sas" arch="x86_64">
    <version epoch="0" ver="07.716.02.00" rel="1.rhel7u9"/>
  </package>
  <package pkgid="1bc2288e88475d2a7e3dc23ec18e7a41daf244cd92190fd60b7251b10923c70d" name="kmod-megaraid_sas" arch="x86_64">
    <version epoch="0" ver="07.719.04.00_el8.4" rel="1"/>
  </package>
  <package pkgid="946300d545ee79d964b85b970cee69cab61b4523daf61be11095890467f26799" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.9" rel="OFED.4.9.4.0.8.1.rhel7u8"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="806e828d9fd84ab332c3c61d8759ff1b4498e8aa3d23cd75249e5666e50555bc" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.9" rel="OFED.4.9.4.0.8.1.rhel7u9"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="24c79d776e0133a746eecc8f944ab5171289b592d45e923be6085c06fc83a449" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.9" rel="OFED.4.9.4.0.8.1.rhel8u4"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="d87870d048be9451e7ef80b7149292bef1c6737898003f7d1ffbc12907a0078b" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.5" rel="OFED.5.5.1.0.3.1.rhel7u8"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="6e66697323cce8aac4d2a458ce4e043e9ba070962b70d258302d65e3a372861e" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.5" rel="OFED.5.5.1.0.3.1.rhel7u9"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="15108383c6762127b6fa5bc5f02780a1f9b86100bff057909c654cb65e57a02f" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.5" rel="OFED.5.5.1.0.3.1.rhel8u4"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="6fe97059f8d72465d7b2715367036c8f1bb0620a97c0daa4aa89742f74c9f3d5" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.5" rel="OFED.5.5.1.0.3.1.rhel8u5"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="3b4eaed609fd8b46110e647381cd39a30440f031a63cb449b846339337758a5b" name="kmod-netxtreme2" arch="x86_64">
    <version epoch="0" ver="7.15.02" rel="1.rhel7u8"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="795265213ab3a8d3c7de1084cc547790e790617b999ca43d17934b45fcec85e6" name="kmod-netxtreme2" arch="x86_64">
    <version epoch="0" ver="7.15.02" rel="1.rhel7u9"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="70d0a208cd5a8ea004ca79cf9e2a8b6cc34731562de98691513f692482b99129" name="kmod-netxtreme2" arch="x86_64">
    <version epoch="0" ver="7.15.02" rel="1.rhel8u4"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="5bddff5b4f526a41d00a635cae8d6452403c4a9530f6355ba8efd0af72c1cecf" name="kmod-netxtreme2" arch="x86_64">
    <version epoch="0" ver="7.15.03" rel="2.rhel8u5"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="93709719c7c6edf4deb92c90563f8deb0baecaab020c5f8aa25b0166f836a56d" name="kmod-qlgc-fastlinq" arch="x86_64">
    <version epoch="0" ver="8.55.15.0" rel="1.rhel7u8"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="41254475262e3c8af5406876117dc2ec25b154704b2470a0f837578a625c094b" name="kmod-qlgc-fastlinq" arch="x86_64">
    <version epoch="0" ver="8.55.15.0" rel="1.rhel7u9"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="ec8c6eaaf90902184e418c13475d807e2253ad40f43f201c6a6c2b16f7ed03be" name="kmod-qlgc-fastlinq" arch="x86_64">
    <version epoch="0" ver="8.55.15.0" rel="1.rhel8u4"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="66f8bb076cf570efaeccf22cb1e5b6b3506b0c145f9297aba3431a391c3fb0b8" name="kmod-qlgc-fastlinq" arch="x86_64">
    <version epoch="0" ver="8.59.6.0" rel="1.rhel8u5"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="49413d97281ab9ac1505545c6a591903ca94503ae9ed4c2cccaa991dcdca8743" name="kmod-qlgc-qla2xxx" arch="x86_64">
    <version epoch="0" ver="10.02.01.00.a14_k1" rel="1.rhel7u8"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.01.00.a14-k1-1" date="1604923200">- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.02.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.02.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario. 
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes 
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to segregate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes 
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 : extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing the firmware dump while running the qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout 
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation. 
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose
Change - qla2xxx: Add error counters to debugfs node

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="79c2472927721e1148efea20c20f32728cd9bf5f2beadd14f504aa315f8248c3" name="kmod-qlgc-qla2xxx" arch="x86_64">
    <version epoch="0" ver="10.02.01.00.a14_k1" rel="1.rhel7u9"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.01.00.a14-k1-1" date="1604923200">- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.02.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.02.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario. 
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes 
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to segregate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes 
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 : extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing the firmware dump while running the qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout 
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation. 
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose
Change - qla2xxx: Add error counters to debugfs node

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="3be3cfdca8cd1b4fddb1ed2b3d5e676f8a85f422a339e231b31c842cf34478cb" name="kmod-qlgc-qla2xxx" arch="x86_64">
    <version epoch="0" ver="10.02.01.01.a2_k1" rel="4.rhel8u4"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.01.01.a2-k1-4" date="1627300800">- 10.02.01.01.a2-k1 BH 03/04/2021
- ERXXXXXX: qla2xxx: fixes for compilation on RHEL8.4
- ERXXXXXX: qla2xxx: Updated README file for RHEL8.4

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.02.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.02.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario. 
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes 
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to segregate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes 
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 : extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing the firmware dump while running the qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout 
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation. 
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose
Change - qla2xxx: Add error counters to debugfs node

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="ec2bb108038a2429cf48694fcc24b7d0fa633b9a98ea13bcc6325e0cbe8fabb3" name="kmod-qlgc-qla2xxx" arch="x86_64">
    <version epoch="0" ver="10.02.06.03_k1" rel="1.rhel8u5"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.06.03-k1-1" date="1638964800">- 10.02.06.03-k1 BH 12/04/2021
- FCD-886: Hard Lockup on Unload/Load task with serial log enabled
Changes: qla2xxx: readme: known issue when serial console and logging is enabled.
Documented on README file.
- FCD-926: lockdown: lower debug severity messages
Changes: Lower the severity of various log messages.
- FCD-868: lockdown: "Unsupported Firmware" message
Changes: Fix this issue by reading value at bits level from variable.

- 10.02.06.03.a1-k1 BH 10/18/2021
- FCD-701: Fix device reconnect in loop topology
Changes: qla2xxx: Taking the main login path that acquires device handle.
- FCD-704: The external flag for tcm_qla2xxx was not set.
Changes: qla2xxx: Add tcm_qla2xxx to externally supported module list.
- FCD-774: Source driver gives compilation error on RHEL8.5
Changes: qla2xxx: Offending code on tcm_qla2xxx module has been removed

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="0eafef2af4feecfa0124501d5242f9f31f91c8d893283e19d00de7d1f78ca00d" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="2.1.16" rel="030.rhel7u8"/>
  </package>
  <package pkgid="a0246ac8ee80b03e8df16973374f1637aed9355fb364624d7c1b777715d3a6fc" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="2.1.16" rel="030.rhel7u9"/>
  </package>
  <package pkgid="26341ab9ff65ad91bc15fad07d4ac5a988f763be88b61a3ab1831a52f6bac926" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="2.1.16" rel="030.rhel8u4"/>
  </package>
  <package pkgid="1b8df7adc146b796aa3f1b28cfa27c5a344ca6cc580e9428d9dbb922d40dace0" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="2.1.16" rel="030.rhel8u5"/>
  </package>
  <package pkgid="dae0e63bcf4463e29581df289adaaf3bd3774f1084c9f259a148dd36d299eab8" name="kmod-tg3" arch="x86_64">
    <version epoch="0" ver="3.139b" rel="1.rhel7u8"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497441600">- Add workaround for 5762 MRRS  (Severity:Medium)
- Update copyright year to 2017 (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="28eeac86a3f9fd76cb781e76c0e4a642778c69bb8ed452464ad7afb95ecc54de" name="kmod-tg3" arch="x86_64">
    <version epoch="0" ver="3.139b" rel="1.rhel7u9"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497441600">- Add workaround for 5762 MRRS  (Severity:Medium)
- Update copyright year to 2017 (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="505f4e422543fcc268f5937a6858ec7d2ea6f775c2265306a42e6aed5d9f75a5" name="kmod-tg3" arch="x86_64">
    <version epoch="0" ver="3.139b" rel="1.rhel8u3"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497441600">- Add workaround for 5762 MRRS  (Severity:Medium)
- Update copyright year to 2017 (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="1d162ea0c293a9ad536ea9514ff1b850e2447a206c691c8445039274f9ac0883" name="kmod-tg3" arch="x86_64">
    <version epoch="0" ver="3.139b" rel="1.rhel8u4"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497441600">- Add workaround for 5762 MRRS  (Severity:Medium)
- Update copyright year to 2017 (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="e660c3333f52d83df50bccd741042e55292da7f28cfb64ac0b2ea7a3c58fe2e1" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="216.0.88.3" rel="sles15sp0"/>
  </package>
  <package pkgid="f4582c45aa7a712a741ab7fda5a4043133f9a8a4aa3980abd8bfb19e30afbef8" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="218.0.7.0" rel="rhel8u2"/>
  </package>
  <package pkgid="9837e0706f1ec2db35945df424a7a17e17e296fab04feb7181f79f5f6981ef63" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="218.0.7.0" rel="rhel8u3"/>
  </package>
  <package pkgid="290d1d5cd254a1e70cbcf2e833fbc9761ebaa069fe8958ba86d2f677417209b3" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="218.0.7.0" rel="sles12sp4"/>
  </package>
  <package pkgid="efda3a8ba69b9be443443b26f084fe5749dfd873fbb89c9aa0a30ba3b244702b" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="218.0.7.0" rel="sles15sp1"/>
  </package>
  <package pkgid="86173d1eebb63c27ebe8dd858781848d62d295d90d727c5a49ae7eba2fa02f7e" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="219.0.8.0" rel="rhel7u8"/>
  </package>
  <package pkgid="fa819a6c349762547b6874bf7d1cce62b8364330b7ea5c3c3595abce6a3179f8" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="219.0.8.0" rel="rhel7u9"/>
  </package>
  <package pkgid="a86642c57c56b0c08bd7e435a09759dcdb8acc9735083d90ef069b1c383812d0" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="219.0.8.0" rel="rhel8u4"/>
  </package>
  <package pkgid="66f6e7a42a6daf7071bb72f71d2ad73f572321d9e26b455acac76e740e718da3" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="219.0.8.0" rel="sles12sp5"/>
  </package>
  <package pkgid="a10fe6cee8d8f4d1e8e6b19ce527c5bdd5efd72757fdded860dc0c8d304300c1" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="219.0.8.0" rel="sles15sp2"/>
  </package>
  <package pkgid="6591e47f64343deabc6c54353d7167c311202d4046485876895307301d798818" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="219.0.8.0" rel="sles15sp3"/>
  </package>
  <package pkgid="34b2697c679495c40aee83503012af2d2f300419546bffa867a30b0aa8d6e7df" name="lsi-megaraid_sas-kmp-default" arch="x86_64">
    <version epoch="0" ver="07.706.05.00" rel="14.sles12sp3"/>
  </package>
  <package pkgid="769d731c126fcf7ac2918c0f59ef3fd25bb8c63dde4486fcd49d050ec98ee8fd" name="lsi-megaraid_sas-kmp-default" arch="x86_64">
    <version epoch="0" ver="07.706.05.00" rel="14.sles12sp4"/>
  </package>
  <package pkgid="08766007d43a682bee91ebe76957b7efd313bd9ac97c61dd245266990f6c8c8b" name="lsi-megaraid_sas-kmp-default" arch="x86_64">
    <version epoch="0" ver="07.706.05.00" rel="14.sles15sp0"/>
  </package>
  <package pkgid="d6b8bc03cef2fb4d9a091775adc54b145ed61c0532d3e4f0669a61db45a32b2b" name="lsi-megaraid_sas-kmp-default" arch="x86_64">
    <version epoch="0" ver="07.716.02.00_sles12sp4" rel="1"/>
  </package>
  <package pkgid="93297e83864dd4108565692e22bb0f7c2283e3c45eaf95dff8feaf534400a82f" name="lsi-megaraid_sas-kmp-default" arch="x86_64">
    <version epoch="0" ver="07.716.02.00_sles12sp5" rel="1"/>
  </package>
  <package pkgid="ddea90d903d7176184f9641f1ce71ac3495d2deebe897a4ace193e06ec5b47b2" name="lsi-megaraid_sas-kmp-default" arch="x86_64">
    <version epoch="0" ver="07.719.04.00_sles15sp2" rel="1"/>
  </package>
  <package pkgid="af9514d8e3b5d808188490891e29f0cd834e18b7d450dab6360c8da5b486ed4c" name="lsi-megaraid_sas-kmp-default" arch="x86_64">
    <version epoch="0" ver="07.719.04.00_sles15sp3" rel="1"/>
  </package>
  <package pkgid="58556cceec5c7e3d115d4b151d3ba1d7f1ad7374ec0864491772ea80dafb6697" name="mft" arch="x86_64">
    <version epoch="0" ver="4.18.0" rel="106.rhel7u8"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 4.18.0-106.rhel7u8</changelog>
  </package>
  <package pkgid="447dc6466b34c172d245e962348745eb929b1c7e2349cc4bbf6ba65cfc87d683" name="mft" arch="x86_64">
    <version epoch="0" ver="4.18.0" rel="106.rhel7u9"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 4.18.0-106.rhel7u9</changelog>
  </package>
  <package pkgid="0ddea7c5287190bdf66ace5dae50cff8dfcf864acf7be7e8456d66624e629072" name="mft" arch="x86_64">
    <version epoch="0" ver="4.18.0" rel="106.rhel8u4"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 4.18.0-106.rhel8u4</changelog>
  </package>
  <package pkgid="a39860c827cfe9b16cdccb41d7a3c2127e5166a3c963997f008e90c078377c95" name="mft" arch="x86_64">
    <version epoch="0" ver="4.18.0" rel="106.rhel8u5"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 4.18.0-106.rhel8u5</changelog>
  </package>
  <package pkgid="3043bd5b94b54a4eeaa126c136557cd05ad457bc5623cc9cc311dfe651344274" name="mft" arch="x86_64">
    <version epoch="0" ver="4.18.0" rel="106.sles12sp4"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 4.18.0-106.sles12sp4</changelog>
  </package>
  <package pkgid="842cd1db2243071306009ccd2e211a4118458e889a785d3922bdd98f8dd3dcf7" name="mft" arch="x86_64">
    <version epoch="0" ver="4.18.0" rel="106.sles12sp5"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 4.18.0-106.sles12sp5</changelog>
  </package>
  <package pkgid="98c2922ef12e027813c195b990e2cad1ecdfbc18c7ae346ad46c38e49acdbc94" name="mft" arch="x86_64">
    <version epoch="0" ver="4.18.0" rel="106.sles15sp2"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 4.18.0-106.sles15sp2</changelog>
  </package>
  <package pkgid="05cbd769ef8c07fd1dd121bf9e11a23fb11b92e453e194a4967c3543ed348ad5" name="mft" arch="x86_64">
    <version epoch="0" ver="4.18.0" rel="106.sles15sp3"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 4.18.0-106.sles15sp3</changelog>
  </package>
  <package pkgid="0971cb9773b1367de7e3fe1834fb5743dab6e696f7cc2bd06a34ff98f043f2bb" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.9" rel="OFED.4.9.4.0.8.1.rhel7u8"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1632312000">- Release version 4.9-OFED.4.9.4.0.8.1.rhel7u8</changelog>
  </package>
  <package pkgid="980d7a324d80873d50e205dbea701ba397111a4f6fb26e8254ec80b3b1c2f0ec" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.9" rel="OFED.4.9.4.0.8.1.rhel7u9"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1632312000">- Release version 4.9-OFED.4.9.4.0.8.1.rhel7u9</changelog>
  </package>
  <package pkgid="9c1ca5348d651968ccde64ed0f75364cb84cae33e1daf379eb3147482b441c67" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.9" rel="OFED.4.9.4.0.8.1.rhel8u4"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1632312000">- Release version 4.9-OFED.4.9.4.0.8.1.rhel8u4</changelog>
  </package>
  <package pkgid="d7e1655acf5e2969b30518b7af218b6087b7e80a672d91e2b3910065bb8c15fa" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.9" rel="OFED.4.9.4.0.8.1.sles12sp4"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1632312000">- Release version 4.9-OFED.4.9.4.0.8.1.sles12sp4</changelog>
  </package>
  <package pkgid="56164f53b457c23494fedd123c762e355f0c570a2caa55b17c984957c932bee7" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.9" rel="OFED.4.9.4.0.8.1.sles12sp5"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1632312000">- Release version 4.9-OFED.4.9.4.0.8.1.sles12sp5</changelog>
  </package>
  <package pkgid="551e817cc219a53ebf0a79666841f951dffc1cfc987cd5ba632b2de9d2cb64c1" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.9" rel="OFED.4.9.4.0.8.1.sles15sp2"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1632312000">- Release version 4.9-OFED.4.9.4.0.8.1.sles15sp2</changelog>
  </package>
  <package pkgid="cd7505fd323d31a151768b57e35734f8c6abd1a7d377f156cf2fb6a17a397444" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.9" rel="OFED.4.9.4.0.8.1.sles15sp3"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1632312000">- Release version 4.9-OFED.4.9.4.0.8.1.sles15sp3</changelog>
  </package>
  <package pkgid="4afd66120c271c6f271c1e9f786a3b8df83b038d433e4ec0cd78487e84d6ce17" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.5" rel="OFED.5.5.1.0.3.1.rhel7u8"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 5.5-OFED.5.5.1.0.3.1.rhel7u8</changelog>
  </package>
  <package pkgid="8565b1142c738179ff67cf64308192c2015642209b54776ca0501b60b66b466a" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.5" rel="OFED.5.5.1.0.3.1.rhel7u9"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 5.5-OFED.5.5.1.0.3.1.rhel7u9</changelog>
  </package>
  <package pkgid="eabf8bdbd3d5ce9fabf29b69c599cc45a6186f5c553762f33b1dc3c1af122c8b" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.5" rel="OFED.5.5.1.0.3.1.rhel8u4"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 5.5-OFED.5.5.1.0.3.1.rhel8u4</changelog>
  </package>
  <package pkgid="f90c15c1e074051b73d41123357a102a89e3f2c44c860b1cd1ef0bd299b25cba" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.5" rel="OFED.5.5.1.0.3.1.rhel8u5"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 5.5-OFED.5.5.1.0.3.1.rhel8u5</changelog>
  </package>
  <package pkgid="bbd9532bbb3b3dba8a17ec2a2143040a506fe2c00b8ff60f5c952a6be5c2a99e" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.5" rel="OFED.5.5.1.0.3.1.sles12sp4"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 5.5-OFED.5.5.1.0.3.1.sles12sp4</changelog>
  </package>
  <package pkgid="8f8c92d9be7e0b93f7d69b5e4a559d045e19f4f196fa2a809169cff451b3dfe3" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.5" rel="OFED.5.5.1.0.3.1.sles12sp5"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 5.5-OFED.5.5.1.0.3.1.sles12sp5</changelog>
  </package>
  <package pkgid="d4bce109351763a2a87c2b9a025176c01fc098cb02106b7a71b7623afc43ade5" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.5" rel="OFED.5.5.1.0.3.1.sles15sp2"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 5.5-OFED.5.5.1.0.3.1.sles15sp2</changelog>
  </package>
  <package pkgid="cea911622e18d9b58b7dfc4582074ac259d9e55c45df3547944e45988516952d" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.5" rel="OFED.5.5.1.0.3.1.sles15sp3"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1638360000">- Release version 5.5-OFED.5.5.1.0.3.1.sles15sp3</changelog>
  </package>
  <package pkgid="0dc9fdf7a447bee93b2558ce026204dd63be630c19d5c51c2834d8bd83daad22" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.9_k4.12.14_120" rel="OFED.4.9.4.0.8.1.sles12sp5"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="0dc39d423f2e180990528a0337d397b8695409e51bf50966b5009e112c7d4cf4" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.9_k4.12.14_94.41" rel="OFED.4.9.4.0.8.1.sles12sp4"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="8cee5784c11b8e417c8dd0218eff519b81422259db2c34d398048d911fefae01" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.9_k5.3.18_57" rel="OFED.4.9.4.0.8.1.sles15sp3"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="f8a93c3046ceb2b0ee4e07ca994535fa05b97b7dbd47afa59f9cc0b54d963715" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.5_k4.12.14_120" rel="OFED.5.5.1.0.3.1.sles12sp5"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="3ffc76f339eeb0c4c2ddd6f74913bc64201d2dfd88e2a063a4f3ef6278c57368" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.5_k4.12.14_94.41" rel="OFED.5.5.1.0.3.1.sles12sp4"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="24e2cedafb29d727b3fcf702c5e17a1c0074dee34ea80a180cd848adc5448a7c" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.5_k5.3.18_22" rel="OFED.5.5.1.0.3.1.sles15sp2"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="b40c34e58f50f09be4d1cc5e8ed58a5ffaa5a0c5f6ca7ca5eadaf553095e610e" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.5_k5.3.18_57" rel="OFED.5.5.1.0.3.1.sles15sp3"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="d970ca60c215ec29ffef69d740890694ed60e700a451aa927936344ed718695c" name="netxtreme2-kmp-default" arch="x86_64">
    <version epoch="0" ver="7.15.02_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="e0ef1da66750ed1dff54433dcc7feccea160341a5ced7d0f68545ea81b8ffe19" name="netxtreme2-kmp-default" arch="x86_64">
    <version epoch="0" ver="7.15.02_k5.3.18_22" rel="1.sles15sp2"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="b1cd1d16af155ffb45db2c7b720c7c55a68fef1f2c01274254ff5a3fb9850e03" name="netxtreme2-kmp-default" arch="x86_64">
    <version epoch="0" ver="7.15.02_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="57df41361a90472ac03771b08ee39ce38c14f5065d5db5fd4c6867e2eabcbbd8" name="nvmefc-connect" arch="noarch">
    <version epoch="0" ver="12.8.264.0" rel="1.rhel7u8"/>
  </package>
  <package pkgid="29560c39881ead28b7a8404be341095b04f9bfe3f603a604b32601726bbe5f6f" name="nvmefc-connect" arch="noarch">
    <version epoch="0" ver="12.8.264.0" rel="1.rhel7u9"/>
  </package>
  <package pkgid="0163d9753ead48c6379e0412fabd27178d9795779f511658a27e8277eeda02ff" name="qlgc-fastlinq-kmp-default" arch="x86_64">
    <version epoch="0" ver="8.55.15.0_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="aee7b6618777d946d2d55f47800df8dfb6b3bd6c74f356081c96635fb93022a4" name="qlgc-fastlinq-kmp-default" arch="x86_64">
    <version epoch="0" ver="8.55.15.0_k5.3.18_22" rel="1.sles15sp2"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="1414de5347f0fbbc34980eea24b0c3a571dc3e8c355fe351ed662183ac5621f3" name="qlgc-fastlinq-kmp-default" arch="x86_64">
    <version epoch="0" ver="8.55.15.0_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="f8986e6f415acee018984f58246e261adcde97054305cd8c397294aefd8b47bc" name="qlgc-qla2xxx-kmp-default" arch="x86_64">
    <version epoch="0" ver="10.02.01.00.a14_k1_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.01.00.a14-k1-1" date="1604923200">- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.02.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.02.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario. 
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes 
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to segregate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes 
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 : extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing the firmware dump while running the qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout 
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation. 
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose
Change - qla2xxx: Add error counters to debugfs node

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="c1305cd32d82453384c1e5d6d568a859ef435852c9abd71b5e65285f4cf75bc5" name="qlgc-qla2xxx-kmp-default" arch="x86_64">
    <version epoch="0" ver="10.02.01.00.a14_k1_k5.3.18_22" rel="1.sles15sp2"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.01.00.a14-k1-1" date="1604923200">- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.02.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.02.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario. 
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes 
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to segregate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes 
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 : extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing the firmware dump while running the qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout 
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation. 
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose
Change - qla2xxx: Add error counters to debugfs node

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="0cf845fb0526facda0e3b0dbe99c76fdd138659c0b2719adf3b2e7631ddb3cb5" name="qlgc-qla2xxx-kmp-default" arch="x86_64">
    <version epoch="0" ver="10.02.01.00.a14_k1_k5.3.18_57" rel="4.sles15sp3"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.01.00.a14-k1-4" date="1627300800">- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.02.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.02.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario. 
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes 
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to segregate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes 
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 : extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing the firmware dump while running the qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout 
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation. 
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose
Change - qla2xxx: Add error counters to debugfs node

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="2e041ce7ac9352f5e2617507e665baa273f82db9356c59fa2f58dff1c5e93b54" name="smartpqi-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.1.16" rel="030.sles12sp4"/>
  </package>
  <package pkgid="894c0d176fcbf5240078ef1575eecd7f819b004558cdafe0424f6f7e3f939a4f" name="smartpqi-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.1.16" rel="030.sles12sp5"/>
  </package>
  <package pkgid="828a1c1bbde6844bdee7d2cf138eebfd1b7bb9c85b8714f2dd3e39536c47fde5" name="smartpqi-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.1.16" rel="030.sles15sp2"/>
  </package>
  <package pkgid="febbca52ab64b22dab6ae77aba8bb0bc239a5a0bb7cb930f0e3a5782cf41e3f3" name="smartpqi-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.1.16" rel="030.sles15sp3"/>
  </package>
  <package pkgid="163b89b1d85f9edb1de34635deb59928d94390c4a002d95d32f030a42d50201f" name="ssa" arch="x86_64">
    <version epoch="0" ver="5.30" rel="6.0"/>
    <changelog author="Ver:5.30-6.0" date="1641384000">- Please see user documentation for details. (Severity: Low)</changelog>
  </package>
  <package pkgid="40a5339eef92d68c397ab2eff45d56705859d5335769a797e059d58c106a1c1c" name="ssacli" arch="x86_64">
    <version epoch="0" ver="5.30" rel="6.0"/>
    <changelog author="Ver:5.30-6.0" date="1641384000">- Please see user documentation for details. (Severity: Low)</changelog>
  </package>
  <package pkgid="baa82f5c5ec6323e0703f9c9ab91ace8a8f0f55bb24f98e02b2d19ae577fd9b2" name="ssaducli" arch="x86_64">
    <version epoch="0" ver="5.30" rel="6.0"/>
    <changelog author="Ver:5.30-6.0" date="1641384000">- Please see user documentation for details. (Severity: Low)</changelog>
  </package>
  <package pkgid="5eba37b4bb862347a81a17d5cd38a5ff4ee2cd66855c2dba19cbc3f45c45ff6a" name="storcli" arch="x86_64">
    <version epoch="0" ver="007.1616.0000.0000" rel="1"/>
  </package>
  <package pkgid="6c02ceb8ee1db834e47bb659313cbd4bbc483e324b5dab0ce56d78253ad377c0" name="sut" arch="x86_64">
    <version epoch="0" ver="2.9.1" rel="22.linux"/>
  </package>
  <package pkgid="88e4a8847cea627a477c6ac2bb57f12c3659f7d019dc94f214084259a7cb2200" name="tg3-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.139b_k4.12.14_120" rel="2.sles12sp5"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497355200">- Add workaround for MRRS of 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="f232f83f8b9dbc5ecfba96c746c38d8e1da8245e3a9b4b6d96f79e3be35f8494" name="tg3-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.139b_k5.3.18_22" rel="2.sles15sp2"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497355200">- Add workaround for MRRS of 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="01ce39ee7e53cab10839cde50df0d1630ec77fcd5cbe298f4b13c611406f2bbe" name="tg3-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.139b_k5.3.18_57" rel="2.sles15sp3"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497355200">- Add workaround for MRRS of 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
</otherdata>
</manifest>
