<?xml version="1.0" encoding="UTF-8"?>
<manifest schema_version="2.0.0.0">
<otherdata xmlns="http://linux.duke.edu/metadata/other" packages="394">
  <package pkgid="974943314e5ca70ea817ffafe6b69ad6bbbf616706e9273ef187115989f6bd01" name="HPE-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="14.0.499.28" rel="1.rhel8"/>
    <changelog author="Broadcom Automated Build User" date="1583150400">- Changed version to 12.6
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library
- Added support for SLES 15 SP2
- Removed support for SLES 12 SP2 and SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User" date="1583755200">- Changed version to 12.8
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1613044800">- Added support for SLES 15 SP3</changelog>
    <changelog author="Broadcom Automated Build User" date="1629720000">- Changed version to 14.0
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1633003200">- Added support for RHEL 8U5</changelog>
    <changelog author="Broadcom Automated Build User" date="1638187200">- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User" date="1638532800">- Added support for RHEL 9</changelog>
    <changelog author="Broadcom Automated Build User" date="1646222400">- Added support for RHEL 8U6</changelog>
    <changelog author="Broadcom Automated Build User" date="1664193600">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1664280000">- Added support for RHEL 8U7</changelog>
  </package>
  <package pkgid="3221a4e908209916b23b77c19d6c07775ad63a5816e08b663ffc6864a899499b" name="HPE-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="14.0.499.28" rel="1.sles12sp5"/>
    <changelog author="Broadcom Automated Build User" date="1583150400">- Changed version to 12.6
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library
- Added support for SLES 15 SP2
- Removed support for SLES 12 SP2 and SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User" date="1583755200">- Changed version to 12.8
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1613044800">- Added support for SLES 15 SP3</changelog>
    <changelog author="Broadcom Automated Build User" date="1629720000">- Changed version to 14.0
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1633003200">- Added support for RHEL 8U5</changelog>
    <changelog author="Broadcom Automated Build User" date="1638187200">- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User" date="1638532800">- Added support for RHEL 9</changelog>
    <changelog author="Broadcom Automated Build User" date="1646222400">- Added support for RHEL 8U6</changelog>
    <changelog author="Broadcom Automated Build User" date="1664193600">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1664280000">- Added support for RHEL 8U7</changelog>
  </package>
  <package pkgid="7d8278d1195a277dc516cec82cd81a5d91ae01e80dc6f034ae7ccc760d244ec7" name="HPE-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="14.0.499.28" rel="1.sles15sp3"/>
    <changelog author="Broadcom Automated Build User" date="1583150400">- Changed version to 12.6
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library
- Added support for SLES 15 SP2
- Removed support for SLES 12 SP2 and SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User" date="1583755200">- Changed version to 12.8
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1613044800">- Added support for SLES 15 SP3</changelog>
    <changelog author="Broadcom Automated Build User" date="1629720000">- Changed version to 14.0
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1633003200">- Added support for RHEL 8U5</changelog>
    <changelog author="Broadcom Automated Build User" date="1638187200">- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User" date="1638532800">- Added support for RHEL 9</changelog>
    <changelog author="Broadcom Automated Build User" date="1646222400">- Added support for RHEL 8U6</changelog>
    <changelog author="Broadcom Automated Build User" date="1664193600">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1664280000">- Added support for RHEL 8U7</changelog>
  </package>
  <package pkgid="584873a8e1cadbd8350df6ffed483ffbbcad349fd49c81086e8a1d21147dd3f9" name="HPE-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="14.0.499.28" rel="1.sles15sp4"/>
    <changelog author="Broadcom Automated Build User" date="1583150400">- Changed version to 12.6
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library
- Added support for SLES 15 SP2
- Removed support for SLES 12 SP2 and SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User" date="1583755200">- Changed version to 12.8
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1613044800">- Added support for SLES 15 SP3</changelog>
    <changelog author="Broadcom Automated Build User" date="1629720000">- Changed version to 14.0
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1633003200">- Added support for RHEL 8U5</changelog>
    <changelog author="Broadcom Automated Build User" date="1638187200">- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User" date="1638532800">- Added support for RHEL 9</changelog>
    <changelog author="Broadcom Automated Build User" date="1646222400">- Added support for RHEL 8U6</changelog>
    <changelog author="Broadcom Automated Build User" date="1664193600">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1664280000">- Added support for RHEL 8U7</changelog>
  </package>
  <package pkgid="d1291130a2bef866e0b58b4400e1801e32c90c90775cfe88970e31e178946970" name="HPE-CNA-FC-hpeqlgc-Enablement-Kit" arch="noarch">
    <version epoch="0" ver="6.0.0.0" rel="18"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1558094400">Enablement Kit Version: 6.0.0.0-9
---------------------------------

v6.04 build47:
-------------
Defect/Enhancement: Defect
Problem: Apps initialization delay seen with NPIV ports
Solution: Allow reading active flash regions for NPIV ports
Introduced: v6.04 build39
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build46:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Restrict application features for NVME targets
Introduced: v6.04 build45
Impact: HW: ISP2071, ISP2271, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1559908800">Enablement Kit Version: 6.0.0.0-10
----------------------------------

v6.04 build48:
-------------
Defect/Enhancement: Defect
Problem: NVME targets not seen when NVME Id and Subsys Id are different
Solution: Identify NVME targets using subsys Id
Introduced: v6.04 build42
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1565006400">Enablement Kit Version: 6.0.0.0-11
----------------------------------

v6.04 build49:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Allow SDGetActiveRegions API for 27xx based adapters
Introduced: v6.04 build45
Impact: HW: ISP2071, ISP2271, ISP2261, ISP2871, ISP2971, ISP2A61
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1572868800">Enablement Kit Version: 6.0.0.0-12
----------------------------------

v6.04 build52:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Allow SCM stats for NVMe targets for Marvell/QLogic Apps
Introduced: v6.04 build52
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

Defect/Enhancement: Enhancement
Problem: Modalias removal request from HPE
Solution: Remove modalias support from Enablement kit rpm
Introduced: Day One
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build51:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Add additional SCM stats for FCP targets for Marvell/QLogic Apps
Introduced: v6.04 build51
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

Defect/Enhancement: Defect
Problem: Corruption seen after flash update with some inbox drivers
	 when BSG device creation fails
Solution: Use /dev/bsg path to create BSG device creation
Introduced: v6.00 build9
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build50:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Allow SCM stats for FCP targets for Marvell/QLogic Apps
Introduced: v6.04 build50
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1587729600">Enablement Kit Version: 6.0.0.0-13
----------------------------------

v6.04 build55:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added MPI Firmware Dump support
Introduced: v6.04 build55
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271,
	    ISP2261, ISP2871, ISP2971, ISP2A61
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build54:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Secure remote port info support
Introduced: v6.04 build54
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build53:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Check driver for SCM stats support before reading SCM stats
Introduced: v6.04 build53
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1592481600">Enablement Kit Version: 6.0.0.0-14
----------------------------------

v6.04 build56:
-------------

Defect/Enhancement: Defect
Problem: LUN QoS API returns "Not Supported"
Solution: Fixed QoS value read issue in BSG path
Introduced: v6.04 build21
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271,
	    ISP2261, ISP2871, ISP2971, ISP2A61, ISP2031
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1593086400">Enablement Kit Version: 6.0.0.0-15
----------------------------------

v6.04 build57:
-------------

Defect/Enhancement: Defect
Problem: Delay seen in Application bringup on some inbox drivers
Solution: Do not perform retries for newer features if driver returns
	  not supported error
Introduced: v6.04 build28
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271,
	    ISP2261, ISP2871, ISP2971, ISP2A61
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="Marvell Semiconductor Inc." date="1599825600">Enablement Kit Version: 6.0.0.0-16
----------------------------------

v6.04 build63:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Allow NVMe specific APIs for newer ISPs
Introduced: v6.04 build63
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271,
	    ISP2261, ISP2871, ISP2971, ISP2A61
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build62:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added ISP FW and MPI FW lockdown bits
Introduced: v6.04 build62
Impact: HW: ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build61:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Provide lockdown mode error codes to apps
Introduced: v6.04 build61
Impact: HW: ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build60:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added adapter firmware lockdown support
Introduced: v6.04 build60
Impact: HW: ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build59:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added EP2989 support
Introduced: v6.04 build59
Impact: HW: EP2989
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build58:
-------------
Defect/Enhancement: Defect
Problem: HBA Parameters read fails for newer adapters for inbox drivers
Solution: Read active HBA Parameters region set from flash
Introduced: v6.04 build24
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="Marvell Semiconductor Inc." date="1627905600">Enablement Kit Version: 6.0.0.0-17
----------------------------------

v6.04 build75:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Mailbox passthru support
Introduced: v6.04 build75
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build74:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added NVRAM parameters for SCMR Profile support
Introduced: v6.04 build74
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build73:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added SCMR Profile support
Introduced: v6.04 build73
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build72:
-------------
Defect/Enhancement: Defect
Problem: Random apps crash seen when large number of vports present
Solution: Validate vport memory pointers before accessing it
Introduced: v6.04 build24
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build71:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added EP2881 and EP2981 support
Introduced: v6.04 build71
Impact: HW: EP2881, EP2981
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build70:
-------------
Defect/Enhancement: Defect
Problem: Flash update failure on UOS on ARM (aarch64)
Solution: Corrected BSG pointers for UOS on ARM
Introduced: v6.04 build24
Impact: HW: ISP2071, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build69:
-------------
Defect/Enhancement: Defect
Problem: Invalid LUN size display for small sized (In MBs) and large sized
	 (in TBs) NVMe LUNs
Solution: Use correct read capacity format to get LUN size of NVMe LUNs
Introduced: v6.04 build52
Impact: HW: ISP2071, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build68:
-------------
Defect/Enhancement: Defect
Problem: Apps delay seen with NVMe targets
Solution: Cache common NVMe target data to avoid multiple calls to NVMe targets
Introduced: v6.04 build52
Impact: HW: ISP2071, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build67:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Session shutdown state macro support
Introduced: v6.04 build67
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build66:
-------------
Defect/Enhancement: Defect
Problem: Apps crash seen with HBA_RemoveCallback SNIA API
Solution: Avoid double free of memory freed in HBA_RemoveCallback SNIA API
Introduced: Day One
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build65:
-------------
Defect/Enhancement: Defect
Problem: Apps delay seen with disabled/isolated port
Solution: Avoid apps retries for disabled/isolated port
Introduced: v6.04 build24
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build64:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added USCM Phase 2 support
Introduced: v6.04 build64
Impact: HW: ISP2071, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

Defect/Enhancement: Defect
Problem: Apps crash seen with disabled/isolated port
Solution: Fixed apps crash with disabled/isolated port
Introduced: v6.04 build24
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="Marvell Semiconductor Inc." date="1644580800">Enablement Kit Version: 6.0.0.0-18
----------------------------------

v6.04 build81:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added NVRAM parameters for UEFI boot support
Introduced: v6.04 build81
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build80:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added additional USCM statistics info
Introduced: v6.04 build80
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build79:
-------------
Defect/Enhancement: Defect
Problem: Port reset seen on all ports of the adapter after HBA parameter update
Solution: Allowed reset only in HBA parameter modified port
Introduced: v6.04 build24
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289, ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build78:
-------------
Defect/Enhancement: Defect
Problem: Apps crash seen with DPort test with newer firmware
Solution: Increase response buffer size to read extra data provided by FW
Introduced: v6.04 build24
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build77:
-------------
Defect/Enhancement: Defect
Problem: NPIV port seen as physical port on newer OSes
Solution: Corrected host number list
Introduced: v6.04 build24
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build76:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added FC-GS-8 based speed definitions
Introduced: v6.04 build76
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
  </package>
  <package pkgid="5589c1fc8614454b3b927652a4b3272ec880da9742e6356b7a86ab30203ab47a" name="MRStorageAdministrator" arch="x86_64">
    <version epoch="0" ver="008.002.019.000" rel="00"/>
  </package>
  <package pkgid="1c0a3dc738edb4259852101e03a9f7d32ec1804ae63d25267f22c15a242799d4" name="amsd" arch="x86_64">
    <version epoch="0" ver="2.7.0" rel="1724.3.rhel7"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.7.0-1724.3.rhel7" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="ee187e75d98d42cadb5886a248a849aeb32584239f3f1482b8dd67f81a97e767" name="amsd" arch="x86_64">
    <version epoch="0" ver="3.3.0" rel="1773.23.rhel8"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.3.0-1773.23.rhel8" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="8977f12c198b33de35640b5fc32890c78f1942f47d6500b31105af52dc28a3f3" name="amsd" arch="x86_64">
    <version epoch="0" ver="3.3.0" rel="1773.7.rhel9"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.3.0-1773.7.rhel9" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="b12906344b4643aea1a23e487e4cbabdf6bf2d850505f82d71862959dbc025fb" name="amsd" arch="x86_64">
    <version epoch="0" ver="3.3.0" rel="1773.7.sles12"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.3.0-1773.7.sles12" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="466c777daa33390cd98f4325d21393bb53f361fba49939a64f06a5d01c49ab8c" name="amsd" arch="x86_64">
    <version epoch="0" ver="3.3.0" rel="1773.7.sles15"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.3.0-1773.7.sles15" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="646bebe75d0b7eaa9d42f6deb63240e016a45842dd9a87a704ff32c14bbc0389" name="be2iscsi-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="ffcb75bfdd7f055d95f00d583d6cda32cafad1b46e501fcb3f3413459824a857" name="be2iscsi-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="e22d19f96bee8ed44eb557c9a9764bcdc1cf5046bdb835b16895d8ee0ae20a72" name="be2net-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="Emulex Corporation &lt;tech.support@emulex.com&gt; 10.6.35.0" date="1424174400">-</changelog>
  </package>
  <package pkgid="804f3195195fb52876d7716e2c96b782295e44012f1b6d0f6e12fa8e2e3d44ab" name="be2net-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="Emulex Corporation &lt;tech.support@emulex.com&gt; 10.6.35.0" date="1424174400">-</changelog>
  </package>
  <package pkgid="e69314bc0b63ac7c867254fdcfa7e0ab60d9d579561609e9f651db2ed44ca597" name="bnxt_en-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.10.2_k4.12.14_120" rel="224.0.157.0.sles12sp5"/>
  </package>
  <package pkgid="e179ae28a9671f85297e06a47193dc97294054f689a9ea19ae7acaf1ec87f56b" name="bnxt_en-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.10.2_k5.14.21_150400.22" rel="224.0.157.0.sles15sp4"/>
  </package>
  <package pkgid="688afec265ac280f9a073f0f6c3e0e0346336182c1b8c1688ec32aeb3827cfcc" name="bnxt_en-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.10.2_k5.3.18_57" rel="224.0.157.0.sles15sp3"/>
  </package>
  <package pkgid="a47053e5a8ea6477eada3799f38ddbdaa8b8001e5ab0e1ef48edcec00ae64189" name="elx-lpfc-kmp-default" arch="x86_64">
    <version epoch="0" ver="14.0.499.31_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="Broadcom Automated Build User&#13;" date="1556539200">- Changed version to 12.2&#13;
- Removed support for SLES 11 SP3&#13;
- Removed support for SLES 11 SP4&#13;
- Removed support for RHEL 6U8&#13;
- Removed support for RHEL 7U2&#13;
- Removed support for RHEL 7U3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1566820800">- Changed version to 12.4&#13;
- Added support for RHEL 7U7&#13;
- Added support for RHEL 8U1&#13;
- Added support for SLES 12 SP5&#13;
- Removed support for RHEL 6U9&#13;
- Removed support for RHEL 6U10&#13;
- Removed support for RHEL 7U4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1583150400">- Changed version to 12.6&#13;
- Added support for RHEL 7U8&#13;
- Added support for RHEL 8U2&#13;
- Added support for SLES 15 SP2&#13;
- Removed support for SLES 12 SP2&#13;
- Removed support for SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1587384000">- Changed version to 12.8&#13;
- Initial build</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1621425600">- Added support for RHEL 8U4&#13;
- Added support for SLES 15 SP3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1630324800">- Changed version to 14.0&#13;
- Initial build</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1634126400">- Added support for RHEL 8U5</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1645012800">- Added support for RHEL 8U6&#13;
- Added support for RHEL 9U0&#13;
- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1661342400">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1661342401">- Added support for RHEL 8U7</changelog>
  </package>
  <package pkgid="f9f970f86a1b176be0275f919e30728ca6bbd8b4110cf7eabae8052a61cada5e" name="elx-lpfc-kmp-default" arch="x86_64">
    <version epoch="0" ver="14.0.499.31_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="Broadcom Automated Build User" date="1556539200">- Changed version to 12.2
- Removed support for SLES 11 SP3
- Removed support for SLES 11 SP4
- Removed support for RHEL 6U8
- Removed support for RHEL 7U2
- Removed support for RHEL 7U3</changelog>
    <changelog author="Broadcom Automated Build User" date="1566820800">- Changed version to 12.4
- Added support for RHEL 7U7
- Added support for RHEL 8U1
- Added support for SLES 12 SP5
- Removed support for RHEL 6U9
- Removed support for RHEL 6U10
- Removed support for RHEL 7U4</changelog>
    <changelog author="Broadcom Automated Build User" date="1583150400">- Changed version to 12.6
- Added support for RHEL 7U8
- Added support for RHEL 8U2
- Added support for SLES 15 SP2
- Removed support for SLES 12 SP2
- Removed support for SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User" date="1587384000">- Changed version to 12.8
- Initial build</changelog>
    <changelog author="Broadcom Automated Build User" date="1621425600">- Added support for RHEL 8U4
- Added support for SLES 15 SP3</changelog>
    <changelog author="Broadcom Automated Build User" date="1630324800">- Changed version to 14.0
- Initial build</changelog>
    <changelog author="Broadcom Automated Build User" date="1634126400">- Added support for RHEL 8U5</changelog>
    <changelog author="Broadcom Automated Build User" date="1645012800">- Added support for RHEL 8U6
- Added support for RHEL 9U0
- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342400">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342401">- Added support for RHEL 8U7</changelog>
  </package>
  <package pkgid="87438fa19db3bbd3213b380e4440761a363c61c26081ff2fb3d5ad8028a22708" name="elx-lpfc-kmp-default" arch="x86_64">
    <version epoch="0" ver="14.0.499.31_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="Broadcom Automated Build User&#13;" date="1556539200">- Changed version to 12.2&#13;
- Removed support for SLES 11 SP3&#13;
- Removed support for SLES 11 SP4&#13;
- Removed support for RHEL 6U8&#13;
- Removed support for RHEL 7U2&#13;
- Removed support for RHEL 7U3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1566820800">- Changed version to 12.4&#13;
- Added support for RHEL 7U7&#13;
- Added support for RHEL 8U1&#13;
- Added support for SLES 12 SP5&#13;
- Removed support for RHEL 6U9&#13;
- Removed support for RHEL 6U10&#13;
- Removed support for RHEL 7U4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1583150400">- Changed version to 12.6&#13;
- Added support for RHEL 7U8&#13;
- Added support for RHEL 8U2&#13;
- Added support for SLES 15 SP2&#13;
- Removed support for SLES 12 SP2&#13;
- Removed support for SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1587384000">- Changed version to 12.8&#13;
- Initial build</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1621425600">- Added support for RHEL 8U4&#13;
- Added support for SLES 15 SP3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1630324800">- Changed version to 14.0&#13;
- Initial build</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1634126400">- Added support for RHEL 8U5</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1645012800">- Added support for RHEL 8U6&#13;
- Added support for RHEL 9U0&#13;
- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1661342400">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1661342401">- Added support for RHEL 8U7</changelog>
  </package>
  <package pkgid="a92869b83c56fa672365cfead33527d264de7ce13cc8007fef3b178c235f4ab0" name="fibreutils" arch="x86_64">
    <version epoch="0" ver="4.2" rel="1_rhel"/>
    <changelog author="Chad Dupuis &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1-3" date="1260446400">- Fixed discovery of HBAs in adapter_info on Integrity servers with multiple PCI
  busses</changelog>
    <changelog author="Keith Wortman &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-3" date="1298635200">- Initial release with Emulex CNA support</changelog>
    <changelog author="Keith Wortman &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-4" date="1323345600">- Fix for dependency check error seen when installing with HPSUM</changelog>
    <changelog author="Kumar Rahul&lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-5" date="1329220800">- Removed installation check for kernel 2.6 and addded Installation check for Rhel5.3 and SLES10 SP3 onwards</changelog>
    <changelog author="Shreya Roy Chowdhury&lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-6" date="1355832000">- Corrected Link state display information for Qlogic Adapters
- Added MSA G3 support in Scsi_info.h</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 3.3-6" date="1557316800">-Perl dependancy fix for RHEL8</changelog>
    <changelog author="Ratna Dey&lt;rathna.dey@hpe.com&gt; and Aravinda Rajanna &lt;aravinda.rajanna@hpe.com&gt; 4.1-1" date="1561550400">-Initial support added for E4 and will get updated subsequently</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.1-1" date="1563451200">-Fixed adpater_info code to display correct Vendor name instead of Unknown</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.1-1" date="1564056000">-Removed Brocade HBAs support</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.2-1" date="1630584000">-Removed adapter_info_nx code for E4 adapters</changelog>
  </package>
  <package pkgid="56bbc8f611d073f2b04a8a8cbb774717c01e736ec4d899cf16f75368a574e0fe" name="fibreutils" arch="x86_64">
    <version epoch="0" ver="4.2" rel="1_sles"/>
    <changelog author="Chad Dupuis &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1-3" date="1260446400">- Fixed discovery of HBAs in adapter_info on Integrity servers with multiple PCI
  busses</changelog>
    <changelog author="Keith Wortman &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-3" date="1298635200">- Initial release with Emulex CNA support</changelog>
    <changelog author="Keith Wortman &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-4" date="1323345600">- Fix for dependency check error seen when installing with HPSUM</changelog>
    <changelog author="Kumar Rahul&lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-5" date="1329220800">- Removed installation check for kernel 2.6 and addded Installation check for Rhel5.3 and SLES10 SP3 onwards</changelog>
    <changelog author="Shreya Roy Chowdhury&lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-6" date="1355832000">- Corrected Link state display information for Qlogic Adapters
- Added MSA G3 support in Scsi_info.h</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 3.3-6" date="1557316800">-Separated code stream for RHEL and SLES</changelog>
    <changelog author="Ratna Dey&lt;rathna.dey@hpe.com&gt; and Aravinda Rajanna &lt;aravinda.rajanna@hpe.com&gt; 4.1-1" date="1561550400">-Initial support added for E4 and will get updated subsequently</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.1-1" date="1563451200">-Fixed adpater_info code to display correct Vendor name instead of Unknown</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.1-1" date="1564056000">-Removed Brocade HBAs support</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.2-1" date="1630584000">-Removed adapter_info_nx code for E4 adapters</changelog>
  </package>
  <package pkgid="394fab4a3c47723343d2754015ac06fd53abb39d48a9cfedeee675779bc3a949" name="firmware-8586fe2547" arch="x86_64">
    <version epoch="0" ver="1.24" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22" date="1632830400">-      Update device guid
      * Fixed FW update causing NVME drive missing</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.24" date="1646222400">-     Fixed command report mistake value.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.24-2.1" date="1656072000">-</changelog>
  </package>
  <package pkgid="8b45399481a124dc2d2b84e4028356f8d6dca26e41582ecfd349e879e9ff42b4" name="firmware-b303c4dfec" arch="x86_64">
    <version epoch="0" ver="1.46" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.42" date="1634644800">-     Fixed to correct the NVMe drive functionality</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.42-2.1" date="1636545600">-     Correct device GUID.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.46" date="1646222400">-     Fixed command report mistake value.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.46-2.1" date="1656072000">-</changelog>
  </package>
  <package pkgid="63b86bafd1243956843250238c61e682376259b1ae95909bdb7190091702b423" name="firmware-cafee9b6e4" arch="x86_64">
    <version epoch="0" ver="24.23.0_0048" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 24.23.0-0019" date="1515499200">-      Initial Release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 24.23.0-0019-2.1" date="1540468800">-     Customers who already installed firmware version 24.23.0-0019 do not need to
    update to 24.23.0-0019 (B).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 24.23.0-0019-2.1" date="1540555200">-      Releasing support for SUSE LINUX Enterprise Server 15 OS</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 24.23.0-0042" date="1548676800">-      Added support for the Apollo 4510 system</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 24.23.0-0042-1.1" date="1565265600">-     Fixes installation issues with Intelligent Provisioning and Service Pack for
    ProLiant Offline.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 24.23.0-0043-1.1" date="1594987200">-     Over-temp issue was a false IML due to a &gt;=60C threshold, modified the
    threshold to &gt;65C in new version.
    
    Please reference Customer Advisory
    [a00101958en_us](https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-
    a00101958en_us)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 24.23.0-0043-2.1" date="1603454400">-     *CFI 24378: sum-8.5.1 "smartupdate upgrade" Not Installing the P824i Controller FW on RHEL7**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 24.23.0-0048" date="1658318400">-</changelog>
  </package>
  <package pkgid="a3ea3aefbfab9ebe2124788347a872aa3e3937367b4560626c80ca6aa9f5bcdd" name="firmware-d3000" arch="x86_64">
    <version epoch="0" ver="5.04" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.04-2.1" date="1534852800">-     *The following fix was incorporated in this version:**
    
      *  Fixed NVRAM CRC error
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v155369/D3000_P07231-002.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.04-3.1" date="1540209600">-     *The following fix was incorporated in this version:**
    
      *  Fixed NVRAM CRC error
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v157942/P07231-003.html) for the complete listing of fixes,
    enhancements, known issues and work-arounds corresponding to this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.12" date="1551700800">-     *The following fixes were incorporated in this version:**
    
      * Fixed TLB exception during upgrade from Rev build 1.11.000 to 0412.000
    
      * Fixed expander bootstrap task which failed with 0xB1 error code appearing in the console due to missing NVRAM tag - Product Name
    
      * Enabled-ClusterS2D command that does not complete with SATA drive in D3610
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v154196/D3000_P07231-004.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04" date="1601985600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04" date="1602072000">-     *The following fixes were incorporated in this version:**
    
      * The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.
    
      * The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.
    
      * Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.
    
      * If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v177052/D3000_P07231-006.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04-2.1" date="1618833600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04-2.1" date="1618920000">-     *The following fixes were incorporated in this version:**
    
      * The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.
    
      * The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.
    
      * Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.
    
      * If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v191363/D3000_v5.04B.html) for the complete listing of fixes,
    enhancements, known issues and work-arounds corresponding to this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04-3.1" date="1636977600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04-3.1" date="1637064000">-     *The following fixes were incorporated in this version:**
    
      * The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.
    
      * The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.
    
      * Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.
    
      * If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v202692/20-D3000-Gen10RN504C_ED3.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04-6.1" date="1669636800">-     *The following fixes were incorporated in this version:**
    
      * The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.
    
      * The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.
    
      * Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.
    
      * If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v217183/20-D3000-Gen10RN504E_ED5.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
  </package>
  <package pkgid="4c11018123f337057797f2982255e48a9bbbc37b064abaa08e4a6bcfc877d777" name="firmware-d3000" arch="x86_64">
    <version epoch="0" ver="6.00" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 6.00" date="1670760000">-     *The following fixes were incorporated in this version:**
    
      * The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.
    
      * The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.
    
      * Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.
    
      * If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v217183/20-D3000-Gen10RN504E_ED5.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
  </package>
  <package pkgid="eee6d98a1c5f404a9b97be5463f211fe396b137ed058065e3250c9f8d55793be" name="firmware-d6020" arch="x86_64">
    <version epoch="0" ver="2.74" rel="13.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-4.1" date="1572955200">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v172139/D6020_P07232-006.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-5.1" date="1586347200">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 8</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-5.1" date="1586433600">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v177006/D6020_v274_RN.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-7.1" date="1601985600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-7.1" date="1602072000">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v183133/D6020_P07232-008.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-9.1" date="1618833600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-9.1" date="1618920000">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v191364/D6020_v2.74I.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-10.1" date="1636977600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-10.1" date="1637064000">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v202690/20-D6020-Gen10RN274J_ED8.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-13.1" date="1669896000">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v217184/20-D6020-Gen10RN274L_ED10.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
  </package>
  <package pkgid="1f80deaae35826ad7f7958282d2f58324ff17515a2c014018074e848075593ca" name="firmware-d8000" arch="x86_64">
    <version epoch="0" ver="0130" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0105" date="1572955200">-     *The following fixes were incorporated in this version:**
    
      * SAS drive LED behavior was corrected to align with the Smart Array specification, specifically: 
        * The Activity LED of a sanitize erase drive now turns ON when connected.
    
        * The Array present LED now turns ON for the SAS drive.
    
        * The Activity LED now blinks on all drives during a SAS drive rebuild.
    
      * The Serial Output Buffer (SOB) has a fixed sized for stored entries. Now, when the buffer is full, the oldest entries are cleared or committed to persistent storage (if available). For this reason, subsequent requests to read the SOB only retrieves new entries that have been logged since the last successful request to read the SOB.
    
      * The drive activity LED has been changed to a function as described in the installation and maintenance guide.
    
      * The reboot flag was changed to issue a hard reset, which enables the service delivery subsystem (ZPSDS) information be shared across (expanded across) the internal expanders to all devices attached.
    
      * The drive activity LED on the SAS disk drives was changed to support the ACTIVE_LOW signal state. The ACTIVE_LOW signal state is the default operation state for most drives.
    
      * The SCSI WRITE BUFFER MODE was changed from activate to soft reset. This change improves the host ability to detect and report whether the enclosure is going to perform a disruptive or non-disruptive activation after a firmware upgrade.
    
      * With I/O module firmware v0105 and PQI firmware 2.02 , the slot power cycle issue has been resolved by changing the power cycle SES request to return a failure when a partner slot is not connected.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v172138/D8000_P20366-002.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0107" date="1601985600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0107" date="1602072000">-     *The following fixes were incorporated in this version:**
    
      * In STD INQUIRY RESPONSE, the ErrM bit was always being set. The ErrM bit indicates that the enclosure firmware detects a mismatch in any of its package versions and the firmware version of a FRU component. The issue was due to an incorrect version of PSU firmware being included and that has been fixed.
    
      * After installing the latest firmware on the enclosure I/O modules, the SES targets could not be discovered on the host. The virtual phy bit in SMP DISCOVER RESPONSE, which is used by the Microchip smartpqi HBA, was det for the virtual phy of the I/O module.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v183134/D8000_P20366-004.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0111" date="1618833600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0111" date="1618920000">-     *The following fixes were incorporated in this version:**
    
      * Incorrect programming of the PHY ERROR COUNTERS parameter caused the amber LED to be lit, resulting in a false warning. The counter condition was corrected and the amber LED now functions correctly.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v191365/D8000_v0111.html) for the complete listing of fixes,
    enhancements, known issues and work-arounds corresponding to this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0118" date="1635163200">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0118" date="1635249600">-     *The following fixes were incorporated in this version:**
    
      * User was not able to collect ddump logs.
    
      * Logical Fault LED remains ON even after clearing the fault using "reboot soft"
    
      * Vendor ID showed as "DEFAULT" for D8000 expander in SSACLI enclosure detail
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v203448/20-D8000-Gen10RN0118_ED1.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0130" date="1667304000">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0130" date="1667390400">-     *The following fixes were incorporated in this version:**
    
      * Smart Array reporting "Storage Enclosure FW upgrade Problem Detected".
      * PSU version is showing as "No Ver" after inserted the New bel power PSU.
      * GEM_5_2 Coverity defect fix.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v218471/20-D8000-Gen10RN0130_ED1.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0130-1.1" date="1670673600">-     *The following fixes were incorporated in this version:**
    
      * Smart Array reporting "Storage Enclosure FW upgrade Problem Detected".
      * PSU version is showing as "No Ver" after inserted the New bel power PSU.
      * GEM_5_2 Coverity defect fix.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v218471/20-D8000-Gen10RN0130_ED1.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
  </package>
  <package pkgid="5c360821b10aa1ad6e60d38fdde1d58c4203baf08f91ae6410de1d398e64d151" name="firmware-dcpmm" arch="x86_64">
    <version epoch="0" ver="1.2.0.5446" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0.5375" date="1561982400">-     Initial release of Firmware for HPE Persistent Memory for Gen10 Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0.5435" date="1585742400">-     Initial release of Firmware for HPE Persistent Memory for Gen10 Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0.5435-2.1" date="1599220800">-      Initial release of Firmware for HPE Persistent Memory for Gen10 Servers.
      * This product contains mainly performance improvements.
      * This product now supports Red Hat Enterprise Linux 8 and SUSE Linux Enterprise Server 12.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0.5446" date="1626782400">-      Add RHEL8.4 and SUSE15 SP3 support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0.5446-2.1" date="1653480000">-      Add RHEL9.0 support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0.5446-3.1" date="1659182400">-</changelog>
  </package>
  <package pkgid="39fc4eac16d3f19488ee84af514f4ab0cbe997b5a7eee1208d9be8347cfc910f" name="firmware-dcpmm" arch="x86_64">
    <version epoch="0" ver="2.2.0.1553" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.2.0.1553" date="1622462400">-     Initial release of Firmware for HPE Persistent Memory for Gen10 Plus Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.2.0.1553-2.1" date="1624276800">-     This product corrects an issue that three different capacities of Intel Optane
    DC Persistent Memory are identifiable with three individual device GUID.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.2.0.1553-3.1" date="1653393600">-      Add RHEL9.0 support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.2.0.1553-3.1" date="1653480000">-     This product corrects an issue that three different capacities of Intel Optane
    DC Persistent Memory are identifiable with three individual device GUID.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.2.0.1553-4.1" date="1659355200">-     This product corrects an issue that three different capacities of Intel Optane
    DC Persistent Memory are identifiable with three individual device GUID.</changelog>
  </package>
  <package pkgid="3eb92ac58a02272a7510b64620a00d623945a8746d2f78063e6399e5b817ada9" name="firmware-dl20gen10plus_me" arch="x86_64">
    <version epoch="0" ver="06.00.03.309" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.035" date="1646568000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.039" date="1646654400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version of the System ROM contains updates aligned with the Tatlow PLR2
    BKC WW50.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.200" date="1653566400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the MCTP PCIe devices could not be discovered after
    an SPS firmware update without an AC power cycle. This issue is not unique to
    HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.204" date="1667908800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version is in compliance with Intel IPU.2022.3 guidance.
    
    The following vulnerabilities have been addressed in this SPS release:
    CVE-2022-29515. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.309" date="1671624000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2022-36794. This issue is not
    unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="5d323c973f8573581bcd6cefa05fc5df6022378d5dcb2b0cfaade8e2f03122a6" name="firmware-dl20ml30gen10sps" arch="x86_64">
    <version epoch="0" ver="05.01.04.804" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.03.094" date="1575633600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision contains the latest Intel Server Platform Services (SPS)
    Firmware which provides mitigations for CVE-2019-11090 and CVE 2019-11109. The
    issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.113" date="1591617600">-     This image contains the latest Intel Server Platform Services (SPS) Firmware
    which contains mitigations for a variety of security vulnerabilities. The
    following vulnerabilities have been addressed in this SPS release:
    CVE-2020-0545 and CVE-2020-0586. These issues are not unique to HPE Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.208" date="1604923200">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2020-8755. This security
    vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.303" date="1623067200">-     See the release document in Download Product Binaries page from Product
    Summary of the firmware product.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.303" date="1623153600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services (SPS) Firmware provides
    mitigations for SPS security vulnerabilities documented as CVE-2020-24509.
    These security vulnerabilities are documented in Intel Security Advisory
    INTEL-SA-00459.  These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.400" date="1644321600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services (SPS) Firmware provides
    mitigations for SPS security vulnerabilities documented as CVE-2021-0060. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.500" date="1652184000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2022.1 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.600" date="1660046400">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2022.2 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.700" date="1667908800">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2022.3 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.804" date="1671192000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2023.1 guidance.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="225b72610e5b121d8fe6e77d14bb0049997c8a2016f2d0200da5562b6828f24e" name="firmware-fc-emulex" arch="x86_64">
    <version epoch="0" ver="2023.03.01" rel="1.3"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.02.01" date="1615204800">-     *Fixed the following:**
    
      * Fixed a behavior where the SN1600E would wrongly display an unwanted message when loading Unified Extensible Firmware Interface (UEFI) driver defaults</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.02.03" date="1625486400">-     This is a fibre channel component.
    
    Added support for the following:
    
      * Code update to support new flash vendors
    
    Contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.352.24
    
    12.8.352.24
    
    12.8.352.10
    
    12.8.352.5
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.352.24
    
    12.8.352.24
    
    12.8.352.10
    
    12.8.352.5</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.10.01" date="1632830400">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    12.8.528.12
    
    12.8.528.12
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    12.8.528.12
    
    12.8.528.12
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.12
    
    12.8.528.12
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.12
    
    12.8.528.12
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.12
    
    12.8.528.12
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.12
    
    12.8.528.12
    
    12.8.528.10
    
    12.8.502.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.11.01" date="1635508800">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.03.01" date="1648641600">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.08.01" date="1656936000">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.08.01-2.3" date="1658318400">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.09.01" date="1658404800">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.10.01" date="1667390400">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.03.01" date="1667476800">-</changelog>
  </package>
  <package pkgid="a27ef797465369e63b73b976044b9bb166e6d52c839d785b058a154afcaf8ac5" name="firmware-fc-qlogic" arch="x86_64">
    <version epoch="0" ver="2023.04.01" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.12.05" date="1585742400">-     Updated the Firmware/BIOS/UEFI packages for following:
    
      * Gen4 Fibre Channel Host Bus Adapter: 
        * Package 3.81.05
        * Firmware 8.08.206
        * UEFI 7.00
        * BIOS 3.56
      * Gen5 Fibre Channel Host Bus Adapter: 
        * Package 6.02.01
        * Firmware 8.08.230
        * UEFI 7.02
        * BIOS 3.43
      * Gen6 Fibre Channel Host Bus Adapter: 
        * Package 1.73.08
        * Firmware 8.08.230
        * UEFI 7.02
        * BIOS 3.64
      * Gen7 Fibre Channel Host Bus Adapter:  
        * Package 02.02.18
        * Firmware 09.02.20
        * UEFI 7.08
        * BIOS 0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2019.12.05" date="1585828800">-     *Fixed the following:**
    
    In extremely rare cases, the following QLogic Fibre Channel (FC) Host Bus
    Adapters (HBAs), SN1100Q, SN1600Q and SN1610Q may cause the host Operating
    System (OS) to stop. Subsequent OS reboot may reveal some filesystem data is
    unavailable or inconsistent. Out of an abundance of caution, HPE updated the
    Firmware/BIOS/UEFI (Boot Image) packages for these adapters to eliminate
    possible exposure to this extremely rare but critical issue.
    
    For more details please go through the document titled "HPE ProLiant, Synergy
    and Superdome Flex Host Bus Adapters (HBA) - Certain Fibre Channel HBA
    Firmware May Cause the Operating System to Halt and Potentially Compromise
    Filesystem Data Integrity" at the following link:  
    [https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a000947
    22en_us](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId
    =a00094722en_us)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2020.09.01" date="1596456000">-     Updated the Firmware/BIOS/UEFI packages for 8 Gb, 16 Gb and 32 Gb products.
    
      * 8Gb Fibre Channel Host Bus Adapter: 
        * Package 3.82.00
        * Firmware 8.08.207
        * UEFI 7.00
        * BIOS 3.56
      * 16Gb Fibre Channel Host Bus Adapter: 
        * Package 6.03.00
        * Firmware 8.08.231
        * UEFI 7.02
        * BIOS 3.43
      * 16Gb/32Gb Fibre Channel Host Bus Adapter: 
        * Package 1.74.07
        * Firmware 9.03.00
        * UEFI 7.02
        * BIOS 3.64
      * 32Gb Fibre Channel Host Bus Adapter:  
        * Package 02.03.06
        * Firmware 09.04.01
        * UEFI 7.08
        * BIOS 0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.02.01" date="1615118400">-     *Added the following:-**
    
      * Added support for Fabric Performance Impact Notifications (FPIN)
    
    
    
    This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    MBI
    
    Firmware
    
    UEFI
    
    Boot Bios
    
    HPE 81Q 8Gb PCIe Fibre Channel Host Bus Adapter  
    8Gb
    
    3.82.00
    
    8.08.207
    
    7.00
    
    3.56
    
    HPE 82Q 8Gb Dual Port PCIe Fibre Channel Host Bus Adapter
    
    8Gb
    
    3.82.00
    
    8.08.207
    
    7.00
    
    3.56
    
    HPE 84Q 8Gb Quad Port Fibre Channel Host Bus Adapter
    
    8Gb
    
    3.82.00
    
    8.08.207
    
    7.00
    
    3.56
    
    HPE SN1000Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    6.04.04
    
    8.08.232
    
    7.04
    
    3.43
    
    HPE SN1000Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    6.04.04
    
    8.08.232
    
    7.04
    
    3.43
    
    HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    1.75.07
    
    9.06.02
    
    7.04
    
    3.64
    
    HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    1.75.07
    
    9.06.02
    
    7.04
    
    3.64
    
    HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    1.75.07
    
    9.06.02
    
    7.04
    
    3.64
    
    HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    1.75.07
    
    9.06.02
    
    7.04
    
    3.64
    
    HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.04.07
    
    09.06.02
    
    7.11
    
    0.0
    
    HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.04.07
    
    09.06.02
    
    7.11
    
    0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.02.01" date="1615204800">-     *Fixed the following:-**
    
      * Enhancements have been made to the firmware to prevent and better recover from any stoppage as described in Customer Advisory available at [https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00094722en_us](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00094722en_us)
      * Fixed a behavior where the number of active Input/Output (IO) exchanges could be reduced under certain fabric conditions, resulting in reduced performance.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.10.01" date="1632398400">-     This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    MBI
    
    Firmware
    
    UEFI
    
    Boot Bios
    
    HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    1.75.07
    
    9.06.02
    
    7.04
    
    3.64
    
    HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    1.75.07
    
    9.06.02
    
    7.04
    
    3.64
    
    HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    1.75.07
    
    9.06.02
    
    7.04
    
    3.64
    
    HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    1.75.07
    
    9.06.02
    
    7.04
    
    3.64
    
    HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.05.03
    
    09.06.02
    
    7.11
    
    0.0
    
    HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.05.03
    
    09.06.02
    
    7.11
    
    0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.08.01" date="1656936000">-     This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    MBI
    
    Firmware
    
    UEFI
    
    Boot Bios
    
    HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    1.77.12
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    1.77.12
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    1.77.12
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    1.77.12
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.06.27
    
    09.09.00
    
    7.28
    
    0.0
    
    HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.08.27
    
    09.09.00
    
    7.28
    
    0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.09.01" date="1658750400">-     This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    MBI
    
    Firmware
    
    UEFI
    
    Boot Bios
    
    HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    1.77.12
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    1.77.12
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    1.77.12
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    1.77.12
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.06.27
    
    09.09.00
    
    7.28
    
    0.0
    
    HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.06.27
    
    09.09.00
    
    7.28
    
    0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.10.01" date="1671451200">-     This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    MBI
    
    Firmware
    
    UEFI
    
    Boot Bios
    
    HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.07.01
    
    09.09.00
    
    7.28
    
    0.0
    
    HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.07.01
    
    09.09.00
    
    7.28
    
    0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.04.01" date="1673265600">-</changelog>
  </package>
  <package pkgid="aac35f845f71621dce4c39b859134ba3bb9976f7efca3559d46a60eaf8470fb1" name="firmware-ff3fa73ca1" arch="x86_64">
    <version epoch="0" ver="1.02" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.02" date="1652443200">-</changelog>
  </package>
  <package pkgid="fe059ab9fe35f120126fffb094b94515ef5c7c3ce0d5037c10df89ed3dff43a9" name="firmware-ff3fa73ca1" arch="x86_64">
    <version epoch="0" ver="1.24" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22" date="1632830400">-      Update device guid
      * Fixed FW update causing NVME drive missing</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.24" date="1646222400">-     Fixed command report mistake value.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.24-2.1" date="1656072000">-</changelog>
  </package>
  <package pkgid="173072994779194e36e11b709d4711846fc403e7de265192c1bf9904d3aae240" name="firmware-hca-mellanox-vpi-connectx4" arch="x86_64">
    <version epoch="0" ver="1.0.14" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1614340800">-     *Following issues have been fixed in firmware version 16.29.1016:**
    
      * An issue that prevented VXLAN packets with svlan/ cvlan tag from being matched.
      * An issue that caused the eth_wqe_too_small counter to count ODP (On-Demand Paging) page faults.
      * When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.
      * An issue that resulted in low performance after enabling the RoCE Accelerator capability. Note: The fix is available when all ports are set as Ethernet. 
      * On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.
      * The chassis manager calculation for Multi-Host and Socket-Direct adapter cards to allow running NC-SI commands by the chassis manager BMC. Now the chassis manager is count as BMC with index 0, regardless of how many BMC there are.
      * An issue that caused the device to go to down IRISC as one of the firmware semaphores could not be released when a speed change or port state change was triggered. 
    
    **Following issues have been fixed in firmware version 12.28.1002:**
    
      * An issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * An issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10-2.1" date="1628683200">-     *Firmware for the following devices are updated to 12.28.1002:**
    
    825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)  
    825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)  
    
    
    **New Feature and Changes in Version 12.28.1002:**
    
      * Increased the maximum XRQ number to 512.
    
    **Firmware for the following devices are updated to 16.31.1200:**
    
    879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)  
    872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 841QSFP28 Adapter)  
    
    
    **New Feature and Changes in Version 16.31.1200:**
    
      * .Added a new NVconfig per Port for a specific Finisar module which sets the port to work in AN mode and sets the module to No DME. This change does not affect the speed logic, only the FEC logic (FEC override). **Note**: If the port does not come up, switch to Force mode.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10-2.1" date="1628769600">-     *Following issues have been fixed in firmware version 12.28.1002:**
    
      * An issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * An issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **No fixes are included in firmware version 16.31.1200.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1632657600">-     *Firmware for the following devices are updated to 12.28.2006:**
    
    825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)  
    825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)  
    
    
    **New Feature and Changes in Version 12.28.2006:**
    
      * Increased the maximum XRQ number to 512.
    
    
    
    **Firmware for the following devices are updated to 16.31.1200:**
    
    879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)  
    872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 841QSFP28 Adapter)  
    
    
    **New features and changes included in version 16.31.1200:**
    
      * NIC scheduling feature support has been disabled for non-privileged functions.
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * support for Enabling/Disabling NIC and RDMA (port/partition) was included via the UEFI HII system settings.
      * Increased the maximum number of MSIX per VF to 127.
      * Asymmetrical MSIX Configuration: This feature allows the device to be configured with a different number of MSIX vectors per physical PCI functions.To use this feature, please follow these steps: 
        *   Clear NUM_PF_MSIX_VALID to disable global symmetrical MSIX configuration.
        *   Set PF_NUM_PF_MSIX_VALID to enable asymmetrical per Physical Function MSIX configuration.
        *   Configure PF_NUM_PF_MSIX per physical PCI function.
      * RDMA partitioning and RDMA counters in IB mode.
      * Added a new bit ("data_in_order") to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.
      * Enabled UID 0 to create resources with UMEM (User Memory).
      * Receiving and sending native IB packets from/to the software (including all headers) via raw IBL2 QPs.
      * RX RDMA NIC flow table on an IB port. Now the software can steer native IB packets to raw IB receive queues according to the DLID and  the DQPN.
      * Added a new NVconfig per Port for a specific Finisar module. This new NVconfig sets the port to work in AN mode and sets the module to No DME. This change does not affect the speed logic, only the FEC logic (FEC override). **Note:** If the port does not go up, switch to Force mode.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1632744000">-     *Following issues have been fixed in firmware version 12.28.2006:**
    
      * An issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * An issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.31.1200:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * An assert that was caused when trying to open 1024 functions on the device and the maximum number of functions was 1023.
      * Occasional performance issues related to RC QPs using E2E-credits (not connected to SRQ and doing send/receive traffic) when the ROCE_ACCL tx_window was enabled.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * A rare issue that caused RX pipe to hang.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
      * CRT_DCR with index larger than 1 &lt;&lt; 21 occasionally collided with the CRT_SW_RESERVED address.
      * An issue that caused the TX queue to get into an unresponsive state when the VF rate limiter was set.
    
    **Additional Fixes included in version 16.31.1200:**
    
      * Disabled the CNP counter "rp_cnp_ignored " (triggered by OOS (out-of-sequence)) when all ports are IB.
      * Fixed the TMP421 sensor temperature reporting.
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12" date="1648468800">-     *Firmware for the following devices has been updated to 12.28.2006:**
    
      * 825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)
      * 825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)  
    
    
    **Firmware for the following devices has been updated to 16.32.1010:**
    
      * 879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)
      * 872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 841QSFP28 Adapter)
    
    
    
    **New Features and changes included in version 12.28.2006:**
    
      * Increased the maximum XRQ number to 512.
    
    
    
    **New features and changes included in version 16.32.1010:**
    
      * Added support for blocking unwanted GMP classes by dedicated MADs.
      * Added a new NvConfig parameter LOG_MAX_QUEUE to set the maximum number of work queue resources (QP, RQ, SQ...) that can be created per function. The default value is 2^17.
      * Added a Congestion Control Key to all Congestion Control MADs to authenticate that they are originated from a trusted source.
      * Added an SMP firewall to block the option of sending SMPs (MADS sent on QP0 from the Subnet Manager) from unauthorized hosts to prevent fake SMPs from being recognized as the SM.
      * Vendor Specific MADs Class 0x9 is no longer supported by the firmware. In case the firmware detects such MAD, the firmware will return a "NOT SUPPORTED" error to the user.
      * Blocked the VF's ability to use both padding and signature in order to prevent the NIC from getting into an unresponsive state.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its rate limit.
      * Performance improvements in the DCT with AR flow by exposing a hint to the software in DCI software context that indicates that RDMA WRITE on this DCI is not supported.
      * Added support for dynamic timeout mechanism when in InfiniBand mode.
      * Added support for QSHR access register to enable Set and Query rate limit perhost per-port.
      * The firmware now exposes a new Software Steering ICM resource for VXLAN encap expand in order for the SW Steering to manage this resource directly.
      * Added support for asymmetrical VFs per PF. To enable it: PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a none zero value.
      * Added 2 new MAD access registers to enable mlxlink to read/write access registers by LID (to the whole subnet).
      * Enabled the exposure of new ICM resource to the software steering for VXLAN encapsulation expansion.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Disabled VST on dual port adapter cards when one port is configured as ETH and the other as IB as VST is not available when the port is set as ETH.
      * Added support for DSFP AOC (CMIS) v4 when error code is not reported by the module.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12" date="1648555200">-     *Fixes in version 12.28.2006:**
    
      * Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed n issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.32.1010**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The link status was reported incorrectly and consequently caused the link to go down due to incorrect definition of the RX_LOS polarity in the INI.
      * The system got into an unresponsive state when a peer port went down while using an Optical module.
      * Invalid RNR timeout when trying to set it during the rts2rts_qp transition.
      * A fatal assert 0x81C5 occurred when calling get_vport_mad from the MAD APIs. The firmware was trying to compute the number of vPorts using a global function number. To avoid this issue, the API was updated to remove any assumption on the function number. Note: This issue is affects only IB devices.
      * During events, stress caused the firmware to reset the Arm host of the vPort without sending an event. Thus preventing the software from rearming the vPort as it did not receive any event, and the firmware did not send the event because the vPort had no Arm set.
      * The system could not create more than 128K QPs.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
      * PCIe lane margining capability issues.
      * An issue related to the sl2vl mad that caused a few msec hiccup in the transmission on an InfiniBand network when the SM sent the sl2vl mad to a node in the cluster.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.13" date="1663156800">-     *Firmware for the following devices has been updated to 12.28.2006:**
    
      * 825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)
      * 825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)  
    
    
    **Firmware for the following devices has been updated to 16.33.1048:**
    
      * 879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)
      * 872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 841QSFP28 Adapter)
    
    
    
    **New Features and changes included in version 12.28.2006:**
    
      * Increased the maximum XRQ number to 512.
    
    
    
    **New features and changes included in version 16.33.1048:**
    
      * Added pci_rescan_needed field to the MFRL access register to indicate whether a PCI rescan is needed based on the NV configurations issued by the software.  
    Note: If the Keep Link Up NV configuration is changed, phyless reset will be
    blocked.
    
      * Added a new MAD of class SMP that has the attributes hierarchy_Info as defined in the IB Specification and is used to query the hierarchy information stored on the node and the physical port.
      * Added a new register (vhca_icm_ctrl access_reg) to enable querying and limiting the ICM pages in use.
      * Enhanced the XRQ QP error information provided to the user in case QP goes into an error state. In such case, QUERY_QP will provide information on the syndrome type and which side caused the error.
      * Replaced the deprecated NetworkPort schema with Port schema in NIC RDE implementation.
      * Updated the ibstat status reported when the phy link is down. Now QUERY_VPORT_STATE.max_tx_speed of UPLINK will not be reported as 0 anymore.
      * Disabled the option to send SMPs from unauthorized hosts.
      * Enabled the option to modify the ip_ecn field in the packet header in firmware steering.
      * Modified the TX or RX cache invalidation behavior. TX or RX cache invalidation now does not occur automatically but only when the software performs the sync operation using the using sync_steering command.
      * Modified the maximum bulk size per single allocation from "log_table_size - log_num_unisizes", to allocate any range size, to remove limitations that HWS objects such as counters and modify arguments might encounter.
      * Enabled delay drop for hairpin packets. If a hairpin QP is created with delay_drop_en enabled, the feature will be enabled across all GVMIs, based on the delay drop status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.13" date="1663243200">-     *Fixes in version 12.28.2006:**
    
      * Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.33.1048**
    
      * Rare lanes skew issue that caused CPU to timeout in Rec.idle.
      * The card occasionally masked some PCIe AER reporting.
      * Incorrect flow of credits blockage that prevented booting during DC cycle test.
      * An issue with BMC medium migration from SMBUS to PCIe, and increased FIFOs to pass large packets in case of the migration.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.14" date="1672401600">-     *Fixes in version 12.28.2006:**
    
      * Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.35.1012:**
    
      * RDE (Redfish) PATCH operation to LLDPTransmit properties "ManagementAddressIPv4", "ManagementAddressIPv6" and "ManagementAddressMAC" were applied only in the first attempt, but failed in the next.
      * PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.
      * Bad configuration of number of VFs and SFs led to the consumption of too many functions and triggered a FW assert 0x888E. The reduction flows behavior was fixed to ensure the configuration does not exceed the total number of supported functions. 
      * InfiniBand L2 QP could not receive RDMA traffic occasionally.
      * Running with a debug firmware reduced security as if token was applied.</changelog>
  </package>
  <package pkgid="46a8e1087dd2af4dd2d942593eefdeef0b641cbbb97bbe0201b5d0fe430e7ec0" name="firmware-hca-mellanox-vpi-connectx6-mft" arch="x86_64">
    <version epoch="0" ver="1.0.10" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1601985600">-     *There are no new fixes in firmware version 20.27.6008.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1614254400">-     *Firmware for the following devices are updated to 20.29.1016:**
    
    HPE InfiniBand HDR/Ethernet 200Gb 1-port 940QSFP56 x16 Adapter - P06154-B21  
    HPE InfiniBand HDR100/Ethernet 100Gb 1-port 940QSFP56 x16 Adapter - P06250-B21  
    HPE InfiniBand HDR100/Ethernet 100Gb 2-port 940QSFP56 x16 Adapter - P06251-B21  
    
    
    **New Features and Changes in Version 20.29.1016:**
    
    Added support for following features:
    
      * LinkX module burning via MFT toolset. The new capability enables direct firmware burning from the internal flash storage to reduce the bandwidth and accelerate the burning process, including burning several modules at a time.
      * An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.
      * Improved NRZ link performance (RX algorithm).
      * Improved NRZ link-up time (25G(G@G speeds).
      * Enabled the options to control different Tx sets for the same attribute when connecting a Mellanox-Mellanox vs Mellanox to 3rd party HCA.
      * "InfiniBand" properties set to the Network Device Function Redfish object.
      * Direct Packet Placement (DPP): DPP is a receive side transport service in which the Ethernet packets are scattered to the memory according to a packet sequence number (PSN) carried by the packet, and not by their arrival order.
      * To enable DPP offload, the software should create a special RQ by using the CREATE_RQ command, and set DPP relevant attributes.
      * Added trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.
      * UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with "ooo_per_sl" field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT command.
      * Enhanced IB Congestion Control to support lower minimum rate. Now it uses destination-lid to classify flows to handle larger scale, and achieve better results in GPCNeT benchmark.
      * Hardware steering dump output used for debugging and troubleshooting.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1614340800">-     *The following issues have been fixed in version 20.29.1016:**
    
      * Changed the default value of DCQCN's (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.
      * An issue that prevented VXLAN packets with svlan/cvlan tag from being matched.
      * The eth_wqe_too_small counter to count ODP (On-Demand Paging) page used to fail.
      * An issue related to raising 100GbE link on ConnectX-6 VPI 100Gb/s adapter cards.
      * When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.
      * Low performance occurred after enabling the RoCE Accelerator capability.
      * On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1632657600">-     *Firmware for the following devices are updated to 20.31.1014:**
    
    HPE InfiniBand HDR/Ethernet 200Gb 1-port 940QSFP56 x16 Adapter - P06154-B21  
    HPE InfiniBand HDR100/Ethernet 100Gb 1-port 940QSFP56 x16 Adapter - P06250-B21  
    HPE InfiniBand HDR100/Ethernet 100Gb 2-port 940QSFP56 x16 Adapter - P06251-B21
    
    **New features and changes included in version 20.31.1014:**
    
      * NIC scheduling feature support has been disabled for non-privileged functions.
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * Updated the NC-SI speed reporting output to support 200GbE speed. Now when running the NC-SI command, the output presents 200GbE speed as well.
      * support for Enabling/Disabling NIC and RDMA (port/partition) was included via the UEFI HII system settings.
      * Increased the maximum number of MSIX per VF to 127.
      * Asymmetrical MSIX Configuration: This feature allows the device to be configured with a different number of MSIX vectors per physical PCI functions.To use this feature, please follow these steps: 
        * Clear NUM_PF_MSIX_VALID to disable global symmetrical MSIX configuration.
        * Set PF_NUM_PF_MSIX_VALID to enable asymmetrical per Physical Function MSIX configuration.
        * Configure PF_NUM_PF_MSIX per physical PCI function.
      * RDMA partitioning and RDMA counters in IB mode.
      * Added a new bit ("data_in_order") to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.
      * Enabled UID 0 to create resources with UMEM (User Memory).
      * Receiving and sending native IB packets from/to the software (including all headers) via raw IBL2 QPs.
      * RX RDMA NIC flow table on an IB port. Now the software can steer native IB packets to raw IB receive queues according to the DLID and  the DQPN.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1632744000">-     *The following issues have been fixed in version 20.31.1014:**
    
      * Occasional performance issues related to RC QPs using E2E-credits (not connected to SRQ and doing send/receive traffic) when the ROCE_ACCL tx_window was enabled.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * A rare issue that caused RX pipe to unresponsive state.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
      * CRT_DCR with index larger than 1 &lt;&lt; 21 occasionally collided with the CRT_SW_RESERVED address.
      * An issue that caused the TX queue to get into an unresponsive state when the VF rate limiter was set.
      * In InfiniBand non-virtualization system, due to a corrupted steering root, traffic fails after a warm reboot.  
    
                                                                             
    **Additional Fixes included in version 20.31.1014:**
    
      * Disabled the CNP counter "rp_cnp_ignored " (triggered by OOS (out-of-sequence)) when all ports are IB.
      * Fixed the TMP421 sensor temperature reporting.
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.            
      * Improved PortXmitWait IB counter accuracy.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1648468800">-     *Firmware for the following devices has been updated to 20.32.1010:**
    
      * HPE InfiniBand HDR/Ethernet 200Gb 1-port QSFP56 PCIe3 x16 MCX653105A-HDAT Adapter - P06154-B21
      * HPE InfiniBand HDR100/Ethernet 100Gb 1-port QSFP56 PCIe3 x16 MCX653105A-ECAT Adapter - P06250-B21
      * HPE InfiniBand HDR100/Ethernet 100Gb 2-port QSFP56 PCIe3 x16 MCX653105A-ECAT Adapter - P06251-B21
    
    **New features and changes included in version 20.32.1010:**
    
      * Added support for blocking unwanted GMP classes by dedicated MADs.
      * Added a new NvConfig parameter LOG_MAX_QUEUE to set the maximum number of work queue resources (QP, RQ, SQ...) that can be created per function. The default value is 2^17.
      * Added a Congestion Control Key to all Congestion Control MADs to authenticate that they are originated from a trusted source.
      * Added an SMP firewall to block the option of sending SMPs (MADS sent on QP0 from the Subnet Manager) from unauthorized hosts to prevent fake SMPs from being recognized as the SM.
      * Vendor Specific MADs Class 0x9 is no longer supported by the firmware. If case the firmware detects such MAD, the firmware will return a "NOT SUPPORTED" error to the user.
      * Blocked the VF's ability to use both padding and signature in order to prevent the NIC from getting into an unresponsive state.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its rate limit.
      * Performance improvements in the DCT with AR flow by exposing a hint to the software in DCI software context that indicates that RDMA WRITE on this DCI is not supported.
      * Added support for dynamic timeout mechanism when in InfiniBand mode.
      * Added support for QSHR access register to enable Set and Query rate limit per-host per-port.
      * The firmware now exposes a new Software Steering ICM resource for VXLAN encap expand in order for the SW Steering to manage this resource directly.
      * Added support for asymmetrical VFs per PF. To enable it: PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a none zero value.
      * Added 2 new MAD access registers to enable mlxlink to read/write access registers by LID (to the whole subnet).
      * Enabled the exposure of new ICM resource to the software steering for VXLAN encapsulation expansion.
      * Added support for DSFP AOC (CMIS) v4 when error code is not reported by the module.
      * Limited the external loopback speed according to the used module's capabilities.
      * Modified the Effective BER calculation method. Due to this, the value of the Effective BER will be slightly higher, however the link quality remains the same as prior to this change.
      * This firmware version includes the following PCIe changes: 
        * Fixed the ACS Port Number field in DSPs and ACS Egress Control Vector field in DSPs.
        * Added support for VSC on USP of PCIe Switch.
        * Fixed the mapping of Legacy Interrupts in the PCIe Switch.
        * Fixed MRRS &amp; MPS configurations in DSPs.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1648555200">-     *The following issues have been fixed in version 20.32.1010:**
    
      * System could not create more than 128K QPs.
      * Incorrect indication of the PCIe link down in the AER registers on PCIe switch upstream port.
      * Invalid RNR timeout when trying to set it during the rts2rts_qp transition.
      * The flash frequency on boot was lower than expected (under 50Mhz). The issue was fixed by enabling the firmware to increase it on boot2 to normal frequency.
      * A race condition between DC QP flush and DC packets that led to stuck slices in the hardware. To avoid such situation, firmware keeps the TCU drop set until QP flush is done.
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The link status was reported incorrectly and consequently caused the link to go down due to incorrect definition of the RX_LOS polarity in the INI.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1663156800">-     *Firmware for the following devices has been updated to 20.33.1048:**
    
      * HPE InfiniBand HDR/Ethernet 200Gb 1-port QSFP56 PCIe3 x16 MCX653105A-HDAT Adapter - P06154-B21
      * HPE InfiniBand HDR100/Ethernet 100Gb 1-port QSFP56 PCIe3 x16 MCX653105A-ECAT Adapter - P06250-B21
      * HPE InfiniBand HDR100/Ethernet 100Gb 2-port QSFP56 PCIe3 x16 MCX653106A-ECAT Adapter - P06251-B21
    
    **New features and changes included in version 20.33.1048:**
    
      * Added pci_rescan_needed field to the MFRL access register to indicate whether a PCI rescan is needed based on the NV configurations issued by the software.  
    Note: If the Keep Link Up NV configuration is changed, phyless reset will be
    blocked.
    
      * Added a new MAD of class SMP that has the attributes hierarchy_Info as defined in the IB Specification and is used to query the hierarchy information stored on the node and the physical port.
      * Added a new register (vhca_icm_ctrl access_reg) to enable querying and limiting the ICM pages in use.
      * Enhanced the XRQ QP error information provided to the user in case QP goes into an error state. In such case, QUERY_QP will provide information on the syndrome type and which side caused the error.
      * Updated the ibstat status reported when the phy link is down. Now QUERY_VPORT_STATE.max_tx_speed of UPLINK will not be reported as 0 anymore.
      * Replaced the deprecated NetworkPort schema with Port schema in NIC RDE implementation. 
      * Disabled the option to send SMPs from unauthorized hosts.
      * Enabled the option to modify the ip_ecn field in the packet header in firmware steering.
      * Modified the TX or RX cache invalidation behavior. TX or RX cache invalidation now does not occur automatically but only when the software performs the sync operation using the using sync_steering command.
      * Modified the maximum bulk size per single allocation from "log_table_size - log_num_unisizes", to allocate any range size, to remove limitations that HWS objects such as counters and modify arguments might encounter. 
      * Crypto features can be in either wrapped or unwrapped mode. Meaning, the key can be wrapped or in plaintext when running the CREATE_DEK PRM command. To comply with the requirements specified in FIPS publication, all the created DEKs must be wrapped.  
    This feature adds new NV_CONFIG per device to control this mode, and enables
    the user to change all the crypto features to wrapped or cleartext.
    
      * Enabled delay drop for hairpin packets. If a hairpin QP is created with delay_drop_en enabled, the feature will be enabled across all GVMIs, based on the delay drop status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1663243200">-     *The following issues have been fixed in version 20.33.1048:**
    
      * An issue where RDMA write may experience performance degradation when working with Adaptive Routing and DCT half-handshake mode.
      * An issue that ignored the default value of TX_SCHEDULER_BURST when its value in the ini was different than "0".
      * Implemented SLD detection code. Surprise Down Error Reporting Capable value was changed from 1 to 0 in boards where the downstream perst was not controlled thus causing SLD detection not to function properly.
      * Rare lanes skew issue that caused CPU to timeout in Rec.idle.
      * RDMA_WRITE traffic performance degradation that occured when working with DC on Adaptive Routing network.
      * Bad cache invalidations of destroyed QPs.
      * A rare case where asserts and ext_synd appeared in dmesg after performing driver restart. 
      * An issue related to host isolation on multi-host systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1673524800">-     *The following issues have been fixed in version 20.35.1012:**
    
      * RDE (Redfish) PATCH operation to LLDPTransmit properties "ManagementAddressIPv4", "ManagementAddressIPv6" and "ManagementAddressMAC" were applied only in the first attempt, but failed in the next.
      * The RXT E2E inflight went into an unresponsive state occasionally.
      * RDMA partition was reported even if NIC+RDMA mode was disabled.
      * PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.
      * An incorrect address issue for XRQ Event Backend Controller Px Syndrome event in multi-host system during FLR.
      * PCIe SKP OS generation interval issue for Gen1 and Gen2.
      * InfiniBand L2 QP could not receive RDMA traffic occasionally.
      * Running with a debug firmware reduced security as if token was applied.
      * PLDM AEN event receiver was required to be cleared on PCIe reset in case the media type was MCTP over PCIe VDM.
      * Asynchronous messages were sent over MTCP before endpoint discovery was done.</changelog>
  </package>
  <package pkgid="e8063605d768f4dc110d0154db725fafc42ced8593936ae5309a3d58ec1261c9" name="firmware-hca-mellanox-vpi-eth-ib" arch="x86_64">
    <version epoch="0" ver="1.0.12" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8-2.1" date="1571054400">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5044:**
    
      * Fixed an issue that  prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode 
    
    **Fixes in version 2.42.5052:**
    
      * Fixed Uncorrectable Machine Check Exception issue. The internal resources for handling packets were not allowed to be flushed when the driver was brought down and occasionally caused Red Screen of Death (RSOD). The fix was applied to the ROM code only and has only external timing influences upon the driver's teardown.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1572868800">-     *Firmware for the following devices are updated to 2.42.5000:**  
        764282-B21  
        764286-B21  
    
    **Firmware for the following devices are updated to 2.42.5052:**  
        764283-B21  
        764284-B21  
        764285-B21
    
    **New features in firmware version 2.42.5000:**
    
      * Added support for the following features. 
        * new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * A mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
      * Improved the debug ability for command timeout cases</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1572955200">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5052:**
    
      * Fixed Uncorrectable Machine Check Exception issue. The internal resources for handling packets were not allowed to be flushed when the driver was brought down and occasionally caused Red Screen of Death (RSOD). The fix was applied to the ROM code only and has only external timing influences upon the driver's teardown.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1592395200">-     *Firmware for the following devices are updated to 2.42.5000:**  
        764282-B21  
        764286-B21  
    
    **Firmware for the following devices are updated to 2.42.5056:**  
        764283-B21  
        764284-B21  
        764285-B21
    
    **New features in firmware version 2.42.5000:**
    
      * Added support for the following features. 
        * new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * A mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
      * Improved the debug ability for command timeout cases.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1592481600">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5056:**
    
      * Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1601899200">-     *Firmware for the following devices are updated to 2.42.5000:**  
        764282-B21  
        764286-B21  
    
    **Firmware for the following devices are updated to 2.42.5056:**  
        764283-B21  
        764284-B21
    
    **Firmware for the following device is updated to 2.42.5700:**  
        764285-B21
    
    **New features in firmware version 2.42.5000:**
    
      * Added support for the following features. 
        * new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * A mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
      * Improved the debug ability for command timeout cases.
    
    **New features and changes in firmware version 2.42.5700.**
    
      * Modified the mlx_cmd_get_mlx_link_status command return value to return "Link Type = Ethernet" in Ethernet adapter cards.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1601985600">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5056:**
    
      * Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12" date="1614254400">-     *Firmware for the following devices are updated to 2.42.5000:**  
        764282-B21  
        764286-B21  
    
    **Firmware for the following devices are updated to 2.42.5056:**  
        764283-B21  
        764284-B21
    
    **Firmware for the following device is updated to 2.42.5700:**  
        764285-B21
    
    **New features in firmware version 2.42.5000:**
    
      * Added support for the following features. 
        * new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * A mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
      * Improved the debug ability for command timeout cases.
    
    **New features and changes in firmware version 2.42.5700.**
    
      * Modified the mlx_cmd_get_mlx_link_status command return value to return "Link Type = Ethernet" in Ethernet adapter cards.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12" date="1614340800">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5056:**
    
      * Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12-2.1" date="1658923200">-     *The following changes have been made in sub-version 1.0.12(A):**
    
      * Product rebuilt to have the new SHA 384 signature.
    
    **Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5056:**
    
      * Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</changelog>
  </package>
  <package pkgid="2c678e663c7765799958177f79441d651b34f04d579d2885234dfcbdcf2f058f" name="firmware-hdd-020fc874ad" arch="x86_64">
    <version epoch="0" ver="HPD1" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1673524800">-      Adds support for a second source drive pre-amp, and improves reliability with an updated direct offline scan algorithm.</changelog>
  </package>
  <package pkgid="efae0994f420bf5aea3d9c94d2172936f924e80da8c6eb5673860e56bee21b69" name="firmware-hdd-035a863453" arch="x86_64">
    <version epoch="0" ver="HPK5" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-2.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-2.1" date="1632484800">-      This Firmware release contains various drive interoperability enhancements and code fixes accumulated since the last firmware release, as well as a change to disable MCTP over PCIe VDM function per requested of HPE, and a PHY setting change for improved compatibility with Intel Ice Lake based Gen10 Plus DL360 platform. 
      * For more information, refer to HPE Customer Bulletin at the following URL: https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00115201en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-3.1" date="1632744000">-      This component HPK3 (C) is supported only on VMD enabled Intel VROC platforms and will not be part of any Service Pack for ProLiant (SPP) and Hotfix releases.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-3.1" date="1632830400">-      This Firmware release contains various drive interoperability enhancements and code fixes accumulated since the last firmware release, as well as a change to disable MCTP over PCIe VDM function per requested of HPE, and a PHY setting change for improved compatibility with Intel Ice Lake based Gen10 Plus DL360 platform. 
      * For more information, refer to HPE Customer Bulletin at the following URL: https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00115201en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-4.1" date="1652529600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-4.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-4.1" date="1652702400">-      This Firmware release contains various drive interoperability enhancements and code fixes accumulated since the last firmware release, as well as a change to disable MCTP over PCIe VDM function per requested of HPE, and a PHY setting change for improved compatibility with Intel Ice Lake based Gen10 Plus DL360 platform. 
      * For more information, refer to HPE Customer Bulletin at the following URL: https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00115201en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-5.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-2.1" date="1671105600">-      Fixed an incompatibility issue in MCTP over PCIe VDM function
      * Updated WCTEMP value for thermal throttling threshold</changelog>
  </package>
  <package pkgid="e7a79165c33f5feab21af8ee59ea0f424987bcdab2ee143449b587e7d4cb0951" name="firmware-hdd-0595c2a887" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-10.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-10.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-11.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="54a33b2100d4a7ceb43ff8936edd2bfb518af3a466fc74f34c7c39697fa2b1a7" name="firmware-hdd-059b8654a6" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1624017600">-     Reliability enhancements and VENDOR IDENTIFICATION field change from "HP" to
    HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="9a66a92602ced2b06e9cf8a9100ca46de158f7a09fad82645ecc4f2d320c70f2" name="firmware-hdd-0a38b25661" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-10.1" date="1657195200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-10.1" date="1657281600">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-11.1" date="1657368000">-</changelog>
  </package>
  <package pkgid="5e4fb56f8f3ee174d18d16f6522fa6f8b31738b77fc63e0f6d0bc9e4958bebcc" name="firmware-hdd-0a7010918e" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-11.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-11.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1656590400">-      Fixes an intermittent issue where the incorrect model number can be reported during spin-up.</changelog>
  </package>
  <package pkgid="cfdaa17b6a9c5f828c32f9748743645bf3ecddbd32d6654d0e90c9f3ff8743cc" name="firmware-hdd-0a7d4aa47f" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1656590400">-      Fixes an intermittent issue where the incorrect model number can be reported during spin-up.</changelog>
  </package>
  <package pkgid="64bbd7f1aa91addfd6c37cb9766d98dc54348a82cefaf50b87a0a957fc8f8602" name="firmware-hdd-0b575b5895" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-10.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-10.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-11.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="91ee9e430961840bb3e5774cc1f1192e8ab55ba8ba6ef1e792afa6f864d242b7" name="firmware-hdd-0f923833e9" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-8.1" date="1657195200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-8.1" date="1657281600">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-9.1" date="1657368000">-</changelog>
  </package>
  <package pkgid="1214aea37ef5db7c9d23fd662fe4a9dcb72645ab4254ea90beb983fae183d7a7" name="firmware-hdd-10385ef3e6" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-9.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="50b84dd5ceb74ff68b7ca9bc900de9598a9606da7d7506b245ca73c118d33a12" name="firmware-hdd-12304c1aca" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1594814400">-       Added support for RHEL 8.2.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1594900800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1594987200">-      This update includes a fix that prevents unrecoverable read errors in highly localized write intensive workload, and a new servo code revision that improves performance under specific vibration conditions.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1656590400">-      Fixes an intermittent issue where the incorrect model number can be reported during spin-up.</changelog>
  </package>
  <package pkgid="8fb2a34930b5d29e09367dbfed4c6c5d2dc4ecfa5ce28e33cdbf7e8bb64ffb64" name="firmware-hdd-1656c1b14a" arch="x86_64">
    <version epoch="0" ver="4ICDHPK1" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1" date="1614772800">-      This firmware corrects the potential for a drive to become disabled and nonfunctional during certain conditions or workloads.
      * After the drive is upgraded to firmware version HPK1, it cannot be downgraded to firmware version HPK0.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1-2.1" date="1632312000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1-2.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1-2.1" date="1632484800">-      This firmware corrects the potential for a drive to become disabled and nonfunctional during certain conditions or workloads.
      * After the drive is upgraded to firmware version HPK1, it cannot be downgraded to firmware version HPK0.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1-3.1" date="1652529600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1-3.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1-3.1" date="1652702400">-      This firmware corrects the potential for a drive to become disabled and nonfunctional during certain conditions or workloads.
      * After the drive is upgraded to firmware version HPK1, it cannot be downgraded to firmware version HPK0.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1-4.1" date="1657022400">-</changelog>
  </package>
  <package pkgid="e687d841d4b3e63040370b488b9b4a426619ec48e7b1f53eca64e48447eb3d94" name="firmware-hdd-18e328f036" arch="x86_64">
    <version epoch="0" ver="HPG7" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1614772800">-       Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7" date="1664280000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7" date="1664366400">-      Fixed an intermittent issue where the incorrect model number can be reported during spin-up</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-2.1" date="1671105600">-      Fixed an intermittent issue where the incorrect model number can be reported during spin-up</changelog>
  </package>
  <package pkgid="b85f1dbf80055b941227607c8ad904af5a36f3b3992eb2f7087556f82086e5ee" name="firmware-hdd-1a516522d1" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="12.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-10.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-10.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-11.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-11.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-12.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="53ef1c13330591175eaef19fd5a88672f6a58bf96eff2ccce300296bba89463d" name="firmware-hdd-1a541ed00d" arch="x86_64">
    <version epoch="0" ver="GPK4" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3" date="1647950400">-      Fix FW issues and add thermal feature requirement.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-2.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-3.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK4" date="1673265600">-      Fixes Get Endpoint ID (EID) command failure by issuing Set Endpoint ID after Endpoint Discovery</changelog>
  </package>
  <package pkgid="0bb5b07b54c677e8f67345b165872a564dc81dfb434acd05bbbd636fb59ae758" name="firmware-hdd-1cbab97ff0" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-10.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-10.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-11.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="d53d3e937ac1ea86b6d38d63535db470a77268cc61bcd8cde57079e7c26e256c" name="firmware-hdd-1d7f19120b" arch="x86_64">
    <version epoch="0" ver="HPGB" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-8.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-8.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-8.1" date="1614772800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was only found during supplier ongoing reliability testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-9.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-9.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-9.1" date="1632484800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was only found during supplier ongoing reliability testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-10.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-10.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-10.1" date="1652702400">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was only found during supplier ongoing reliability testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-11.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="a923816be1e6a7310e0d6bfa7175eb8b816941b03ca2cbde91e0cf901cafd12a" name="firmware-hdd-1e51a57347" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1614772800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1632484800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1652702400">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-7.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="1ae17460a84a67b551f60a0f86ad6e416429d34d0da82cf195099b403c7f8344" name="firmware-hdd-24384980ec" arch="x86_64">
    <version epoch="0" ver="HPD1" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1615809600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1615896000">-      VENDOR IDENTIFICATION field change from "HP" to HPE". Support for second source PMIC from IDT.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-5.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="31f32836e1a6f5948bb61e26f01a05ad99da895250cd0fa63c1ae25691058930" name="firmware-hdd-24fe569b72" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1628078400">-     This firmware fixes a potential reliability condition and the cause of a
    potential hang.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1639915200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1640001600">-      This firmware mitigates a potential reliability concern.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1657281600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1657368000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1657454400">-</changelog>
  </package>
  <package pkgid="302260fe51082a09505f98ef37bc32c70014759a4f2e8aa70c28e7dac6b6b2e6" name="firmware-hdd-252770cdda" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-7.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-7.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-8.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-8.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-9.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-9.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-10.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="bcc9e757ab9397d17f95c54a10287f38c517dd3becf4ed0c6947b339ea27829a" name="firmware-hdd-2a5b65f157" arch="x86_64">
    <version epoch="0" ver="HPK4" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1565611200">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-4.1" date="1572955200">-      Added support for SLES15SP1.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-6.1" date="1632398400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-7.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-8.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-9.1" date="1670932800">-</changelog>
  </package>
  <package pkgid="da8d5fa3282f2876acea4453fb05a8b37a18ac132d16134c5db58193c8ca4337" name="firmware-hdd-2af7385a1e" arch="x86_64">
    <version epoch="0" ver="HPK6" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-3.1" date="1621425600">-      Optimized T-offset setting.
      * Change MQES setting to 8192.
      * Fixed LED Behavior misaligned specs issue.
      * Fixed performance drop issue when 4+ SSD are installed.
      * The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-4.1" date="1632312000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-4.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-4.1" date="1632484800">-      Optimized T-offset setting.
      * Change MQES setting to 8192.
      * Fixed LED Behavior misaligned specs issue.
      * Fixed performance drop issue when 4+ SSD are installed.
      * The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-5.1" date="1652529600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-5.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-5.1" date="1652702400">-      Optimized T-offset setting.
      * Change MQES setting to 8192.
      * Fixed LED Behavior misaligned specs issue.
      * Fixed performance drop issue when 4+ SSD are installed.
      * The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK6" date="1652875200">-     Please refer to SID8624 wtih the reason that why upgrade requiremnet need to
    be set to Critical</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK6" date="1652961600">-      Main fixes are for Secure boot(Option ROM) ILO error and critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK6-2.1" date="1657022400">-      Main fixes are for Secure boot(Option ROM) ILO error and critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
  </package>
  <package pkgid="164d94a3a9aac50ffbeb2d6a4e458b173d44bed1b41c5cdf6d826496f55d903c" name="firmware-hdd-2c27a7a9a4" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1628078400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1628164800">-      Reliability enhancements and VENDOR IDENTIFICATION field change from "HP" to HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1657195200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1657281600">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1657368000">-</changelog>
  </package>
  <package pkgid="f90de7dd5ae3ddd74e541e903a62618dafaa810b714c77301b26f8639ea7a7a5" name="firmware-hdd-2cfaac41db" arch="x86_64">
    <version epoch="0" ver="HPDB" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-10.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-10.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-11.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="c145abdbe66f8f7217338bc55c0b474341e231e559ddaa87697f4ef140d06b80" name="firmware-hdd-2e4c61fc63" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1617105600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1617192000">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1652702400">-     Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1657108800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1657195200">-     Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1657281600">-</changelog>
  </package>
  <package pkgid="5a8f5687b6dbad2621264fd22b78b3ad75cd4f33a68d10b250a14dc3fa14631a" name="firmware-hdd-2e70ce7412" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="13.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-11.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-11.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-12.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-12.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-13.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="059a312e711bbcece1d30b293b652a4f1ed55edd76aa5675a4ef42b159991fef" name="firmware-hdd-2eb810cdd7" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1614772800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1632484800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1652702400">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="cb1312e814d0b89623026d09d67766694fd0b9cb2dc64307b2e0c1acaca05e4e" name="firmware-hdd-31f91b8622" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="12.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-8.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-9.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-9.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-10.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-10.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-11.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-11.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-12.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="177833fb97975ca9a35ebb722219537b614fcd00a5b4e28084e1d397dd84a48a" name="firmware-hdd-3243fce9a0" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="12.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-11.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-11.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-12.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="ca655311f4ac01d96664449b9657ab3c783d31b76484495cbce291d94024ed0f" name="firmware-hdd-326de7c0f2" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-10.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-10.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-11.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="a1dc38eda7cb02fb81e071c84cf3104f3c121ff9ad8ea51f91538992720799b5" name="firmware-hdd-3496cc4743" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1673784000">-      Adds support for a second source drive pre-amp, and improves reliability with an updated direct offline scan algorithm.</changelog>
  </package>
  <package pkgid="420b792e0c4377a479ea9d33bcacc4415999e07f6e4ea1c153ffc62d2cf6a230" name="firmware-hdd-35fd24601f" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1614772800">-      Modify Drive Vendor Identification String (VID) in Inquiry page from "HP" to "HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="f9b5d04a79f7b672c2318568c20dd09e64c1cc24b5cf3de4526b0c9266b69a68" name="firmware-hdd-3815d4b024" arch="x86_64">
    <version epoch="0" ver="GPK6" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3" date="1626868800">-     This Firmware release address below fixes and additional features:
    
      * FW Transfer Fix
      * Drive Failure Fix
      * Power Loss Protection
      * FW Download Fix
      * Reset Fix
      * Shutdown fix
      * PCIe Improvement
      * Random Write Improvement</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-2.1" date="1632139200">-      .Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-2.1" date="1632225600">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-3.1" date="1632312000">-      Added support for VMD enabled Intel VROC platform.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5" date="1647950400">-      Fix FW issues and add thermal feature requirement.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-2.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-3.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK6" date="1673265600">-      Fixes Get Endpoint ID (EID) command failure by issuing Set Endpoint ID after Endpoint Discovery</changelog>
  </package>
  <package pkgid="6a4b1eb1ccb66b16d02e73e97bbd5c89bc89b406a56f68e8fc856cc07a260170" name="firmware-hdd-3ab4c70e64" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="13.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-11.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-11.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-12.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-12.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-13.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="aee4efb6e5814185862095606f865f494a104d66053e056c40ef56c1e3e74149" name="firmware-hdd-3d97759111" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1647777600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1647864000">-      Firmware addresses a hot plug reporting concern</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1671624000">-      Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</changelog>
  </package>
  <package pkgid="299965c99bc863b47d281f37b3680b024e1c9667aa787cfc2e8f218be5560f5c" name="firmware-hdd-3db7640485" arch="x86_64">
    <version epoch="0" ver="HPGG" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE-5.1" date="1613390400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG" date="1613476800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG" date="1613563200">-      Improvements to Product Quality and Reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-5.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="0a884c5d5ff00bf32a4b3f99a7273cd8852e931f295af07ea86b9a4111e5b191" name="firmware-hdd-3e34285be7" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="13.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-10.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-10.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-10.1" date="1614772800">-      Firmware fixes intermittent data corruption issue associated with unaligned sequential write operations.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-11.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-11.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-11.1" date="1632484800">-      Firmware fixes intermittent data corruption issue associated with unaligned sequential write operations.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-12.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-12.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-12.1" date="1652702400">-      Firmware fixes intermittent data corruption issue associated with unaligned sequential write operations.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-13.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="ffca6db75777403d4c61285250b5efe4bf7814c8ef96d0a5c0e8fb770bdd0068" name="firmware-hdd-40277d55d3" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="13.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-10.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-10.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-11.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-11.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-12.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-12.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-13.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="6df579d1d1c0307ad4338a86ca17e8c00c423fb0796e7881970e94d428c9cb00" name="firmware-hdd-41cdb1c9da" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-7.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-7.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-8.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-8.1" date="1670932800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-9.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="a440f0962dcb730d277234e8685c22ed023476540d55b26bf3ce97ae7744cfeb" name="firmware-hdd-42aff4675b" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1626004800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1626091200">-     Firmware release to enable SAS4.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1640174400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1640260800">-      Fix command timeout and uncorrectable error improvement.
      * Added features for SAS4 auto power swtiching and thermal requirement.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="5b36d7c13a8c3093ce147822c199e8175b3d895d7ea9d1555718231895a5dbfe" name="firmware-hdd-46fc43ab26" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-10.1" date="1657195200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-10.1" date="1657281600">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-11.1" date="1657368000">-</changelog>
  </package>
  <package pkgid="00770431f84c720d682719e3b0318f5d7754f43e3ae78a4e3087119d505ea0c0" name="firmware-hdd-481c8ea9a7" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1614600000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1614686400">-       Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1614772800">-      The issue affects SSDs with an HPE firmware version prior to HPD7 that results in SSD failure at 40,000 hours of operation (i.e., 4 years, 205 days 16 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us&gt;.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1632484800">-      The issue affects SSDs with an HPE firmware version prior to HPD7 that results in SSD failure at 40,000 hours of operation (i.e., 4 years, 205 days 16 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us&gt;.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1652702400">-      The issue affects SSDs with an HPE firmware version prior to HPD7 that results in SSD failure at 40,000 hours of operation (i.e., 4 years, 205 days 16 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us&gt;.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="6b75accb300c22b48e5c7d7ed1321b229cb7fa9456d743eda1cb0c862e2008ca" name="firmware-hdd-492a9952f6" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1614772800">-      This maintenance FW release addresses a rare corner case COMRESET issue at warm boot, and to address an early EOL behavior under certain use cases.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1630411200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1630497600">-     These firmware release add a foreground media scan policy to prevent a
    Predictive Failure and add SMART Attribute value for the FMS count.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4" date="1660219200">-      Fixes the issue that certain SSDs may report false predictive failure in the integrated management log (IML).</changelog>
  </package>
  <package pkgid="82c73a88c1b905754c39d51edb9a81a3230f470df7a52d394cc576c4f9c3fd94" name="firmware-hdd-4b4177239b" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1630584000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1630670400">-      Improved Product Quality and Reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1648555200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1648641600">-      Firmware Capacity charge timeout threshold is increased to 14 seconds.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="364aa4ca9b713897b7e7b7ae4cf71dab6b15caf42b2363560a772a2eca389741" name="firmware-hdd-4ba9615f90" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1614600000">-      This firmware fixes an issue that, under extremely rare conditions, can cause a data miscompare. It eliminates causes of some potential timeouts and hangs. It also addresses some temporary performance degradation conditions.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1627992000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1628078400">-     This firmware release provides additional protection against command timeouts.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1629806400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1629892800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1629979200">-      This firmware release provides additional protection against command timeouts.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00117258en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652702400">-      This firmware release provides additional protection against command timeouts.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00117258en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="69adde3d4494cd581b4ee141751685e665d5c35e49108b6492a09be99ec942b5" name="firmware-hdd-4c048aaeb0" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1614772800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1632484800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1652702400">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="c40fb75e0b3dc8844ff86ea3b287e7e8c3bd4e5d002fca94fb39fa6a7dff851f" name="firmware-hdd-4fbb6d96e5" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1656590400">-      Fixes an intermittent issue where the incorrect model number can be reported during spin-up.</changelog>
  </package>
  <package pkgid="b1d9bd90d9f434b5c1b42a0dc6fd991a90fcf85362f840f0eb0eba3c8a1ae232" name="firmware-hdd-54addf5312" arch="x86_64">
    <version epoch="0" ver="HPK3" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-2.1" date="1613995200">-      This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-4.1" date="1616587200">-      This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-5.1" date="1617278400">-      This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-6.1" date="1632312000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-6.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-6.1" date="1632484800">-      This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-7.1" date="1652529600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-7.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-7.1" date="1652702400">-      This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-8.1" date="1657022400">-</changelog>
  </package>
  <package pkgid="46a78d6d6da5ec895b05a8c306252e650970d9749546269c30dfbf076e2c1da5" name="firmware-hdd-5bf9355926" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-10.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="4ab96825aadf6741962efa2ddeee59b5bde67934d012423fd4ae8662034c7a93" name="firmware-hdd-5d9e841607" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-10.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-10.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-11.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="4dd4873b42ab52ab3621c274d4b262a350fc328fa2c8fecf48978b528f225632" name="firmware-hdd-5dcf26fa42" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-9.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="efd6a225d3cf46c9e1222dfe7820e41fb7168c69246b294392247d11fee12c0c" name="firmware-hdd-624b75c7e2" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1614772800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1632484800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1652702400">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-10.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="93d87d17a5d54cc562c9cf4e54ef26b172aac15f7e95fd2754c59dec74906924" name="firmware-hdd-6628fce235" arch="x86_64">
    <version epoch="0" ver="EPK76H3Q" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK75H3Q-2.1" date="1630238400">-      Fixed False UECC issue at idle power mode.
      * Old FW download Blocking (EPK70H3Q~EPK74H3Q).
      * FW is changed off the option of TX data alignment for each lane.
      * FW is changed to clear the interrupt after TLP Complete when PCIe config read operation.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00113342en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK75H3Q-3.1" date="1630324800">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK75H3Q-3.1" date="1630411200">-      Added support for VMD enabled Intel VROC platform.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK75H3Q-3.1" date="1630497600">-      Fixed False UECC issue at idle power mode.
      * Old FW download Blocking (EPK70H3Q~EPK74H3Q).
      * FW is changed off the option of TX data alignment for each lane.
      * FW is changed to clear the interrupt after TLP Complete when PCIe config read operation.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00113342en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK75H3Q-4.1" date="1652529600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK75H3Q-4.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK75H3Q-4.1" date="1652702400">-      Fixed False UECC issue at idle power mode.
      * Old FW download Blocking (EPK70H3Q~EPK74H3Q).
      * FW is changed off the option of TX data alignment for each lane.
      * FW is changed to clear the interrupt after TLP Complete when PCIe config read operation.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00113342en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK76H3Q" date="1652875200">-     Please refer to SID8624 wtih the reason that why upgrade requiremnet need to
    be set to Critical</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK76H3Q" date="1652961600">-      Contains critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK76H3Q-2.1" date="1657022400">-      Contains critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
  </package>
  <package pkgid="93723d29735843cc8106d6087c5a8db227adf43d2901302173f079c5876418b6" name="firmware-hdd-6758a46eb7" arch="x86_64">
    <version epoch="0" ver="4IASHPK3" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4IASHPK3" date="1666180800">-      Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4IASHPK3" date="1666267200">-      OCP v2.0 feature support 
      * NVMe-MI over PCIe VDM support 
      * Bug fixes</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4IASHPK3-2.1" date="1671105600">-      OCP v2.0 feature support 
      * NVMe-MI over PCIe VDM support 
      * Bug fixes</changelog>
  </package>
  <package pkgid="7d3300487659e4191f5122691b31d4af086c8039097192b1be219e45b5daad67" name="firmware-hdd-68b12e54d2" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1657195200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1657281600">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1657368000">-</changelog>
  </package>
  <package pkgid="d952aae514f815392b1c575562e624107b428d28384d02f48344779a806c20d1" name="firmware-hdd-693b9a2853" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1617796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1617883200">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1657195200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1657281600">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1657368000">-</changelog>
  </package>
  <package pkgid="b1501448e6b98e5f8445438bd19396ec855bf0a1f5a82aa828b7eabfe04c5d80" name="firmware-hdd-6b7ce3da0e" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-9.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="d7979ff97a2fecd6cd6c1ff03754499ac913d8aafb06aeff77ac7a98e5e33a1f" name="firmware-hdd-6d922fc9a8" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="5df676f148c4ef9599bc154ce594f77cef0b85f806e052e3c811bcb54240450b" name="firmware-hdd-6e3845def5" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="17270c63a5f8c550281fd51fd2989a7148bea369d2c762ae9dc3f43cea185e1c" name="firmware-hdd-6ec35faf90" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1614772800">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1623153600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1623240000">-      Reliability enhancements and VENDOR IDENTIFICATION field change from "HP" to HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="b3ce4fbe0f856ad6e5fba18e615bc7a1e5a9e03795aaff671702f6c2f81eb1a4" name="firmware-hdd-6fc985bd3b" arch="x86_64">
    <version epoch="0" ver="GPK6" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-2.1" date="1631534400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-2.1" date="1631620800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-3.1" date="1631707200">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-3.1" date="1631793600">-      Added support for VMD enabled Intel VROC platform.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5" date="1647950400">-      Fix FW issues and add thermal feature requirement.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-2.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-3.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK6" date="1673179200">-      Fixes Get Endpoint ID (EID) command failure by issuing Set Endpoint ID after Endpoint Discovery</changelog>
  </package>
  <package pkgid="cc93dff8ed16bd6e93774739172a41967d5306926934e31e9b40ba750b4f768c" name="firmware-hdd-70e3962f98" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1614772800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1632484800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-10.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-10.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-10.1" date="1652702400">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-11.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="7d1b7b2e06830dc6805185d654daa07f5081087bcc13925bf14925eb316aeb5f" name="firmware-hdd-71af849f3b" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-10.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-10.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-11.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="d5305cc8f9715189ca837ea16c7152b4f7e8faf718ac1634322b41d0b275dfd5" name="firmware-hdd-726d5ec795" arch="x86_64">
    <version epoch="0" ver="HPK2" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1659009600">-      Fix for BIOS RSOD issue</changelog>
  </package>
  <package pkgid="6ec46ea76f6f39e9062c30690cd9407f7dfba695ae58a6a5a95c89f467f1c503" name="firmware-hdd-7505dfb5ae" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1617105600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1617192000">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652702400">-      Added support for 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1657195200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1657281600">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1657368000">-</changelog>
  </package>
  <package pkgid="da3a1d5e85ca8c5f59aee2264b6b99b320769601b422b50b0a053089de786085" name="firmware-hdd-7677644a25" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-10.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="228f81b6328ac384f90aa7e7feec2062ebbbec247e6cc7ba56bd6cc3befc8405" name="firmware-hdd-7a1edae8e7" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="05e532e61904df6a39387bc4ae4d1b1db32998ffa62cac724a968631a952e642" name="firmware-hdd-7c1a1734f9" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-10.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-10.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-11.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="9879582c43111b39d7b18ee5f5561cd13013f7809cc41aed116abc917e052a48" name="firmware-hdd-7f2a26e6d0" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="204354782bf6457c9a72c20218641f39284e51dc3fd49329d82c14809db6f105" name="firmware-hdd-7fc5497116" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1617105600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1617192000">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1657195200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1657281600">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1657368000">-</changelog>
  </package>
  <package pkgid="0a4243a31681cb99ba5b593ac2ef3d5a0d42456469cc7f88f14a5b80e79105ef" name="firmware-hdd-805abb7e9c" arch="x86_64">
    <version epoch="0" ver="85032G00" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85030G00-2.1" date="1598270400">-      Added Support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85031G00" date="1623240000">-      This is a maintenance release that contains various drive reliability enhancements and code fixes accumulated since the last initial release, as well as a change to disable MCTP over PCIe VDM function to satisfy certain HPE platform environments.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85032G00" date="1635249600">-      Implements FW-based VPD.
      * ARP setting is changed from "Capable &amp; Discoverable" to "Fixed &amp; Discoverable".
      * A minor tweak to the Foreground Media Scan (FMS) algorithm to ensure critical variables are initialized properly.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85032G00-2.1" date="1635336000">-      Added support for VMD enabled Intel VROC platform.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85032G00-2.1" date="1635422400">-      Implements FW-based VPD.
      * ARP setting is changed from "Capable &amp; Discoverable" to "Fixed &amp; Discoverable".
      * A minor tweak to the Foreground Media Scan (FMS) algorithm to ensure critical variables are initialized properly.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85032G00-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85032G00-4.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="7c6f4e47e07bc7f3a9ca71be39cc085e09e9553c3fc5c5d818fd0f6757d4ac96" name="firmware-hdd-8173816d98" arch="x86_64">
    <version epoch="0" ver="HPD1" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1664280000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1664366400">-      Firmware addresses a hot plug reporting concern</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1671105600">-      Firmware addresses a hot plug reporting concern</changelog>
  </package>
  <package pkgid="4a4d6446ea816dc55211c49ac3c643ea002ac103f22579c08931dd210ae2ff1d" name="firmware-hdd-82894b9e0a" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1670932800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="24260af1adf6bcae17149ca0fc69910bde996d9851f1b72651af3d43956bb28e" name="firmware-hdd-852266afdf" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1628078400">-     This firmware fixes a potential reliability condition, a rare data integrity
    issue and the cause of a potential hang.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1640174400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1640260800">-      This firmware mitigates a potential reliability concern.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1657281600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1657368000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1657454400">-</changelog>
  </package>
  <package pkgid="30744b443b73d2eadcbdbccdc4a9a5932f30dee1f9817bdb4acc0658acf299a4" name="firmware-hdd-8a0371a425" arch="x86_64">
    <version epoch="0" ver="HPDA" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1629115200">-     This firmware revision corrects a rare situation where a Cryptographic Erase
    could result in random data instead of the expected deterministic zeros. This
    is judged as low severity because it does not compromise user data or
    security, but justifies the update to preclude potential security concerns.
    There are several items that reduce the probability of hangs and provide some
    minor performance improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA" date="1671105600">-      This firmware revision improves data integrity and reliability by optimizing adjacent track refresh parameters and management of emergency power loss table structure.
      * The risk of not upgrading to this firmware is the increased possibility of data corruption in emergency power loss events.
      * Several maintenance items are included in this firmware revision that reduce the probability of hangs and provide some minor performance improvements.</changelog>
  </package>
  <package pkgid="191729d1837d5ca9ced2601a4c45297818e1700c09dbe051af4a46b7fc3505a5" name="firmware-hdd-8a2c06af48" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="12.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-10.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-10.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-11.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-11.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-12.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="94f96e3e45c7c90766b7b6946239008c0b85ce53a1905ecf0a1a4464def21300" name="firmware-hdd-8a7ecf7465" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1486555200">-     *Problems Fixed:**
    
      * Fixed an issue where wear usage was not being reported correctly in the SmartSSD Wear Gauge Utility</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1615809600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1615896000">-      If Power On Hours exceeds 70,000hrs, PM2R will report Hardware error (04/4C/A8) after the next Power Cycle and will not accept read/write commands. This fix will update storage location reporting when the maximum number of registrations in the Work Load Log read process reaches 70,000; the last registered 70,000th storage location will be modified to be read as the next (70,001st) storage location.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111296en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      If Power On Hours exceeds 70,000hrs, PM2R will report Hardware error (04/4C/A8) after the next Power Cycle and will not accept read/write commands. This fix will update storage location reporting when the maximum number of registrations in the Work Load Log read process reaches 70,000; the last registered 70,000th storage location will be modified to be read as the next (70,001st) storage location.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111296en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      If Power On Hours exceeds 70,000hrs, PM2R will report Hardware error (04/4C/A8) after the next Power Cycle and will not accept read/write commands. This fix will update storage location reporting when the maximum number of registrations in the Work Load Log read process reaches 70,000; the last registered 70,000th storage location will be modified to be read as the next (70,001st) storage location.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111296en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="219b16010a447a964a161eeeed4da14df00ba25f9c36a11c85b131fa779b1d47" name="firmware-hdd-8b26d1ef02" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1623240000">-      Reliability enhancements and VENDOR IDENTIFICATION field change from "HP" to HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1670932800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="6a2b5c94d35d273f7a83cf6c48863b9089446c6930d0953c9442666984fef5fe" name="firmware-hdd-8c4a212ff9" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="12.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-7.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-8.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-9.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-9.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-10.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-10.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-11.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-11.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-12.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="d293c32910526cab9a445a868506a0dceaf78183270810b1fa634fd7e7bd8577" name="firmware-hdd-8d68452816" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1628078400">-     This firmware fixes a condition that could cause the heads to land on the
    media in an emergency power off situation, and eliminates a command timeout
    issue. Some internal logging operations were refined at the same time.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1652702400">-      Added support for RHEL9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1661428800">-      Added support for RHEL9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664452800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664539200">-      Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine "sweeping" of the media surface.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1671105600">-      Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine "sweeping" of the media surface.</changelog>
  </package>
  <package pkgid="7179584a074953544e60f449bdfe9203b27f8ec8ce6c79752d44e7203f2bd061" name="firmware-hdd-8e1e8083c5" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1614772800">-       Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1630670400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1630756800">-     This FW release deploys an Enhanced Media Scan algorithm that addresses an
    issue when the host system does not provide enough idle time for drive's
    Foreground Media Scan to be activated, which is needed to ensure long term
    drive reliability. It also addresses few minor issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="b99b39af8892224b159798def8029562abccf5ca2b5f89f70ae26fe2bf74bf13" name="firmware-hdd-8e8ddc5265" arch="x86_64">
    <version epoch="0" ver="HPK2" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS1-2.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS1-3.1" date="1572955200">-      Added support for SLES15SP1.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS1-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS1-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS1-6.1" date="1632398400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS1-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1646913600">-      Applied enhanced NAND recovery algorithm to prevent read UECC error
      * Prepare proper response data for Get Message Type Supported MCTP Command</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-3.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="01eb9eead1061d1407ab38be4cf384ae5d360bc86befe55ca32338f3ed7ad438" name="firmware-hdd-8ed8893abd" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1614686400">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-6.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-6.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-7.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="33b9458d35a9f1e8ccd267b4434bc1f9b8dc884553523a8f074630a6de629d9e" name="firmware-hdd-8f501d6cf1" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1640174400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1640260800">-      Fix command timeout and uncorrectable error improvement.
      * Added features for SAS4 auto power swtiching and thermal requirement.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="be1b94e67a2e8cce018d2efd1bdeb6dae1058f829f84efe40e37ceba233d2bdc" name="firmware-hdd-8f9bf23306" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1621944000">-      The updates were included in a regularly scheduled 5300 maintenance release. This firmware has a security version upgrade to include TCGe SKUs and prevent a downloading of a back level firmware version of HPG0 after upgrading to HPG1.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="08e8c8e628093c7de752e228e28e8304859bd61b2d0aee3179598ff67e27a72b" name="firmware-hdd-8fafc9efb2" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1652702400">-      Reduced the occurrence probability of PMIC busy issue. 
      * Fixed the system data error at the drive power on issue. 
      * When the PLP operation starts, the waiting Unmap request to the 4KB not-aligned host write area is canceled to be able to complete PLP correctly.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1666094400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1666180800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1666267200">-      Reduced the occurrence probability of PMIC busy issue. 
      * Fixed the system data error at the drive power on issue. 
      * When the PLP operation starts, the waiting Unmap request to the 4KB not-aligned host write area is canceled to be able to complete PLP correctly.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1666612800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1666699200">-      Reduced the occurrence probability of PMIC busy issue by stopping PLP capacity check to reduce i2c access to PMIC.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1671105600">-      Reduced the occurrence probability of PMIC busy issue by stopping PLP capacity check to reduce i2c access to PMIC.</changelog>
  </package>
  <package pkgid="00980d75b47e245d5e7bccb19fd734fc98901c5525f52b6505da4657f59a65a1" name="firmware-hdd-9196d4f720" arch="x86_64">
    <version epoch="0" ver="HPGG" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE-4.1" date="1613563200">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG" date="1613649600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG" date="1613736000">-      Improvements to Product Quality and Reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-5.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="358295bd018102f262be8d2af70cbe64b55212b1bbf920881841fc7c592e4597" name="firmware-hdd-92d876cfea" arch="x86_64">
    <version epoch="0" ver="4ICRHPK3" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3" date="1617105600">-      Fixed issues described in Customer Bulletin at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111900en_us.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-2.1" date="1618142400">-      Added support for Intel VROC platform.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-2.1" date="1618228800">-      The issue affects SSDs with an HPE firmware version prior to 4ICRHPK3 that may result in SSD failure starting at 4,700 hours of operation, neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111900en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-3.1" date="1632312000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-3.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-3.1" date="1632484800">-      The issue affects SSDs with an HPE firmware version prior to 4ICRHPK3 that may result in SSD failure starting at 4,700 hours of operation, neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111900en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-4.1" date="1652529600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-4.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-4.1" date="1652702400">-      The issue affects SSDs with an HPE firmware version prior to 4ICRHPK3 that may result in SSD failure starting at 4,700 hours of operation, neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111900en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-5.1" date="1657108800">-</changelog>
  </package>
  <package pkgid="53a2bfdcb4e54714ae72906aa26d9e266848c062f3a763ab4b1834f744d1d9ae" name="firmware-hdd-9475583fb5" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1673784000">-      Fix contains optimization to increase the time for Recovery operation and few checks for maintenance.</changelog>
  </package>
  <package pkgid="e8a12fbd04d0536fe1e7b072102e78893b24910b1dfd216325d88de283d7f8ca" name="firmware-hdd-951aefd63e" arch="x86_64">
    <version epoch="0" ver="MPK7625Q" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q" date="1652875200">-     Please refer to SID8624 wtih the reason that why upgrade requiremnet need to
    be set to Critical</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q" date="1652961600">-      Contains critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q-2.1" date="1657022400">-      Contains critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
  </package>
  <package pkgid="e31707d63cacf5bc5b46261040a0139642497f747544adafa0bf693bb6b74e76" name="firmware-hdd-95a2e5abcb" arch="x86_64">
    <version epoch="0" ver="HPK4" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1572955200">-      Fixed timing issue to pass VMWare VSAN certification. Downgrading to any previous version of firmware is not allowed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-4.1" date="1598270400">-      Added support for RHEL8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-6.1" date="1632398400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-7.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-8.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-9.1" date="1670673600">-</changelog>
  </package>
  <package pkgid="c24af0e7938f2c532533ab359a78fcd774660ca29d1d3803cea193d2490972a0" name="firmware-hdd-95af9a555e" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-4.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1656072000">-      Fixes an intermittent issue where the incorrect model number can be reported during spin-up.</changelog>
  </package>
  <package pkgid="cd5729ea6a11c1af1e80ce4b8bd5a29c5c2006db914b8f440b4d5795673e7a34" name="firmware-hdd-95b6ae2e85" arch="x86_64">
    <version epoch="0" ver="HPK6" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-3.1" date="1621425600">-      Optimized T-offset setting.
      * Change MQES setting to 8192.
      * Fixed LED Behavior misaligned specs issue.
      * Fixed performance drop issue when 4+ SSD are installed.
      * The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-4.1" date="1632312000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-4.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-4.1" date="1632484800">-      Optimized T-offset setting.
      * Change MQES setting to 8192.
      * Fixed LED Behavior misaligned specs issue.
      * Fixed performance drop issue when 4+ SSD are installed.
      * The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-5.1" date="1652529600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-5.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-5.1" date="1652702400">-      Optimized T-offset setting.
      * Change MQES setting to 8192.
      * Fixed LED Behavior misaligned specs issue.
      * Fixed performance drop issue when 4+ SSD are installed.
      * The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK6" date="1652875200">-     Please refer to SID8624 wtih the reason that why upgrade requiremnet need to
    be set to Critical</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK6" date="1652961600">-      Main fixes are for Secure boot(Option ROM) ILO error and critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK6-2.1" date="1657022400">-      Main fixes are for Secure boot(Option ROM) ILO error and critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
  </package>
  <package pkgid="da235ffa844a7eb1bfe4c68fc8466b01ab189eed662a8168b058bde368b028c8" name="firmware-hdd-9a826ccd8a" arch="x86_64">
    <version epoch="0" ver="HPK4" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1565611200">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-4.1" date="1572955200">-      Added support for SLES12SP1</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-6.1" date="1632398400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-7.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-8.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-9.1" date="1670932800">-</changelog>
  </package>
  <package pkgid="47883776d9c5f5b11c741b77a4f44cfc615fac37875830649125ef3b13753e40" name="firmware-hdd-9ad359dac1" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1616414400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1616500800">-      Change Vendor Identification Field (VID data) from "HP" to "HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="123f8b7500786c081d15bf50dd65abbc7ac63546576867fd4ce6065887d50ccd" name="firmware-hdd-9e87eecb3f" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1611835200">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1611921600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1612008000">-      Improved Product Quality and Reliability. Changed Cap Charge Timeout to 14 seconds from 4 seconds to provide additional time for cap charge in marginal power environment.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="3a1207f7ae2b09948e8f0410b2f7cdf712bd4679ac4fb4bd4b6d26d97a5f4192" name="firmware-hdd-a05f29cef3" arch="x86_64">
    <version epoch="0" ver="HPDB" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA" date="1647777600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA" date="1647864000">-      Firmware addresses a hot plug reporting concern.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB" date="1670932800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB" date="1671019200">-      Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-2.1" date="1674302400">-      Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</changelog>
  </package>
  <package pkgid="666ee7e2d6da38ed327a8f51fcb731ed53e44e257fd5d7e05b5885130cddf4f6" name="firmware-hdd-a07a420ed1" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1614772800">-      Modify Drive Vendor Identification String (VID) in Inquiry page from "HP" to "HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="39a0b1e0cd4e53a9174c707c9c4c6dab0fd7016d99739ee2642dcfc93451c016" name="firmware-hdd-a1fd19f9ca" arch="x86_64">
    <version epoch="0" ver="HPG8" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-9.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="de5629f79d9538e3f565ac9d03ca4901796760a0f6ab749e4e91fd8d2c738e74" name="firmware-hdd-a27c95663d" arch="x86_64">
    <version epoch="0" ver="HPK2" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1670932800">-      Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1671019200">-      Added Relaxed Ordering feature in drive FW and fixed some bugs</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1671105600">-      Added Relaxed Ordering feature in drive FW and fixed some bugs</changelog>
  </package>
  <package pkgid="7cac68f9012d0db066b5ca5b23c92801a29910dba690d391944bf5819ae8371b" name="firmware-hdd-a2d4b5c742" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="13.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-10.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-10.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-11.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-11.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-12.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-12.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-13.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="f2ce2d2d91157bb03567fd89a78dd4794a19e92288cd7ea8aa93bb19052948a0" name="firmware-hdd-a629fcea59" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="13.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-8.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-9.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-9.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-10.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-10.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-11.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-11.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-12.1" date="1657195200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-12.1" date="1657281600">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-13.1" date="1657368000">-</changelog>
  </package>
  <package pkgid="f3e2c71a8ca4c6caf849b4924fd60498b2927a0374565f29c6949005d381dae8" name="firmware-hdd-a886842a99" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1626264000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1626350400">-     Reliability enhancements and VENDOR IDENTIFICATION field change from "HP" to
    HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1657195200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1657281600">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1657368000">-</changelog>
  </package>
  <package pkgid="95a465b1dc29c9674d5763c38e84e135bde14d1a65d40f1aaa09e2a61634ef27" name="firmware-hdd-a9843986b0" arch="x86_64">
    <version epoch="0" ver="HPK2" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1659009600">-      Fix for BIOS RSOD issue</changelog>
  </package>
  <package pkgid="faed7c27af0d1f858c35640732cd6050c3369136a1264e3ce4f855667cb8b3d9" name="firmware-hdd-aa9e289524" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1621425600">-      This firmware version updates the Vendor ID in the standard inquiry to 'HPE', in previous versions it was 'HP.'</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1670932800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="36ba22cba5b1e8cb25a66eb0691bbf67889e30c707ec7cd13e080df74c2bdaf3" name="firmware-hdd-aaf1014ede" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1621944000">-      Reliability enhancements and VENDOR IDENTIFICATION field change from "HP" to HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1670932800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="8e89edc6fdacb24665507ea359749d14d570c5c7a220de37e36813f95fd03f11" name="firmware-hdd-abd133f0de" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1673784000">-      Fix contains optimization to increase the time for Recovery operation and few checks for maintenance.</changelog>
  </package>
  <package pkgid="be2dc07b46412a764813cfdb6a3ceabe24719520430e065c3e8343b8c0a70cf4" name="firmware-hdd-ac20a1e1c6" arch="x86_64">
    <version epoch="0" ver="HPG8" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1613822400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8" date="1613908800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8" date="1613995200">-      Improvements to Product Quality and Reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-5.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="0643743775a7b43cb97a98bb57acb7fe748bf402fbbcc1592d57ce22fb5425a7" name="firmware-hdd-ac3fda26eb" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="12.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-10.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-10.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-11.1" date="1657195200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-11.1" date="1657281600">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-12.1" date="1657368000">-</changelog>
  </package>
  <package pkgid="fd3e7453384c5503d14ace6325eb25d084bc72c4d94e139423c461cca39d4e6b" name="firmware-hdd-adb3ab8147" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1648641600">-      Firmware addresses a hot plug reporting concern.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664280000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664366400">-      Fixes an issue in previous version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1670932800">-      Fixes an issue in previou version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1671105600">-      Fixes an issue in previou version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</changelog>
  </package>
  <package pkgid="c050824ec7ed4803454c9a83437253215f7f1ae46cf01c4f5eae27b8a7e4618f" name="firmware-hdd-ae6b41e855" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1648641600">-     Firmware addresses a hot plug reporting concern</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664280000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664366400">-      Fixes an issue in previou version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1670932800">-      Fixes an issue in previous version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1671105600">-      Fixes an issue in previous version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</changelog>
  </package>
  <package pkgid="30310af6d5a985c50564e3f7d74b4be48eff6f337f97576b5b7e1c628da66ceb" name="firmware-hdd-aef2a690c9" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-5.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-5.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-5.1" date="1614772800">-      Fixes a rare link loss issue and adds enhancements for drive reliability.
      * After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.
      * The new drive bootloader code will be activated after the next drive power cycle.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1632484800">-      Fixes a rare link loss issue and adds enhancements for drive reliability.
      * After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.
      * The new drive bootloader code will be activated after the next drive power cycle.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1652702400">-      Fixes a rare link loss issue and adds enhancements for drive reliability.
      * After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.
      * The new drive bootloader code will be activated after the next drive power cycle.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-8.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="0557ec648508bf7a2b1e5e8bb66fe71c57a3a01a61b06bca184e4b91a228e177" name="firmware-hdd-af802bb412" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-10.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-10.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-11.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="cc31069879e7cf358ef9186d2c31a16aa110f767db6e10e1ad630490899f99e8" name="firmware-hdd-b04257b77b" arch="x86_64">
    <version epoch="0" ver="HPDA" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1624449600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1624536000">-     This firmware version updates the Vendor ID in the standard inquiry to 'HPE',
    in previous versions it was 'HP.'</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA" date="1654862400">-      Firmware addresses a hot plug reporting concern</changelog>
  </package>
  <package pkgid="999f056598de1f72e6f0bc7aac5a2fc65c14f68f91534c6d98cf724b4cf24104" name="firmware-hdd-b04df66fe9" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1657281600">-</changelog>
  </package>
  <package pkgid="1b38fff90f56ab69e6b6dff94dfb7cd3059532650c7f156e993b0ad8b83b1c50" name="firmware-hdd-b1c9eaf74c" arch="x86_64">
    <version epoch="0" ver="HPDA" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1647864000">-      Firmware addresses a hot plug reporting concern</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1666094400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1666180800">-      Firmware adds support for new humidity sensor</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA" date="1670932800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA" date="1671019200">-      Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-2.1" date="1674302400">-      Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</changelog>
  </package>
  <package pkgid="6f8e3d3032ab64d15533181fcca881bf08883cd54b80883a7e167f873715ee85" name="firmware-hdd-b45e49679c" arch="x86_64">
    <version epoch="0" ver="HPK4" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1572955200">-      Fixed timing issue to pass VMWare VSAN certification.  Downgrading to any previous version of firmware is not allowed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-4.1" date="1598270400">-      Added support for RHEL8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-6.1" date="1632398400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-7.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-8.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-9.1" date="1670932800">-</changelog>
  </package>
  <package pkgid="b4b6a4c1da8753a41d627787b7762080816c3b8d213779c44b76d0ec543291da" name="firmware-hdd-b460823f70" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1611835200">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1611921600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1612008000">-      Improved Product Quality and Reliability. Changed Cap Charge Timeout to 14 seconds from 4 seconds to provide additional time for cap charge in marginal power environment.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="a2a4b2d0595668e78ab9bb45fcd3b13d1058481da2cffb6756d14956dd1d5b88" name="firmware-hdd-b78255e146" arch="x86_64">
    <version epoch="0" ver="HPG8" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-2.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-3.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-4.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-5.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8" date="1666094400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8" date="1666180800">-      Fix for potential hangs and timeouts, tuning fixes based on field experience and maintenance logging items</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-2.1" date="1671019200">-      Fix for potential hangs and timeouts, tuning fixes based on field experience and maintenance logging items</changelog>
  </package>
  <package pkgid="46344105813a99d872715a06633b2a35096e94dc70c36ac23a21f8b0140212e6" name="firmware-hdd-b7eb905efe" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1614772800">-      Fixes an issue which caused the drive to become non-functional.
      * Fixes VPD Log D0h reported drive Sanitize times.
      * Adds support for Security Log Page BBh.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1632484800">-      Fixes an issue which caused the drive to become non-functional.
      * Fixes VPD Log D0h reported drive Sanitize times.
      * Adds support for Security Log Page BBh.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1652702400">-      Fixes an issue which caused the drive to become non-functional.
      * Fixes VPD Log D0h reported drive Sanitize times.
      * Adds support for Security Log Page BBh.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="ebde8b9e45fed11b2589c8f3ea7e8bf9707596f4812fbe2909e4ba31daad58aa" name="firmware-hdd-b85516c7d2" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-9.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="99f71236499a081e3b665c036209639a7ce0d62478e9a9af37a4bad37304d64f" name="firmware-hdd-b8a60fbe9a" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-8.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="4228b3867ec30f9d1bd3ae0928f24f25ec7b04e03555ac269307a9186877cf31" name="firmware-hdd-b9340d29be" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="12.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-10.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-10.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-11.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-11.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-12.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="f39cc895057eb9d7290a6d6c1f30bb41a546ae6b8121b542d344d3ec455fbf7d" name="firmware-hdd-bdc37cb37f" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="12.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-7.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-8.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-9.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-9.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-10.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-10.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-11.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-11.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-12.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="30c20deaa495a52a5090c2d287b813f28fa302c97e4f033f65bfe6b6a4affd3c" name="firmware-hdd-bdfb8e99d9" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1647777600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1647864000">-      Firmware addresses a hot plug reporting concern</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1666094400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1666180800">-      Firmware adds support for new humidity sensor</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1670673600">-      Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</changelog>
  </package>
  <package pkgid="10ba315edfd5a4ce10956504f443cdd8e91760701f02c2505dee9bf112b3dbe2" name="firmware-hdd-befd42bd64" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1644148800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1644235200">-      Support new PCB H/W with new temperature sensor.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="2f9e1354c8e444c7258e2c8f7ce6dc916fe3afbb425c7fcd25395bd32d943725" name="firmware-hdd-bfc4af697b" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="9e81da1f8effac4e4e5d0a36531b18e08ca2ee009b0bd576418363cf13b39018" name="firmware-hdd-bfc95f0628" arch="x86_64">
    <version epoch="0" ver="HPGB" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-8.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-8.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-8.1" date="1614772800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-9.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-9.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-9.1" date="1632484800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-10.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-10.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-10.1" date="1652702400">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-11.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="9769759615b4343b1165bd922d7354652ff9e7023891ad6e4b25ab4bdc1b80b3" name="firmware-hdd-c4355d15c4" arch="x86_64">
    <version epoch="0" ver="4ICSHPK4" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4" date="1621425600">-      Fixed HPK3 drive reports incorrect Device ID issue.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-2.1" date="1621771200">-      Added support for VMD enabled Intel VROC platform.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-2.1" date="1621857600">-      Fixed HPK3 drive reports incorrect Device ID issue.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-3.1" date="1632398400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-4.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-5.1" date="1657108800">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-5.1" date="1657195200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-6.1" date="1657281600">-</changelog>
  </package>
  <package pkgid="58e7f245a26e027dc0b900e1cdb68ca0a3955cd654d6e94eedfc613f489ff7f6" name="firmware-hdd-c566d63ca0" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="4755748ea21ae2feb8bb1761f043a8c5f1be06b3df8cca840d3ecb8f123fef39" name="firmware-hdd-c5cd837c29" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1616932800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1617019200">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1657108800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1657195200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1657281600">-</changelog>
  </package>
  <package pkgid="1ea15764a1676a3156bf27c2bfd8cd8041470c56185ca6a0c06e4d8c7bdcad93" name="firmware-hdd-c7df7ceedb" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1628078400">-     This firmware fixes a condition that could cause the heads to land on the
    media in an emergency power off situation, and another condition that can lead
    to high-fly write, and eliminates a command timeout issue. Some internal
    logging operations were refined at the same time.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664366400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664452800">-      Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine "sweeping" of the media surface.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1671105600">-      Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine "sweeping" of the media surface.</changelog>
  </package>
  <package pkgid="197e6973057b38ffc919eac28ff21da9965e9c9c04e5fd1135832db72a95b13e" name="firmware-hdd-c993b31232" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1661428800">-      Improvement in mixed READ/WRITE performance, which was causing a field issue at an HPE customer</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1666008000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1666094400">-      Improvement in mixed READ/WRITE performance, which was causing a field issue at an HPE customer - Improve random mix performance in TL=2048k and 512k</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1671105600">-      Improvement in mixed READ/WRITE performance, which was causing a field issue at an HPE customer - Improve random mix performance in TL=2048k and 512k</changelog>
  </package>
  <package pkgid="8d9872ab0b174edb459b1d073afa8c6922969934dada4581063646393d5ef9bd" name="firmware-hdd-ca21e169e2" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="e0f161a1a642544ce43c8fd88e17bacba33817f0e41cee3300f11c34a6eee306" name="firmware-hdd-cc819d4bff" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1614772800">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1632484800">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-8.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-8.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-8.1" date="1652702400">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-9.1" date="1657108800">-</changelog>
  </package>
  <package pkgid="748dc1d12dd08d5fb7b9171d629912a4294ec702f5943c6065dd3c6edae92897" name="firmware-hdd-cea219e4b1" arch="x86_64">
    <version epoch="0" ver="HPK3" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1567598400">-      Fixes an issue where the SSID was not programmed correctly to the drive. This may cause issues with the drive not being identified correctly in the Integrated Lights Out Utility.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1598270400">-      Added support for RHEL8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3" date="1614168000">-      Fixed SSD weargauge report error issue.
      * Fixed Assign FWState as TR_DONE_ERR at the correct location.
      * Prepare proper response data for Get Message Type Supported MCTP Command.
      * Added code to preserve current feature values cross live firmware update.
      * Allocate 4 bytes instead of 2 bytes for parameter code.
      * Changed the value for NLB equal to NSize -1.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-3.1" date="1632398400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-4.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-5.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-6.1" date="1670932800">-</changelog>
  </package>
  <package pkgid="34c8d603ab2220ac19b1a2843d552c8291897d57ba9e21d8ddf89c4808697b30" name="firmware-hdd-cf0b6cabe1" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1626350400">-     This firmware version updates the Vendor ID in the standard inquiry to 'HPE',
    in previous versions it was 'HP.'</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1664280000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1664366400">-      Addresses a hot plug reporting concern
      * Increased the buffer memory size used for sequential write data to resolve performance degradation seen in a RAID60 configuration</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1671105600">-      Addresses a hot plug reporting concern
      * Increased the buffer memory size used for sequential write data to resolve performance degradation seen in a RAID60 configuration</changelog>
  </package>
  <package pkgid="606881be4429cce7e5b22bd583995fd051212411c3a562f6a881b58a71ef68fd" name="firmware-hdd-cfd7436fcc" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1623758400">-      VENDOR IDENTIFICATION field change from "HP" to "HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1670932800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="5dd469571354b3da132e4ce41f883a5cc833d14a170546ba9fa33b5c0619514d" name="firmware-hdd-d1cf327bc4" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1611835200">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1611921600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1612008000">-      Improved Product Quality and Reliability. Changed Cap Charge Timeout to 14 seconds from 4 seconds to provide additional time for cap charge in marginal power environment.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="0adb985d0d1127bf6d2339ebb9e8cc851509b962ec7a5e3bdf1965a06eed7e87" name="firmware-hdd-d355375539" arch="x86_64">
    <version epoch="0" ver="HPS4" rel="13.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-8.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-9.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-9.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-10.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-10.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-11.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-11.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-12.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-12.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS4-13.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="0c6d5d005422e179d2a06605b3dbcddd238c6583053f16fd81884e6af89c9036" name="firmware-hdd-d39e7a7e75" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-10.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="ba0401ac4ae4ef78c853379793bc53ea3cb05481559cf4a2b6292b3bd64b02ee" name="firmware-hdd-d4be2aecbb" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1657281600">-</changelog>
  </package>
  <package pkgid="8b71a8ab035f5c2ce836daa058e4634ac8f2a8ad84f0076a4d143a65c5bd6663" name="firmware-hdd-d550523365" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1632484800">-      VENDOR IDENTIFICATION field changed from "HP" to "HPE" and Reliability improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="458ffd8778ebe86c28463655ffe00dae9ad43984bfcb453ab9c101e9ff580734" name="firmware-hdd-d64642c780" arch="x86_64">
    <version epoch="0" ver="HPK4" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1565611200">-      Fixes a potential latency issue caused by an incorrect pre-fetch algorithm. 
      * Resolves an issue with a possible bus hang during a system reboot.
      * Once HPK4 is downloaded, the drive firmware cannot be changed back to an earlier firmware version (eg, HPK3 or HPK2) due to security changes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-4.1" date="1572955200">-      Added support for SLES15SP1.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-6.1" date="1632398400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-7.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-8.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-9.1" date="1670846400">-</changelog>
  </package>
  <package pkgid="53dbc9601a8b85958ab3773fcecd91c9971b74932e25d011a76f174aad7015c0" name="firmware-hdd-d7af557f47" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1617883200">-      This firmware provides a change to the Vendor ID in the VPD page that refers to HP instead of HPE.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="864be01dd980fda0b360de567ade0a887c44bdd846dcd7a466eced8d1d419b7e" name="firmware-hdd-db687966b4" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-2.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="6fd0b3274ca5848abec7041ae08e2904160bac7c08676f1203ad6fc7ff9055cb" name="firmware-hdd-df22f7effd" arch="x86_64">
    <version epoch="0" ver="HPDB" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-10.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-10.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-11.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="6d62d3dbf8a7ebe55eda9155e7ab7cf96eb058e03852604114d070d0862bb443" name="firmware-hdd-e320db791d" arch="x86_64">
    <version epoch="0" ver="MPK76H5Q" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK75H5Q-2.1" date="1621857600">-      Fixed False UECC issue at idle power mode (12.8TB and 15.36TB only).
      * Apply PCLK running PHY option, PLL clock disable can be avoided in lane 0 missing case.
      * Old FW download Blocking.
      * FW is changed off the option of TX data alignment for each lane.
      * FW is changed to clear the interrupt after TLP Complete when PCIe config read operation.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00113342en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK75H5Q-3.1" date="1632312000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK75H5Q-3.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK75H5Q-3.1" date="1632484800">-      Fixed False UECC issue at idle power mode (12.8TB and 15.36TB only).
      * Apply PCLK running PHY option, PLL clock disable can be avoided in lane 0 missing case.
      * Old FW download Blocking.
      * FW is changed off the option of TX data alignment for each lane.
      * FW is changed to clear the interrupt after TLP Complete when PCIe config read operation.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00113342en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK75H5Q-4.1" date="1652529600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK75H5Q-4.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK75H5Q-4.1" date="1652702400">-      Fixed False UECC issue at idle power mode (12.8TB and 15.36TB only).
      * Apply PCLK running PHY option, PLL clock disable can be avoided in lane 0 missing case.
      * Old FW download Blocking.
      * FW is changed off the option of TX data alignment for each lane.
      * FW is changed to clear the interrupt after TLP Complete when PCIe config read operation.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00113342en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK76H5Q" date="1652875200">-     Please refer to SID8624 wtih the reason that why upgrade requiremnet need to
    be set to Critical</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK76H5Q" date="1652961600">-      Contains critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK76H5Q-2.1" date="1657022400">-      Contains critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
  </package>
  <package pkgid="7446c6da932436b6c2f0074a95e8412f098016d141b3abd83199d1c34b5e86b3" name="firmware-hdd-e4f147cdd2" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1629115200">-     This firmware revision corrects a rare situation where a Cryptographic Erase
    could result in random data instead of the expected deterministic zeros. This
    is judged as low severity because it does not compromise user data or
    security, but justifies the update to preclude potential security concerns.
    There are several items that reduce the probability of hangs and provide some
    minor performance improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4" date="1671105600">-      This firmware revision improves data integrity and reliability by optimizing adjacent track refresh parameters and management of emergency power loss table structure.
      * The risk of not upgrading to this firmware is the increased possibility of data corruption in emergency power loss events.
      * Several maintenance items are included in this firmware revision that reduce the probability of hangs and provide some minor performance improvements.</changelog>
  </package>
  <package pkgid="a2d8f708067844b11c447c01c0028645623b5b7f79dcea9121e806182ef4dbb8" name="firmware-hdd-e800e8d3b9" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-9.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="6a5483ba7255350fa601df50b31460c1361b63756728fcd8d9477313ccef41f3" name="firmware-hdd-ec908c3650" arch="x86_64">
    <version epoch="0" ver="HPG9" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-5.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-6.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG9" date="1655380800">-      Fixes an intermittent issue where the incorrect model number can be reported during spin-up</changelog>
  </package>
  <package pkgid="88473c3ee43ece606a67fa3e9402c774ce1c6dc968b131dbc3e884fd003e459f" name="firmware-hdd-edf6dcd906" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1614686400">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-6.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-6.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-7.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="46e0e4f7783d44d592a84c0e4994e0d1ca48d3e7469b4fe951309751f3957831" name="firmware-hdd-ef93133161" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1598616000">-      This release corrects logical block address mismatches that could results in partial or total data loss.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="fbe39fddd85e16c6431f283c5fb51c82e872db6c536003ffeabce93fe21c6118" name="firmware-hdd-f0c91d2fe3" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1616932800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1617019200">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-     Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1657108800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1657195200">-     Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1657281600">-</changelog>
  </package>
  <package pkgid="55d130205319c005626581d7a82a784753dd1236d266c458a96c383383e531fe" name="firmware-hdd-f3faa195ff" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-7.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-7.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-7.1" date="1614772800">-      Fixes a data integrity risk where stale data is mistakenly used from cache.
      * Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-8.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-8.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-8.1" date="1632484800">-      Fixes a data integrity risk where stale data is mistakenly used from cache.
      * Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-9.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-9.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-9.1" date="1652702400">-      Fixes a data integrity risk where stale data is mistakenly used from cache.
      * Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-10.1" date="1657108800">-</changelog>
  </package>
  <package pkgid="d3db04e2a9d9c74be9427a1efbd5f9d3d6f0ad3f638e0fbe0197721a790876f5" name="firmware-hdd-f42438de3d" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-10.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="dfd6e91514a8653de39914d92f572390a4f6e80e171a0bf0540e1c416fc3b7a9" name="firmware-hdd-f693ccc138" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="6671e118289a9d32292ab059a150072ccdf5f3c12cadace16dba5d8e64d92f2e" name="firmware-hdd-f6d00bd17e" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1616328000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1616414400">-      There is no compelling reason to update this firmware. Risk is that whoever looks at the Vendor ID in the VPD page will notice that it refers to HP instead of HPE. There is no functional risk if not upgraded.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1657195200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1657281600">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1657368000">-</changelog>
  </package>
  <package pkgid="0655bdaff0fadec178a4cc42a34f85d42437c4418716c362b8d2d4f166db8437" name="firmware-hdd-fa46c607d6" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1622635200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1622721600">-      This firmware version updates the Vendor ID in the standard inquiry to 'HPE', in previous versions it was 'HP.'</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1654862400">-      Firmware addresses a hot plug reporting concern</changelog>
  </package>
  <package pkgid="aa2993889038bb33ce50a28763b660ff5ba22c453056ff5fbea39adcdd78fe22" name="firmware-hdd-faf39e0ff7" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1614772800">-      This firmware release provides additional protections against hangs in certain corner cases, and cleans up some error handling and command behavior issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1627992000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1628078400">-     This firmware release provides additional protection against command timeouts.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1629806400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1629892800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1629979200">-      This firmware release provides additional protection against command timeouts.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00117258en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652702400">-      This firmware release provides additional protection against command timeouts.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00117258en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="b50eac2128ebf2b2387a5c14a8885770ad7aed6db7b9098d34257904cfda13ac" name="firmware-hdd-fe9c474847" arch="x86_64">
    <version epoch="0" ver="HPK3" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1567598400">-      Fixes an issue where the SSID was not programmed correctly to the drive. This may cause issues with the drive not being identified correctly in the Integrated Lights Out Utility.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3" date="1614772800">-      Fixed SSD weargauge report error issue.
      * Fixed Assign FWState as TR_DONE_ERR at the correct location.
      * Prepare proper response data for Get Message Type Supported MCTP Command.
      * Added code to preserve current feature values cross live firmware update.
      * Allocate 4 bytes instead of 2 bytes for parameter code.
      * Changed the value for NLB equal to NSize -1.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-3.1" date="1632398400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-4.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-5.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-6.1" date="1670932800">-</changelog>
  </package>
  <package pkgid="84646ce1c77db00ef8d88d05e361beb92bcc80bcd8c590a63236bd5285c572a7" name="firmware-iegen10" arch="x86_64">
    <version epoch="0" ver="0.2.3.0" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.1.6.1" date="1525780800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    System ROM V1.26 or later
    
    **Problems Fixed:**
    
    Addressed an issue where the Integrated Lights-Out (iLO) web interface may
    incorrectly report the Innovation Engine is running in a degraded state.
    
    Addressed an issue where memory telemetry data may not be reported properly in
    the Integrated Lights-Out (iLO) web interface or through the HPE RESTful API.
    
    Addressed an issue where the Innovation Engine Firmware flash would fail if a
    previous flash attempt was interrupted and not completed successfully.
    
    **Known Issues:**
    
    This flash component will report the Current Revision of the Innovation Engine
    FW as "n/a" when updating the Innovation Engine FW. This does not affect the
    flash update or impact how the Innovation Engine FW operates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.1.6.1-3.1" date="1544184000">-     *Important Notes:**
    
    Ver. 0.1.6.1(C) contains updates to the component packaging and is
    functionally equivalent to ver. 0.1.6.1.  It is not necessary to upgrade with
    Revision C if a previous component Revision was used to upgrade the firmware
    to version 0.1.6.1.
    
    **Firmware Dependencies:**
    
    System ROM V1.26 or later  
    
    **Problems Fixed:**
    
    Addressed an issue where the Integrated Lights-Out (iLO) web interface may
    incorrectly report the Innovation Engine is running in a degraded state.
    
    Addressed an issue where memory telemetry data may not be reported properly in
    the Integrated Lights-Out (iLO) web interface or through the HPE RESTful API.
    
    Addressed an issue where the Innovation Engine Firmware flash would fail if a
    previous flash attempt was interrupted and not completed successfully.
    
    **Known Issues:**
    
    This flash component will report the Current Revision of the Innovation Engine
    FW as "n/a" when updating the Innovation Engine FW. This does not affect the
    flash update or impact how the Innovation Engine FW operates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.0.11" date="1550059200">-     Added support for Intel Xeon Scalable Performance 3200, 4200, 5200, 6200 and
    8200 series processors.
    
    Added support for HPE system performance monitoring and workload performance
    advisor. This feature also requires Integrated Lights-Out (iLO) firmware
    version 1.40 or later.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.0.11" date="1550145600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where updates to the Intel Server Platform
    Services (SPS) firmware may fail.
    
    **Known Issues:**
    
    This flash component will report the Current Revision of the Innovation Engine
    FW as "n/a" when updating the Innovation Engine FW. This does not affect the
    flash update or impact how the Innovation Engine FW operates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.1.2-2.1" date="1561982400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for HPE Persistent Memory featuring Intel Optane DC Persistent
    Memory.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.2.0" date="1585742400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where Processor or Memory temperature
    reporting may not be collected properly by the platform and the system fans
    may be running faster than expected. This issue has been seen occasionally
    after a server reboot and is typically corrected with a subsequent server
    reboot.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.2.2" date="1623153600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where processor or memory temperature
    reporting may stop reporting properly or report a constant reading after
    servers have been operating over an extended period of time without an AC
    power cycle.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.2.3" date="1630065600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Address an issue where Innovation Engine (IE) Firmware may be unresponsive and
    iLO Firmware may report "Update Failed" after flashing the Innovation Engine
    (IE) Firmware via RESTful update.  The flash will have been performed
    successfully, but the system must be reset for IE Firmware to function
    properly.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.3.0" date="1645704000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Innovation Engine (IE) may improperly reset every 24
    hours. On some systems this could result in a brief drop in CPU utilization or
    network traffic lasting less than a second.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.3.0-3.1" date="1660478400">-     *Important Notes:**
    
    Ver. 0.2.3.0(C) contains updates to the firmware packaging and is functionally
    equivalent to ver. 0.2.3.0. It is not necessary to upgrade with Revision B if
    a previous component revision was used to upgrade the firmware to version
    0.2.3.0.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Innovation Engine (IE) may improperly reset every 24
    hours. On some systems this could result in a brief drop in CPU utilization or
    network traffic lasting less than a second.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="f56700d09d7e87f7c858d21a39a7f536b3d59a860857f89c2a58f525324a6cd0" name="firmware-iegen10plus" arch="x86_64">
    <version epoch="0" ver="1.0.0.22" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.0.20" date="1623326400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.0.22" date="1648641600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Innovation Engine (IE) may improperly reset every 24
    hours.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.0.22-3.1" date="1660478400">-     *Important Notes:**
    
    Ver. 1.0.0.22(C) contains updates to the firmware packaging and is
    functionally equivalent to ver. 1.0.0.22. It is not necessary to upgrade with
    Revision B if a previous component revision was used to upgrade the firmware
    to version 1.0.0.22.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Innovation Engine (IE) may improperly reset every 24
    hours.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="5882e2a66d5a65e8cb3ca54bbc1cd4cf38e1d18e66f4cf1ffe151e46f285b2b2" name="firmware-ilo5" arch="x86_64">
    <version epoch="0" ver="2.81" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70" date="1653220800">-      Type-D Component Firmware update experience for Compute Ops Management.
      * Support for easy transition to Compute Ops Management for nodes that are currently under OneView management.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.70" date="1653307200">-      Port Status of 331i &amp; 562FLR Network Adapter cards do not change from "unknown" to "ok" in rare occasions.
      * "show swid" command displays HPE Smart Array P408i-a SR Gen10 card twice.
      * iLO fails to send Support Events even when Embedded Remote Support has been enabled.
      * iLO responds with wrong Network port information during Ports collection and Network Device Functions collection.
      * Server boot gets stuck on POST while loading Encryption keys for secure boot.
      * EID Table information is retained in AHS though MCTP discovery is disabled.
      * Front Display Port (DP) on Universal Media bay does not work in certain instances.
      * Unable to adjust fan settings on Edgeline e910/e920 Thermal Configuration page.
      * iLO unable to authenticate users intermittently when directory authentication is enabled.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.71" date="1658923200">-      UBM6 Backplane Detection Support : New backplane basic support added without firmware update support (Only supported for HPE ProLiant Servers)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.71" date="1659009600">-      Fix for multiple security issues</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72" date="1663070400">-      Cannery Row Solution Support.
      * Added support to auto-restore the IPMI and SNMP configuration settings to custom defaults (manually enabled by the user) instead of the factory defaults during abrupt AC power cycle.
      * iLO PLDM Downstream Drive firmware update support enabled.
      * Enhanced the Alerting Mechanism to allow clearing of Events without resetting iLO.
      * PATCH support for Redfish Property "DateTimeLocalOffset"
      * Ability to update Firmware on SATA Drives without Operating System Support.
      * Ability to disable/enable TLS 1.0 and/or TLS 1.1 in Production state.
      * The Temperature page now displays the temperature details of the available PCIe subcomponents.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72" date="1663156800">-      'SessionTimeout' property missing under '/redfish/v1/SessionService' URI
      * GUI reporting configured drives as unconfigured.
      * A router failover post iLO NIC link down and link up could cause iLO to be rendered unreachable over router (default gateway).
      * Incorrect SNMP Trap Data value for cpqSm2CntlrBadLoginAttempts (OID 1.3.6.1.4.1.232.9.2.2.14)
      * Patch operation under redfish URI chassis/1/Thermal not working
      * When a storage controller is configured in Passthrough Mode in ESXi, iLO might take a bit longer to discover Direct Attach NVMe Drive.
      * iLO hostname displays the previous host name after iLO reset.
      * NVMe Backplane Firmware Package 1.0 is not getting updated through iLO.
      * Issue with the JSON payload for Country property
      * Issue with Alertmail IP address reporting on Moonshot systems. 
      * The following weak TLS 1.2 ciphers are disabled in High security state: 
        * 256-bit AES with RSA, ECDH, and a SHA384 MAC (ECDHE-RSA-AES256-SHA384)
        * 256-bit AES with RSA, DH, and a SHA256 MAC (DHE-RSA-AES256-SHA256)
        * 128-bit AES with RSA, ECDH, and a SHA256 MAC (ECDHE-RSA-AES128-SHA256)
        * 128-bit AES with RSA, DH, and a SHA256 MAC (DHE-RSA-AES128-SHA256</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78" date="1671710400">-     Please note iLO 5 v2.78 is positioned to be the bridge version for future iLO
    versions considering that future iLO 5 binary files will be 34 MB in size.
    
    Previous versions of iLO 5 (before 2.78) had provision to only accept iLO 5
    binary which was 32 MB in size.
    
    This restriction has been removed in iLO 5 v2.78. The increase in the bin file
    size will be to support dual payload firmware for ensuring that customers
    
    can use single iLO firmware package on any of the iLO ASICs (T265 or T285).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78" date="1671796800">-      Add support for Intel ATS-M 75W, 100W and 150W
      * Add support for NVIDIA H100
      * Redfish firmware inventory displays CEC FW version (40 GB NVIDIA GPU Drawer)
      * Support for import of a trusted SSL certificate and its corresponding private key.
      * Inclusion of "Context" property in Redfish event which will display the value set by user during Redfish event subscription creation.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78" date="1671883200">-      NVMe drive reporting invalid drive IML and illuminating the Amber LED
      * In a configuration with more than 10 logical network controller on bringing the logical controller up or down data doesnt get updated and AMS banner " iLO did not detect Agentless Management"   shows up in iLO GUI.
      * Thermal over temperature alerts observed with respect to Pensando DSP DSC-25 Cards
      * UEFI iLO config utility lets users add special characters to the ILO hostname
      * iLO IP addresses were not included in the SSL certificate SAN even when the user selects this option in the UI
      * iLO is not holding onto Redfish Subscriptions due to invalid Sender-Address in Redfish Event Header
      * For URI /redfish/v1/Managers/@ManagersId/SecurityService/, PATCH on the property TLSVersion  using "Enabled" or "Disabled" fails.
      * On Gen 10 plus AMD systems, with more than 16 PCIe capable SK Hynix drives configured; the behaviour of a single option card (Drives/Storage Controllers/Network Adapters) in the configuration could be unknown or unpredictable.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.81" date="1677585600">-     None</changelog>
  </package>
  <package pkgid="8d9a12feb0f91b2cb15bd2bd17b6b14e85876d0c2d459bf21263501b4fe93aa5" name="firmware-microservergen10plussps" arch="x86_64">
    <version epoch="0" ver="05.01.04.804" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.03.094" date="1581076800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.113" date="1591617600">-     This image contains the latest Intel Server Platform Services (SPS) Firmware
    which contains mitigations for a variety of security vulnerabilities. The
    following vulnerabilities have been addressed in this SPS release:
    CVE-2020-0545 and CVE-2020-0586. These issues are not unique to HPE Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.208" date="1604923200">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2020-8755. This security
    vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.303" date="1623067200">-     See the release document in Download Product Binaries page from Product
    Summary of the firmware product.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.303" date="1623153600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services (SPS) Firmware provides
    mitigations for SPS security vulnerabilities documented as CVE-2020-24509.
    These security vulnerabilities are documented in Intel Security Advisory
    INTEL-SA-00459.  These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.400" date="1644321600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services (SPS) Firmware provides
    mitigations for SPS security vulnerabilities documented as CVE-2021-0060. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.500" date="1652184000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2022.1 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.600" date="1660046400">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2022.2 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.700" date="1667908800">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2022.3 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.804" date="1671192000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2023.1 guidance.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="9bbf0fbcae74dfdb73074075d7b37467206084926048f3bfc2fc326e0013d10d" name="firmware-microserverv2gen10plus_me" arch="x86_64">
    <version epoch="0" ver="06.00.03.309" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.200" date="1663329600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.204" date="1667908800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version is in compliance with Intel IPU.2022.3 guidance.
    
    The following vulnerabilities have been addressed in this SPS release:
    CVE-2022-29515. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.309" date="1671624000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2022-36794. This issue is not
    unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="0c071d7491ae0c9afbfdf0cbc58622084f8222f6099b3535adc6c0f4e5533be8" name="firmware-ml30gen10plus_me" arch="x86_64">
    <version epoch="0" ver="06.00.03.309" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.035" date="1646568000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.039" date="1646654400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version of the System ROM contains updates aligned with the Tatlow PLR2
    BKC WW50.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.200" date="1653566400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the MCTP PCIe devices could not be discovered after
    an SPS firmware update without an AC power cycle. This issue is not unique to
    HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.204" date="1667908800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version is in compliance with Intel IPU.2022.3 guidance.
    
    The following vulnerabilities have been addressed in this SPS release:
    CVE-2022-29515. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.309" date="1671624000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2022-36794. This issue is not
    unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="0bb033fc80b268bab047ced78af00d24974accfb81656f0487659c6b4b70c790" name="firmware-nic-bcm-nxe" arch="x86_64">
    <version epoch="0" ver="1.15.2" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.7.6" date="1572609600">-     This product now remove supports Synergy and Blade Server.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.8.1" date="1582459200">-     This product now supports Red Hat Enterprise Linux 7.7
    
    This product now supports  SUSE Linux Enterprise Server 15 SP1
    
    This product now supports the following network adapters.
    
      * HPE Ethernet 10Gb 2-port 537SFP+ Adapter
      * HPE Ethernet 10Gb 2-port 537SFP+ FLR Adapter</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.9.3" date="1594987200">-      This product corrects wrong names of adapters which show up while doing firmware update.
      * This product corrects an issue about 2 ports in a port bond both being disconnected if we were just disconnecting 1 port.
      * This product corrects an issue about LLDP nearest bridge packet not being disabled while that option under NIC HII was disabled.
      * This product corrects the wrong LED behavior while attaching SFP-RJ45 tranceiver.
      * This product corrects an issue about firmware not being actually updated even seeing it was reported as successfully by update utility.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.9.5" date="1605182400">-     This product addresses a package loss issue while running under multicast UDP
    traffic.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.11.3" date="1635508800">-     This product addresses an issue where network interface could not be brought
    up under OS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.12.1" date="1646395200">-      This product addresses an issue a packet missing problem after some amounts of multicast UDP streams transmitted.
      * This product addresses an issue the port identifier LED problem on HPE Ethernet 10Gb 2-port 535T Adapter .</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.13.0" date="1661774400">-     This product no longer supported of updating FW via Service Pack for Proliant
    on HPE Proliant Gen9 servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.13.50" date="1664625600">-     This product addresses an issue about battery POST error caused by unnecessary
    protocol on Supported Devices of this product.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.14.0" date="1669464000">-      This product addresses an issue incorrect reporting on link status of HPE 631FLR-SFP28 Adapter.
      * This product addresses an issue battery POST error caused by unnecessary protocol on Supported Devices of this product.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.15.2" date="1669550400">-     TBD</changelog>
  </package>
  <package pkgid="a3b703b5d0edc084cd2d1bf0a7e0281cd440819c451f7f84e63267b8fcb7f946" name="firmware-nic-bcm-open" arch="x86_64">
    <version epoch="0" ver="2.32.3" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.3" date="1631880000">-     Initial version</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.50" date="1646654400">-     This product adderssed minor adjustment on its UEFI driver structure.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.60" date="1654516800">-     This product now supports the following network adapters:
    
      * Broadcom BCM5719 Ethernet 1Gb 4-port Base-T Adapter for HPE
      * Broadcom BCM5719 Ethernet 1Gb 4-port Base-T OCP3 Adapter for HPE</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.29.2" date="1661774400">-     This product addresses some minor adjustment with its internal UEFI code
    structure.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.31.0" date="1668772800">-     This product addresses an issue the adjustment of firmware read-write commands
    on corresponding OS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.32.3" date="1668859200">-     TBD</changelog>
  </package>
  <package pkgid="0391948937ad3e97e65783328495d0326d4b7df3abc9388ed54ca9dc9395e479" name="firmware-nic-broadcom" arch="x86_64">
    <version epoch="0" ver="2.32.3" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.25.1" date="1583755200">-     This product addresses an issue where Legacy Boot Protocol(System Utilities -&gt;
    System Configuration -&gt; NIC HII menu -&gt; BA Configuration Menu) changes from
    None to PXE.  
    This product addresses an issue where it would be forced to exit System
    Utilities when select Port 2 &amp; Port 3(System Utilities -&gt; System Configuration
    -&gt; NIC HII menu).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.26.1" date="1594987200">-     This product corrects the wrong spare number while it was originally not the
    same as what was written on the label of package.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.27.6" date="1614859200">-      This product addresses an issue about lack of information under AHS log.
      * This product addresses an RSOD issue which appeared intermittently during POST after having a warm reboot.
      * This product addresses a modification on help string of Family Firmware Version.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.4" date="1636286400">-     This product now supports Red Hat Enterprise Linux 8 update 4 and SUSE Linux
    Enterprise Server 15 Service Pack 3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.4" date="1636372800">-     This product addresses an issue about lost connection under S5 if adapter was
    running under 1G.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.50" date="1637582400">-      This product addressed the firmware update failure problem while running the installation under Linux OS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.29.0" date="1646395200">-     This product addresses an abnormal reporting on link status of HPE 331i
    Adapter under IML log.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.30.2" date="1661774400">-      This product no longer supported of updating FW via Service Pack for Proliant on HPE Proliant Gen9 servers.
      * This product now supports Red Hat Enterprise Linux 8 Update 5.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.31.0" date="1668772800">-     This product addresses an issue the adjustment of code structure on
    corresponding HW material change.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.32.3" date="1668859200">-     TBD</changelog>
  </package>
  <package pkgid="780a7b680b622b0f360eebc1999a74af3ff5f272655976b869cb24a629b6cd99" name="firmware-nic-cornelis-opa-hfi" arch="x86_64">
    <version epoch="0" ver="1.12.0" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.8.1" date="1552305600">-     *Changes and New Features in version 1.8.1.0.0 :**
    
      * Added hfi1_eprom **v10_8_0_0_13.**
      * Loader ROM **HfiPcieGen3Loader_1.8.1.0.0.rom** and driver EFI **HfiPcieGen3_1.8.1.0.0.efi** were added.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.11.0" date="1634472000">-     *No changes and new features in version 1.11.0**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.11.0" date="1634558400">-     *Fixes included in version 1.11.0:**
    
      * **The following issue has been fixed in Unified Extensible Firmware Interafce (UEFI) ROM: **On some platforms, the hfi1 device was not showing up in BIOS/UEFI boot menus and was not available as a PXE boot device. This was caused by the platform not loading the UEFI driver for the hfi1 adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.12.0-2.1" date="1666180800">-     *Fixes included in version 1.12.0:**
    
      * Fixed race condition between BIOS checking link status and LNI completing which resulted in PXE boot failures.
      * Changed the default behavior of the hfi1_eprom tool to convert the eprom format to version 2, eliminating the need to supply the -N command line argument.
      * Addressed an issue where updating the HfiPcieGen3Loader*.rom file could result in the erasure of HfiPcieGen3Loader*.efi and HFI_TYPE1*.dat files.</changelog>
  </package>
  <package pkgid="3d4a42ee8e494fb3760f81f77a134cb2986132d2436631bff23ac4222e638044" name="firmware-nic-intel" arch="x86_64">
    <version epoch="0" ver="1.27.0" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20.37" date="1614772800">-     This product addresses a FW update issue that fails to update FW with this
    specific NIC FW version (80001FB7/1.2529.0).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.21.6" date="1614859200">-     This product addresses an issue where Systems Insight Display (SID) modul is
    green when there's no Network connection.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22.6" date="1631793600">-     This product now supports Red Hat Enterprise Linux 8 update 4 and SUSE Linux
    Enterprise Server 15 Service Pack 3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22.50" date="1639137600">-      This product addresses an issue where link flipping is seen with HPE Ethernet 10Gb 2-port 568FLR-MMSFP+ Adapter.
      * This product addresses an issue where the link speed isn't consistent with HPE Ethernet 10Gb 2-port 568FLR-MMT Adapter when system shutdown.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.0" date="1643112000">-     This product now supports Red Hat Enterprise Linux 8 update 5</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.0" date="1643198400">-      This product addresses an issue where SR-IOV high latency is seen with HPE Ethernet 10Gb 2-port 562SFP+ Adapter and HPE Ethernet 10Gb 2-port 562FLR-SFP+ Adapter.
      * This product addresses an issue where it fails to disable HP Ethernet 1Gb 2-port 361i Adapter in RBSU.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.20" date="1643284800">-     This product now supports Red Hat Enterprise Linux 8 update 5</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.35" date="1647086400">-     This product addresses a issue where IGMP2 packets isn't forwarded to the host
    OS when shared NIC is enabled with HPE Ethernet 1Gb 2-port 361i Adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.24.3" date="1647172800">-     This product addresses a issue where Firmware version isn't displaed in NIC
    HII menu</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.27.0" date="1647259200">-     TBD</changelog>
  </package>
  <package pkgid="f1c6811f348171f8463c968494ea125fd77bce09360a42b54cc00a92aa1603c3" name="firmware-nic-is-intel" arch="x86_64">
    <version epoch="0" ver="1.27.0" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.21.5" date="1601899200">-     This product now supports the following network adapters:
    
      * Intel X710-DA2 Ethernet 10Gb 2-port SFP+ OCP3 Adapter for HPE
      * Intel X710-DA2 Ethernet 10Gb 2-port SFP+ Adapter for HPE</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22.11" date="1614859200">-      This product now supports SUSE Linux Enterprise Server 15 SP2.
      * This product now supports Red Hat Enterprise Linux 8, Update 2 and Update 3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22.50" date="1617883200">-     This product corrects an issue where iLO returns invalid JSON response format.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22.55" date="1631707200">-     This product addresses an link issue for Intel X710-DA2 Ethernet 10Gb 2-port
    SFP+ OCP3 Adapter for HPE.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.5" date="1631793600">-     This product now supports Red Hat Enterprise Linux 8 update 4 and SUSE Linux
    Enterprise Server 15 Service Pack 3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.50" date="1639137600">-      This product addresses an issue where the incorrect translation is seen with Intel Intel I350-T4 Ethernet 1Gb 4-port BASE-T  Adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.24.4" date="1661342400">-     This product now supports HPE ProLiant MicroServer Gen10 Plus v2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.25.4" date="1665489600">-     This product now supports HPE ProLiant Gen11 servers</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.25.4" date="1665576000">-     This product addresses an issue where the adaters isn't recongized with HPE
    Ethernet 10Gb 2-port SFP+ OCP3 X710-DA2  Adapter and HPE Ethernet 10Gb 2-port
    SFP+ X710-DA2 Adapter</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.27.0" date="1672228800">-     TBD</changelog>
  </package>
  <package pkgid="35881b4bb1e0b64dc1acb63d5a364d35cc74edec8929a276f2971e55d85c64e1" name="firmware-nic-mellanox-eth-only-mft" arch="x86_64">
    <version epoch="0" ver="1.0.6" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.1" date="1572955200">-     *Fixes in version** **14.26.XXXX :**
    
      * Fixed an issue that caused a function to misbehave when a PCIe Transaction Layer Packet (TLP) was set with a poisoned indication.
      * Fixed a rare issue that resulted in "destroy mkey " command getting stuck when rebooting the hypervisor.
      * The total firmware reset time is increased by 1 second.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.3" date="1601899200">-     *Firmware for the following device is updated to 14.27.4000:**
    
    P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)
    
    **Following New features and Changes are included in version 14.27.4000:**
    
      * Added mlxconfig support for power reduction: PCI CAP AUTO_POWER_SAVE_LINK_DOWN 
        * PCI CAP
        * AUTO_POWER_SAVE_LINK_DOWN
      * Added the following segments, as appeared in the PRM, to the Resource Dump: 
        * PRM_QUERY_QP
        * PRM_QUERY_CQ
        * PRM_QUERY_MKEY
        * QUERY_VNIC_ENV</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.3" date="1601985600">-     *Following issues have been fixed in version 14.27.4000:**
    
      * An issue that caused the sent packet to hang while the device entered FLR mode.
      * Enabled Bar configuration bytewise by applying the write_en bitmask.
      * A rare case where the the device froze while running the sw reset flow under heavy stress and with many open resources.
      * Low PXE performance while using the VSC to trigger the send_ring_doorbells.
      * An error that prevented the completions (CQ) from being completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.
      * An issue that caused the fragmented IP packets to drop was fixed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1614254400">-     *Firmware for the following device is updated to 14.28.1002:**
    
    P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)
    
    **Following New features and Changes are included in version 14.28.1002:**
    
      * Added mlxconfig support for power reduction: PCI CAP AUTO_POWER_SAVE_LINK_DOWN 
        * PCI CAP
        * AUTO_POWER_SAVE_LINK_DOWN
      * Added the following segments, as appeared in the PRM, to the Resource Dump: 
        * PRM_QUERY_QP
        * PRM_QUERY_CQ
        * PRM_QUERY_MKEY
        * QUERY_VNIC_ENV</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1614340800">-     *Following issues have been fixed in version 14.29.1016:**
    
      * An issue that caused the sent packet to hang while the device entered FLR mode.
      * Enabled Bar configuration bytewise by applying the write_en bitmask.
      * A rare case where the the device froze while running the sw reset flow under heavy stress and with many open resources.
      * Low PXE performance while using the VSC to trigger the send_ring_doorbells.
      * An error that prevented the completions (CQ) from being completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.
      * An issue that caused the fragmented IP packets to drop was fixed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1632657600">-     *Firmware for the following device is updated to 14.31.1014:**
    
      * P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)
    
    **New features and changes included in version 14.31.1014:**
    
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * support for Enabling/Disabling NIC and RDMA (port/partition) was included via the UEFI HII system settings.
      * Increased the maximum number of MSIX per VF to 127.
      * Added a new bit ("data_in_order") to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1632744000">-     *Following issues have been fixed in version 14.31.1014:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
    
    **Additional Fixes included in version 14.31.1014:**
    
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1647777600">-     *Firmware for the following device has been updated to 14.32.1010:**
    
      * P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1647864000">-     *The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6-2.1" date="1658404800">-     *The following changes have been made in sub-version 1.0.6(A):**
    
      * Product rebuilt to have the new SHA 384 signature.
    
    **The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</changelog>
  </package>
  <package pkgid="29e52afec33f222836bba8ec6f18a0035a11fc02a4c543567ab628c064aff397" name="firmware-nic-mellanox-ethernet-only" arch="x86_64">
    <version epoch="0" ver="1.0.19" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.14-2.1" date="1628769600">-     *Fixes included in  firmware version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **Fixes included in firmware version 14.29.1016:**
    
      * Changed the default value of DCQCN's (Data center- Quantized Congestion Notification)  NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.
      * An issue that caused packets to drop due to header size issues and/or failing checks. The issue was caused due to a Linux issue that caused VFs to set the wrong header size value in wqe_inline_header_mode input.
      * When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs were configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.
      * On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.
      *  An issue that caused the device to go to dead IRISC as one of the firmware semaphores could not be released when a speed change or port state change was triggered. 
    
    **No fixes are included in firmware version 14.31.1200.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.15" date="1632657600">-     *Firmware for the following devices are updated to 2.42.5044 :**
    
       779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)  
       779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)
    
    **Firmware for the following devices are updated to 14.31.1200:**
    
       817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)
    
    **Firmware for the following devices are updated to 14.31.1200:**  
       817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)
    
    **Firmware for the following device is updated to 16.31.1014:**
    
       874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)
    
      
    **New features and changes in version 14.31.1200:**
    
      * NVconfig per Port for a Specific Finisar Module: Added a new NVconfig per Port for a specific Finisar module. This new NVconfig sets the port to work in AN mode and sets the module to No DME. This change does not affect the speed logic, only the FEC logic (FEC override).  
    **Note:** If the port does not go up, switch to Force mode. 
    
    **New features and changes in version 16.31.1014:**
    
      * NIC scheduling feature support has been disabled for non-privileged functions.
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * Added support for Enabling/Disabling NIC and RDMA (port/partition) via the UEFI HII system settings.  
    **Note:** Values set in this option only take effect when is Ethernet mode.
      * Increased the maximum number of MSIX per VF to 127.
      * Asymmetrical MSIX Configuration: This feature allows the device to be configured with a different number of MSIX  
    vectors per physical PCI functions.  
    To use this feature, please follow these steps:
    
        * Clear NUM_PF_MSIX_VALID to disable global symmetrical MSIX configuration.
        * Set PF_NUM_PF_MSIX_VALID to enable asymmetrical per Physical Function MSIX configuration.
        * Configure PF_NUM_PF_MSIX per physical PCI function.
      * Support for RDMA partitioning and RDMA counters in IB mode.
      * A new bit ("data_in_order") was added to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.  
    Pages are returned by the driver to the kernel without issuing the
    MANAGE_PAGES commands to the firmare.
    
      * Enabled UID 0 to create resources with UMEM (User Memory).
      * Receiving and sending native IB packets from/to the software (including all headers) via raw IBL2 QPs.
      * RX RDMA NIC flow table on an IB port. Now the software can steer native IB packets to raw IB receive queues according to the DLID and  
    the DQPN.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.15" date="1632744000">-     *Fixes included in  firmware version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **The following issues have been fixed in version 14.31.1200:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
    
    **Additional Fixes included in version 14.31.1200:**
    
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.
    
    **The following issues have been fixed in version 16.31.1014:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * An assert that was caused when trying to open 1024 functions on the device and the maximum number of functions was 1023.
      * Occasional performance issues related to RC QPs using E2E-credits (not connected to SRQ and doing send/receive traffic) when the ROCE_ACCL tx_window was enabled.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * A rare issue that caused RX pipe to hang.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
      * CRT_DCR with index larger than 1 &lt;&lt; 21 occasionally collided with the CRT_SW_RESERVED address.
      * An issue that caused the TX queue to get into an unresponsive state when the VF rate limiter was set.
    
    **Additional Fixes included in version 16.31.1014:**
    
      * Disabled the CNP counter "rp_cnp_ignored " (triggered by OOS (out-of-sequence)) when all ports are IB.
      * Fixed the TMP421 sensor temperature reporting.
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.15-2.1" date="1639310400">-     *Firmware for the following devices are updated to 2.42.5044 :**
    
       779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)  
       779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)
    
    **Firmware for the following devices are updated to 14.31.1200:**
    
       817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)
    
    **Firmware for the following devices are updated to 14.31.1200:**  
       817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)
    
    **Firmware for the following device is updated to 16.31.1014:**
    
       874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)
    
    
    
    **Updated mstflint from version 4.13 to 4.16**
    
      
    **New features and changes in version 14.31.1200:**
    
      * NVconfig per Port for a Specific Finisar Module: Added a new NVconfig per Port for a specific Finisar module. This new NVconfig sets the port to work in AN mode and sets the module to No DME. This change does not affect the speed logic, only the FEC logic (FEC override).  
    **Note:** If the port does not go up, switch to Force mode. 
    
    **New features and changes in version 16.31.1014:**
    
      * NIC scheduling feature support has been disabled for non-privileged functions.
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * Added support for Enabling/Disabling NIC and RDMA (port/partition) via the UEFI HII system settings.  
    **Note:** Values set in this option only take effect when is Ethernet mode.
      * Increased the maximum number of MSIX per VF to 127.
      * Asymmetrical MSIX Configuration: This feature allows the device to be configured with a different number of MSIX  
    vectors per physical PCI functions.  
    To use this feature, please follow these steps:
    
        * Clear NUM_PF_MSIX_VALID to disable global symmetrical MSIX configuration.
        * Set PF_NUM_PF_MSIX_VALID to enable asymmetrical per Physical Function MSIX configuration.
        * Configure PF_NUM_PF_MSIX per physical PCI function.
      * Support for RDMA partitioning and RDMA counters in IB mode.
      * A new bit ("data_in_order") was added to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.  
    Pages are returned by the driver to the kernel without issuing the
    MANAGE_PAGES commands to the firmare.
    
      * Enabled UID 0 to create resources with UMEM (User Memory).
      * Receiving and sending native IB packets from/to the software (including all headers) via raw IBL2 QPs.
      * RX RDMA NIC flow table on an IB port. Now the software can steer native IB packets to raw IB receive queues according to the DLID and  
    the DQPN.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.15-2.1" date="1639396800">-     *Fixes included in  firmware version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **The following issues have been fixed in version 14.31.1200:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
    
    **Additional Fixes included in version 14.31.1200:**
    
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.
    
    **The following issues have been fixed in version 16.31.1014:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * An assert that was caused when trying to open 1024 functions on the device and the maximum number of functions was 1023.
      * Occasional performance issues related to RC QPs using E2E-credits (not connected to SRQ and doing send/receive traffic) when the ROCE_ACCL tx_window was enabled.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * A rare issue that caused RX pipe to hang.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
      * CRT_DCR with index larger than 1 &lt;&lt; 21 occasionally collided with the CRT_SW_RESERVED address.
      * An issue that caused the TX queue to get into an unresponsive state when the VF rate limiter was set.
    
    **Additional Fixes included in version 16.31.1014:**
    
      * Disabled the CNP counter "rp_cnp_ignored " (triggered by OOS (out-of-sequence)) when all ports are IB.
      * Fixed the TMP421 sensor temperature reporting.
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.16" date="1647777600">-     *Firmware for the following devices has been updated to 2.42.5044 :**
    
      * 779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)
      * 779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)
    
    **Firmware for the following devices has been updated to 14.32.1010:**
    
      * 817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)
      * 817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)
    
    **Firmware for the following device has been updated to 16.32.1010:**
    
      * 874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)
    
    
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.
    
    .  
    
    **New features and changes included in version 16.32.1010:**
    
      * Added a new NvConfig parameter LOG_MAX_QUEUE to set the maximum number of work queue resources (QP, RQ, SQ...) that can be created per function. The default value is 2^17.
      * Blocked the VF's ability to use both padding and signature in order to prevent the NIC from getting into an unresponsive state.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its rate limit.
      * Performance improvements in the DCT with AR flow by exposing a hint to the software in DCI software context that indicates that RDMA WRITE on this DCI is not supported.
      * Added support for QSHR access register to enable Set and Query rate limit perhost per-port.
      * The firmware now exposes a new Software Steering ICM resource for VXLAN encap expand in order for the SW Steering to manage this resource directly.
      * Enabled the exposure of new ICM resource to the software steering for VXLAN encapsulation expansion.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for DSFP AOC (CMIS) v4 when error code is not reported by the module.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.16" date="1647864000">-     *The following issues have been fixed in version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    
    
    **The following issues have been fixed in version 16.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The link status was reported incorrectly and consequently caused the link to go down due to incorrect definition of the RX_LOS polarity in the INI.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * The system could not create more than 128K QPs.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
      * PCIe lane margining capability issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.17" date="1663156800">-     *Firmware for the following devices has been updated to 2.42.5044 :**
    
      * 779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)
      * 779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)
    
    **Firmware for the following devices has been updated to 14.32.1010:**
    
      * 817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)
      * 817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)
    
    **Firmware for the following device has been updated to 16.33.1048:**
    
      * 874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)
    
    
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.
    
    .  
    
    **New features and changes included in version 16.33.1048:**
    
      * Added pci_rescan_needed field to the MFRL access register to indicate whether a PCI rescan is needed based on the NV configurations issued by the software.  
    Note: If the Keep Link Up NV configuration is changed, phyless reset will be
    blocked.
    
      * Added a new MAD of class SMP that has the attributes hierarchy_Info as defined in the IB Specification and is used to query the hierarchy information stored on the node and the physical port.
      * Added a new register (vhca_icm_ctrl access_reg) to enable querying and limiting the ICM pages in use.
      * Enhanced the XRQ QP error information provided to the user in case QP goes into an error state. In such case, QUERY_QP will provide information on the syndrome type and which side caused the error.
      * Replaced the deprecated NetworkPort schema with Port schema in NIC RDE implementation.
      * Updated the ibstat status reported when the phy link is down. Now QUERY_VPORT_STATE.max_tx_speed of UPLINK will not be reported as 0 anymore.
      * Disabled the option to send SMPs from unauthorized hosts.
      * Enabled the option to modify the ip_ecn field in the packet header in firmware steering.
      * Modified the TX or RX cache invalidation behavior. TX or RX cache invalidation now does not occur automatically but only when the software performs the sync operation using the using sync_steering command.
      * Modified the maximum bulk size per single allocation from "log_table_size - log_num_unisizes", to allocate any range size, to remove limitations that HWS objects such as counters and modify arguments might encounter.
      * Enabled delay drop for hairpin packets. If a hairpin QP is created with delay_drop_en enabled, the feature will be enabled across all GVMIs, based on the delay drop status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.17" date="1663243200">-     *The following issues have been fixed in version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    
    
    **The following issues have been fixed in version 16.33.1048:**
    
      * Rare lanes skew issue that caused CPU to timeout in Rec.idle.
      * The card occasionally masked some PCIe AER reporting.
      * Incorrect flow of credits blockage that prevented booting during DC cycle test.
      * An issue with BMC medium migration from SMBUS to PCIe, and increased FIFOs to pass large packets in case of the migration.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.19" date="1671710400">-     *The following issues have been fixed in version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    
    
    **The following issues have been fixed in version 16.35.1012:**
    
      * RDE (Redfish) PATCH operation to LLDPTransmit properties "ManagementAddressIPv4", "ManagementAddressIPv6" and "ManagementAddressMAC" were applied only in the first attempt, but failed in the next.
      * PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.
      * Bad configuration of number of VFs and SFs led to the consumption of too many functions and triggered a FW assert 0x888E. The reduction flows behavior was fixed to ensure the configuration does not exceed the total number of supported functions. 
      * InfiniBand L2 QP could not receive RDMA traffic occasionally.
      * Running with a debug firmware reduced security as if token was applied.</changelog>
  </package>
  <package pkgid="b5a57881abea097692b6da0147340a8ad2da049cfcba83ad08c1fc5db91a5e70" name="firmware-nic-mellanox-ib-cx4-cx5" arch="x86_64">
    <version epoch="0" ver="1.0.12" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1601985600">-     *Following issues have been fixed in firmware version 16.27.2008:**
    
      * Although the effective BER (after FEC) was expected to meet the design targets (e.g. 10e-14 or lower), occasionally it was higher.
      * High BER occured when connecting cables of type 0.5/1m DAC to an HDR speed.
      * The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.
      * The desched_threshold field did not work properly.
      * The "roce_adp_retrans" counter was presenting the values of the "local_ack_timeout_err" counter.
      * If Relaxed Ordering was disabled by running the "setpci" command, it would not be functional even after re-enabling it by running the "setpci" command again.
    
    **Following issues have been fixed in firmware version 12.27.4000:**
    
      * The device hung while running the sw reset flow under heavy stress and with many open resources.
      * Low PXE performance observered while using the VSC to trigger the send_ring_doorbells.
      * IPoIB and DC would not work together.
      * DC funtionality issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1614254400">-     *Firmware for the following devices are updated to 12.28.1002:**
    
    843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)  
      
    **New Feature and Changes in Version 12.28.1002:**
    
      * Increased the maximum XRQ number to 512.
    
      
    **Firmware for the following devices are updated to 16.29.1016:**
    
    872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)  
    872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)  
    
    
    **New Feature and Changes in Version 16.29.1016:**
    
    Added support for following features:
    
      * Changed the default value of DCQCN's (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of the cluster.
      * An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.
      * "InfiniBand" properties set to the Network Device Function Redfish object.
      * HW support for Flow Metering to utilize Advanced Steering Operation (ASO). HW Flow Meter allows higher scale, more accuracy, and better performance compared to the FW Flow Metering.
      * Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.
      * 2 new Mini CQE formats: Responder Mini CQE With Flow Tag Layout Responder Mini CQE With l3_l4_info Layout
      * UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with "ooo_per_sl" field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT command.
      * Steering DP hash flow groups.
      * A new counter per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause "CQE with Error" or "CQE_MOCK".
      * PCIe Rx modifications to prevent the adapter cards from disappearing from the system.
      * ignore_flow_level is now enabled by the TRUST LEVEL access registry. 
      * cq_overrun counter. The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.
      * [Beta] Enabled the capability to allow Virtual Functions to send Pause Frames packets.
      * Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.
      * Hardware steering dump output used for debugging and troubleshooting.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1614340800">-     *Following issues have been fixed in firmware version 16.29.1016:**
    
      * An issue that prevented VXLAN packets with svlan/ cvlan tag from being matched.
      * An issue that caused the eth_wqe_too_small counter to count ODP (On-Demand Paging) page faults.
      * When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.
      *  Ani ssue that resulted in low performance after enabling the RoCE Accelerator capability. Note: The fix is available when all ports are set as Ethernet. 
      * On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.
      * The chassis manager calculation for Multi-Host and Socket-Direct adapter cards to allow running NC-SI commands by the chassis manager BMC. Now the chassis manager is count as BMC with index 0, regardless of how many BMC there are.
      * An issue that caused the device to go to down IRISC as one of the firmware semaphores could not be released when a speed change or port state change was triggered. 
    
    **Following issues have been fixed in firmware version 12.28.1002:**
    
      * An issue that caused the DCR (DC Resources) to be destroyed before the retry option managed to work when the retry timeout is too big. in this case, the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * An issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1632657600">-     *Firmware for the following devices are updated to 12.28.2006:**
    
    843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)  
    
    
    **Firmware for the following devices are updated to 16.31.1014:**
    
    872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)  
    872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)
    
    
    
    **New features and changes in version 12.28.2006:**
    
      * Increased the maximum XRQ number to 512.
    
    **New features and changes in version 16.31.1014:**
    
      * NIC scheduling feature support has been disabled for non-privileged functions.
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * support for Enabling/Disabling NIC and RDMA (port/partition) was included via the UEFI HII system settings.
      * Increased the maximum number of MSIX per VF to 127.
      * Asymmetrical MSIX Configuration: This feature allows the device to be configured with a different number of MSIX vectors per physical PCI functions.To use this feature, please follow these steps:
      *         Clear NUM_PF_MSIX_VALID to disable global symmetrical MSIX configuration.
      *         Set PF_NUM_PF_MSIX_VALID to enable asymmetrical per Physical Function MSIX configuration.
      *         Configure PF_NUM_PF_MSIX per physical PCI function.
      * RDMA partitioning and RDMA counters in IB mode.
      * Added a new bit ("data_in_order") to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.
      * Enabled UID 0 to create resources with UMEM (User Memory).
      * Receiving and sending native IB packets from/to the software (including all headers) via raw IBL2 QPs.
      * RX RDMA NIC flow table on an IB port. Now the software can steer native IB packets to raw IB receive queues according to the DLID and  the DQPN.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1632744000">-     *The following issues have been fixed in version 12.28.2006:**
    
      * An issue that caused the DCR (DC Resources) to be destroyed before the retry option managed to work when the retry timeout is too big. in this case, the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * An issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.31.1014:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * An assert that was caused when trying to open 1024 functions on the device and the maximum number of functions was 1023.
      * Occasional performance issues related to RC QPs using E2E-credits (not connected to SRQ and doing send/receive traffic) when the ROCE_ACCL tx_window was enabled.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * A rare issue that caused RX pipe to hang.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
      * CRT_DCR with index larger than 1 &lt;&lt; 21 occasionally collided with the CRT_SW_RESERVED address.
      * An issue that caused the TX queue to get into an unresponsive state when the VF rate limiter was set.
    
    **Additional Fixes included in version 16.31.1014:**
    
      * Disabled the CNP counter "rp_cnp_ignored " (triggered by OOS (out-of-sequence)) when all ports are IB.
      * Fixed the TMP421 sensor temperature reporting.
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1648468800">-     *Firmware for the following devices has been updated to 12.28.2006:**
    
      * 843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)  
    
    
    **Firmware for the following devices has been updated to 16.32.1010:**
    
      * 872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)
      * 872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)
    
    
    
    **New features and changes included in version 12.28.2006:**
    
      * Increased the maximum XRQ number to 512.
    
    **New features and changes included in version 16.32.1010:**
    
      * Added support for blocking unwanted GMP classes by dedicated MADs.
      * Added a new NvConfig parameter LOG_MAX_QUEUE to set the maximum number of work queue resources (QP, RQ, SQ...) that can be created per function. The default value is 2^17.
      * Added a Congestion Control Key to all Congestion Control MADs to authenticate that they are originated from a trusted source.
      * Added an SMP firewall to block the option of sending SMPs (MADS sent on QP0 from the Subnet Manager) from unauthorized hosts to prevent fake SMPs from being recognized as the SM.
      * Vendor Specific MADs Class 0x9 is no longer supported by the firmware. In case the firmware detects such MAD, the firmware will return a "NOT SUPPORTED" error to the user.
      * Blocked the VF's ability to use both padding and signature in order to prevent the NIC from getting into an unresponsive state.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its rate limit.
      * Performance improvements in the DCT with AR flow by exposing a hint to the software in DCI software context that indicates that RDMA WRITE on this DCI is not supported.
      * Added support for dynamic timeout mechanism when in InfiniBand mode.
      * Added support for QSHR access register to enable Set and Query rate limit perhost per-port.
      * The firmware now exposes a new Software Steering ICM resource for VXLAN encap expand in order for the SW Steering to manage this resource directly.
      * Added support for asymmetrical VFs per PF. To enable it: PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a none zero value.
      * Added 2 new MAD access registers to enable mlxlink to read/write access registers by LID (to the whole subnet).
      * Enabled the exposure of new ICM resource to the software steering for VXLAN encapsulation expansion.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Disabled VST on dual port adapter cards when one port is configured as ETH and the other as IB as VST is not available when the port is set as ETH.
      * Added support for DSFP AOC (CMIS) v4 when error code is not reported by the module.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1648555200">-     *Fixes in version 12.28.2006:**
    
      * Fixed an issue that caused the DCR (DC Resources) to be destroyed before the retry option managed to work when the retry timeout is too big. in this case, the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.32.1010**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The link status was reported incorrectly and consequently caused the link to go down due to incorrect definition of the RX_LOS polarity in the INI.
      * The system got into an unresponsive state when a peer port went down while using an Optical module.
      * Invalid RNR timeout when trying to set it during the rts2rts_qp transition.
      * A fatal assert 0x81C5 occurred when calling get_vport_mad from the MAD APIs. The firmware was trying to compute the number of vPorts using a global function number. To avoid this issue, the API was updated to remove any assumption on the function number. Note: This issue is affects only IB devices.
      * During events, stress caused the firmware to reset the Arm host of the vPort without sending an event. Thus preventing the software from rearming the vPort as it did not receive any event, and the firmware did not send the event because the vPort had no Arm set.
      * The system could not create more than 128K QPs.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
      * PCIe lane margining capability issues.
      * An issue related to the sl2vl mad that caused a few msec hiccup in the transmission on an InfiniBand network when the SM sent the sl2vl mad to a node in the cluster.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1663156800">-     *Firmware for the following devices has been updated to 12.28.2006:**
    
      * 843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)  
    
    
    **Firmware for the following devices has been updated to 16.33.1048:**
    
      * 872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)
      * 872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)
    
    
    
    **New features and changes included in version 12.28.2006:**
    
      * Increased the maximum XRQ number to 512.
    
    **New features and changes included in version 16.33.1048:**
    
      * Added pci_rescan_needed field to the MFRL access register to indicate whether a PCI rescan is needed based on the NV configurations issued by the software.  
    Note: If the Keep Link Up NV configuration is changed, phyless reset will be
    blocked.
    
      * Added a new MAD of class SMP that has the attributes hierarchy_Info as defined in the IB Specification and is used to query the hierarchy information stored on the node and the physical port.
      * Added a new register (vhca_icm_ctrl access_reg) to enable querying and limiting the ICM pages in use.
      * Enhanced the XRQ QP error information provided to the user in case QP goes into an error state. In such case, QUERY_QP will provide information on the syndrome type and which side caused the error.
      * Replaced the deprecated NetworkPort schema with Port schema in NIC RDE implementation.
      * Updated the ibstat status reported when the phy link is down. Now QUERY_VPORT_STATE.max_tx_speed of UPLINK will not be reported as 0 anymore.
      * Disabled the option to send SMPs from unauthorized hosts.
      * Enabled the option to modify the ip_ecn field in the packet header in firmware steering.
      * Modified the TX or RX cache invalidation behavior. TX or RX cache invalidation now does not occur automatically but only when the software performs the sync operation using the using sync_steering command.
      * Modified the maximum bulk size per single allocation from "log_table_size - log_num_unisizes", to allocate any range size, to remove limitations that HWS objects such as counters and modify arguments might encounter.
      * Enabled delay drop for hairpin packets. If a hairpin QP is created with delay_drop_en enabled, the feature will be enabled across all GVMIs, based on the delay drop status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1663243200">-     *Fixes in version 12.28.2006:**
    
      * Fixed an issue that caused the DCR (DC Resources) to be destroyed before the retry option managed to work when the retry timeout is too big. in this case, the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.33.1048**
    
      * Rare lanes skew issue that caused CPU to timeout in Rec.idle.
      * The card occasionally masked some PCIe AER reporting.
      * Incorrect flow of credits blockage that prevented booting during DC cycle test.
      * An issue with BMC medium migration from SMBUS to PCIe, and increased FIFOs to pass large packets in case of the migration.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12" date="1673265600">-     *Fixes in version 12.28.2006:**
    
      * Fixed an issue that caused the DCR (DC Resources) to be destroyed before the retry option managed to work when the retry timeout is too big. in this case, the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.35.1012**
    
      * Rare lanes skew issue that caused CPU to timeout in Rec.idle.
      * The card occasionally masked some PCIe AER reporting.
      * Incorrect flow of credits blockage that prevented booting during DC cycle test.
      * An issue with BMC medium migration from SMBUS to PCIe, and increased FIFOs to pass large packets in case of the migration.</changelog>
  </package>
  <package pkgid="a3f27a81c68dde9e909491ff259ac73fe57d85a69c3efc00968d430c6aa0d9c1" name="firmware-nic-open-mellanox-eth-mft" arch="x86_64">
    <version epoch="0" ver="1.0.9" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-3.1" date="1606996800">-     *Following issues have been fixed in firmware version 14.29.1016 and 16.29.1016:**
    
      * Changed the default value of DCQCN's NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.
      * An issue that caused packets to drop due to header size issues and/or failing checks. This issue was caused due to a Linux issue that caused VFs to set the wrong header size value in wqe_inline_header_mode input.
      * When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) might take longer than when MKEY_BY_NAME was disabled.
      * In rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.
      * An issue that caused the device to go to dead IRISC as one of the firmware semaphores could not be released when a speed change or port state change was triggered.
    
    **Following issues have been fixed in firmware version 16.29.1016:**
    
      * An issue that caused the eth_wqe_too_small counter to count ODP page faults.
      * A low performance was observed after enabling the RoCE Accelerator capability.
    
    **No fixes are included in firmware version 14.31.1200.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-2.1" date="1607083200">-     *Firmware for the following devices is updated to 16.28.4200:**
    
    P13188-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX512F-ACAT Adapter)  
    P10112-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX562A-ACAI OCP3 Adapter)
    
    **New Feature and Changes in Version 16.28.4200:**
    
    **This release contains important reliability improvements and security hardening enhancements. Upgrade the firmware of the device to this release to improve the devices' firmware security and reliability.**
    
      * Enabled ASN1 and OCBB (DCi) MCTP HPE specific protocols.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-2.1" date="1607169600">-     *Following issues have been fixed in firmware version 16.28.4200:**
    
      * Although the effective BER (after FEC) was expected to meet the design targets (e.g. 10e-14 or lower), occasionally it was higher.
      * High BER occured when connecting cables of type 0.5/1m DAC to an HDR speed.
      * The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.
      * The desched_threshold field did not work properly.
      * The "roce_adp_retrans" counter was presenting the values of the "local_ack_timeout_err" counter.
      * If Relaxed Ordering was disabled by running the "setpci" command, it would not be functional even after re-enabling it by running the "setpci" command again.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1632657600">-     *Firmware for the following devices is updated to 14.31.1014:**
    
    P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)
    
    **Firmware for the following devices is updated to 14.31.1200:**
    
    P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)
    
    **Firmware for the following devices is updated to 16.31.1014:**
    
    P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)
    
    
    
    **New features and changes included in version 14.31.1014:**
    
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * support for Enabling/Disabling NIC and RDMA (port/partition) was included via the UEFI HII system settings.
      * Increased the maximum number of MSIX per VF to 127.
      * Added a new bit ("data_in_order") to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.
    
    **New features and changes included in version 14.31.1200:**
    
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * support for Enabling/Disabling NIC and RDMA (port/partition) was included via the UEFI HII system settings.
      * Increased the maximum number of MSIX per VF to 127.
      * Added a new bit ("data_in_order") to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.                                                                                                                                
      * Added a new NVconfig per Port for a specific Finisar module. This new NVconfig sets the port to work in AN mode and sets the module to No DME. This change does not affect the speed logic, only the FEC logic (FEC override). Note: If the port does not go up, switch to Force mode.                                                                                                                        
    
    **New features and changes included in version 16.31.1014:**
    
      * NIC scheduling feature support has been disabled for non-privileged functions.
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * support for Enabling/Disabling NIC and RDMA (port/partition) was included via the UEFI HII system settings.
      * Increased the maximum number of MSIX per VF to 127.
      * Asymmetrical MSIX Configuration: This feature allows the device to be configured with a different number of MSIX vectors per physical PCI functions.To use this feature, please follow these steps:
      *         Clear NUM_PF_MSIX_VALID to disable global symmetrical MSIX configuration.
      *         Set PF_NUM_PF_MSIX_VALID to enable asymmetrical per Physical Function MSIX configuration.
      *         Configure PF_NUM_PF_MSIX per physical PCI function.
      * RDMA partitioning and RDMA counters in IB mode.
      * Added a new bit ("data_in_order") to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.
      * Enabled UID 0 to create resources with UMEM (User Memory).
      * Receiving and sending native IB packets from/to the software (including all headers) via raw IBL2 QPs.
      * RX RDMA NIC flow table on an IB port. Now the software can steer native IB packets to raw IB receive queues according to the DLID and  the DQPN.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1632744000">-     *The following issues have been fixed in version 14.31.1014:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
    
    **Additional Fixes included in version 14.31.1014:**
    
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.
    
    
    
    **The following issues have been fixed in version 14.31.1200:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
    
    **Additional Fixes included in version 14.31.1200:**
    
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.  
    
    
    **The following issues have been fixed in version 16.31.1014:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * An assert that was caused when trying to open 1024 functions on the device and the maximum number of functions was 1023.
      * Occasional performance issues related to RC QPs using E2E-credits (not connected to SRQ and doing send/receive traffic) when the ROCE_ACCL tx_window was enabled.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * A rare issue that caused RX pipe to hang.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
      * CRT_DCR with index larger than 1 &lt;&lt; 21 occasionally collided with the CRT_SW_RESERVED address.
      * An issue that caused the TX queue to get into an unresponsive state when the VF rate limiter was set.
    
    **Additional Fixes included in version 16.31.1014:**
    
      * Disabled the CNP counter "rp_cnp_ignored " (triggered by OOS (out-of-sequence)) when all ports are IB.
      * Fixed the TMP421 sensor temperature reporting.
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1647777600">-     *Firmware for the following devices has been updated to 14.32.1010:**
    
      * P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)
      * P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)
    
    
    
    **Firmware for the following device has been updated to 16.32.1010:**
    
      * P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)
    
    
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.
    
    .  
    
    **New features and changes included in version 16.32.1010:**
    
      * Added a new NvConfig parameter LOG_MAX_QUEUE to set the maximum number of work queue resources (QP, RQ, SQ...) that can be created per function. The default value is 2^17.
      * Blocked the VF's ability to use both padding and signature in order to prevent the NIC from getting into an unresponsive state.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its rate limit.
      * Performance improvements in the DCT with AR flow by exposing a hint to the software in DCI software context that indicates that RDMA WRITE on this DCI is not supported.
      * Added support for QSHR access register to enable Set and Query rate limit perhost per-port.
      * The firmware now exposes a new Software Steering ICM resource for VXLAN encap expand in order for the SW Steering to manage this resource directly.
      * Enabled the exposure of new ICM resource to the software steering for VXLAN encapsulation expansion.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for DSFP AOC (CMIS) v4 when error code is not reported by the module.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1647864000">-     *The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    
    
    **The following issues have been fixed in version 16.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The link status was reported incorrectly and consequently caused the link to go down due to incorrect definition of the RX_LOS polarity in the INI.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * The system could not create more than 128K QPs.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
      * PCIe lane margining capability issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1663156800">-     *Firmware for the following devices has been updated to 14.32.1010:**
    
      * P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)
      * P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)
    
    
    
    **Firmware for the following device has been updated to 16.33.1048:**
    
      * P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)
    
    
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.
    
    .  
    
    **New features and changes included in version 16.33.1048:**
    
      * Added pci_rescan_needed field to the MFRL access register to indicate whether a PCI rescan is needed based on the NV configurations issued by the software.  
    Note: If the Keep Link Up NV configuration is changed, phyless reset will be
    blocked.
    
      * Added a new MAD of class SMP that has the attributes hierarchy_Info as defined in the IB Specification and is used to query the hierarchy information stored on the node and the physical port.
      * Added a new register (vhca_icm_ctrl access_reg) to enable querying and limiting the ICM pages in use.
      * Enhanced the XRQ QP error information provided to the user in case QP goes into an error state. In such case, QUERY_QP will provide information on the syndrome type and which side caused the error.
      * Replaced the deprecated NetworkPort schema with Port schema in NIC RDE implementation.
      * Updated the ibstat status reported when the phy link is down. Now QUERY_VPORT_STATE.max_tx_speed of UPLINK will not be reported as 0 anymore.
      * Disabled the option to send SMPs from unauthorized hosts.
      * Enabled the option to modify the ip_ecn field in the packet header in firmware steering.
      * Modified the TX or RX cache invalidation behavior. TX or RX cache invalidation now does not occur automatically but only when the software performs the sync operation using the using sync_steering command.
      * Modified the maximum bulk size per single allocation from "log_table_size - log_num_unisizes", to allocate any range size, to remove limitations that HWS objects such as counters and modify arguments might encounter.
      * Enabled delay drop for hairpin packets. If a hairpin QP is created with delay_drop_en enabled, the feature will be enabled across all GVMIs, based on the delay drop status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1663243200">-     *The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    
    
    **The following issues have been fixed in version 16.33.1048:**
    
      * Rare lanes skew issue that caused CPU to timeout in Rec.idle.
      * The card occasionally masked some PCIe AER reporting.
      * Incorrect flow of credits blockage that prevented booting during DC cycle test.
      * An issue with BMC medium migration from SMBUS to PCIe, and increased FIFOs to pass large packets in case of the migration.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1671710400">-     *The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.  
    
    
    **The following issues have been fixed in version 16.35.1012:**
    
      * RDE (Redfish) PATCH operation to LLDPTransmit properties "ManagementAddressIPv4", "ManagementAddressIPv6" and "ManagementAddressMAC" were applied only in the first attempt, but failed in the next.
      * PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.
      * Bad configuration of number of VFs and SFs led to the consumption of too many functions and triggered a FW assert 0x888E. The reduction flows behavior was fixed to ensure the configuration does not exceed the total number of supported functions. 
      * InfiniBand L2 QP could not receive RDMA traffic occasionally.
      * Running with a debug firmware reduced security as if token was applied.</changelog>
  </package>
  <package pkgid="fe2c512c0184394d1d3d7fbc13cd4184706315ef2d23bc87734a2bab3ff4e928" name="firmware-nic-qlogic-flq" arch="x86_64">
    <version epoch="0" ver="1.22.0" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.7.16" date="1565524800">-     This product now supports the HPE Synergy 6820C 25/50Gb Converged Network
    Adapter.
    
    This product now allows modification of the settings under the 'Port Level
    Configuration' sub-menu under the adapter's configuration menu (located at
    'System Utilities'(F9 at POST)-&gt;'System Configuration') when OneView Profile
    with 'manage manually' option is applied to the server.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.7.16" date="1565611200">-     This product corrects an issue where the firmware update fails when the first
    port is disabled on the network adapter.
    
    This product corrects an issue where not all devices are discovered as part of
    firmware update on a multi-root-complex platforms like Integrity, Superdome
    etc.
    
    This product corrects an issue where the system hangs during POST with red
    screen when iSCSI boot LUN is re-exported (after a previous unexport
    operation) from the iSCSI host (HPE 3PAR StoreServ Storage).
    
    This product corrects an issue where 'HPE Synergy 4820C 10/20/25Gb Converged
    Network Adapter' disappears after changing its link speed under its
    configuration menu (located at 'System Utilities'(F9 at POST)-&gt;'System
    Configuration').
    
    This product corrects an issue where the configuration settings of the
    adapter, connected to a server managed by OneView profile, may be reset to
    defaults after a system reboot.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.8.12" date="1572523200">-     This product now remove supports Synergy and Blade Server.
    
    This product now supports Red Hat Enterprise Linux 8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.8.12" date="1572609600">-     This product addresses an issue where 2nd port reports "function type:
    disabled" with HPE Ethernet 10Gb 2-port 524SFP+ Adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.9.8" date="1594987200">-      This product corrects the abnormal disconnection of iLO web page while performing under Shared Networking on Flexible-LOM.
      * This product addresses an issue where the HPE Ethernet 10/25Gb 2-port 622FLR-SFP28 adapter and  HPE Ethernet 10/25Gb 2-port 621SFP28 Adapter UMCE (Uncorrectable Machine Check Exception) was followed by Unrecoverable I/O error, Uncorrectable PCI express error on Server and one of the ports suddenly no longer can send or receive traffic.
      * This product addresses an issue where driver doesn't load upon booting up by correct memory relocation.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.10.10" date="1614859200">-     This product contains support PLDM firmware upgrade base improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.11.0" date="1635508800">-     This product addresses an issue where the modification on string format of
    firmware update payload.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20.1" date="1646395200">-     This product addresses the problem that the MAC being modified after Firmware
    update</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.21.3" date="1661342400">-     This product now supports Red Hat Enterprise Linux 8 Update 6, Liunx 9 and
    SUSE Linux Enterprise Server 15 Service Pack 4.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22.0" date="1671192000">-     TBD</changelog>
  </package>
  <package pkgid="507ebeed51b77b9431ae31e7018ab2498d283dbeded8ec14755e676830a7ef07" name="firmware-nic-qlogic-nx2" arch="x86_64">
    <version epoch="0" ver="2.32.0" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.26.7" date="1572609600">-     This product addresses an incorrect local sequence number in the Link Layer
    Discovery Protocol (LLDP).
    
    This product addresses an issue where boot mode is not restored to the default
    value after a factory reset.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.26.30" date="1583236800">-     This product addresses an Overheat issue that system shuts down automatically
    due to NIC temperature exceeding threshold.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.27.8" date="1594987200">-      This product corrects the display problem of the adapter name under RBSU.
      * This products corrects some issues about the thermal reporting and temperature threadshold control of the adapter.
      * This product addresses an issue where unexpected UMCE(Uncorrectable Machine Check Exception) appeared when powering on the system with NPAR(Network Partitioning) enabled.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.27.50" date="1602244800">-     This product addresses an issue where the Firmware installation failure when
    enabling secure boot under SUSE Linux Enterprise Server 15 SP2.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.6" date="1614859200">-     This product addresses an issue that platform would be randomly waked up by
    WOL packet.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.50" date="1627387200">-      **This product addressed the firmware update failure problem which may cause NIC FW corruption.**
      * **This product addressed the firmware update failure problem while the platform secure boot being enabled.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.29.2" date="1631793600">-     This product now supports Red Hat Enterprise Linux 8 update 4 and SUSE Linux
    Enterprise Server 15 Service Pack 3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.30.2" date="1646395200">-      This product addresses a cosmetic change in the adapter configuration page to reflect that DCBx is enabled and as long as LLDP is enabled.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.31.4" date="1661342400">-     This product now supports Red Hat Enterprise Linux 8 Update 6, Liunx 9 and
    SUSE Linux Enterprise Server 15 Service Pack 4</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.32.0" date="1671192000">-     TBD</changelog>
  </package>
  <package pkgid="05a3dff7d3690da80ffaf4868044db6bbffd6b2619e99aef94718efec3e0ac3a" name="firmware-powerpic-gen10" arch="x86_64">
    <version epoch="0" ver="1.0.8" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.2" date="1496750400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1503489600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM version
    1.20 or later
    
    **Enhancements/New Features:**
    
    Added support for Dynamic Power Capping. For proper operation, please ensure
    that Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM
    version 1.20 or later are updated on the server.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-2.1" date="1541419200">-     *Important Notes:**
    
    Ver. 1.0.4 (B) contains support for new server products.  It is functionally
    equivalent to ver. 1.0.4.  It is not necessary to upgrade with Revision (B) if
    a previous component revision was used to upgrade the firmware to ver. 1.0.4.
    
    **Firmware Dependencies:**
    
    Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM version
    1.20 or later
    
    **Enhancements/New Features:**
    
    Added support for Dynamic Power Capping. For proper operation, please ensure
    that Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM
    version 1.20 or later are updated on the server.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-4.1" date="1548936000">-     *Important Notes:**
    
    Ver. 1.0.4 (D) contains updates to the component packaging and is functionally
    equivalent to ver. 1.0.4.  It is not necessary to upgrade with Revision (D) if
    a previous component revision was used to upgrade the firmware to ver. 1.0.4.
    
    **Firmware Dependencies:**
    
    Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM version
    1.20 or later
    
    **Enhancements/New Features:**
    
    Added support for Dynamic Power Capping. For proper operation, please ensure
    that Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM
    version 1.20 or later are updated on the server.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1566820800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for AMD EPYC 7002 Generation Processors. ROM version 2.00 or
    later is required to enable the support. This version of firmware does not
    include any changes for platforms with Intel Processors or AMD EPYC 7001
    Generation Processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7-2.1" date="1583755200">-     *Important Notes:**
    
    Ver. 1.0.7 (B) contains updates to the component packaging and is functionally
    equivalent to ver. 1.0.7. It is not necessary to upgrade with Revision (B) if
    a previous component revision was used to upgrade the firmware to ver.
    1.0.7.This is the initial version for HPE Gen10 Plus servers.  
    
    
    **Firmware Dependencies:**
    
    For HPE ProLiant DL325/DL385 Gen10 servers, ROM version 2.00 or later is
    required to enable the support. iLO5 version 1.40 or above is required to
    upgrade to this version.
    
    **Enhancements/New Features:**
    
    Added support for AMD EPYC 7002 Generation Processors on HPE ProLiant
    DL325/DL385 Gen10 servers. ROM version 2.00 or later is required to enable the
    support. This version of firmware does not include any changes for Gen10
    platforms with Intel Processors or AMD EPYC 7001 Generation Processors. iLO5
    version 1.40 or above is required to upgrade to this version.
    
    This is the initial version for HPE Gen10 Plus servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7-3.1" date="1612958400">-     *Important Notes:**
    
    Ver. 1.0.7 (C) contains updates to the component packaging and is functionally
    equivalent to ver. 1.0.7. It is not necessary to upgrade with Revision (C) if
    a previous component revision was used to upgrade the firmware to ver.
    1.0.7.This is the initial version for HPE Gen10 Plus servers.
    
    **Firmware Dependencies:**
    
    For HPE ProLiant DL325/DL385 Gen10 servers, ROM version 2.00 or later is
    required to enable the support. iLO5 version 1.40 or above is required to
    upgrade to this version.
    
    **Enhancements/New Features:**
    
    Added support for AMD EPYC 7002 Generation Processors on HPE ProLiant
    DL325/DL385 Gen10 servers. ROM version 2.00 or later is required to enable the
    support. This version of firmware does not include any changes for Gen10
    platforms with Intel Processors or AMD EPYC 7001 Generation Processors. iLO5
    version 1.40 or above is required to upgrade to this version.
    
    This is the initial version for HPE Gen10 Plus servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1631707200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Fixed an issue of inaccurate temperature readings when the actual temperature
    exceeds 100 C on Proliant Gen10 Plus servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8-2.1" date="1660478400">-     *Important Notes:**
    
    Ver. 1.0.8(B) contains updates to the firmware packaging and is functionally
    equivalent to ver. 1.0.8. It is not necessary to upgrade with Revision B if a
    previous component revision was used to upgrade the firmware to version 1.0.8.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Fixed an issue of inaccurate temperature readings when the actual temperature
    exceeds 100 C on Proliant Gen10 Plus servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="567b355d7422d48706082dc10a58b6b0bdcf6157c081d3ccbd0c498b339be0e7" name="firmware-smartarray-1f19a4a64d" arch="x86_64">
    <version epoch="0" ver="5.14" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.21" date="1537444800">-     The following issues are resolved in version 4.21:
    
      * Expander may reset during heavy SSACLI polling
      * SATA drives may take longer to spin up, not be initially detected, and then hot add later. This can prevent system boot or affect the logical drive status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.22" date="1564488000">-      Fixes an issue where false Smart Carrier authenication errors may happen.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.08" date="1616328000">-      Added support for Gen10 plus UBM type 1/2/3 backplanes</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.08" date="1616414400">-      Smart Carrier Authentication Failure issue</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.09" date="1622635200">-      Added support for Gen10 plus UBM type 1/2/3 backplanes</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.09" date="1622721600">-      Intermittent failures on Smart Carrier authentication</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.10" date="1630929600">-      To make Valid flag is always set to true initially so that CRC check can be performed on initstring partition and test if it is really valid.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.12" date="1652356800">-     Users need to update HPE SAS 12G Expander FW version 5.12 for FW compatibility
    due to a specific SPI flash devices is used on the Expander card. Carry over
    issue resolution with reference SID8638.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.12" date="1652443200">-     1\. In support of Micron 256Mb SPI ROM on the latest Shiner board
    
    2\. Provided a proper downgrade restriction to ensure FW compatibility with
    the latest HW</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.14-2.1" date="1658318400">-</changelog>
  </package>
  <package pkgid="e47872ac61ef0e42544b4b0d4e7badb12f96cb9e3c582ed33017d9df6d7ad41d" name="firmware-smartarray-40023de47f" arch="x86_64">
    <version epoch="0" ver="1.20" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.16-2.1" date="1632830400">-      Update device guid</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20" date="1646222400">-     Fixed command report mistake value.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20-2.1" date="1656072000">-</changelog>
  </package>
  <package pkgid="c7ef359b4d69c2bbc787b68b2d0be9c8f67c5a63b456a0f4ecfc683155efa78c" name="firmware-smartarray-7b5e8400dd" arch="x86_64">
    <version epoch="0" ver="1.27" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.27" date="1616414400">-     Initial Release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.27-2.1" date="1655985600">-</changelog>
  </package>
  <package pkgid="dc9e06472297987797298a5b25dd3dc93a3977046073ab75807508416156fbfa" name="firmware-smartarray-815b1ae26d" arch="x86_64">
    <version epoch="0" ver="1.56" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00" date="1502884800">-     Initial Release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56" date="1526558400">-           Supports Drive Zoning</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56-2.1" date="1540209600">-     *Note:** If version 1.56 was previously installed, then it is not necessary to upgrade to version 1.56 (B).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56-2.1" date="1540296000">-      Added support for SUSE Linux Enterprise Server 15 OS</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56-3.1" date="1547208000">-      Added HPE Smart Array P824i-p controller support</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56-4.1" date="1655985600">-</changelog>
  </package>
  <package pkgid="ebc0149009abfbce4b21c7edf203e71e06fcd7dc23ec33cadc550836dc6d6f3f" name="firmware-smartarray-9f082dffb4" arch="x86_64">
    <version epoch="0" ver="1.00" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00" date="1526558400">-     Initial Release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00-2.1" date="1540209600">-     *Note:** If version 1.00 was previously installed, then it is not necessary to upgrade to version 1.00 (B).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00-2.1" date="1540296000">-      Added support for SUSE Linux Enterprise Server 15 OS</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00-3.1" date="1544875200">-</changelog>
  </package>
  <package pkgid="7841a7918fa272ab5dd91754b710607f9d35b9eb596f4662faa16fe6df163160" name="firmware-smartarray-f18fdefd0b" arch="x86_64">
    <version epoch="0" ver="1.79" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.25" date="1446638400">-      Added support for new 6 HDD SFF backplane.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.26" date="1474459200">-      Added support for new 6 SFF HDD backplane.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.26" date="1474545600">-      In rare circumstances after multiple, successive reboots, a system with 28 large form factor drives might become unresponsive. Firmware v1.26 resolves the issue.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.26-2.1" date="1496145600">-      **Customers who already installed firmware version 1.26 do not need to update to 1.26 (B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.26-2.1" date="1496232000">-      Updated to support Service Pack for ProLiant version 2017.07.0
    
              **Note:** If version 1.26 was previously installed, then it is not necessary to upgrade to version 1.26 (B).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50" date="1523448000">-      Enhanced debug capabilities</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50-2.1" date="1526558400">-      Enhanced debug capabilities</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.78-1.1" date="1549368000">-      Added HPE Smart Array P824i-p controller support</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.79" date="1584360000">-     Drive may show up missing after a system reboot.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.79-2.1" date="1655985600">-     Drive may show up missing after a system reboot.
    
    Please reference Customer Advisory a00098241en_us</changelog>
  </package>
  <package pkgid="1b2a16bef7e4d00123a924df0a7471fc0667ba9b094c7cf74c0d32d5f0da393c" name="firmware-smartarray-f36d4ef431" arch="x86_64">
    <version epoch="0" ver="0.39" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.37" date="1616414400">-     Initial Release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.39" date="1632657600">-     It's the transition version before migrating to newer version 0.39(B). 0.39
    doesn't have any function change or issue fix, just to activate the new
    Product ID naming.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.39" date="1632744000">-      It's the transition version before migrating to newer version 0.39(B). 0.39 doesn't have any function change or issue fix, just to activate the new Product ID naming.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.39-2.1" date="1632830400">-      Modify Product ID to "A4200 Gen10P LFF" and "A4200 Gen10P SFF" to distinguish the different generation expander backplane.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.39-3.1" date="1655985600">-</changelog>
  </package>
  <package pkgid="2c95ab33fca6ea64bcfa44f6d3212b986554375cfd36e55ef9163fbebda9d577" name="firmware-smartarray-f7c07bdbbd" arch="x86_64">
    <version epoch="0" ver="5.61" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.53" date="1616328000">-      Added UBM type3 backplane support
      * Added support for long device model/product ID for SATA drives.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.53" date="1616414400">-      An issue where the controller might become unresponsive while waiting for a non-existent pre-fetch queue entry.
      * Host I/O timeouts might occur due to continuing firmware attempts to discover devices during an expander configuration.
      * A controller lockup problem (with code 0x1E10) might occur when a bad drive with an unsupported block size is connected into slot 0.
      * A Controller hangs issue when multiple hot-plug and hot remove events (drives or JBODs) were being processed.
      * A Controller hangs issue on DDR caching enabled logical volumes with sequential read towards the end of the volume.
      * A Controller hangs issue with outstanding I/Os on a degraded logical volume when the physical drive fails.
      * A Controller hangs issue if a host I/O and background consistency check simultaneously encounter a RAID-1 ADM stripe in which all drives have URE's on the same LBA.
      * A Controller hangs issue when a drive is failed from a RAID6/60 logical drive when the host issues a Clear Controller Configuration command or any other configuration change command.
      * The SSD data drive might be set offline (with reason code 0x37) when hot-remove and re-insert during a spare rebuild in progress.
      * A drive might not be exposed to the OS after reboot if the system is rebooted just after the sanitize erase finishes.
      * UBM backplanes are not detected properly when connected to specific ports (port 7 or above) in an expander card configuration.
      * A Controller hangs issue when processing idle time followed by a short burst of I/Os.
      * The controller might return the previous drive firmware version, after a drive firmware update on SATA drives.
      * The controller might fail drives (with reason code 0x49, I/O freeze timeout) during expander firmware upgrade on a multi-expander enclosure configuration.
      * Hot-added drive LED control fails on specific fan-out expander type external enclosure models.
      * sequential I/Os and the firmware coalescing logic can't get the memory.
      * Filesystem or application might read old data when SmartCache configurations encounter intermittent write I/O errors to a primary logical drive.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.11" date="1632398400">-      Fixed an issue where SSD SmartPath is not enabled on logical drives created on the same array in certain scenarios.
      * Fixed a problem where WRITE and READ fails with URE on a RAID6 volume where it could have completed successfully in certain error recovery scenarios.
      * Fixed a problem where events were not getting logged in certain scenarios.
      * Fixed an issue where a Windows memory dump process was taking longer than 30 minutes.
      * Fixed a problem in Gen10+ server where FAULT LED was not turning on for the drives failing during device discovery.
      * Fixed a problem where the critical event "Controller memory ECC error limit exceeded" was reported in the AHS IML log after upgrading to 3.53 B0 firmware build.
      * Fixed a problem where the host WRITE I/O failed on the SmartCache logical drive with UREs present on the primary logical drive.
      * Fixed an issue where the controller may be non-responsive after drive failure with SSD SmartPath enabled under a high queue depth workload.
      * Fixed a performance issue when the host is submitting large sequential IO streams at high queue depth.
      * Fixed an issue where OS filesystem is not available after making configuration changes in HII.
      * Fixed an issue where error was observed while selecting edit SmartCache Logical drive option when SmartCache logical drive is in Degraded mode.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.00" date="1647777600">-      Added support for DMTF PLDM Monitoring and Control for enhanced thermal monitoring
      * Added support for DMTF PLDM Redfish Device Enablement for Redfish Storage, StorageController, Port, Drive, Volume, &amp; CollectionCapabilities
      * Added support for DMTF PLDM Redfish Device Enablement for Volume POST &amp; DEL operations
      * Added support for DMTF Redfish StorageDevice.1.0.1 Events
      * Added support in firmware to enable logical drive transformation without backup power source on the controllers supporting data preservation.
      * Added support to return NCQ Priority Information for SATA drive to host.
      * Added support to blink the drive Predictive Failure (PF) LED during Predictive Spare Rebuilding (PSR) for drives that can be safely removed and replaced without causing a logical drive failure.
      * Added support to configure default setting for the drive write cache.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.00" date="1647864000">-      Fixed a rare problem where backup power status was incorrectly reporting Charging instead of Failed.
      * Fixed an issue where obsoleted SCSI pass through command fails.
      * Loss of redundant path message is incorrectly reported on logical drive failure with single domain configuration.
      * Fixed an issue where SmartPath may not be used after LUN Reset
      * Fixed a potential controller lockup 0x1BC0 during write then read I/O with drive URE's.
      * Fixed an issue that Apollo 4200 Gen10 plus LFF expander backplanes are not discovered by controller.
      * Fixed an issue that range locked SED failed with reason error erasing RAID metadata during reboot and remains failed after clear configuration.
      * Fixed an issue where the file system may read incorrect data from a degraded RAID 5 or 6 logical drive.
      * Fixed an issue where the file system or application may read incorrect data when a backup power source is discharged completely, and system power loss occurs during a transformation.
      * Fixed an issue where the drive Fault LED is not turned ON when firmware fails a bad HBA drive connected to an expander during device discovery or hot-plug.
      * Fixed an issue of auto-rebuild not starting if two drives fail at the same time on a RAID10 or RAID6 logical drive having only one "Auto-Replace Drives" spare drive.
      * Fixed an issue where the drive Fault LED is turned ON for a few seconds when multiple configured drives are hot removed from a SES enclosure and then hot added
      * Fixed an issue where rebuild did not start after multiple iterations of drive failures.
      * Fixed an issue where the controller might fail to discover devices after a cable is hot-added.
      * Fixed a potential problem of inability to delete a SmartCache write-back logical drive.
      * Fixed an issue where 0x1789 POST message error code is displayed as healthy and there is no information in HII when all logical drives in the controller are offline.
      * Fixed an issue where the last logical drive in an array cannot be deleted in UEFI configuration tool.
      * Fixed an issue where build method is not listed for RAID 6 array creation in UEFI configuration tool.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.00-2.1" date="1651752000">-      Added support for DMTF PLDM Monitoring and Control for enhanced thermal monitoring
      * Added support for DMTF PLDM Redfish Device Enablement for Redfish Storage, StorageController, Port, Drive, Volume, &amp; CollectionCapabilities
      * Added support for DMTF PLDM Redfish Device Enablement for Volume POST &amp; DEL operations
      * Added support for DMTF Redfish StorageDevice.1.0.1 Events
      * Added support in firmware to enable logical drive transformation without backup power source on the controllers supporting data preservation.
      * Added support to return NCQ Priority Information for SATA drive to host.
      * Added support to blink the drive Predictive Failure (PF) LED during Predictive Spare Rebuilding (PSR) for drives that can be safely removed and replaced without causing a logical drive failure.
      * Added support to configure default setting for the drive write cache.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.00-2.1" date="1651838400">-      Fixed a rare problem where backup power status was incorrectly reporting Charging instead of Failed.
      * Fixed an issue where obsoleted SCSI pass through command fails.
      * Loss of redundant path message is incorrectly reported on logical drive failure with single domain configuration.
      * Fixed an issue where SmartPath may not be used after LUN Reset
      * Fixed a potential controller lockup 0x1BC0 during write then read I/O with drive URE's.
      * Fixed an issue that Apollo 4200 Gen10 plus LFF expander backplanes are not discovered by controller.
      * Fixed an issue that range locked SED failed with reason error erasing RAID metadata during reboot and remains failed after clear configuration.
      * Fixed an issue where the file system may read incorrect data from a degraded RAID 5 or 6 logical drive.
      * Fixed an issue where the file system or application may read incorrect data when a backup power source is discharged completely, and system power loss occurs during a transformation.
      * Fixed an issue where the drive Fault LED is not turned ON when firmware fails a bad HBA drive connected to an expander during device discovery or hot-plug.
      * Fixed an issue of auto-rebuild not starting if two drives fail at the same time on a RAID10 or RAID6 logical drive having only one "Auto-Replace Drives" spare drive.
      * Fixed an issue where the drive Fault LED is turned ON for a few seconds when multiple configured drives are hot removed from a SES enclosure and then hot added
      * Fixed an issue where rebuild did not start after multiple iterations of drive failures.
      * Fixed an issue where the controller might fail to discover devices after a cable is hot-added.
      * Fixed a potential problem of inability to delete a SmartCache write-back logical drive.
      * Fixed an issue where 0x1789 POST message error code is displayed as healthy and there is no information in HII when all logical drives in the controller are offline.
      * Fixed an issue where the last logical drive in an array cannot be deleted in UEFI configuration tool.
      * Fixed an issue where build method is not listed for RAID 6 array creation in UEFI configuration tool.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.32-2.1" date="1663675200">-     For 2022 Sep MSB usage</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.32-3.1" date="1669636800">-      Initial driver release for HPE SR Gen11 storage controllers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.61-2.1" date="1680782400">-</changelog>
  </package>
  <package pkgid="dbe722cc0a7dd7e4c1424802734af55fc201d69fe8f974222d33d44313e4afaa" name="firmware-spsgen10" arch="x86_64">
    <version epoch="0" ver="04.01.04.901" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.296" date="1561982400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an intermittent issue where an optional PCIe device may not properly
    report its thermal data or other telemetry data as seen through the Integrated
    Lights-Out (iLO) interface. This issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.339" date="1572868800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This image contains the latest Intel Server Platform Services (SPS) Firmware
    which contains mitigations for a variety of security vulnerabilities. The
    following vulnerabilities have been addressed in this SPS release:
    CVE-2019-11090 and CVE-2019-11109. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.381" date="1591617600">-     This image contains the latest Intel Server Platform Services (SPS) Firmware
    which contains mitigations for security vulnerability CVE-2020-0545. This
    issue is not unique to HPE Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.381-2.1" date="1597924800">-     This image contains the latest Intel Server Platform Services (SPS) Firmware
    which contains mitigations for security vulnerability CVE-2020-0545. This
    issue is not unique to HPE Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.381-2.1" date="1598011200">-     *Important Notes:**
    
    The Ver. 04.01.04.381(B) flash component contains an updated flash image. The
    actual firmware is exactly the same as was delivered with the original ver.
    04.01.04.381 flash component. The previous flash component had an issue that
    caused flashing to intermittently fail. It is not necessary to upgrade with
    Revision B if a previous component Revision was successfully used to upgrade
    the firmware to version 04.01.04.381 or for systems that originally shipped
    with version 04.01.04.381 firmware.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where systems configured with older versions of the Server
    Platform Services (SPS) Firmware, such as version 04.00.00.288 or older, may
    become inoperable after flashing to SPS firmware version 04.01.04.381. This
    releases contains an updated flash component for SPS Firmware 04.01.04.381
    which allows direct flashing from older firmware versions to the latest.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.423" date="1604923200">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2020-8755. This security
    vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.505" date="1623153600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version of the Server Platform Services (SPS) Firmware addresses an issue
    where not all PCIe devices will be managed properly by the system when there
    are more than 16 PCIe devices present in the platform. This would include PCIe
    devices in PCIe slots or NVMe drives. This issue would typically manifest
    itself as iLO Firmware not properly reporting thermals from a device when a
    server was in this heavily loaded configuration.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.601" date="1644321600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2021.2 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.804-2.1" date="1660046400">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Addressed an issue where Intel reference systems were observed to
    intermittently fail to power on during extensive reboot testing.  This issue
    has not been reported on HPE servers.  This version of the Intel SPS firmware
    has been released as part of the Intel 2022.2 IPU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.901" date="1673179200">-</changelog>
  </package>
  <package pkgid="00c174326474136e2b1692c21bd46694b12ea54115a770e0eceae31c8a0c12e3" name="firmware-spsgen10plus" arch="x86_64">
    <version epoch="0" ver="04.04.04.300" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.04.04.053" date="1623326400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.04.04.058" date="1626436800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for Intel Optane Persistent Memory.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.04.04.062" date="1644321600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version of the System ROM contains updates aligned with the INTEL Whitley
    BKC WW52.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.04.04.202" date="1660046400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the INTEL PLR3.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.04.04.300" date="1673524800">-</changelog>
  </package>
  <package pkgid="193d07988e5ae09cbc99c718aeeff8b4e6f207456a03f5d848e1763a428156cc" name="firmware-system-a40" arch="x86_64">
    <version epoch="0" ver="2.68_2023_02_02" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-08-2021" date="1629028800">-     Added a new BIOS/Platform Configuration (RBSU) option to Server Security
    called UEFI Variable Access Firmware Control. This option, when enabled, can
    be used to block UEFI Variable writes, such as to the UEFI Boot Order, from
    the Operating System or a third-party utility. HPE recommends leaving this
    capability disabled unless the user specifically wants to prevent the
    operating system's normal operation of writing to UEFI Variables, which
    typically occur during OS install.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-08-2021" date="1629115200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Tianocore
    Edk2 Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and
    CVE-2021-28210. These security vulnerabilities are documented in Tianocore
    Edk2 CVE details site. These issues are not unique to HPE servers.
    
    Addressed an issue with Pensando Distributed Services Platform DSC-25
    Enterprise 10/25Gb 2-port SFP28 Card missing in system information page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-28-2021" date="1636459200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of AMD security
    patch (AMD-SN-1021) which provides mitigations for BIOS advisories and
    security vulnerabilities documented as CVE-2020-12954, CVE-2020-12961,
    CVE-2021-26331, CVE-2021-26335, CVE-2021-26315, CVE-2020-12946,
    CVE-2020-12951. CVE-2021-26336, CVE-2021-26337, CVE-2021-26338,
    CVE-2021-26320, CVE-2020-12944, CVE-2020-12988, CVE-2021-26329,
    CVE-2021-26330, CVE-2021-26321, CVE-2021-26323, CVE-2021-26325,
    CVE-2021-26326, CVE-2021-26322, CVE-2021-26327, and CVE-2021-26312. These
    issues are not unique to HPE servers.
    
    Addressed an issue where in the OS does not display the true CPU Max Core
    Frequency.
    
    Addressed an issue with AMD EPYC 1st Generation processors that can result in
    Corrected Memory Error Threshold Events being logged to the Integrated
    Management Log (IML) in cases when they should not be logged. The system
    monitors corrected errors and notifies the user when action is required due to
    an increased risk of an Uncorrected Memory Error. Corrected Memory errors are
    a normal and expected occurrence and do not always indicate a higher risk of
    an Uncorrected Memory Error. Previous revisions of the System ROM were
    incorrectly logging Corrected Memory Error Threshold Events to the IML when
    action should not have been required, resulting in unnecessary scheduled
    downtime to replace DIMMs. It is recommended that the System ROM be updated to
    this version before replacing DIMMs due to Corrected Memory Error Threshold
    Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_12-03-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_02-10-2022" date="1645704000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where RAID volumes will be lost when using the "Restore
    Default Manufacturing Settings" feature.
    
    Addressed an issue where if the Administrator Password and Power-On Password
    are set, after clearing the Power-On Password, Administrator Password is also
    cleared.
    
    Addressed an issue where a system with Microsoft BitLocker enabled may
    incorrectly and intermittently prompt the user to unlock drives after a
    graceful OS reboot.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_06-16-2022" date="1657886400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigations for security vulnerabilities documented as CVE-2022-0778
    and CVE-2022-1292. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of LibPng library
    which provides mitigations for security vulnerability documented as CVE-
    CVE-2019-7317. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    Addressed an issue where systems using AMD 1st Generation EPYC processors
    would incorrectly count correctable DIMM errors from different channels into
    one channel thus possibly incorrectly causing Correctable Memory Error
    Threshold Exceeded errors to occur.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661947200">-     *Important Notes:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code 100E for AMD 2nd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigations for security vulnerabilities documented as
    CVE-2022-02068. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-17-2022" date="1669809600">-     Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-17-2022" date="1669896000">-     *Important Notes:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code 100E for AMD 2nd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-02-2023" date="1676721600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where some Chinese translation is missing from RBSU.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="7a0805f5ae04751b280fc4a0dbadd975b80f4ed3140d0e8e75ed3c1f3e95ce99" name="firmware-system-a41" arch="x86_64">
    <version epoch="0" ver="2.68_2023_02_02" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-08-2021" date="1629028800">-     Added a new BIOS/Platform Configuration (RBSU) option to Server Security
    called UEFI Variable Access Firmware Control. This option, when enabled, can
    be used to block UEFI Variable writes, such as to the UEFI Boot Order, from
    the Operating System or a third-party utility. HPE recommends leaving this
    capability disabled unless the user specifically wants to prevent the
    operating system's normal operation of writing to UEFI Variables, which
    typically occur during OS install.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-08-2021" date="1629115200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Tianocore
    Edk2 Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and
    CVE-2021-28210. These security vulnerabilities are documented in Tianocore
    Edk2 CVE details site. These issues are not unique to HPE servers.
    
    Addressed an issue with Pensando Distributed Services Platform DSC-25
    Enterprise 10/25Gb 2-port SFP28 Card missing in system information page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-28-2021" date="1636459200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of AMD security
    patch (AMD-SN-1021) which provides mitigations for BIOS advisories and
    security vulnerabilities documented as CVE-2020-12954, CVE-2020-12961,
    CVE-2021-26331, CVE-2021-26335, CVE-2021-26315, CVE-2020-12946,
    CVE-2020-12951. CVE-2021-26336, CVE-2021-26337, CVE-2021-26338,
    CVE-2021-26320, CVE-2020-12944, CVE-2020-12988, CVE-2021-26329,
    CVE-2021-26330, CVE-2021-26321, CVE-2021-26323, CVE-2021-26325,
    CVE-2021-26326, CVE-2021-26322, CVE-2021-26327, and CVE-2021-26312. These
    issues are not unique to HPE servers.
    
    Addressed an issue where in the OS does not display the true CPU Max Core
    Frequency.
    
    Addressed an issue with AMD EPYC 1st Generation processors that can result in
    Corrected Memory Error Threshold Events being logged to the Integrated
    Management Log (IML) in cases when they should not be logged. The system
    monitors corrected errors and notifies the user when action is required due to
    an increased risk of an Uncorrected Memory Error. Corrected Memory errors are
    a normal and expected occurrence and do not always indicate a higher risk of
    an Uncorrected Memory Error. Previous revisions of the System ROM were
    incorrectly logging Corrected Memory Error Threshold Events to the IML when
    action should not have been required, resulting in unnecessary scheduled
    downtime to replace DIMMs. It is recommended that the System ROM be updated to
    this version before replacing DIMMs due to Corrected Memory Error Threshold
    Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_12-03-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_02-10-2022" date="1645704000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where RAID volumes will be lost when using the "Restore
    Default Manufacturing Settings" feature.
    
    Addressed an issue where if the Administrator Password and Power-On Password
    are set, after clearing the Power-On Password, Administrator Password is also
    cleared.
    
    Addressed an issue where a system with Microsoft BitLocker enabled may
    incorrectly and intermittently prompt the user to unlock drives after a
    graceful OS reboot.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_06-16-2022" date="1657886400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigations for security vulnerabilities documented as CVE-2022-0778
    and CVE-2022-1292. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of LibPng library
    which provides mitigations for security vulnerability documented as CVE-
    CVE-2019-7317. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    Addressed an issue where systems using AMD 1st Generation EPYC processors
    would incorrectly count correctable DIMM errors from different channels into
    one channel thus possibly incorrectly causing Correctable Memory Error
    Threshold Exceeded errors to occur.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661947200">-     *Important Notes:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code 100E for AMD 2nd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigations for security vulnerabilities documented as
    CVE-2022-02068. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-17-2022" date="1669809600">-     Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-17-2022" date="1669896000">-     *Important Notes:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code 100E for AMD 2nd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-02-2023" date="1676721600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where some Chinese translation is missing from RBSU.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="60332ffa8b6cc1f1acf6740620dd969f0db0775e90f488be978386e69087b1e8" name="firmware-system-a42" arch="x86_64">
    <version epoch="0" ver="2.68_2023_02_06" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-29-2021" date="1636372800">-     Added a new BIOS/Platform Configuration (RBSU) option for Dynamic PCIe Rate
    Change. This option should be enabled for certain PCIe devices that change
    their advertised speed during training. The option is disabled by default, and
    should only be enabled if the system is configured with a device which is
    training at a less than advertised speed.
    
    Added a new BIOS/Platform Configuration (RBSU) option for MCTP Broadcast
    Support. This option is used to control the PCIe Management Component
    Transport Protocol (MCTP) support for a given slot. This option can be used to
    disable MCTP support to a given PCIe endpoint that may not properly support
    this protocol. It is recommended that this option remain enabled for full
    system functionality.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-29-2021" date="1636459200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of AMD security
    patch (AMD-SN-1021) which provides mitigations for BIOS advisories and
    security vulnerabilities documented as CVE-2020-12954, CVE-2020-12961,
    CVE-2021-26331, CVE-2021-26335, CVE-2021-26315, CVE-2020-12946,
    CVE-2020-12951. CVE-2021-26336, CVE-2021-26337, CVE-2021-26338,
    CVE-2021-26320, CVE-2020-12944, CVE-2020-12988, CVE-2021-26329,
    CVE-2021-26330, CVE-2021-26321, CVE-2021-26323, CVE-2021-26325,
    CVE-2021-26326, CVE-2021-26322, CVE-2021-26327, and CVE-2021-26312. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of AMD security
    patch (AMD-SN-1007) which provides mitigation for AMD vulnerability with PSP
    Code Execution documented by AMD. This issue is not unique to HPE servers.
    
    Addressed an issue where in the OS does not display the true CPU Max Core
    Frequency.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_12-03-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_02-10-2022" date="1645704000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where RAID volumes will be lost when using the "Restore
    Default Manufacturing Settings" feature.
    
    Addressed an issue where if the Administrator Password and Power-On Password
    are set, after clearing the Power-On Password, Administrator Password is also
    cleared.
    
    Addressed an issue where a system with Microsoft BitLocker enabled may
    incorrectly and intermittently prompt the user to unlock drives after a
    graceful OS reboot.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_06-09-2022" date="1656072000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the AMD
    reference code for AMD 3rd Generation EPYC processors which addresses and
    issue with Windows 2022 AQ Secure Core certification.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-0778. This security vulnerability is documented in the CVE report
    site https://nvd.nist.gov/vuln/detail/CVE-2022-0778. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigation for BIOS security vulnerability documented
    as CVE-2022-27405. This security vulnerability is documented in the CVE report
    site https://nvd.nist.gov/vuln/detail/CVE-2022-27405. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where the IPMI Watchdog Timer (WDT) would continuously be
    re-enabled on reboots even after being disabled which causes the system to
    continuously reboot after the timeout is triggered.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661083200">-     Added support for the latest HPE UBM6 backplanes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661169600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the QR Code in ROM Based Setup Menu (RBSU) was not
    valid.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-17-2022" date="1669809600">-     Implemented PMU Memory BIST test options for Milan platforms.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-17-2022" date="1669896000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    Addressed an issue where the system would encounter an unexpected shutdown
    with "Internal processors error" in the IML while running the TPM scripts.
    
    Addressed an issue where the system boot-up would hang if the system has
    installed mutiple PCIe devices and set to "Dual Bifurcation" at the same time.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-06-2023" date="1676721600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site.
    
    This revision of the System ROM includes the v1.1.1s openSSL which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-2097.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2097). This security vulnerability
    is documented in the CVE report site.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="e3474536f7ab441ca573123fb9bfd63a8e48710eac45b07d83032b7c0cfd8b5a" name="firmware-system-a43" arch="x86_64">
    <version epoch="0" ver="2.68_2023_02_06" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-29-2021" date="1636372800">-     Added a new BIOS/Platform Configuration (RBSU) option for Dynamic PCIe Rate
    Change. This option should be enabled for certain PCIe devices that change
    their advertised speed during training. The option is disabled by default, and
    should only be enabled if the system is configured with a device which is
    training at a less than advertised speed.
    
    Added a new BIOS/Platform Configuration (RBSU) option for MCTP Broadcast
    Support. This option is used to control the PCIe Management Component
    Transport Protocol (MCTP) support for a given slot. This option can be used to
    disable MCTP support to a given PCIe endpoint that may not properly support
    this protocol. It is recommended that this option remain enabled for full
    system functionality.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-29-2021" date="1636459200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of AMD security
    patch (AMD-SN-1021) which provides mitigations for BIOS advisories and
    security vulnerabilities documented as CVE-2020-12954, CVE-2020-12961,
    CVE-2021-26331, CVE-2021-26335, CVE-2021-26315, CVE-2020-12946,
    CVE-2020-12951. CVE-2021-26336, CVE-2021-26337, CVE-2021-26338,
    CVE-2021-26320, CVE-2020-12944, CVE-2020-12988, CVE-2021-26329,
    CVE-2021-26330, CVE-2021-26321, CVE-2021-26323, CVE-2021-26325,
    CVE-2021-26326, CVE-2021-26322, CVE-2021-26327, and CVE-2021-26312. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of AMD security
    patch (AMD-SN-1007) which provides mitigation for AMD vulnerability with PSP
    Code Execution documented by AMD. This issue is not unique to HPE servers.
    
    Addressed an issue where in the OS does not display the true CPU Max Core
    Frequency.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_12-03-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_02-10-2022" date="1645704000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where RAID volumes will be lost when using the "Restore
    Default Manufacturing Settings" feature.
    
    Addressed an issue where if the Administrator Password and Power-On Password
    are set, after clearing the Power-On Password, Administrator Password is also
    cleared.
    
    Addressed an issue where a system with Microsoft BitLocker enabled may
    incorrectly and intermittently prompt the user to unlock drives after a
    graceful OS reboot.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_06-09-2022" date="1656072000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the AMD
    reference code for AMD 3rd Generation EPYC processors which addresses and
    issue with Windows 2022 AQ Secure Core certification.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-0778. This security vulnerability is documented in the CVE report
    site https://nvd.nist.gov/vuln/detail/CVE-2022-0778. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigation for BIOS security vulnerability documented
    as CVE-2022-27405. This security vulnerability is documented in the CVE report
    site https://nvd.nist.gov/vuln/detail/CVE-2022-27405. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where the IPMI Watchdog Timer (WDT) would continuously be
    re-enabled on reboots even after being disabled which causes the system to
    continuously reboot after the timeout is triggered.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661083200">-     Added support for the latest HPE UBM6 backplanes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661169600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the QR Code in ROM Based Setup Menu (RBSU) was not
    valid.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-17-2022" date="1669809600">-     Implemented PMU Memory BIST test options for Milan platforms.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-17-2022" date="1669896000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    Addressed an issue where the system would encounter an unexpected shutdown
    with "Internal processors error" in the IML while running the TPM scripts.
    
    Addressed an issue where the system boot-up would hang if the system has
    installed mutiple PCIe devices and set to "Dual Bifurcation" at the same time.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-06-2023" date="1676721600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site.
    
    This revision of the System ROM includes the v1.1.1s openSSL which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-2097.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2097). This security vulnerability
    is documented in the CVE report site.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="e22adf4184022d9d8ef6e32742d20f9e387ddfb028b3c27f8aecb9782b4e4fc3" name="firmware-system-a46" arch="x86_64">
    <version epoch="0" ver="2.68_2023_02_06" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-29-2021" date="1636459200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    \- This revision of the System ROM includes the latest revision of AMD
    security patch (AMD-SN-1021) which provides mitigations for BIOS advisories
    and security vulnerabilities documented as CVE-2020-12954, CVE-2020-12961,
    CVE-2021-26331, CVE-2021-26335, CVE-2021-26315, CVE-2020-12946,
    CVE-2020-12951. CVE-2021-26336, CVE-2021-26337, CVE-2021-26338,
    CVE-2021-26320, CVE-2020-12944, CVE-2020-12988, CVE-2021-26329,
    CVE-2021-26330, CVE-2021-26321, CVE-2021-26323, CVE-2021-26325,
    CVE-2021-26326, CVE-2021-26322, CVE-2021-26327, and CVE-2021-26312. These
    issues are not unique to HPE servers.
    
    \- This revision of the System ROM includes the latest revision of AMD
    security patch (AMD-SN-1007) which provides mitigation for AMD vulnerability
    with PSP Code Execution documented by AMD. This issue is not unique to HPE
    servers.
    
    \- Addressed an issue where in the OS does not display the true CPU Max Core
    Frequency.
    
    \- Addressed an issue where BootMode and UefiOptimizedBoot settings are not
    accessible through Redfish on class 3 systems.
    
    \- Addressed an issue where the controller's name is missing in BIOS/Platform
    Configuration (RBSU) and One Time Boot Menu if HPE SR416i-a x16 Lanes 4GB
    Cache NVMe/SAS 24G Gen10 Plus Controller or HPE SR932i-p x32 Lanes 8GB Wide
    Cache NVMe/SAS 24G PCIe4 x16 Gen10 Plus Controller is installed.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_12-03-2021" date="1639483200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    \- Addressed an issue that can result in Corrected Memory Error Threshold
    Events being logged to the Integrated Management Log (IML) incorrectly. The
    system monitors corrected memory errors and notifies the user via a Corrected
    Memory Error Threshold Event when action is recommended due to an increased
    risk of an uncorrected memory error. Previous versions of the System ROM may
    log a Corrected Memory Error Threshold Event in cases where the system is not
    at an increased risk of an uncorrected memory error. It is strongly
    recommended that the System ROM be updated to this version or later before
    replacing DIMMs due to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_02-10-2022" date="1646049600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Correctable Memory Error Threshold
    Events on DIMM slots 9/10/13/14/15/16 with AMD EPYC 7773/7573/7473/7373 CPU
    SKUs not being reported in the IML (Integrated Management Log).
    
    Addressed an issue where RAID volumes will be lost when using the "Restore
    Default Manufacturing Settings" feature.
    
    Addressed an issue where if the Administrator Password and Power-On Password
    are set, after clearing the Power-On Password, Administrator Password is also
    cleared.
    
    Addressed an issue where a system with Microsoft BitLocker enabled may
    incorrectly and intermittently prompt the user to unlock drives after a
    graceful OS reboot.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_02-10-2022-2.1" date="1653307200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Correctable Memory Error Threshold
    Events on DIMM slots 9/10/13/14/15/16 with AMD EPYC 7773/7573/7473/7373 CPU
    SKUs not being reported in the IML (Integrated Management Log).
    
    Addressed an issue where RAID volumes will be lost when using the "Restore
    Default Manufacturing Settings" feature.
    
    Addressed an issue where if the Administrator Password and Power-On Password
    are set, after clearing the Power-On Password, Administrator Password is also
    cleared.
    
    Addressed an issue where a system with Microsoft BitLocker enabled may
    incorrectly and intermittently prompt the user to unlock drives after a
    graceful OS reboot.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_06-09-2022" date="1657281600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the AMD
    reference code for AMD 3rd Generation EPYC processors which addresses and
    issue with Windows 2022 AQ Secure Core certification.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-0778. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigation for BIOS security vulnerability documented
    as CVE-2022-27405. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    https://nvd.nist.gov/vuln/detail/CVE-2022-27405
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where the IPMI Watchdog Timer (WDT) would continuously be
    re-enabled on reboots even after being disabled which causes the system to
    continuously reboot after the timeout is triggered.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661342400">-     Added support for the latest HPE UBM6 backplanes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661428800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the QR Code in ROM Based Setup Menu (RBSU) was not
    valid.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-30-2022" date="1671624000">-     Implemented PMU Memory BIST test options for Milan platforms.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-30-2022" date="1671710400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    Addressed an issue where the system would encounter an unexpected shutdown
    with "Internal processors error" in the IML while running the TPM scripts.
    
    Addressed an issue where the system boot-up would hang if the system has
    installed mutiple PCIe devices and set to "Dual Bifurcation" at the same time.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-06-2023" date="1677153600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site.
    
    This revision of the System ROM includes the v1.1.1s openSSL which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-2097.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2097). This security vulnerability
    is documented in the CVE report site.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="e42c1ca8be2e88c9d38aa54597f25f2b1e658571642d5f9905f6c9ff3977d15c" name="firmware-system-a47" arch="x86_64">
    <version epoch="0" ver="2.68_2023_02_06" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-29-2021" date="1636459200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    \- This revision of the System ROM includes the latest revision of AMD
    security patch (AMD-SN-1021) which provides mitigations for BIOS advisories
    and security vulnerabilities documented as CVE-2020-12954, CVE-2020-12961,
    CVE-2021-26331, CVE-2021-26335, CVE-2021-26315, CVE-2020-12946,
    CVE-2020-12951. CVE-2021-26336, CVE-2021-26337, CVE-2021-26338,
    CVE-2021-26320, CVE-2020-12944, CVE-2020-12988, CVE-2021-26329,
    CVE-2021-26330, CVE-2021-26321, CVE-2021-26323, CVE-2021-26325,
    CVE-2021-26326, CVE-2021-26322, CVE-2021-26327, and CVE-2021-26312. These
    issues are not unique to HPE servers.
    
    \- This revision of the System ROM includes the latest revision of AMD
    security patch (AMD-SN-1007) which provides mitigation for AMD vulnerability
    with PSP Code Execution documented by AMD. This issue is not unique to HPE
    servers.
    
    \- Addressed an issue where in the OS does not display the true CPU Max Core
    Frequency.
    
    \- Addressed an issue that can result in Corrected Memory Error Threshold
    Events being logged to the Integrated Management Log (IML) in cases when they
    should not be logged. The system monitors corrected errors and notifies the
    user when action is required due to an increased risk of an Uncorrected Memory
    Error. Corrected Memory errors are a normal and expected occurrence and do not
    always indicate a higher risk of an Uncorrected Memory Error. Previous
    revisions of the System ROM were incorrectly logging Corrected Memory Error
    Threshold Events to the IML when action should not have been required,
    resulting in unnecessary scheduled downtime to replace DIMMs. It is
    recommended that the System ROM be updated to this version before replacing
    DIMMs due to Corrected Memory Error Threshold Events.
    
    \- Addressed an issue where BootMode and UefiOptimizedBoot settings are not
    accessible through Redfish on class 3 systems.
    
    \- Addressed an issue where the controller's name is missing in BIOS/Platform
    Configuration (RBSU) and One Time Boot Menu if HPE SR416i-a x16 Lanes 4GB
    Cache NVMe/SAS 24G Gen10 Plus Controller or HPE SR932i-p x32 Lanes 8GB Wide
    Cache NVMe/SAS 24G PCIe4 x16 Gen10 Plus Controller is installed.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_12-03-2021" date="1639483200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    \- Addressed an issue that can result in Corrected Memory Error Threshold
    Events being logged to the Integrated Management Log (IML) incorrectly. The
    system monitors corrected memory errors and notifies the user via a Corrected
    Memory Error Threshold Event when action is recommended due to an increased
    risk of an uncorrected memory error. Previous versions of the System ROM may
    log a Corrected Memory Error Threshold Event in cases where the system is not
    at an increased risk of an uncorrected memory error. It is strongly
    recommended that the System ROM be updated to this version or later before
    replacing DIMMs due to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_02-10-2022" date="1646049600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Correctable Memory Error Threshold
    Events on DIMM slots 9/10/13/14/15/16 with AMD EPYC 7773/7573/7473/7373 CPU
    SKUs not being reported in the IML (Integrated Management Log).
    
    Addressed an issue where RAID volumes will be lost when using the "Restore
    Default Manufacturing Settings" feature.
    
    Addressed an issue where if the Administrator Password and Power-On Password
    are set, after clearing the Power-On Password, Administrator Password is also
    cleared.
    
    Addressed an issue where a system with Microsoft BitLocker enabled may
    incorrectly and intermittently prompt the user to unlock drives after a
    graceful OS reboot.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_02-10-2022-2.1" date="1653307200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Correctable Memory Error Threshold
    Events on DIMM slots 9/10/13/14/15/16 with AMD EPYC 7773/7573/7473/7373 CPU
    SKUs not being reported in the IML (Integrated Management Log).
    
    Addressed an issue where RAID volumes will be lost when using the "Restore
    Default Manufacturing Settings" feature.
    
    Addressed an issue where if the Administrator Password and Power-On Password
    are set, after clearing the Power-On Password, Administrator Password is also
    cleared.
    
    Addressed an issue where a system with Microsoft BitLocker enabled may
    incorrectly and intermittently prompt the user to unlock drives after a
    graceful OS reboot.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_06-09-2022" date="1657281600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the AMD
    reference code for AMD 3rd Generation EPYC processors which addresses and
    issue with Windows 2022 AQ Secure Core certification.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-0778. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigation for BIOS security vulnerability documented
    as CVE-2022-27405. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    https://nvd.nist.gov/vuln/detail/CVE-2022-27405
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where the IPMI Watchdog Timer (WDT) would continuously be
    re-enabled on reboots even after being disabled which causes the system to
    continuously reboot after the timeout is triggered.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661342400">-     Added support for the latest HPE UBM6 backplanes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661428800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the QR Code in ROM Based Setup Menu (RBSU) was not
    valid.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-30-2022" date="1670760000">-     Implemented PMU Memory BIST test options for Milan platforms.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-30-2022" date="1670846400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    Addressed an issue where the system would encounter an unexpected shutdown
    with "Internal processors error" in the IML while running the TPM scripts.
    
    Addressed an issue where the system boot-up would hang if the system has
    installed mutiple PCIe devices and set to "Dual Bifurcation" at the same time.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-06-2023" date="1677844800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site.
    
    This revision of the System ROM includes the v1.1.1s openSSL which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-2097.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2097). This security vulnerability
    is documented in the CVE report site.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="52bee3b504fc4a443b05e2ade7592c141e44bf6126eab84c0dea7132441572ab" name="firmware-system-a48" arch="x86_64">
    <version epoch="0" ver="2.68_2023_02_06" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-29-2021" date="1636459200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    \- This revision of the System ROM includes the latest revision of AMD
    security patch (AMD-SN-1021) which provides mitigations for BIOS advisories
    and security vulnerabilities documented as CVE-2020-12954, CVE-2020-12961,
    CVE-2021-26331, CVE-2021-26335, CVE-2021-26315, CVE-2020-12946,
    CVE-2020-12951. CVE-2021-26336, CVE-2021-26337, CVE-2021-26338,
    CVE-2021-26320, CVE-2020-12944, CVE-2020-12988, CVE-2021-26329,
    CVE-2021-26330, CVE-2021-26321, CVE-2021-26323, CVE-2021-26325,
    CVE-2021-26326, CVE-2021-26322, CVE-2021-26327, and CVE-2021-26312. These
    issues are not unique to HPE servers.
    
    \- This revision of the System ROM includes the latest revision of AMD
    security patch (AMD-SN-1007) which provides mitigation for AMD vulnerability
    with PSP Code Execution documented by AMD. This issue is not unique to HPE
    servers.
    
    \- Addressed an issue where in the OS does not display the true CPU Max Core
    Frequency.
    
    \- Addressed an issue where the system would encounter an unexpected long
    pause during early POST during a warm boot.
    
    \- Addressed an issue where BootMode and UefiOptimizedBoot settings are not
    accessible through Redfish on class 3 systems.
    
    \- Addressed an issue where the controller's name is missing in BIOS/Platform
    Configuration (RBSU) and One Time Boot Menu if HPE SR416i-a x16 Lanes 4GB
    Cache NVMe/SAS 24G Gen10 Plus Controller or HPE SR932i-p x32 Lanes 8GB Wide
    Cache NVMe/SAS 24G PCIe4 x16 Gen10 Plus Controller is installed.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_12-03-2021" date="1639483200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    \- Addressed an issue that can result in Corrected Memory Error Threshold
    Events being logged to the Integrated Management Log (IML) incorrectly. The
    system monitors corrected memory errors and notifies the user via a Corrected
    Memory Error Threshold Event when action is recommended due to an increased
    risk of an uncorrected memory error. Previous versions of the System ROM may
    log a Corrected Memory Error Threshold Event in cases where the system is not
    at an increased risk of an uncorrected memory error. It is strongly
    recommended that the System ROM be updated to this version or later before
    replacing DIMMs due to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_02-10-2022" date="1646049600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Correctable Memory Error Threshold
    Events on DIMM slots 9/10/13/14/15/16 with AMD EPYC 7773/7573/7473/7373 CPU
    SKUs not being reported in the IML (Integrated Management Log).
    
    Addressed an issue where RAID volumes will be lost when using the "Restore
    Default Manufacturing Settings" feature.
    
    Addressed an issue where if the Administrator Password and Power-On Password
    are set, after clearing the Power-On Password, Administrator Password is also
    cleared.
    
    Addressed an issue where a system with Microsoft BitLocker enabled may
    incorrectly and intermittently prompt the user to unlock drives after a
    graceful OS reboot.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_02-10-2022-2.1" date="1653307200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Correctable Memory Error Threshold
    Events on DIMM slots 9/10/13/14/15/16 with AMD EPYC 7773/7573/7473/7373 CPU
    SKUs not being reported in the IML (Integrated Management Log).
    
    Addressed an issue where RAID volumes will be lost when using the "Restore
    Default Manufacturing Settings" feature.
    
    Addressed an issue where if the Administrator Password and Power-On Password
    are set, after clearing the Power-On Password, Administrator Password is also
    cleared.
    
    Addressed an issue where a system with Microsoft BitLocker enabled may
    incorrectly and intermittently prompt the user to unlock drives after a
    graceful OS reboot.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_06-09-2022" date="1657281600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the AMD
    reference code for AMD 3rd Generation EPYC processors which addresses and
    issue with Windows 2022 AQ Secure Core certification.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-0778. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigation for BIOS security vulnerability documented
    as CVE-2022-27405. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    https://nvd.nist.gov/vuln/detail/CVE-2022-27405
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where the IPMI Watchdog Timer (WDT) would continuously be
    re-enabled on reboots even after being disabled which causes the system to
    continuously reboot after the timeout is triggered.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661342400">-     Added support for the latest HPE UBM6 backplanes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661428800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the QR Code in ROM Based Setup Menu (RBSU) was not
    valid.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-30-2022" date="1670760000">-     Implemented PMU Memory BIST test options for Milan platforms.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-30-2022" date="1670846400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    Addressed an issue where the system would encounter an unexpected shutdown
    with "Internal processors error" in the IML while running the TPM scripts.
    
    Addressed an issue where the system boot-up would hang if the system has
    installed mutiple PCIe devices and set to "Dual Bifurcation" at the same time.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-06-2023" date="1677844800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site.
    
    This revision of the System ROM includes the v1.1.1s openSSL which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-2097.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2097). This security vulnerability
    is documented in the CVE report site.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="dc14c900065785a21afeac6224eccc8582d242526db1e64613047e61f89156dd" name="firmware-system-u30" arch="x86_64">
    <version epoch="0" ver="2.76_2023_02_09" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues
    are not unique to HPE servers.
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1646827200">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_04-21-2022" date="1652184000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00616. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123,
    CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addresses an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    Addresses an issue where the system would loop in reboot once the watchdog
    timer times out.
    
    Addresses an issue where Advanced ECC is selected in Advanced Memory
    Protection (AMP), the option will be forced to HPE Fast Fault Tolerant (ADDDC)
    when in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode can be set
    while in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode does not change
    back to ADDDC after updating system ROM from version 2.60 to 2.62. For more
    details on this please check the following advisory:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1653393600">-     Added support for HPE MegaRAID Gen10 Plus Storage Controllers MR216i-a and
    MR416i-a.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1653480000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1671364800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="9cc5b5434f7c33d567bb30edae1642aab4e1472dd4f708158ff0c53e024826b0" name="firmware-system-u31" arch="x86_64">
    <version epoch="0" ver="2.76_2023_02_09" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_11-24-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues
    are not unique to HPE servers.
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1646827200">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_04-21-2022" date="1652184000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00616. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123,
    CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addresses an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    Addresses an issue where the system would loop in reboot once the watchdog
    timer times out.
    
    Addresses an issue where Advanced ECC is selected in Advanced Memory
    Protection (AMP), the option will be forced to HPE Fast Fault Tolerant (ADDDC)
    when in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode can be set
    while in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode does not change
    back to ADDDC after updating system ROM from version 2.60 to 2.62. For more
    details on this please check the following advisory:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1653652800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1671278400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="cf97111e54897db104ff3d38401ffc901f3b144fad426d7155aeb726e0c0d2d5" name="firmware-system-u32" arch="x86_64">
    <version epoch="0" ver="2.76_2023_02_09" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues
    are not unique to HPE servers.
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1646827200">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_04-21-2022" date="1652184000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00616. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123,
    CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addresses an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    Addresses an issue where the system would loop in reboot once the watchdog
    timer times out.
    
    Addresses an issue where Advanced ECC is selected in Advanced Memory
    Protection (AMP), the option will be forced to HPE Fast Fault Tolerant (ADDDC)
    when in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode can be set
    while in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode does not change
    back to ADDDC after updating system ROM from version 2.60 to 2.62. For more
    details on this please check the following advisory:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1653393600">-     Added support for HPE MegaRAID Gen10 Plus Storage Controllers MR216i-a and
    MR416i-a.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1653480000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1671278400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="3b6d3ba2cb6e77c4b13bab4e2e2ca4f109571cb4e342630fcf5cb50ffb05412e" name="firmware-system-u33" arch="x86_64">
    <version epoch="0" ver="2.76_2023_02_09" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_11-24-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues
    are not unique to HPE servers.
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1646827200">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_04-21-2022" date="1652184000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00616. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123,
    CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addresses an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    Addresses an issue where the system would loop in reboot once the watchdog
    timer times out.
    
    Addresses an issue where Advanced ECC is selected in Advanced Memory
    Protection (AMP), the option will be forced to HPE Fast Fault Tolerant (ADDDC)
    when in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode can be set
    while in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode does not change
    back to ADDDC after updating system ROM from version 2.60 to 2.62. For more
    details on this please check the following advisory:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1653652800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1671278400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="14cadabf4bb3351a9f74e460c74703776e15424499188b3207ce8a9bf35bfc9e" name="firmware-system-u34" arch="x86_64">
    <version epoch="0" ver="2.76_2023_02_09" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_11-24-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues
    are not unique to HPE servers.
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1646827200">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_04-21-2022" date="1652184000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00616. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123,
    CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addresses an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    Addresses an issue where the system would loop in reboot once the watchdog
    timer times out.
    
    Addresses an issue where Advanced ECC is selected in Advanced Memory
    Protection (AMP), the option will be forced to HPE Fast Fault Tolerant (ADDDC)
    when in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode can be set
    while in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode does not change
    back to ADDDC after updating system ROM from version 2.60 to 2.62. For more
    details on this please check the following advisory:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1653652800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1671278400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="4682d77d2a6f254d23159ed147f1c57d93a7eddb57ffefd4d56c4a6dcdab8bde" name="firmware-system-u37" arch="x86_64">
    <version epoch="0" ver="2.76_2023_02_09" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_11-24-2021" date="1639483200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092. These issues are not unique to HPE servers.
    CVE-2021-0093, CVE-2021-0144
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the IPMI Watchdog Timer stops after a cold boot with
    IPMI watch dog timer enabled in RBSU
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1647000000">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_04-21-2022" date="1652184000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00616. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123,
    CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addresses an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    Addresses an issue where the system would loop in reboot once the watchdog
    timer times out.
    
    Addresses an issue where Advanced ECC is selected in Advanced Memory
    Protection (AMP) the option with be forced back to be HPE Fast Fault Tolerant
    (ADDDC) while in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode can be set
    while in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode does not change
    back to ADDDC after updating system ROM from version 2.60 to 2.62. For more
    details on this please check the following advisory:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1654084800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1671364800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="0707a4e039a896f64598d6d7576ca6e02f247c9725bd1bf4dc2300fe3b3f5314" name="firmware-system-u38" arch="x86_64">
    <version epoch="0" ver="2.76_2023_02_09" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092. These issues are not unique to HPE servers.
    CVE-2021-0093, CVE-2021-0144
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the IPMI Watchdog Timer stops after a cold boot with
    IPMI watch dog timer enabled in RBSU
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1647000000">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_04-21-2022" date="1652184000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00616. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123,
    CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addresses an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    Addresses an issue where the system would loop in reboot once the watchdog
    timer times out.
    
    Addresses an issue where Advanced ECC is selected in Advanced Memory
    Protection (AMP) the option with be forced back to be HPE Fast Fault Tolerant
    (ADDDC) while in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode can be set
    while in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode does not change
    back to ADDDC after updating system ROM from version 2.60 to 2.62. For more
    details on this please check the following advisory:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1654084800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.69_08-19-2022" date="1661947200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Enhanced the system thermal settings to provide improved acoustics when the
    server is configured in legacy boot mode with M.2 SSDs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1671364800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="8278d21080dbd3608041d1eae8cec3648318ce7408d9bc4cfe075842d31d4312" name="firmware-system-u39" arch="x86_64">
    <version epoch="0" ver="2.76_2023_02_09" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_11-24-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues
    are not unique to HPE servers.
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1646827200">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_04-21-2022" date="1652184000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00616. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123,
    CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addresses an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    Addresses an issue where the system would loop in reboot once the watchdog
    timer times out.
    
    Addresses an issue where Advanced ECC is selected in Advanced Memory
    Protection (AMP), the option will be forced to HPE Fast Fault Tolerant (ADDDC)
    when in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode can be set
    while in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode does not change
    back to ADDDC after updating system ROM from version 2.60 to 2.62. For more
    details on this please check the following advisory:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1653652800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1672833600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="15dbce901f468b8932407bf49650866aeeb9c8ffce3531ddfa9ee3ae0114c761" name="firmware-system-u40" arch="x86_64">
    <version epoch="0" ver="2.76_2023_02_09" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_11-24-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues
    are not unique to HPE servers.
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1646827200">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_04-21-2022" date="1652184000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00616. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123,
    CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addresses an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    Addresses an issue where the system would loop in reboot once the watchdog
    timer times out.
    
    Addresses an issue where Advanced ECC is selected in Advanced Memory
    Protection (AMP), the option will be forced to HPE Fast Fault Tolerant (ADDDC)
    when in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode can be set
    while in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode does not change
    back to ADDDC after updating system ROM from version 2.60 to 2.62. For more
    details on this please check the following advisory:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1653652800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1671278400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="835d41b66742152f5312c97a0f5f8a0893af1bc005a81467428b7d8411694fdd" name="firmware-system-u41" arch="x86_64">
    <version epoch="0" ver="2.76_2023_02_09" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_11-24-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092, CVE-2021-0093, CVE-2021-0144. These issues
    are not unique to HPE servers.
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1646827200">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_04-21-2022" date="1652184000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00616. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123,
    CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addresses an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    Addresses an issue where the system would loop in reboot once the watchdog
    timer times out.
    
    Addresses an issue where Advanced ECC is selected in Advanced Memory
    Protection (AMP), the option will be forced to HPE Fast Fault Tolerant (ADDDC)
    when in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode can be set
    while in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode does not change
    back to ADDDC after updating system ROM from version 2.60 to 2.62. For more
    details on this please check the following advisory:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1653652800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1673179200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="35e3c999752c42c4ce700633946d65f5180a9a9146077e398e917b4e186ba4e6" name="firmware-system-u43" arch="x86_64">
    <version epoch="0" ver="2.68_2023_01_12" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-20-2021" date="1630065600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Tianocore
    Edk2 Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and
    CVE-2021-28210. These security vulnerabilities are documented in Tianocore
    Edk2 CVE details site. These issues are not unique to HPE servers.
    
    Addressed an issue with Pensando Distributed Services Platform DSC-25
    Enterprise 10/25Gb 2-port SFP28 Card missing in system information page.
    
    Addressed an issue where a PCIe device or an NVMe M.2 device may not show up
    correctly in iLO 5 Device Inventory or storage page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_09-16-2021" date="1632312000">-     Improved boot time by removing unneeded delay.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_09-16-2021" date="1632398400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where High Precision Event Timer in Windows was not showing
    up in device manager.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_10-21-2021" date="1636372800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2021.2 which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0157. These security vulnerabilities
    are documented in the CVE report site. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_01-20-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2 which
    provides mitigations for security vulnerabilities CVE-2021-0092,
    CVE-2021-0127, CVE-2021-0156 and CVE-2021-0157. These issues are not unique to
    HPE servers.
    
    Fixed an issue where system boot mode changed to Legacy mode from UEFI mode
    after IP flash complete and system may hang when entering IP after setting to
    UEFI mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_04-14-2022" date="1652184000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166, CVE-2022-21125, CVE-2022-21123, CVE-2022-21127,
    CVE-2022-21151, and CVE-2022-0005. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00617 and INTEL-SA-00614. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0154, CVE-2021-0189, CVE-2021-33123,
    CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the server may become unresponsive during POST with
    error messages about Unknown Initialization Error and DIMM Initialization
    Error. For more details please read the below advisory:
    https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778 ), CVE-2022-1292
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2068 ) and CVE-2022-2068
    (https://nvd.nist.gov/vuln/detail/CVE-2022-1292). This security vulnerability
    is documented in the CVE report site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of Libpng library
    which provides mitigations for security vulnerability documented as
    CVE-2019-7317 (https://nvd.nist.gov/vuln/detail/CVE-2019-7317). This issue is
    not unique to HPE servers.
    
    Removed PCIe bifurcation option in the ROM Based Setup Utility (RBSU) because
    it is not supported through ROM on this platform.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-13-2022" date="1667822400">-     Added support to show manufacturing date for DIMMs in SMBIOS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-13-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-26837. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed an issue where firmware BootTimer would cause a black screen hang
    when switching TPM 1.2 to 2.0.
    
    Addressed an issue TPM Visibility option in ROM Based Setup Utility (RBSU)
    would be greyed out after upgrading the system ROM from 2.54 to 2.58.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_01-12-2023" date="1673092800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-33894 and CVE-2022-26837. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for security vulnerabilities
    documented as CVE-2022-37434.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUN. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture defaults.
    
    Addressed an issue where some Chinese and Japaneses translations were missing
    from RBSU.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="49291ffac29166ff30dba55e129647936ba968e50096bac887b80c5e24983ffc" name="firmware-system-u44" arch="x86_64">
    <version epoch="0" ver="2.68_2023_01_12" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-20-2021-2.1" date="1629115200">-     *Important Notes:**
    
    Ver. 2.50_07-20-2021(B) contains updates to the firmware packaging and is
    functionally equivalent to ver. 2.50_07-20-2021. It is not necessary to
    upgrade with Revision B if a previous component revision was used to upgrade
    the firmware to version 2.50_07-20-2021.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Tianocore
    Edk2 Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and
    CVE-2021-28210. These security vulnerabilities are documented in Tianocore
    Edk2 CVE details site.  These issues are not unique to HPE servers.
    
    Addressed an issue with Pensando Distributed Services Platform DSC-25
    Enterprise 10/25Gb 2-port SFP28 Card missing in system information page.
    
    Addressed an issue where a PCIe device or an NVMe M.2 device may not show up
    correctly in iLO 5 Device Inventory or storage page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_09-16-2021" date="1632312000">-     Improved boot time by removing unneeded delay.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_09-16-2021" date="1632398400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where High Precision Event Timer in Windows was not showing
    up in device manager.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_10-21-2021" date="1636372800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2021.2 which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0157. These security vulnerabilities
    are documented in the CVE report site. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_01-20-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2 which
    provides mitigations for security vulnerabilities CVE-2021-0092,
    CVE-2021-0127, CVE-2021-0156 and CVE-2021-0157. These issues are not unique to
    HPE servers.
    
    Fixed an issue where system boot mode changed to Legacy mode from UEFI mode
    after IP flash complete and system may hang when entering IP after setting to
    UEFI mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_04-14-2022" date="1652184000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166, CVE-2022-21125, CVE-2022-21123, CVE-2022-21127,
    CVE-2022-21151, and CVE-2022-0005. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00617 and INTEL-SA-00614. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0154, CVE-2021-0189, CVE-2021-33123,
    CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778 ), CVE-2022-1292
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2068 ) and CVE-2022-2068
    (https://nvd.nist.gov/vuln/detail/CVE-2022-1292). This security vulnerability
    is documented in the CVE report site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of Libpng library
    which provides mitigations for security vulnerability documented as
    CVE-2019-7317 (https://nvd.nist.gov/vuln/detail/CVE-2019-7317). This issue is
    not unique to HPE servers.
    
    Removed PCIe bifurcation option in the ROM Based Setup Utility (RBSU) because
    it is not supported through ROM on this platform.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-13-2022" date="1667822400">-     Added support to show manufacturing date for DIMMs in SMBIOS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-13-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-26837. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed an issue where firmware BootTimer would cause a black screen hang
    when switching TPM 1.2 to 2.0.
    
    Addressed an issue TPM Visibility option in ROM Based Setup Utility (RBSU)
    would be greyed out after upgrading the system ROM from 2.54 to 2.58.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_01-12-2023" date="1673092800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-33894 and CVE-2022-26837. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for security vulnerabilities
    documented as CVE-2022-37434.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUN. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture defaults.
    
    Addressed an issue where some Chinese and Japaneses translations were missing
    from RBSU.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="55dac4665bb1c62de4314885baa3314e6de8f5063a1247fbb01a235f71ba78f6" name="firmware-system-u45" arch="x86_64">
    <version epoch="0" ver="2.76_2023_02_09" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_11-24-2021" date="1639483200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_01-13-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides BIOS mitigations for security vulnerabilities documented as INTEL-
    SA-00527 (2/8) for CVE-2021-0092. These issues are not unique to HPE servers.
    CVE-2021-0093, CVE-2021-0144
    
    This revision of the System ROM includes Intel Platform Update 2021.2. It
    provides Authenticated Code Module (ACM) mitigations for security
    vulnerabilities documented as INTEL-SA-00527 (2/8) for CVE-2021-0099,
    CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115,
    CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0125, CVE-2021-0124.
    These issues are not unique to HPE servers.
    
    Addressed an issue (SIK6906) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the IPMI Watchdog Timer stops after a cold boot with
    IPMI watch dog timer enabled in RBSU
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.62_03-08-2022" date="1647000000">-     *Important Notes:**
    
    This System ROM should be considered Critical for any systems using the v2.60
    revision of the System ROM.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Advanced Memory Protection (AMP) mode was
    incorrectly forced to Advanced ECC from HPE Fast Fault Tolerant (ADDDC) mode
    after updating to Sysrom ROM 01/13/2022 v2.60.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_04-21-2022" date="1652184000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166 and CVE-2021-21131. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00616. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0189, CVE-2021-0159, CVE-2021-33123,
    CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addresses an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    Addresses an issue where the system would loop in reboot once the watchdog
    timer times out.
    
    Addresses an issue where Advanced ECC is selected in Advanced Memory
    Protection (AMP) the option with be forced back to be HPE Fast Fault Tolerant
    (ADDDC) while in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode can be set
    while in custom workload mode.
    
    Addresses an issue where Advanced Memory Protection (AMP) mode does not change
    back to ADDDC after updating system ROM from version 2.60 to 2.62. For more
    details on this please check the following advisory:
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00121538en_us
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1654084800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1671364800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="64c02af6f4dca88cb516e8015dbf1d31eab615f99d8a0b38e910bac80a3a23d8" name="firmware-system-u46" arch="x86_64">
    <version epoch="0" ver="1.72_2023_02_02" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56_11-29-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.58_01-13-2022" date="1644408000">-     Changed the behavior of Restore Manufacturing Defaults from restoring the
    settings for UEFI, NICs and RAID cards to UEFI only.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.58_01-13-2022" date="1644494400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where if the administrator password and power-on password
    are set, after clearing power-on password, administrator password is also
    cleared.
    
    Addressed an issue (https://support.hpe.com/hpesc/public/docDisplay?docId=a001
    19362en_us&amp;docLocale=en_US) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_06-01-2022" date="1654430400">-     Added Protected Processor Inventory Number (PPIN) setting in ROM Based Setup
    Utility (RBSU) under Process Option Menu.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_06-01-2022" date="1654516800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166, CVE-2022-21136, and CVE-2022-21151. These security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00616, and
    INTEL-SA-00617. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2022-0004. These security vulnerabilities
    are documented in Intel Security Advisory INTEL-SA-00613. These issues are not
    unique to HPE servers
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where in the ROM Based Setup Utility (RBSU), PMem QoS
    Options cannot be set as disabled under Performance Options work profile with
    system ROM v1.58.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where incorrect Drive Location is reported for HPE MegaRAID
    Gen10 Plus Storage Controllers under Secure Erase Report
    
    Addressed an issue where PCI network boot option shows only one port for Intel
    E810-2CQDA2 Ethernet 100Gb 2-port QSFP28 Adapter for HPE (P41611-B21) when
    bifurcation is enabled. More details can be found in the Customer Advisory
    (CA) link below: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-
    a00118261en_us
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the RBSU language setting is non-English.
    
    Addressed an issue where the IPMI Watchdog Timer (WDT) would continuously be
    re-enabled on reboots even after being disabled which causes the system to
    continuously reboot after the timeout is triggered.
    
    Addressed an issue where Advanced Memory Protection (AMP) status displays
    Degraded A3DC on iLO web page but there is no memory failure displayed in iLO.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.62_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00657. This
    issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerability documented as CVE-2021-33060. This security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00686. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    Addressed an issue where Microsoft Secured-core is not grayed-out when TPM is
    not present.
    
    Addressed an issue where the QR code in Rom Based Set Up menu linked to a
    discontinued site.
    
    Addressed an issue where a hot plug event occurring before event handler
    operates would cause ESXi kernel to call exception waiting for hot plug status
    from device and then triggered an ASSERT with PSOD (Purple Screen Of Death).
    
    Addressed an issue with displaying FW versions for Intel's latest ATS-M GPU
    cards.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_08-11-2022" date="1661169600">-     *Important Notes:**
    
    For customers who had already upgraded to v1.62 7/14/2022 ROM, it is highly
    recommended to upgrade to this version v1.64 if customers have Intel Optane
    Persistent Memory 200 Series installed in their system.
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue from previous published ROM release v1.62 7/14/2022 in
    which systems with Intel Optane Persistent Memory 200 Series may not appear
    under an OS.
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00657. This
    issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerability documented as CVE-2021-33060. This security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00686. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    Addressed an issue where Microsoft Secured-core is not grayed-out when TPM is
    not present.
    
    Addressed an issue where the QR code in Rom Based Set Up menu linked to a
    discontinued site.
    
    Addressed an issue where a hot plug event occurring before event handler
    operates would cause ESXi kernel to call exception waiting for hot plug status
    from device and then triggered an ASSERT with PSOD (Purple Screen Of Death).
    
    Addressed an issue with displaying FW versions for Intel's latest ATS-M GPU
    cards.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_10-27-2022" date="1667822400">-     Added support to show manufacturing date for DIMMs in SMBIOS.
    
    This revision of the System ROM includes an updated revision of Intel VROC
    UEFI driver.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_10-27-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel PLR3
    OOB guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel PLR3
    OOB update which provides Intel's mitigation for BIOS advisory and security
    vulnerability documented as CVE-2022-33972. This security vulnerability is
    documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    Addressed an issue where the Boot timer record was increasing incorrectly
    after every warm reboot.
    
    Addressed a possible hang issue when using a newer PCIe device with a very
    high PCI bus requirement.
    
    Addressed an issue where "Reboot Required" radio button isn't highlighted
    after BIOS restore.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_02-02-2023" date="1671364800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21216, CVE-2022-32231,
    CVE-2022-26343, CVE-2022-33196, CVE-2022-38090 and CVE-2022-33972. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where the controller name was not displayed in Japanese
    when MegaRAID was switched to Japanese, .
    
    Addressed an issue where NVMe drive info was not displayed properly in iLO
    when Intel PCH VMD is enabled in RBSU.
    
    Addressed an issue where Intel VROC SATA firmware shows N/A under PCI Device
    information.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="f8402972639986fea5d910f2ff072d1530580f096f08dc4740f9b107708da29c" name="firmware-system-u47" arch="x86_64">
    <version epoch="0" ver="1.72_2023_02_02" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.58_01-13-2022" date="1644408000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where if the administrator password and power-on password
    are set, after clearing power-on password, administrator password is also
    cleared.
    
    Addressed an issue
    (https://support.hpe.com/hpesc/public/docDisplay?docId=a00119362en_us) where
    the systems with HPE NS204i-p NVMe OS Boot Device may shut down intermittently
    and may log the following System Overheating message in the Integrated
    Management Log (IML): "System Overheating (Temperature Sensor 47, Location I/O
    Board, Temperature61) ACTION:Check fans, processor heat sink and air baffles
    installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.58_01-13-2022-2.1" date="1653220800">-     Changed the behavior of Restore Manufacturing Defaults from restoring the
    settings for UEFI, NICs and RAID cards to UEFI only.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.58_01-13-2022-2.1" date="1653307200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where if the administrator password and power-on password
    are set, after clearing power-on password, administrator password is also
    cleared.
    
    Addressed an issue
    (https://support.hpe.com/hpesc/public/docDisplay?docId=a00119362en_us) where
    the systems with HPE NS204i-p NVMe OS Boot Device may shut down intermittently
    and may log the following System Overheating message in the Integrated
    Management Log (IML): "System Overheating (Temperature Sensor 47, Location I/O
    Board, Temperature61) ACTION:Check fans, processor heat sink and air baffles
    installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_05-12-2022" date="1654430400">-     Added Protected Processor Inventory Number (PPIN) setting in ROM Based Setup
    Utility (RBSU) under Process Option Menu.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_05-12-2022" date="1654516800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166, CVE-2022-21136, and CVE-2022-21151. These security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00616, and
    INTEL-SA-00617. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2022-0004. These security vulnerabilities
    are documented in Intel Security Advisory INTEL-SA-00613. These issues are not
    unique to HPE servers
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where in the ROM Based Setup Utility (RBSU), PMem QoS
    Options cannot be set as disabled under Performance Options work profile with
    system ROM v1.58.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where incorrect Drive Location is reported for HPE MegaRAID
    Gen10 Plus Storage Controllers under Secure Erase Report
    
    Addressed an issue where PCI network boot option shows only one port for Intel
    E810-2CQDA2 Ethernet 100Gb 2-port QSFP28 Adapter for HPE (P41611-B21) when
    bifurcation is enabled. More details can be found in the Customer Advisory
    (CA) link below
    
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00118261en_us
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the RBSU language setting is non-English.
    
    Addressed an issue where the IPMI Watchdog Timer (WDT) would continuously be
    re-enabled on reboots even after being disabled which causes the system to
    continuously reboot after the timeout is triggered.
    
    Addressed an issue where Advanced Memory Protection (AMP) status displays
    Degraded A3DC on iLO web page but there is no memory failure displayed in iLO.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.62_07-14-2022" date="1660046400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00657. This
    issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerability documented as CVE-2021-33060. This security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00686. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    Addressed an issue where Microsoft Secured-core is not grayed-out when TPM is
    not present.
    
    Addressed an issue where the QR code in Rom Based Set Up menu linked to a
    discontinued site.
    
    Addressed an issue where a hot plug event occurring before event handler
    operates would cause ESXi kernel to call exception waiting for hot plug status
    from device and then triggered an ASSERT with PSOD (Purple Screen Of Death).
    
    Addressed an issue with displaying FW versions for Intel's latest ATS-M GPU
    cards.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_08-11-2022" date="1661342400">-     *Important Notes:**
    
    For customers who had already upgraded to v1.62 7/14/2022 ROM, it is highly
    recommended to upgrade to this version v1.64 if customers have Intel Optane
    Persistent Memory 200 Series installed in their system.
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue from previous published ROM release v1.62 7/14/2022 in
    which systems with Intel Optane Persistent Memory 200 Series may not appear
    under an OS.
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00657. This
    issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerability documented as CVE-2021-33060. This security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00686. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    Addressed an issue where Microsoft Secured-core is not grayed-out when TPM is
    not present.
    
    Addressed an issue where the QR code in Rom Based Set Up menu linked to a
    discontinued site.
    
    Addressed an issue where a hot plug event occurring before event handler
    operates would cause ESXi kernel to call exception waiting for hot plug status
    from device and then triggered an ASSERT with PSOD (Purple Screen Of Death).
    
    Addressed an issue with displaying FW versions for Intel's latest ATS-M GPU
    cards.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_10-27-2022" date="1667822400">-     Added support to show manufacturing date for DIMMs in SMBIOS.
    
    This revision of the System ROM includes an updated revision of Intel VROC
    UEFI driver.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_10-27-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel PLR3
    OOB guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel PLR3
    OOB update which provides Intel's mitigation for BIOS advisory and security
    vulnerability documented as CVE-2022-33972. This security vulnerability is
    documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    Addressed an issue where the Boot timer record was increasing incorrectly
    after every warm reboot.
    
    Addressed a possible hang issue when using a newer PCIe device with a very
    high PCI bus requirement.
    
    Addressed an issue where Reboot Required radio button isn't highlighted after
    BIOS restore.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_02-02-2023" date="1671364800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21216, CVE-2022-32231,
    CVE-2022-26343, CVE-2022-33196, CVE-2022-38090 and CVE-2022-33972. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where the controller name was not displayed in Japanese
    when MegaRAID was switched to Japanese, .
    
    Addressed an issue where NVMe drive info was not displayed properly in iLO
    when Intel PCH VMD is enabled in RBSU.
    
    Addressed an issue where Intel VROC SATA firmware shows N/A under PCI Device
    information.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="7012911ffb5dc9922e9db7b04bc711fbb899b5ee29c9bb3f86cb82bdc264a8e2" name="firmware-system-u48" arch="x86_64">
    <version epoch="0" ver="2.68_2023_01_12" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.50_07-08-2021" date="1629720000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance. None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Tianocore
    Edk2 Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2019-14584, CVE-2021-28211 and
    CVE-2021-28210. These security vulnerabilities are documented in Tianocore
    Edk2 CVE details site. These issues are not unique to HPE servers.
    
    Addressed an issue with HPE Infiniband NIC missing in system information page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_09-16-2021" date="1632312000">-     Improved boot time by removing unneeded delay.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_09-16-2021" date="1632398400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance. None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where High Precision Event Timer in Windows was not showing
    up in device manager.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_10-21-2021" date="1636372800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance. None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2021.2 which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0157. These security vulnerabilities
    are documented in the CVE report site. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_01-20-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2 which
    provides mitigations for security vulnerabilities CVE-2021-0092,
    CVE-2021-0127, CVE-2021-0156 and CVE-2021-0157. These issues are not unique to
    HPE servers.
    
    Fixed an issue where system boot mode changed to Legacy mode from UEFI mode
    after IP flash complete and system may hang when entering IP after setting to
    UEFI mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_04-14-2022" date="1652184000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166, CVE-2022-21125, CVE-2022-21123, CVE-2022-21127,
    CVE-2022-21151, and CVE-2022-0005. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00617 and INTEL-SA-00614. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0154, CVE-2021-0189, CVE-2021-33123,
    CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778 ), CVE-2022-1292
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2068 ) and CVE-2022-2068
    (https://nvd.nist.gov/vuln/detail/CVE-2022-1292). This security vulnerability
    is documented in the CVE report site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of Libpng library
    which provides mitigations for security vulnerability documented as
    CVE-2019-7317 (https://nvd.nist.gov/vuln/detail/CVE-2019-7317). This issue is
    not unique to HPE servers.
    
    Removed PCIe bifurcation option in the ROM Based Setup Utility (RBSU) because
    it is not supported through ROM on this platform.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-13-2022" date="1667822400">-     Added support to show manufacturing date for DIMMs in SMBIOS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-13-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-26837. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed an issue where firmware BootTimer would cause a black screen hang
    when switching TPM 1.2 to 2.0.
    
    Addressed an issue TPM Visibility option in ROM Based Setup Utility (RBSU)
    would be greyed out after upgrading the system ROM from 2.54 to 2.58.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_01-12-2023" date="1673524800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-33894 and CVE-2022-26837. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for security vulnerabilities
    documented as CVE-2022-37434.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUN. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture defaults.
    
    Addressed an issue where some Chinese and Japaneses translations were missing
    from RBSU.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="6939dc6d91707d9239909d154ce19154264cdb525c240da24f74d3024b0fc414" name="firmware-system-u50" arch="x86_64">
    <version epoch="0" ver="1.72_2023_02_02" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56_11-29-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.58_01-13-2022" date="1644408000">-     Changed the behavior of Restore Manufacturing Defaults from restoring the
    settings for UEFI, NICs and RAID cards to UEFI only.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.58_01-13-2022" date="1644494400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where if the administrator password and power-on password
    are set, after clearing power-on password, administrator password is also
    cleared.
    
    Addressed an issue (https://support.hpe.com/hpesc/public/docDisplay?docId=a001
    19362en_us&amp;docLocale=en_US) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_05-12-2022" date="1654430400">-     Added Protected Processor Inventory Number (PPIN) setting in ROM Based Setup
    Utility (RBSU) under Process Option Menu.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_05-12-2022" date="1654516800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166, CVE-2022-21136, and CVE-2022-21151. These security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00616, and
    INTEL-SA-00617. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2022-0004. These security vulnerabilities
    are documented in Intel Security Advisory INTEL-SA-00613. These issues are not
    unique to HPE servers
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where in the ROM Based Setup Utility (RBSU), PMem QoS
    Options cannot be set as disabled under Performance Options work profile with
    system ROM v1.58.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where incorrect Drive Location is reported for HPE MegaRAID
    Gen10 Plus Storage Controllers under Secure Erase Report
    
    Addressed an issue where PCI network boot option shows only one port for Intel
    E810-2CQDA2 Ethernet 100Gb 2-port QSFP28 Adapter for HPE (P41611-B21) when
    bifurcation is enabled. More details can be found in the Customer Advisory
    (CA) link below
    
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00118261en_us
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the RBSU language setting is non-English.
    
    Addressed an issue where the IPMI Watchdog Timer (WDT) would continuously be
    re-enabled on reboots even after being disabled which causes the system to
    continuously reboot after the timeout is triggered.
    
    Addressed an issue where Advanced Memory Protection (AMP) status displays
    Degraded A3DC on iLO web page but there is no memory failure displayed in iLO.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.62_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00657. This
    issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerability documented as CVE-2021-33060. This security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00686. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    Addressed an issue where Microsoft Secured-core is not grayed-out when TPM is
    not present.
    
    Addressed an issue where the QR code in Rom Based Set Up menu linked to a
    discontinued site.
    
    Addressed an issue where a hot plug event occurring before event handler
    operates would cause ESXi kernel to call exception waiting for hot plug status
    from device and then triggered an ASSERT with PSOD (Purple Screen Of Death).
    
    Addressed an issue with displaying FW versions for Intel's latest ATS-M GPU
    cards.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_08-11-2022" date="1661169600">-     *Important Notes:**
    
    For customers who had already upgraded to v1.62 7/14/2022 ROM, it is highly
    recommended to upgrade to this version v1.64 if customers have Intel Optane
    Persistent Memory 200 Series installed in their system.
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue from previous published ROM release v1.62 7/14/2022 in
    which systems with Intel Optane Persistent Memory 200 Series may not appear
    under an OS.
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00657. This
    issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerability documented as CVE-2021-33060. This security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00686. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    Addressed an issue where Microsoft Secured-core is not grayed-out when TPM is
    not present.
    
    Addressed an issue where the QR code in Rom Based Set Up menu linked to a
    discontinued site.
    
    Addressed an issue where a hot plug event occurring before event handler
    operates would cause ESXi kernel to call exception waiting for hot plug status
    from device and then triggered an ASSERT with PSOD (Purple Screen Of Death).
    
    Addressed an issue with displaying FW versions for Intel's latest ATS-M GPU
    cards.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_10-27-2022" date="1667822400">-     Added support to show manufacturing date for DIMMs in SMBIOS.
    
    This revision of the System ROM includes an updated revision of Intel VROC
    UEFI driver.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_10-27-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel PLR3
    OOB guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel PLR3
    OOB update which provides Intel's mitigation for BIOS advisory and security
    vulnerability documented as CVE-2022-33972. This security vulnerability is
    documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    Addressed an issue where the Boot timer record was increasing incorrectly
    after every warm reboot.
    
    Addressed a possible hang issue when using a newer PCIe device with a very
    high PCI bus requirement.
    
    Addressed an issue where Reboot Required radio button isn't highlighted after
    BIOS restore.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_02-02-2023" date="1671537600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21216, CVE-2022-32231,
    CVE-2022-26343, CVE-2022-33196, CVE-2022-38090 and CVE-2022-33972. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where the controller name was not displayed in Japanese
    when MegaRAID was switched to Japanese, .
    
    Addressed an issue where NVMe drive info was not displayed properly in iLO
    when Intel PCH VMD is enabled in RBSU.
    
    Addressed an issue where Intel VROC SATA firmware shows N/A under PCI Device
    information.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="37717fb9c02464b4154dd9b936517a55d23d644247286929170e306b39e7b5be" name="firmware-system-u56" arch="x86_64">
    <version epoch="0" ver="1.72_2023_02_02" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56_11-29-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.58_01-13-2022" date="1644408000">-     Changed the behavior of Restore Manufacturing Defaults from restoring the
    settings for UEFI, NICs and RAID cards to UEFI only.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.58_01-13-2022" date="1644494400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where if the administrator password and power-on password
    are set, after clearing power-on password, administrator password is also
    cleared.
    
    Addressed an issue (https://support.hpe.com/hpesc/public/docDisplay?docId=a001
    19362en_us&amp;docLocale=en_US) where the systems with HPE NS204i-p NVMe OS Boot
    Device may shut down intermittently and may log the following System
    Overheating message in the Integrated Management Log (IML): "System
    Overheating (Temperature Sensor 47, Location I/O Board, Temperature61)
    ACTION:Check fans, processor heat sink and air baffles installation."
    
    Addressed an issue where the system may not automatically restart due to a
    hang condition during the boot process after a cold boot when the IPMI
    Watchdog Timer feature is enabled in the ROM-Based Setup Utility (RBSU).
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_05-12-2022" date="1654430400">-     Added Protected Processor Inventory Number (PPIN) setting in ROM Based Setup
    Utility (RBSU) under Process Option Menu.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_05-12-2022" date="1654516800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166, CVE-2022-21136, and CVE-2022-21151. These security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00616, and
    INTEL-SA-00617. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2022-0004. These security vulnerabilities
    are documented in Intel Security Advisory INTEL-SA-00613. These issues are not
    unique to HPE servers
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where in the ROM Based Setup Utility (RBSU), PMem QoS
    Options cannot be set as disabled under Performance Options work profile with
    system ROM v1.58.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where incorrect Drive Location is reported for HPE MegaRAID
    Gen10 Plus Storage Controllers under Secure Erase Report
    
    Addressed an issue where PCI network boot option shows only one port for Intel
    E810-2CQDA2 Ethernet 100Gb 2-port QSFP28 Adapter for HPE (P41611-B21) when
    bifurcation is enabled. More details can be found in the Customer Advisory
    (CA) link below
    
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00118261en_us
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the RBSU language setting is non-English.
    
    Addressed an issue where the IPMI Watchdog Timer (WDT) would continuously be
    re-enabled on reboots even after being disabled which causes the system to
    continuously reboot after the timeout is triggered.
    
    Addressed an issue where Advanced Memory Protection (AMP) status displays
    Degraded A3DC on iLO web page but there is no memory failure displayed in iLO.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.62_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00657. This
    issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerability documented as CVE-2021-33060. This security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00686. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    Addressed an issue where Microsoft Secured-core is not grayed-out when TPM is
    not present.
    
    Addressed an issue where the QR code in Rom Based Set Up menu linked to a
    discontinued site.
    
    Addressed an issue where a hot plug event occurring before event handler
    operates would cause ESXi kernel to call exception waiting for hot plug status
    from device and then triggered an ASSERT with PSOD (Purple Screen Of Death).
    
    Addressed an issue with displaying FW versions for Intel's latest ATS-M GPU
    cards.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_08-11-2022" date="1661169600">-     *Important Notes:**
    
    For customers who had already upgraded to v1.62 7/14/2022 ROM, it is highly
    recommended to upgrade to this version v1.64 if customers have Intel Optane
    Persistent Memory 200 Series installed in their system.
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue from previous published ROM release v1.62 7/14/2022 in
    which systems with Intel Optane Persistent Memory 200 Series may not appear
    under an OS.
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00657. This
    issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerability documented as CVE-2021-33060. This security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00686. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    Addressed an issue where Microsoft Secured-core is not grayed-out when TPM is
    not present.
    
    Addressed an issue where the QR code in Rom Based Set Up menu linked to a
    discontinued site.
    
    Addressed an issue where a hot plug event occurring before event handler
    operates would cause ESXi kernel to call exception waiting for hot plug status
    from device and then triggered an ASSERT with PSOD (Purple Screen Of Death).
    
    Addressed an issue with displaying FW versions for Intel's latest ATS-M GPU
    cards.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_10-27-2022" date="1667822400">-     Added support to show manufacturing date for DIMMs in SMBIOS.
    
    This revision of the System ROM includes an updated revision of Intel VROC
    UEFI driver.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_10-27-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel PLR3
    OOB guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel PLR3
    OOB update which provides Intel's mitigation for BIOS advisory and security
    vulnerability documented as CVE-2022-33972. This security vulnerability is
    documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    Addressed an issue where the Boot timer record was increasing incorrectly
    after every warm reboot.
    
    Addressed a possible hang issue when using a newer PCIe device with a very
    high PCI bus requirement.
    
    Addressed an issue where Reboot Required radio button isn't highlighted after
    BIOS restore.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_02-02-2023" date="1672142400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21216, CVE-2022-32231,
    CVE-2022-26343, CVE-2022-33196, CVE-2022-38090 and CVE-2022-33972. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where the controller name was not displayed in Japanese
    when MegaRAID was switched to Japanese, .
    
    Addressed an issue where NVMe drive info was not displayed properly in iLO
    when Intel PCH VMD is enabled in RBSU.
    
    Addressed an issue where Intel VROC SATA firmware shows N/A under PCI Device
    information.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="bc8f510d732efc6fb236618115e251cf1d13ada6a7444132189cc78d4c9209da" name="firmware-system-u60" arch="x86_64">
    <version epoch="0" ver="1.68_2023_01_12" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.52_10-29-2021" date="1646481600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Improved higher performance when with Intel Turbo core enabled mode when
    enabling Enhanced Processor Performance in the BIOS RBSU menu.
    
    **Known Issues:**
    
    UEFI Legacy boot mode (CSM) is not supported in this release. Pentium CPU is
    not supported in this release. The following two options are not supported but
    visible in the RBSU Menu: TPM 1.2 and Dynamic Power Capping Functionality.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.54_01-13-2022" date="1646568000">-     Added support for Microsoft Windows Server 2022. Windows Server 2022 adds a
    new security feature called Secured-core. Secured-core is only supported on
    Intel Xeon Processors. Secured-core servers use a combination of hardware
    features, firmware enablement and Windows Server operating system capabilities
    to provide protection against malware and rootkit security exploits.
    
    Added a new BIOS/Platform Configuration (RBSU) option for Microsoft Secured-
    core Support. Enabling this setting makes the following policy changes and
    configures the corresponding options: Intel Virtualization Technology
    enabled, Intel VT-d enabled, Intel TXT Support enabled, Secure Boot enabled,
    TPM enabled in 2.0 mode. Disabling any of these features while Secured-core is
    enabled can prevent Secured-core from working properly.
    
    Added in support for legacy UEFI boot.
    
    Added support for Intel Pentium CPUs.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.54_01-13-2022" date="1646654400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the power-on password and the administrator passwords
    were both cleared when clearing one or the other. With this fix the two
    passwords will be treated independently as intended.
    
    Removed Dynamic Power Capping Functionality option from the RBSU menu as this
    option is not supported on this platform.
    
    Removed TPM1.2 option from the RBSU menu as this option is not supported on
    this platform.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56_03-24-2022" date="1649937600">-     Changed the default setting of Intel VT-d Virtualization to enabled to align
    with all other Gen10 and Gen10 Plus ProLiant servers. This will not affect the
    current setting of this option when upgrading to the v1.54 04/01/2022 System
    ROM. However, when defaults are restored on a system with the v1.54 or later
    System ROM, Intel VT-d Virtualization will be enabled.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56_03-24-2022" date="1650024000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Intel X710-DA2 Ethernet 10Gb 2-port SFP Adapter
    intermittently encounters PCIe bandwidth downgrade.
    
    Addressed an issue where Windows 2022 has a yellow bang with unknown device
    when Microsoft(R) Secured-core is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.58_04-18-2022" date="1652184000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21151, CVE-2022-0005,
    CVE-2021-33122, CVE-2021-33123, CVE-2021-33124, and CVE-2021-33103. These
    security vulnerabilities are documented in the CVE report site. This issue is
    not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of freetype
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the RBSU language setting is non-English.
    
    Addressed an issue where system would not reboot if reboot test was executed
    after PCIe Bifurcation.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_10-20-2022" date="1667822400">-     Added warning message Intel(R) NVMe is not supported when the Boot Mode is
    configured in Legacy BIOS Mode.
    
    This revision of the System ROM includes an updated revision of VROC UEFI
    driver.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_10-20-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21198 and CVE-2022-26837. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    Addressed an issue where "Reboot Required" radio button isn't highlighted
    after BIOS restore.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_01-12-2023" date="1671796800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-26837, CVE-2022-38090 and
    CVE-2022-30704. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where RBSU PCI device information page does not display the
    Intel VROC SATA firmware firmware version correctly.
    
    Addressed an issue where NVMe drive info cannot display properly in iLO web
    when PCH VMD is enabled.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="a5d94ff9e6ae8ff745aba8b7525ac40d081fd6e9fd25b93546dd61ed14561b29" name="firmware-system-u61" arch="x86_64">
    <version epoch="0" ver="1.68_2023_01_12" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.52_10-29-2021" date="1646481600">-     *Important Notes:**
    
    None.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Improved higher performance when with Intel Turbo core enabled mode when
    enabling Enhanced Processor Performance in the BIOS RBSU menu.
    
    **Known Issues:**
    
    UEFI Legacy boot mode (CSM) is not supported in this release. Pentium CPU is
    not supported in this release. The following two options are not supported but
    visible in the RBSU Menu: TPM 1.2 and Dynamic Power Capping Functionality.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.54_01-13-2022" date="1646568000">-     Added support for Microsoft Windows Server 2022. Windows Server 2022 adds a
    new security feature called Secured-core. Secured-core is only supported on
    Intel Xeon Processors. Secured-core servers use a combination of hardware
    features, firmware enablement and Windows Server operating system capabilities
    to provide protection against malware and rootkit security exploits.
    
    Added a new BIOS/Platform Configuration (RBSU) option for Microsoft Secured-
    core Support. Enabling this setting makes the following policy changes and
    configures the corresponding options: Intel Virtualization Technology
    enabled, Intel VT-d enabled, Intel TXT Support enabled, Secure Boot enabled,
    TPM enabled in 2.0 mode. Disabling any of these features while Secured-core is
    enabled can prevent Secured-core from working properly.
    
    Added in support for legacy UEFI boot.
    
    Added support for Intel Pentium CPUs.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.54_01-13-2022" date="1646654400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the power-on password and the administrator passwords
    were both cleared when clearing one or the other. With this fix the two
    passwords will be treated independently as intended.
    
    Removed Dynamic Power Capping Functionality option from the RBSU menu as this
    option is not supported on this platform.
    
    Removed TPM1.2 option from the RBSU menu as this option is not supported on
    this platform.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56_04-01-2022" date="1649937600">-     Changed the default setting of Intel VT-d Virtualization to enabled to align
    with all other Gen10 and Gen10 Plus ProLiant servers. This will not affect the
    current setting of this option when upgrading to the v1.54 04/01/2022 System
    ROM. However, when defaults are restored on a system with the v1.54 or later
    System ROM, Intel VT-d Virtualization will be enabled.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56_04-01-2022" date="1650024000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where SATA drives were intermittently missing.
    
    Addressed an issue where Windows 2022 has a yellow bang with unknown device
    when Microsoft(R) Secured-core is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.58_04-18-2022" date="1652184000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21151, CVE-2022-0005,
    CVE-2021-33122, CVE-2021-33123, CVE-2021-33124, and CVE-2021-33103. These
    security vulnerabilities are documented in the CVE report site. This issue is
    not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of freetype
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the RBSU language setting is non-English.
    
    Addressed an issue where system would not reboot if reboot test was executed
    after PCIe Bifurcation.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_10-20-2022" date="1667822400">-     Added warning message Intel(R) NVMe is not supported when the Boot Mode is
    configured in Legacy BIOS Mode.
    
    This revision of the System ROM includes an updated revision of VROC UEFI
    driver.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_10-20-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21198 and CVE-2022-26837. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    Addressed an issue where Reboot Required radio button isn't highlighted after
    BIOS restore.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_01-12-2023" date="1671796800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-26837, CVE-2022-38090 and
    CVE-2022-30704. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where RBSU PCI device information page does not display the
    Intel VROC SATA firmware firmware version correctly.
    
    Addressed an issue where NVMe drive info cannot display properly in iLO web
    when PCH VMD is enabled.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="f3774648a3607ee35bc87a8e1499f7379215f988daffc54a678b7d3c79be770b" name="firmware-system-u64" arch="x86_64">
    <version epoch="0" ver="1.68_2023_01_12" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_06-30-2022" date="1663329600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_10-20-2022" date="1667822400">-     Added warning message Intel(R) NVMe is not supported when the Boot Mode is
    configured in Legacy BIOS Mode.
    
    This revision of the System ROM includes an updated revision of VROC UEFI
    driver.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_10-20-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21198 and CVE-2022-26837. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    Addressed an issue where Reboot Required radio button isn't highlighted after
    BIOS restore.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_01-12-2023" date="1671796800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-26837, CVE-2022-38090 and
    CVE-2022-30704. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where RBSU PCI device information page does not display the
    Intel VROC SATA firmware firmware version correctly.
    
    Addressed an issue where NVMe drive info cannot display properly in iLO web
    when PCH VMD is enabled.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="62a2af272f02542978ebc88894f04025396e646c53207051bd4216c666a3271f" name="hp-i40e-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.21.12_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.21.12-1.sles15sp4" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="4cc3902bf21a3ac2bf60c83f298f71f69efac0082ce4304e54ccc0b7bf19fdab" name="hp-i40e-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.21.12_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.21.12-1.sles15sp3" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="d1de1439c7914f9e7678b0113d20bb5e13a8ce0cf616ac18179213ba552cdaf8" name="hp-iavf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.6.1_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="9343c1550631db1fa1366d397fa723b00132637c2cff29547072d4d8d9ba84d9" name="hp-iavf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.6.1_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="f884b43370a093728f9f1b00dbcce38ef3f07db7e3761558e72dceec59a94c5b" name="hp-igb-kmp-default" arch="x86_64">
    <version epoch="0" ver="6.12.3_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="b25ef026ebd9c1f8e0886cc52330372414a0d5473e2c3a7eeb2f4658c7fdd88e" name="hp-igb-kmp-default" arch="x86_64">
    <version epoch="0" ver="6.12.3_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="3b14629951540318a3dbaa58ccd5122516e05d17c293083a654838db6bc07fb6" name="hp-ixgbe-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.17.1_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="047a41e9852e80e7200399eae21e1445406f5c75f1ca8912e528843af1bb33eb" name="hp-ixgbe-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.17.1_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="bfe6dea69b27a8456d69a55d3269c31fa2fa87a876b6584cd4a4dee3c199ab7a" name="hp-ixgbevf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.16.5_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="1e7cdd3e33390d88c7c4e0cb0d17d1ca00cff4608fbe59645b71f4a107158f66" name="hp-ixgbevf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.16.5_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="cf06d7ea389af26f9ff5038a43b5965eabfc003d442630d844c687b4ef96eb72" name="hpe-auxiliary-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.0.3_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 1.0.0-1" date="1642420800">- Limited auxiliary backporting functions to support Intel iavf and ice driver.</changelog>
  </package>
  <package pkgid="e9bc812bd45467858155b711da48cf262df14a2dfd4c0c63e594193c72270c1b" name="hpe-emulex-smartsan-enablement-kit" arch="x86_64">
    <version epoch="0" ver="1.0.0.0" rel="4"/>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-1" date="1446465600">- Initial development</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-2" date="1469016000">- Added support the HPE StoreFabric 84E 4-port Fibre Channel Host Bus Adapter</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-3" date="1478174400">- Added support for HPE StoreFabric SN1200E 1P &amp; 2P, HPE StoreFabric SN1600E 1P &amp; 2P</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-4" date="1480334400">- Added support for HPE Synergy 3530C</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-4" date="1480507200">- Added Obsoletes tag since the rpm has been changed from noarch to x86_64 bit</changelog>
  </package>
  <package pkgid="ebf070249634532d8ba0653d3ce57c5c3f2c3b1f57acf974e3b3a92b5e95c76d" name="hpe-qlogic-smartsan-enablement-kit" arch="x86_64">
    <version epoch="0" ver="3.3" rel="3"/>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 3.3-1" date="1448280000">- Initial development</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 3.3-2" date="1479384000">- Added support for SN1600Q 1P &amp; 2P devices</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 3.3-3" date="1480334400">- Added support for 84Q and 3830C devices</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 3.3-3" date="1480507200">- Added Obsoletes tag since the rpm has been changed from noarch to x86_64 bit</changelog>
  </package>
  <package pkgid="ad346895114b9c6a215aa3584407d47d6fc51882250ffaff98ec30bc352a298e" name="hponcfg" arch="x86_64">
    <version epoch="0" ver="6.0.0" rel="0"/>
    <changelog author="Suhas MG &lt;suhas.mg@hpe.com&gt; 5.1.0-0" date="1502193600">- v5.1.0 is mainly targeted for iLO 5 1.15</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.2.0-0" date="1506340800">- v5.2.0 is mainly targeted for iLO 5 1.20</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.3.0-0" date="1521633600">- v5.3.0 is mainly targeted for iLO 5 1.30</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.4.0-0" date="1532606400">- Changes include to select correct libssl.so file when multiple Openssl installed (32-bit and 64-bit)</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.4.0-0" date="1555416000">- Changes to remove the low level openSSL calls.</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.5.0-0" date="1559217600">-Updated the OpenSSL API calls to support Host's OpenSSL FIPS mode.</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.6.0-0" date="1590494400">- Changes to handle multiple OpenSSL library installed.</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.7.0-0" date="1638532800">- Changes to support RHEL 9.0 OS.</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.8.0-0" date="1658923200">- Changes to add dependency check for RPM installation.</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 6.0.0-0" date="1659441600">- Changes to support iLO 6 or later.</changelog>
  </package>
  <package pkgid="4c62a089959942d558f48ca715239c7d2c554eff83d10fbdc55f988a8533be60" name="ice-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.10.1.2_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="d4827988d8db79747b288f84d534dc77a0d6ad5115b49c278ea422741ffc54b3" name="ice-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.10.1.2_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="60f9451231adf8b522b0fc5cbd754c9df536bc399b294b1a6b15db587c2dd30f" name="kernel-mft-mlnx-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.22.1_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 4.22.1_k4.12.14_120-1.sles12sp5</changelog>
  </package>
  <package pkgid="bf89b97fed06bf71750317d24433b1c4e213c9215e56fc0d6f0e659d38636314" name="kernel-mft-mlnx-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.22.1_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 4.22.1_k5.14.21_150400.22-1.sles15sp4</changelog>
  </package>
  <package pkgid="853e8c92118171766f373ce1e23f8caae24c62fbeb965165b3b12c7469740603" name="kernel-mft-mlnx-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.22.1_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 4.22.1_k5.3.18_57-1.sles15sp3</changelog>
  </package>
  <package pkgid="5dec7bb28fdbaa7ba7e9e799930bf625b9ae3930240f61ebd8e70d745b27628e" name="kmod-be2iscsi" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0" rel="1.rhel7u8"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="139c035e692930d68421b1c19e31a895af5dc5b0d27a3ce35bb2cb23342aea1d" name="kmod-be2iscsi" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0" rel="1.rhel7u9"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="93769c52914c3ffb9856e77506ad597082410aa2831e7f0f2f353167966780ed" name="kmod-be2net" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0" rel="1.rhel7u8"/>
  </package>
  <package pkgid="936a1235853ea75ce165a9a6dea83dd2bd70411217e0680f3cfcdb1732e035cd" name="kmod-be2net" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0" rel="1.rhel7u9"/>
  </package>
  <package pkgid="fc1b27e274eda52c08141618c4846feb0fc54fe8edcc611cc211297e8b59570a" name="kmod-bnxt_en" arch="x86_64">
    <version epoch="0" ver="1.10.2" rel="224.0.157.0.rhel8u6"/>
  </package>
  <package pkgid="8f2b6657f7563bcd969630b38e97f21898e265c8946872168d6744ad53c9cf4d" name="kmod-bnxt_en" arch="x86_64">
    <version epoch="0" ver="1.10.2" rel="224.0.157.0.rhel9u0"/>
  </package>
  <package pkgid="48e07975abaa47c9e4bc3bcdf842df844ebc2ab6617427c68ed91c86e09a7b2c" name="kmod-elx-lpfc" arch="x86_64">
    <version epoch="0" ver="14.0.499.31" rel="1.rhel8u6"/>
    <changelog author="Broadcom Automated Build User&#13;" date="1556539200">- Changed version to 12.2&#13;
- Removed support for SLES 11 SP3&#13;
- Removed support for SLES 11 SP4&#13;
- Removed support for RHEL 6U8&#13;
- Removed support for RHEL 7U2&#13;
- Removed support for RHEL 7U3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1566820800">- Changed version to 12.4&#13;
- Added support for RHEL 7U7&#13;
- Added support for RHEL 8U1&#13;
- Added support for SLES 12 SP5&#13;
- Removed support for RHEL 6U9&#13;
- Removed support for RHEL 6U10&#13;
- Removed support for RHEL 7U4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1583150400">- Changed version to 12.6&#13;
- Added support for RHEL 7U8&#13;
- Added support for RHEL 8U2&#13;
- Added support for SLES 15 SP2&#13;
- Removed support for SLES 12 SP2&#13;
- Removed support for SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1587384000">- Changed version to 12.8&#13;
- Initial build</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1621425600">- Added support for RHEL 8U4&#13;
- Added support for SLES 15 SP3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1630324800">- Changed version to 14.0&#13;
- Initial build</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1634126400">- Added support for RHEL 8U5</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1645012800">- Added support for RHEL 8U6&#13;
- Added support for RHEL 9U0&#13;
- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1661342400">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1661342401">- Added support for RHEL 8U7</changelog>
  </package>
  <package pkgid="4bef56fcccba25bb5e274e09028be8171731a69441f2075cd27e8a8dc8439950" name="kmod-elx-lpfc" arch="x86_64">
    <version epoch="0" ver="14.0.499.31" rel="1.rhel8u7"/>
    <changelog author="Broadcom Automated Build User&#13;" date="1556539200">- Changed version to 12.2&#13;
- Removed support for SLES 11 SP3&#13;
- Removed support for SLES 11 SP4&#13;
- Removed support for RHEL 6U8&#13;
- Removed support for RHEL 7U2&#13;
- Removed support for RHEL 7U3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1566820800">- Changed version to 12.4&#13;
- Added support for RHEL 7U7&#13;
- Added support for RHEL 8U1&#13;
- Added support for SLES 12 SP5&#13;
- Removed support for RHEL 6U9&#13;
- Removed support for RHEL 6U10&#13;
- Removed support for RHEL 7U4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1583150400">- Changed version to 12.6&#13;
- Added support for RHEL 7U8&#13;
- Added support for RHEL 8U2&#13;
- Added support for SLES 15 SP2&#13;
- Removed support for SLES 12 SP2&#13;
- Removed support for SLES 12 SP3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1587384000">- Changed version to 12.8&#13;
- Initial build</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1621425600">- Added support for RHEL 8U4&#13;
- Added support for SLES 15 SP3</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1630324800">- Changed version to 14.0&#13;
- Initial build</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1634126400">- Added support for RHEL 8U5</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1645012800">- Added support for RHEL 8U6&#13;
- Added support for RHEL 9U0&#13;
- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1661342400">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1661342401">- Added support for RHEL 8U7</changelog>
  </package>
  <package pkgid="bfde1aef7aef712c63604cb5f3f63118acb0a9ea26c35a520ccf7d416fd4364b" name="kmod-elx-lpfc" arch="x86_64">
    <version epoch="0" ver="14.0.499.31" rel="1.rhel9u0"/>
    <changelog author="Broadcom Automated Build User" date="1621425600">- Added support for RHEL 8U4
- Added support for SLES 15 SP3</changelog>
    <changelog author="Broadcom Automated Build User" date="1630324800">- Changed version to 14.0
- Initial build</changelog>
    <changelog author="Broadcom Automated Build User" date="1634126400">- Added support for RHEL 8U5</changelog>
    <changelog author="Broadcom Automated Build User" date="1645012800">- Added support for RHEL 8U6
- Added support for RHEL 9U0
- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342400">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342401">- Added support for RHEL 8U7</changelog>
  </package>
  <package pkgid="032d7bc3894e168260e3bc76a5f31b40c036e29249311e99770c4db455aa6f60" name="kmod-elx-lpfc" arch="x86_64">
    <version epoch="0" ver="14.0.499.31" rel="1.rhel9u1"/>
    <changelog author="Broadcom Automated Build User" date="1621425600">- Added support for RHEL 8U4
- Added support for SLES 15 SP3</changelog>
    <changelog author="Broadcom Automated Build User" date="1630324800">- Changed version to 14.0
- Initial build</changelog>
    <changelog author="Broadcom Automated Build User" date="1634126400">- Added support for RHEL 8U5</changelog>
    <changelog author="Broadcom Automated Build User" date="1645012800">- Added support for RHEL 8U6
- Added support for RHEL 9U0
- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342400">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342401">- Added support for RHEL 8U7</changelog>
  </package>
  <package pkgid="bf7784feecd1d8cbbef5fb4b722185ce334619344a266c7a090cadd889deaf64" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.21.12" rel="1.rhel8u5"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.21.12-1.rhel8u5" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="e8964c0ce00595cb9ffd2d6dce697e42412816a103e03ce92cdbd408a4094414" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.21.12" rel="1.rhel8u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.21.12-1.rhel8u6" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="52749678cf193334fed9f7e890c3f3000aa493f1dc79b2cffc7c76a74716fb1d" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.21.12" rel="1.rhel9u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.21.12-1.rhel9u0" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="16b1d9b1e4d833556144430ecfcd926b347f5f9b89e7f00024d8fd389b2c8b6b" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="4.6.1" rel="1.rhel8u5"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="57a5a90fc85b6d609574b11dbd759fef54f542765f03c82515e126e1906548c6" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="4.6.1" rel="1.rhel8u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="8c54f47bacf0fb30b6b1e20457c0091efb1b6b99df7634a738ccd821def46535" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="4.6.1" rel="1.rhel9u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="01b972a4d8d1c235b53a4a6f900f74fb6ffdeb2e45ba8efc310f1ee608850aad" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="5.12.3" rel="1.rhel9u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="7213a614606e78119563d255ee620513c5bbc976c87e7aab4c61a7fa6b89b04a" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="6.12.3" rel="1.rhel8u5"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="5eb1393c1ee882fac0651f238fb1aa8fa476f32a53480d5f274ac1229a282f78" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="6.12.3" rel="1.rhel8u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="45c1fa521900004d82750ab676750fdca6a016ce30fa96bc3dafa45cd6e25a6a" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.17.1" rel="1.rhel8u5"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="0256f3a8e2fa30b8edfc3c45328665f4b6744795cd5255545292c8b562eb6394" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.17.1" rel="1.rhel8u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="2ba42062d57c617ff0a47e1f0a841865f80323ba8cbfe8e642af5c4e46ff7cc5" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.17.1" rel="1.rhel9u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="1647202f5c45dbe426d51ac1dc3b5cbf5947715e4ab13cf1e7d013128b29a8ab" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.16.5" rel="1.rhel8u5"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="60e34e1d393aef572da0f6e97f90827385d9b080a0d3ce11c82a3c577b3845fb" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.16.5" rel="1.rhel8u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="ea13fdbdffb0e89f401d7635c255b0217a59dd033728013ac5b3ba3b0dd707f6" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.16.5" rel="1.rhel9u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="6e57ff98c220c2477187b198201fc79559383ad8ec400f9ac6af91f7ee390fe1" name="kmod-ice" arch="x86_64">
    <version epoch="0" ver="1.10.1.2" rel="1.rhel8u5"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="396a11b1120cfff12cedbb90ad81bef81451267f861b9dd143bfba8a096b94c5" name="kmod-ice" arch="x86_64">
    <version epoch="0" ver="1.10.1.2" rel="1.rhel8u6"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="ef2dd3ebd7fe0978246f8f33522fd50df4091f7bd4fabc288d523c1e4a5529f7" name="kmod-ice" arch="x86_64">
    <version epoch="0" ver="1.10.1.2" rel="1.rhel9u0"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="7099c480475767fc584613a8b94208450b77815c9a971874765c928851240b48" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.22.1" rel="1.rhel7u9"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 4.22.1-1.rhel7u9</changelog>
  </package>
  <package pkgid="5a04ab1f7ebf49ad5cabcfa1f616633df4c6761ea249a198908e9b827842bb8a" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.22.1" rel="1.rhel8u5"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 4.22.1-1.rhel8u5</changelog>
  </package>
  <package pkgid="69e7770c502bd952f9a12457b4bc47da5ebe857377d12a3144f52403c8455dce" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.22.1" rel="1.rhel8u6"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 4.22.1-1.rhel8u6</changelog>
  </package>
  <package pkgid="b7d331bf3af4652e6f38ffa207d48dc8eebbe45171318b9391e48b5d109c2173" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.22.1" rel="1.rhel8u7"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 4.22.1-1.rhel8u7</changelog>
  </package>
  <package pkgid="63bc9be8e8520bc45b383dd00e360ee4704df1eedec91927cb1e0b48376b1556" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.22.1" rel="1.rhel9u0"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 4.22.1-1.rhel9u0</changelog>
  </package>
  <package pkgid="b16f0846a62aeeb3dd2094cc27527b1ddcc52c481fce9ac46d5e4f656dd2d85c" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.22.1" rel="1.rhel9u1"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 4.22.1-1.rhel9u1</changelog>
  </package>
  <package pkgid="9d60336cbc9789ebf827f4b32fb57d0f96181b01fd808b87ae6b61b39c92dead" name="kmod-megaraid_sas" arch="x86_64">
    <version epoch="0" ver="07.722.02.00_rhel7u9" rel="1"/>
  </package>
  <package pkgid="bc3e6dde7a558900fc691d83f56368e49de6eff3590a956c5b0484a35ae11935" name="kmod-megaraid_sas" arch="x86_64">
    <version epoch="0" ver="07.722.02.00_rhel8u5" rel="2"/>
  </package>
  <package pkgid="0ad609528bfc4549685fcaec455e2b397f5d1e19e4e8cb016a70bcc4f7f46a03" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.9" rel="OFED.4.9.4.0.8.1.rhel7u9"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="5c7265462cf83c9eedb10b420dbfc2c52692bd67dc440ddaebfb6150f6c5c0c9" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.8" rel="OFED.5.8.1.1.2.1.202212170754.rhel9u0"/>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="a85db1de03892e14845697157ce66c870a3e2e3205c1703c5ba3f0a23b67bee4" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.8" rel="OFED.5.8.1.1.2.1.rhel7u9"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="318bd526c8e29221b97f47a33294d9b70cbb988644a40bd7d1cc1acbd3cbde4a" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.8" rel="OFED.5.8.1.1.2.1.rhel8u5"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="91e974f428757344b9703dfa6503c0eaef42b246317d4d82921320b816606c0e" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.8" rel="OFED.5.8.1.1.2.1.rhel8u6"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="2fceea9f66e83088c9f25656970cc5080a11710333d986ea7a06a7d5339a5833" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.8" rel="OFED.5.8.1.1.2.1.rhel8u7"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="9bddd12ea7525cfc066c629a3aebf9a24bf74c831ccfb87dfd4b8437768b00f3" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.8" rel="OFED.5.8.1.1.2.1.rhel9u1"/>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="6db54572aeeeba7597f1072ae47fe5cab705f03b5a51a619ce7201a86491cd89" name="kmod-netxtreme2" arch="x86_64">
    <version epoch="0" ver="7.15.14" rel="1.rhel8u6"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="9a7d4047f428ce85593c37475fcf411971bb9eb8146078c35328726fd47874b3" name="kmod-netxtreme2" arch="x86_64">
    <version epoch="0" ver="7.15.14" rel="1.rhel8u7"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="264467e62a3fcd10eca0fc01b45d7f50adbba922e10d758bc250cb679c272784" name="kmod-netxtreme2" arch="x86_64">
    <version epoch="0" ver="7.15.14" rel="1.rhel9u0"/>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="ef2ded6a8560787d43f1750c108a78a100f294a02874ce0d02bb5216d1be9df7" name="kmod-netxtreme2" arch="x86_64">
    <version epoch="0" ver="7.15.14" rel="1.rhel9u1"/>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="21cdfa863ccfa89bc8d92bcb7fd7cb8a0e8be5a75c48d057193a4e775389ddec" name="kmod-qlgc-fastlinq" arch="x86_64">
    <version epoch="0" ver="8.72.1.0" rel="1.rhel8u6"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="ad88187e56f18e9e74445fd95ad29e0a1cdcd64c694646c69ef985972d1fe341" name="kmod-qlgc-fastlinq" arch="x86_64">
    <version epoch="0" ver="8.72.1.0" rel="1.rhel8u7"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="2ebf742c960d1e4ff2d39822b52f001699682408ac65da052156b2cd3de6e16c" name="kmod-qlgc-fastlinq" arch="x86_64">
    <version epoch="0" ver="8.72.1.0" rel="1.rhel9u0"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="4a7ff48ba68525668da2a9c06d79221b124079e17725e941a9bc84efed48d198" name="kmod-qlgc-fastlinq" arch="x86_64">
    <version epoch="0" ver="8.72.1.0" rel="1.rhel9u1"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="90c18aa1004c3922b727e5a24f12d758e2254ce9d335e5887754c95d87cbc2df" name="kmod-qlgc-qla2xxx" arch="x86_64">
    <version epoch="0" ver="10.02.07.01_k1" rel="2.rhel8u6"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.07.01-k1-2" date="1662552000">- 10.02.07.01-k1 BH 09/02/2022
- FCD-2035: qla2xxx: Fix task mgmt cmd failure
Changes: Wait for marker to be complete before issuing TM.
Ensure no more than 8 TM are submitted per target at any given time.
- FCD-847: qla2xxx: Fix exchange over subscription
Changes: Check for exchange availability at FW before submitting command.

- 10.02.07.00-k1 BH 05/27/2022
- Non-alpha build

- 10.02.07.00.a19-k1 BH 05/21/2022
- FCD-XXX : qla2xxx: USCM: Throttling is not honored for NVMe
Changes: Enable NVMe READ/WRITE commands to be throttled

- FCD-XXX: qla2xxx: USCM: Add counters to track directional throttling
Changes: Add sysfs counters to have stats displayed for busy status returns.

- FCD-1801: qla2xxx: USCM: CP reads go to zero while doing directional throttling
Changes: Take into account the directional queue depth while returning a busy status to the stack.

- FCD-1809: qla2xxx: USCM: Restoring USCM Profile to default result in driver

- FCD-1798: qla2xxx: USCM: Profiles are not honored for peer congestion
Chnages: Apply the profile to each target (fcport) when the profile is changed.

Reverting the following changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- 10.02.07.00.a18-k1 BH 05/12/2022
- FCD-1484: qla2xxx: Manufacturer details should be "Marvell Semiconductor, Inc."
Changes: Update Manufacturer details to indicate Marvell Semiconductors

- FCD-XXX: qla2xxx: USCM: Throttle only read and write commands
Changes: Throttle only read and write commands.

- FCD-XXX: qla2xxx: USCM: Do not clear throttle for Clear Cong FPIN.
Changes: Do not clear throttle when Clear Congestion FPIN is received.

- FCD-XXX: qla2xxx: USCM: Change default profile to Monitor
Changes: Set the default throttle profile as Monitor.

- FCD-XXX: qla2xxx: Fix few issues reported by klocwork tool

- 10.02.07.00.a17-k1 BH 05/06/2022
- FCD-1522: qla2xxx: USCM: Throughput drops to zero in Monitor mode
Changes: Restore qdepth based on monitor mode

- FCD-1315: qla2xxx: Fix erroneous mailbox timeout after pci error inject.
Changes: Clear wait for MB interrupt flag to prevent stale MB completion arriving

- FCD-1424: Remove verbose IO debug messages
Changes: Remove the IOCB debug messages for every IO

- FCD-XXX: Support for NVMe parameters in Auxiliary Image Status
Changes: Added new structure member, bit define and image status check.

- 10.02.07.00.a16-k1 BH 04/08/2022
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- FCD-1221: qla2xxx: USCM: Switch does not send FPINs after a EDC re-negotiation
Changes: Send Link Service Request Information wih the EDC response, along with the other descriptors.

- 10.02.07.00.a15-k1 BH 03/25/2022
- FCD-1249: qla2xxx: edif: Fix dropped IKE message.
Changes: Fixes IKE message being dropped due to error in
processing Purex IOCB and Continuation IOCBs.

- FCD-1457: qla2xxx: Zero undefined mailbox IN registers
Changes: Set zero to unuse register's value while requesting a new MB command.

- FCD-1425: qla2xxx: USCM: Seconds since last event showing incorrect value
Changes: Calculate delta time correctly

- FCD-1287: qla2xxx: Fix incorrect display of max frame size.
Changes: Save off the field of interest into separate location and convert into words.

- FCD-XXX: qla2xxx: Fix memory leak when reading tgt_port_database debugfs file
- FCD-XXX: qla2xxx: USCM: Do not reset SCM stats on a link bounce/ISP reset

- 10.02.07.00.a14-k1 BH 03/14/2022
- FCD-XXX: qla2xxx: Fix losing FCP-2 targets on long port disable with IOs
Changes: Fix this by accepting RSCN when the device is not online.

- FCD-XXX: qla2xxx: Fix losing target when it reappears during delete
Changes: Fix the issue by adding state checks before proceeding.

- FCD-XXX: qla2xxx: Fix losing FCP-2 targets during port perturbation tests
Changes: Fix was to ignore delete for FCP-2 devices in certain sequence.

- FCD-119: qla2xxx: Fix crash due to stale srb access around IO timeouts
Changes: Ensure srb is either returned during error IO timeout error escalation.
If that is not possible fail the escalation path.

- FCD-1132: qla2xxx: HPE3PAR: Fix IOCB resource count leak
Changes: Decrement FW IOCB resource count.

- FCD-1132: qla2xxx: Turn off MQ for 8G adapter.
Changes: For 8G adapter, multi queue was enabled accidentally.

- FCD-1385: Wind down adapter after pcie error.
Changes: Detect the PCIE error and returns all IO's to upper layers.

- FCD-1412: qla2xxx: Reset Congestion Warning/Alarm signals count.
Changes: Reset signals at every signal check boundary (1 sec).

- 10.02.07.00.a13-k1 BH 02/17/2022
- FCD-1353: qla2xx: a12/a11 driver compilation gives warning messages
Changes: Fix the fall through warning
- FCD-1342: qla2xxx: SL12SP5 a12 driver compilation issue observed
Changes: fallthrough macro is defined based on gcc version.

- 10.02.07.00.a12-k1 BH 02/09/2022
- FCD-XXX: qla2xxx: Reset USCM stats/state and throttling on RSCN
Changes: Reset USCM stats on getting an RSCN indicating a target port down.

- FCD-XXX: qla2xxx: Increase max limit of ql2xnvme_queues
Changes: Increase max limit of ql2xnvme_queues to (max_qpair-1)

- FCD-478: qla2xxx: Fix missing devices on a LOGO from F-Port
Changes: A call to logo all ports is made upon a F-Port LOGO.

- FCD-XXX: qla2xxx: Move NVMe traffic to the slow queue on target congestion
Changes: Steer the NVMe traffic to the slow Q on encountering target congestion

- FCD-348: qla2xxx: edif: Fix slow session tear down.
Changes: As a work around, driver would trigger a session tear down where
it tell the local authentication application to also tear down.

- FCD-XXX: qla2xxx: edif: Tweak debug log.
Changes: Print AUTH ELS header to assist in debugging session's state of authentication app.

- FCD-207: qla2xxx: Fix stuck session of prli reject
Changes: Remove the stale code that cause the unintentional short cut.

- FCD-1197: qla2xxx: Throttling up is seen when port is down
Changes: Reset the stats/congestion state and the throttling algorithm on a link down event.

- FCD-348: qla2xxx: Reduce false trigger to login
Changes: Reduce the extra trigger to prevent multiple login to the same session.

- FCD-207: qla2xxx: edif : Reduce N2N thrashing at app_start time
Changes: make sure the old session is torn down before triggering a relogin.

- FCD-207: qla2xxx: Fix laggy FC remote port session recovery
Changes: allows the higher priority error recovery to run first before running
the lower priority heart beat check.

- FCD-XXX: qla2xxx: edif: Fix no logout on delete for n2n
Changes: Set a flag to turn on implicit logout early in the session recovery
to make sure it would go out in case of error.

- FCD-348: qla2xxx: edif: fix session thrash 2
Changes: prevents prli from going out before authentication app gives the ok

- FCD-348: qla2xxx: edif: tear down session if keys has been removed
Changes: If all keys for a session has been deleted then trigger a session tear down.

- FCD-348: qla2xxx: edif: fix no login after app start
Changes: Add a re-login trigger to relogin.

- FCD-207: qla2xxx: Fix hang due to session stuck
Changes: Break the requeue cycle and exit. The session deletion code will trigger a session relogin.

- FCD-348: qla2xxx: edif: reduce disruption due to multiple app start
Changes: Driver will skip over session tear down if app start is seen more than once.

- FCD-348: qla2xxx: edif: send logo for unexpected ike msg
Changes: Terminate/cleanup the AUTH ELS exchange.Follow with a pass through LOGO.

- FCD-348: qla2xxx: edif: Fix IO timeout due to over subscription
Changes: Track IOCB resources to prevent over subscription of IOCB resources

- FCD-207: qla2xxx: edif: fix n2n login retry for secure device
Changes: Add a few more login retries to revive the connection.

- FCD-1205: qla2xxx: Fix disk failure to rediscover
Changes: Set the online state before reporting to UL of the availability of the session.

- FCD-207: qla2xxx: Fix n2n inconsistent plogi
Changes: Delete the session to restart the connection, where ELS pass through
PLOGI would be used consistently.

- FCD-1267: qla2xxx: Fix crash during module load unload test
Changes: Driver correctly freeing a pre-allocated structure for purex packet handling

- FCD-XXX: qla2xxx: Fix missed DMA unmap for NVME ls requests.
Changes: Add an unmap call during ELS completion.

- FCD-1266: qla2xxx: Fix loss of NVME namespaces after driver reload test
Changes: Calling the localport registration under a mutex

- FCD-1212: qla2xxx: Host does not retry RDF when retries are exhausted and there is an incoming RDF
Changes: Reset the SCM ELS counters to zero once an RDF is received.

- FCD-XXX: qla2xxx: Restrict CPU-qpair mapping to work for NVMe only
- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
- FCD-XXX: qla2xxx: SCM: Add a bitmap for FPIN events.

- 10.02.07.00.a11-k1 BH 01/17/2022
- FCD-738: Fix T10 DIF performance on high end setup
Changes: Added high performing CRC-1 interface

- FCD-1182: qla2xxx: Fix initrd build error on RHEL 9
Changes: Updated the build script specific to RHEL 9

- FCD-XXX: qla2xxx: Fix incorrect latency counter display
Changes: Fix this by ignoring I/Os with unusually high latencies.

- FCD-207: qla2xxx: Fix n2n discovery issue with secure target
Changes: On app_start, driver will reset the login retry attempt count.

- FCD-1180: qla2xxx: Use correct feature type field during rffid processing
Changes: Driver sends RFF_ID for initiator type 28 i.e. NVMe insteads of SCSI two times

- FCD-1159: qla2xxx: Host doesn't retry the RDF/EDC when jammed with idle/CRC
Changes: Wake up the DPC thread from the timer context when EDC/RDF needs to be

- FCD-XXXX: qla2xxx: Build module with "-mindirect-branch=thunk-extern" option on RHEL 9

- 10.02.07.00.a10-k1 BH 01/06/2022
- FCD-XXX: qla2xxx: Support for changes in kernel 5.6 and above(rhel9.0)
Changes: Changes made specific to rhel9.0

- FCD-1136: qla2xxx: Throttling occurs even when USCM is disabled via CLI
Changes: Update flags that control USCM features, correctly on ISP reset

- FCD-1160: USCM continues to be active even if RDF response is jammed (and failed)
Changes: USCM flags are updated properly when port toggle and RDF completion happen

- 10.02.07.00.a9-k1 BH 01/03/2022
- FCD-1154: qla2xxx: Fix incorrect reporting of task management failure
Changes: Corrected endianness.

- 10.02.07.00.a8-k1 BH 12/23/2021
- FCD-814 : qla2xxx: Add a new v2 dport diagnostic feature.
Changes: Buffer size is increased to 1024 bytes and handle START/RESTART
command received from SDMAPI.

- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
Changes: Ramp up to faster initially, to get closer to the sweet spot quicker.
Be less prone to operating at lower bandwidth in case of a sudden workload spike.
Operate more conservatively (prioritize self over the network).

- FCD-XXX: qla2xxx: Do not track SCM stats for all ports in the zone
Changes: Track SCM stats just for the host and the target

- FCD-XXX: qla2xxx: Stats for FPIN with event type "Lost Credit" not incremented.
Changes: Add incrementing of "Lost Credit" stats.

- FCD-684: qla2xxx: Fix link down when connected to AG fabric with FAA enabled
Changes: Remove setting PUN and VL support bits in init control block.

- FCD-1004: qla2xxx: Debug message improvement when changing SCM profile.
Changes: Use profile names when changing profiles

- FCD-868: qla2xxx: lockdown: "Unsupported Firmware" message
Changes: checked different BITs for checking lockdown feature.

- FCD-682: qla2xxx: tcm_qla2xxx driver load fails with "Invalid argument" error
Changes: As tcm_qla2xxx is untested/unused, make it a dummy driver
and reduce unncessary noise created by this.

- FCD-886: qla2xxx: Hard Lockup on Unload/Load task with serial log enabled
Changes: Hard lockup is seen because serial console driver crashed because of
excessive logging. It was finalized to document this as known issues.

- FCD-XXX: qla2xxx: Apply USCM profile change immediately

- 10.02.07.00.a7-k1 BH 11/05/2021
- FCD-926: qla2xxx: lockdown: lower debug severity messages
- FCD-824: qla2xxx: lower debug severity message for fw lockdown
Changes: This patch lower the severity of various log messages.

- FCD-XXX: qla2xxx: Send LS_ACC for an incoming RDF
Changes: Send the LS_ACC and the new RDF separately

- FCD-721: qla2xxx: Set Max queue depth based on data direction.
Changes: Max q depth for Initiator tracks Reads (per port) and Fcport tracks Writes (per fcport).

- FCD-701: qla2xxx: Fix device reconnect in loop topology
Changes: Fix by taking the main login path that acquires device handle.

- FCD-XXX: qla2xxx: Add ql2xnvme_queues module parameter to configure number of NVME queues


- 10.02.07.00.a6-k1 BH 10/08/2021
- FCD-786: Shown wrong FDMI data for 64G adaptor
Changes: qla2xxx: Corrected transmission speed mask values for FC

- FCD-717: add retry for exe fw
Changes: qla2xxx: Driver will retry Exec FW command up to 4 retries

- FCD-XXX: qla2xxx: Compile out map queue changes if present in nvme-fc

- 10.02.07.00.a5-k1 BH 10/01/2021
- FCD-740: Fix scheduling while atomic
Changes: qla2xxx: schedule the call to fc_remote_port_delete in non-interrupt context

- FCD-691: Fix premature hw access after pci error
Changes: qla2xxx: Check error condition still persist and/or wait until the OS to give the resume signal

- FCD-756: Fix excessive messages during device logout
Changes: qla2xxx: disable printing IO error messages by default

- FCD-XXX: qla2xxx: abort fw dump if soft reset fail
- FCD-XXX: qla2xxx: USCM: Retry USCM ELS for Logical busy error code
- FCD-XXX: qla2xxx: USCM: USCM profile reset to Driver defaults
- FCD-XXX: qla2xxx: Fix warning message due to adisc is being flush at /var/log/messages

- 10.02.07.00.a4-k1 BH 09/20/2021
- FCD-721: Revert code that keeps track of queue-depth directionally.
Reason: Observing issue while q-depth accounting

- FCD-XXX: Cleanup stale code.
Changes: qla2xxx: Remove unused experimental code that uses
explicit PRLO as a way to tear down session.

- FCD-XXX: edif: remove old doorbell interface
Changes: qla2xxx:driver has implemented a new doorbell mechanism via bsg.

- FCD-348: edif: add retry for els pass through
Changes: qla2xxx: edif: Add additional retries to reduce higher level recovery.

- FCD-XXX: edif: Synchronize NPIV deletion with authentication application
Changes: qla2xxx: Notify authentication application of a NPIV deletion event is about to occur.

- FCD-XXX: edif: Fix potential stuck session in sa update
Changes: qla2xxx: Set flag properly for any attempt to relogin.

- FCD-704: The external flag for tcm_qla2xxx was not set.
qla2xxx: Add tcm_qla2xxx to externally supported module list.

- 10.02.07.00.a3-k1 BH 09/08/2021
- FCD-XXX: qla2xxx: edif: wait for app to ack on sess down
Changes: On session deletion, wait for app to acknowledge before moving on.

- FCD-XXX: qla2xxx: edif: fix edif bsg
Changes: Properly fill out the reply_payload_rcv_len field.

- FCD-XXX: qla2xxx: edif: fix inconsistent check of db_flags
Changes: Replace value check with bit flag check.

- FCD-XXX: qla2xxx: edif: increase ELS payload
Changes: Adjust memory buffer size to be able to handle max ELS payload.

- FCD-343: qla2xxx: turn off target reset during issue_lip
Changes: driver sends additional target reset to remote device before resetting the link.

- FCD-XXX: qla2xxx: edif: Reduce Initiator-Initiator thrashing.
Changes: Reduce unnecessary stress for authentication application to deal with unused connections.

- FCD-XXX: qla2xxx: fix gnl list corruption
Changes: move lock deletion behind lock.

- FCD-XXX: qla2xxx: edif: flush stale events and msgs on session down
Changes: Prevents authentication application from having to process stale data.

- FCD-XXX: qla2xxx: edif: reduces thrashing of the connection.
- FCD-XXX: qla2xxx: edif: tweak trace message
- FCD-XXX: qla2xxx: edif: fix app start delay
- FCD-XXX: qla2xxx: USCM: Handle SCM ELS from switch
- FCD-XXX: qla2xxx: edif: fix app start fail

- 10.02.07.00.a2-k1 BH 09/02/2021
- FCD-156: qla2xxx: 3PAR: Fix out of bound mem access
Changes: Add additional check to make sure the range of memory

- FCD-624: qla2xxx: Source driver gives compilation error on RHEL8.5
Changes: Offending code on tcm_qla2xxx module has been removed

- FCD-xxx: qla2xxx: Fix use after free
Changes: Would check for command is aborted / completed by FW before exiting the call.

- ER148553: qla2xxx: relogin during fabric disturbance
Changes : Set the scan_need flag to indicate a session

- FCD-464: qla2xxx: Fix race between timeout handler and completion handler
Changes: One reference is taken for the normal code path and one for the timeout path

- FCD-453: Fix FC-NVME register localport failure.
Changes: Module initialization is added to nvme_fc_port_template

- FCD-XXX: qla2xxx: Process responses in Tx path if any available for better performance
Changes: Call process_response_queue() in Tx path

- FCD-492: Kernel crashes when accessing port_speed sysfs file
Changes: CNA: Fix this by changing the lookup.

- FCD-XXX: qla2xxx: Refactor asynchronous command initialization
- FCD-XXX: qla2xxx: USCM - Add profile support for throttling IO
- FCD-XXX: qla2xxx: Move heart beat handling from dpc thread to workqueue
- FCD-XXX: USCM: Enhancement to throttle only read traffic during host congestion
and write traffic during target congestion.

- 10.02.07.00.a1-k1 BH 08/22/2021

- FCD-124: qla2xxx: edif: Use link event to wake up app
Changes: The link up event would notify app of the present of a new SCSI Host.

- FCD-299: qla2xxx: Fix crash in NVME abort path
Changes: Fixed the issue by removing stale access.

- FCD-XXX: qla2xxx: Display 16G only as supported speeds for 3830c card.
Changes: This card doesn't support lower speeds, hence,
update the fdmi and sysfs fields to display 16G only.

- FCD-226: qla2xxx: Update details for building kdump initrd in NVMe BFS.
Changes: Currently inbox driver doesn't support kdump/kexec kernel,
hence user need to update kdump initrd to have OOB driver part of it.

- FCD-372: qla2xxx: Anomaly in the congestion stats
Changes: Clear the signal counter on a qaucli clear

- FCD-279: Request QCC to check/report adapter's MCTP state
Changes: qla2xxx: Add support for mailbox passthru

- FCD-XXX: Perf improvement: Pick qpair such that Tx and Rx are processed on same CPU.
Changes: qla2xxx: Select qpair depending on which CPU post_cmd() gets called

- FCD-XXX: scsi: qla2xxx: Reserve extra IRQ vectors

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="5bf38aa7f88ff6f217068615378e8dd574d705b8f810a5c8a9c74f93d7f34ec6" name="kmod-qlgc-qla2xxx" arch="x86_64">
    <version epoch="0" ver="10.02.07.01_k1" rel="2.rhel9u0"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.07.01-k1-2" date="1665403200">- 10.02.07.01-k1 BH 09/02/2022
- FCD-2035: qla2xxx: Fix task mgmt cmd failure
Changes: Wait for marker to be complete before issuing TM.
Ensure no more than 8 TM are submitted per target at any given time.
- FCD-847: qla2xxx: Fix exchange over subscription
Changes: Check for exchange availability at FW before submitting command.

- 10.02.07.00-k1 BH 05/27/2022
- Non-alpha build

- 10.02.07.00.a19-k1 BH 05/21/2022
- FCD-XXX : qla2xxx: USCM: Throttling is not honored for NVMe
Changes: Enable NVMe READ/WRITE commands to be throttled

- FCD-XXX: qla2xxx: USCM: Add counters to track directional throttling
Changes: Add sysfs counters to have stats displayed for busy status returns.

- FCD-1801: qla2xxx: USCM: CP reads go to zero while doing directional throttling
Changes: Take into account the directional queue depth while returning a busy status to the stack.

- FCD-1809: qla2xxx: USCM: Restoring USCM Profile to default result in driver

- FCD-1798: qla2xxx: USCM: Profiles are not honored for peer congestion
Chnages: Apply the profile to each target (fcport) when the profile is changed.

Reverting the following changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- 10.02.07.00.a18-k1 BH 05/12/2022
- FCD-1484: qla2xxx: Manufacturer details should be "Marvell Semiconductor, Inc."
Changes: Update Manufacturer details to indicate Marvell Semiconductors

- FCD-XXX: qla2xxx: USCM: Throttle only read and write commands
Changes: Throttle only read and write commands.

- FCD-XXX: qla2xxx: USCM: Do not clear throttle for Clear Cong FPIN.
Changes: Do not clear throttle when Clear Congestion FPIN is received.

- FCD-XXX: qla2xxx: USCM: Change default profile to Monitor
Changes: Set the default throttle profile as Monitor.

- FCD-XXX: qla2xxx: Fix few issues reported by klocwork tool

- 10.02.07.00.a17-k1 BH 05/06/2022
- FCD-1522: qla2xxx: USCM: Throughput drops to zero in Monitor mode
Changes: Restore qdepth based on monitor mode

- FCD-1315: qla2xxx: Fix erroneous mailbox timeout after pci error inject.
Changes: Clear wait for MB interrupt flag to prevent stale MB completion arriving

- FCD-1424: Remove verbose IO debug messages
Changes: Remove the IOCB debug messages for every IO

- FCD-XXX: Support for NVMe parameters in Auxiliary Image Status
Changes: Added new structure member, bit define and image status check.

- 10.02.07.00.a16-k1 BH 04/08/2022
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- FCD-1221: qla2xxx: USCM: Switch does not send FPINs after a EDC re-negotiation
Changes: Send Link Service Request Information wih the EDC response, along with the other descriptors.

- 10.02.07.00.a15-k1 BH 03/25/2022
- FCD-1249: qla2xxx: edif: Fix dropped IKE message.
Changes: Fixes IKE message being dropped due to error in
processing Purex IOCB and Continuation IOCBs.

- FCD-1457: qla2xxx: Zero undefined mailbox IN registers
Changes: Set zero to unuse register's value while requesting a new MB command.

- FCD-1425: qla2xxx: USCM: Seconds since last event showing incorrect value
Changes: Calculate delta time correctly

- FCD-1287: qla2xxx: Fix incorrect display of max frame size.
Changes: Save off the field of interest into separate location and convert into words.

- FCD-XXX: qla2xxx: Fix memory leak when reading tgt_port_database debugfs file
- FCD-XXX: qla2xxx: USCM: Do not reset SCM stats on a link bounce/ISP reset

- 10.02.07.00.a14-k1 BH 03/14/2022
- FCD-XXX: qla2xxx: Fix losing FCP-2 targets on long port disable with IOs
Changes: Fix this by accepting RSCN when the device is not online.

- FCD-XXX: qla2xxx: Fix losing target when it reappears during delete
Changes: Fix the issue by adding state checks before proceeding.

- FCD-XXX: qla2xxx: Fix losing FCP-2 targets during port perturbation tests
Changes: Fix was to ignore delete for FCP-2 devices in certain sequence.

- FCD-119: qla2xxx: Fix crash due to stale srb access around IO timeouts
Changes: Ensure srb is either returned during error IO timeout error escalation.
If that is not possible fail the escalation path.

- FCD-1132: qla2xxx: HPE3PAR: Fix IOCB resource count leak
Changes: Decrement FW IOCB resource count.

- FCD-1132: qla2xxx: Turn off MQ for 8G adapter.
Changes: For 8G adapter, multi queue was enabled accidentally.

- FCD-1385: Wind down adapter after pcie error.
Changes: Detect the PCIE error and returns all IO's to upper layers.

- FCD-1412: qla2xxx: Reset Congestion Warning/Alarm signals count.
Changes: Reset signals at every signal check boundary (1 sec).

- 10.02.07.00.a13-k1 BH 02/17/2022
- FCD-1353: qla2xx: a12/a11 driver compilation gives warning messages
Changes: Fix the fall through warning
- FCD-1342: qla2xxx: SL12SP5 a12 driver compilation issue observed
Changes: fallthrough macro is defined based on gcc version.

- 10.02.07.00.a12-k1 BH 02/09/2022
- FCD-XXX: qla2xxx: Reset USCM stats/state and throttling on RSCN
Changes: Reset USCM stats on getting an RSCN indicating a target port down.

- FCD-XXX: qla2xxx: Increase max limit of ql2xnvme_queues
Changes: Increase max limit of ql2xnvme_queues to (max_qpair-1)

- FCD-478: qla2xxx: Fix missing devices on a LOGO from F-Port
Changes: A call to logo all ports is made upon a F-Port LOGO.

- FCD-XXX: qla2xxx: Move NVMe traffic to the slow queue on target congestion
Changes: Steer the NVMe traffic to the slow Q on encountering target congestion

- FCD-348: qla2xxx: edif: Fix slow session tear down.
Changes: As a work around, driver would trigger a session tear down where
it tell the local authentication application to also tear down.

- FCD-XXX: qla2xxx: edif: Tweak debug log.
Changes: Print AUTH ELS header to assist in debugging session's state of authentication app.

- FCD-207: qla2xxx: Fix stuck session of prli reject
Changes: Remove the stale code that cause the unintentional short cut.

- FCD-1197: qla2xxx: Throttling up is seen when port is down
Changes: Reset the stats/congestion state and the throttling algorithm on a link down event.

- FCD-348: qla2xxx: Reduce false trigger to login
Changes: Reduce the extra trigger to prevent multiple login to the same session.

- FCD-207: qla2xxx: edif : Reduce N2N thrashing at app_start time
Changes: make sure the old session is torn down before triggering a relogin.

- FCD-207: qla2xxx: Fix laggy FC remote port session recovery
Changes: allows the higher priority error recovery to run first before running
the lower priority heart beat check.

- FCD-XXX: qla2xxx: edif: Fix no logout on delete for n2n
Changes: Set a flag to turn on implicit logout early in the session recovery
to make sure it would go out in case of error.

- FCD-348: qla2xxx: edif: fix session thrash 2
Changes: prevents prli from going out before authentication app gives the ok

- FCD-348: qla2xxx: edif: tear down session if keys has been removed
Changes: If all keys for a session has been deleted then trigger a session tear down.

- FCD-348: qla2xxx: edif: fix no login after app start
Changes: Add a re-login trigger to relogin.

- FCD-207: qla2xxx: Fix hang due to session stuck
Changes: Break the requeue cycle and exit. The session deletion code will trigger a session relogin.

- FCD-348: qla2xxx: edif: reduce disruption due to multiple app start
Changes: Driver will skip over session tear down if app start is seen more than once.

- FCD-348: qla2xxx: edif: send logo for unexpected ike msg
Changes: Terminate/cleanup the AUTH ELS exchange.Follow with a pass through LOGO.

- FCD-348: qla2xxx: edif: Fix IO timeout due to over subscription
Changes: Track IOCB resources to prevent over subscription of IOCB resources

- FCD-207: qla2xxx: edif: fix n2n login retry for secure device
Changes: Add a few more login retries to revive the connection.

- FCD-1205: qla2xxx: Fix disk failure to rediscover
Changes: Set the online state before reporting to UL of the availability of the session.

- FCD-207: qla2xxx: Fix n2n inconsistent plogi
Changes: Delete the session to restart the connection, where ELS pass through
PLOGI would be used consistently.

- FCD-1267: qla2xxx: Fix crash during module load unload test
Changes: Driver correctly freeing a pre-allocated structure for purex packet handling

- FCD-XXX: qla2xxx: Fix missed DMA unmap for NVME ls requests.
Changes: Add an unmap call during ELS completion.

- FCD-1266: qla2xxx: Fix loss of NVME namespaces after driver reload test
Changes: Calling the localport registration under a mutex

- FCD-1212: qla2xxx: Host does not retry RDF when retries are exhausted and there is an incoming RDF
Changes: Reset the SCM ELS counters to zero once an RDF is received.

- FCD-XXX: qla2xxx: Restrict CPU-qpair mapping to work for NVMe only
- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
- FCD-XXX: qla2xxx: SCM: Add a bitmap for FPIN events.

- 10.02.07.00.a11-k1 BH 01/17/2022
- FCD-738: Fix T10 DIF performance on high end setup
Changes: Added high performing CRC-1 interface

- FCD-1182: qla2xxx: Fix initrd build error on RHEL 9
Changes: Updated the build script specific to RHEL 9

- FCD-XXX: qla2xxx: Fix incorrect latency counter display
Changes: Fix this by ignoring I/Os with unusually high latencies.

- FCD-207: qla2xxx: Fix n2n discovery issue with secure target
Changes: On app_start, driver will reset the login retry attempt count.

- FCD-1180: qla2xxx: Use correct feature type field during rffid processing
Changes: Driver sends RFF_ID for initiator type 28 i.e. NVMe insteads of SCSI two times

- FCD-1159: qla2xxx: Host doesn't retry the RDF/EDC when jammed with idle/CRC
Changes: Wake up the DPC thread from the timer context when EDC/RDF needs to be

- FCD-XXXX: qla2xxx: Build module with "-mindirect-branch=thunk-extern" option on RHEL 9

- 10.02.07.00.a10-k1 BH 01/06/2022
- FCD-XXX: qla2xxx: Support for changes in kernel 5.6 and above(rhel9.0)
Changes: Changes made specific to rhel9.0

- FCD-1136: qla2xxx: Throttling occurs even when USCM is disabled via CLI
Changes: Update flags that control USCM features, correctly on ISP reset

- FCD-1160: USCM continues to be active even if RDF response is jammed (and failed)
Changes: USCM flags are updated properly when port toggle and RDF completion happen

- 10.02.07.00.a9-k1 BH 01/03/2022
- FCD-1154: qla2xxx: Fix incorrect reporting of task management failure
Changes: Corrected endianness.

- 10.02.07.00.a8-k1 BH 12/23/2021
- FCD-814 : qla2xxx: Add a new v2 dport diagnostic feature.
Changes: Buffer size is increased to 1024 bytes and handle START/RESTART
command received from SDMAPI.

- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
Changes: Ramp up to faster initially, to get closer to the sweet spot quicker.
Be less prone to operating at lower bandwidth in case of a sudden workload spike.
Operate more conservatively (prioritize self over the network).

- FCD-XXX: qla2xxx: Do not track SCM stats for all ports in the zone
Changes: Track SCM stats just for the host and the target

- FCD-XXX: qla2xxx: Stats for FPIN with event type "Lost Credit" not incremented.
Changes: Add incrementing of "Lost Credit" stats.

- FCD-684: qla2xxx: Fix link down when connected to AG fabric with FAA enabled
Changes: Remove setting PUN and VL support bits in init control block.

- FCD-1004: qla2xxx: Debug message improvement when changing SCM profile.
Changes: Use profile names when changing profiles

- FCD-868: qla2xxx: lockdown: "Unsupported Firmware" message
Changes: checked different BITs for checking lockdown feature.

- FCD-682: qla2xxx: tcm_qla2xxx driver load fails with "Invalid argument" error
Changes: As tcm_qla2xxx is untested/unused, make it a dummy driver
and reduce unncessary noise created by this.

- FCD-886: qla2xxx: Hard Lockup on Unload/Load task with serial log enabled
Changes: Hard lockup is seen because serial console driver crashed because of
excessive logging. It was finalized to document this as known issues.

- FCD-XXX: qla2xxx: Apply USCM profile change immediately

- 10.02.07.00.a7-k1 BH 11/05/2021
- FCD-926: qla2xxx: lockdown: lower debug severity messages
- FCD-824: qla2xxx: lower debug severity message for fw lockdown
Changes: This patch lower the severity of various log messages.

- FCD-XXX: qla2xxx: Send LS_ACC for an incoming RDF
Changes: Send the LS_ACC and the new RDF separately

- FCD-721: qla2xxx: Set Max queue depth based on data direction.
Changes: Max q depth for Initiator tracks Reads (per port) and Fcport tracks Writes (per fcport).

- FCD-701: qla2xxx: Fix device reconnect in loop topology
Changes: Fix by taking the main login path that acquires device handle.

- FCD-XXX: qla2xxx: Add ql2xnvme_queues module parameter to configure number of NVME queues


- 10.02.07.00.a6-k1 BH 10/08/2021
- FCD-786: Shown wrong FDMI data for 64G adaptor
Changes: qla2xxx: Corrected transmission speed mask values for FC

- FCD-717: add retry for exe fw
Changes: qla2xxx: Driver will retry Exec FW command up to 4 retries

- FCD-XXX: qla2xxx: Compile out map queue changes if present in nvme-fc

- 10.02.07.00.a5-k1 BH 10/01/2021
- FCD-740: Fix scheduling while atomic
Changes: qla2xxx: schedule the call to fc_remote_port_delete in non-interrupt context

- FCD-691: Fix premature hw access after pci error
Changes: qla2xxx: Check error condition still persist and/or wait until the OS to give the resume signal

- FCD-756: Fix excessive messages during device logout
Changes: qla2xxx: disable printing IO error messages by default

- FCD-XXX: qla2xxx: abort fw dump if soft reset fail
- FCD-XXX: qla2xxx: USCM: Retry USCM ELS for Logical busy error code
- FCD-XXX: qla2xxx: USCM: USCM profile reset to Driver defaults
- FCD-XXX: qla2xxx: Fix warning message due to adisc is being flush at /var/log/messages

- 10.02.07.00.a4-k1 BH 09/20/2021
- FCD-721: Revert code that keeps track of queue-depth directionally.
Reason: Observing issue while q-depth accounting

- FCD-XXX: Cleanup stale code.
Changes: qla2xxx: Remove unused experimental code that uses
explicit PRLO as a way to tear down session.

- FCD-XXX: edif: remove old doorbell interface
Changes: qla2xxx:driver has implemented a new doorbell mechanism via bsg.

- FCD-348: edif: add retry for els pass through
Changes: qla2xxx: edif: Add additional retries to reduce higher level recovery.

- FCD-XXX: edif: Synchronize NPIV deletion with authentication application
Changes: qla2xxx: Notify authentication application of a NPIV deletion event is about to occur.

- FCD-XXX: edif: Fix potential stuck session in sa update
Changes: qla2xxx: Set flag properly for any attempt to relogin.

- FCD-704: The external flag for tcm_qla2xxx was not set.
qla2xxx: Add tcm_qla2xxx to externally supported module list.

- 10.02.07.00.a3-k1 BH 09/08/2021
- FCD-XXX: qla2xxx: edif: wait for app to ack on sess down
Changes: On session deletion, wait for app to acknowledge before moving on.

- FCD-XXX: qla2xxx: edif: fix edif bsg
Changes: Properly fill out the reply_payload_rcv_len field.

- FCD-XXX: qla2xxx: edif: fix inconsistent check of db_flags
Changes: Replace value check with bit flag check.

- FCD-XXX: qla2xxx: edif: increase ELS payload
Changes: Adjust memory buffer size to be able to handle max ELS payload.

- FCD-343: qla2xxx: turn off target reset during issue_lip
Changes: driver sends additional target reset to remote device before resetting the link.

- FCD-XXX: qla2xxx: edif: Reduce Initiator-Initiator thrashing.
Changes: Reduce unnecessary stress for authentication application to deal with unused connections.

- FCD-XXX: qla2xxx: fix gnl list corruption
Changes: move lock deletion behind lock.

- FCD-XXX: qla2xxx: edif: flush stale events and msgs on session down
Changes: Prevents authentication application from having to process stale data.

- FCD-XXX: qla2xxx: edif: reduces thrashing of the connection.
- FCD-XXX: qla2xxx: edif: tweak trace message
- FCD-XXX: qla2xxx: edif: fix app start delay
- FCD-XXX: qla2xxx: USCM: Handle SCM ELS from switch
- FCD-XXX: qla2xxx: edif: fix app start fail

- 10.02.07.00.a2-k1 BH 09/02/2021
- FCD-156: qla2xxx: 3PAR: Fix out of bound mem access
Changes: Add additional check to make sure the range of memory

- FCD-624: qla2xxx: Source driver gives compilation error on RHEL8.5
Changes: Offending code on tcm_qla2xxx module has been removed

- FCD-xxx: qla2xxx: Fix use after free
Changes: Would check for command is aborted / completed by FW before exiting the call.

- ER148553: qla2xxx: relogin during fabric disturbance
Changes : Set the scan_need flag to indicate a session

- FCD-464: qla2xxx: Fix race between timeout handler and completion handler
Changes: One reference is taken for the normal code path and one for the timeout path

- FCD-453: Fix FC-NVME register localport failure.
Changes: Module initialization is added to nvme_fc_port_template

- FCD-XXX: qla2xxx: Process responses in Tx path if any available for better performance
Changes: Call process_response_queue() in Tx path

- FCD-492: Kernel crashes when accessing port_speed sysfs file
Changes: CNA: Fix this by changing the lookup.

- FCD-XXX: qla2xxx: Refactor asynchronous command initialization
- FCD-XXX: qla2xxx: USCM - Add profile support for throttling IO
- FCD-XXX: qla2xxx: Move heart beat handling from dpc thread to workqueue
- FCD-XXX: USCM: Enhancement to throttle only read traffic during host congestion
and write traffic during target congestion.

- 10.02.07.00.a1-k1 BH 08/22/2021

- FCD-124: qla2xxx: edif: Use link event to wake up app
Changes: The link up event would notify app of the present of a new SCSI Host.

- FCD-299: qla2xxx: Fix crash in NVME abort path
Changes: Fixed the issue by removing stale access.

- FCD-XXX: qla2xxx: Display 16G only as supported speeds for 3830c card.
Changes: This card doesn't support lower speeds, hence,
update the fdmi and sysfs fields to display 16G only.

- FCD-226: qla2xxx: Update details for building kdump initrd in NVMe BFS.
Changes: Currently inbox driver doesn't support kdump/kexec kernel,
hence user need to update kdump initrd to have OOB driver part of it.

- FCD-372: qla2xxx: Anomaly in the congestion stats
Changes: Clear the signal counter on a qaucli clear

- FCD-279: Request QCC to check/report adapter's MCTP state
Changes: qla2xxx: Add support for mailbox passthru

- FCD-XXX: Perf improvement: Pick qpair such that Tx and Rx are processed on same CPU.
Changes: qla2xxx: Select qpair depending on which CPU post_cmd() gets called

- FCD-XXX: scsi: qla2xxx: Reserve extra IRQ vectors

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="9086318af54f0c5c534343064fcc6b4b7e37a09167468f9e36b410854083a4d4" name="kmod-qlgc-qla2xxx" arch="x86_64">
    <version epoch="0" ver="10.02.08.01_k1" rel="1.rhel8u7"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.08.01-k1-1" date="1666094400">- 10.02.08.01-k1 BH 09/28/2022
- FCD-2392: Fix initrd image creation failure in OpenEuler, Kylin and UOS
Changes: Add support for creating initrd image on openEuler, Kylin and UOS

- 10.02.08.00-k1 BH 09/16/2022
- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Residual under-run is not an interface error, hence no need to increment that count.

- FCD-2291: qla2xxx: Fix erroneous link down.
Changes: Allow adapter reset to complete before any scan can start.

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Add additional error check at various point

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced.

- 10.02.08.00.a7-k1 BH 08/22/2022
- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path.

- FCD-2164: qla2xxx: USCM: Fix stall session after app start
Changes: Prevent accidental clearing of flag that blocks re-login

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset.

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Heck fcport state before invoking mailbox

- FCDXXX: qla2xxx: USCM: Debug log message improvement

- 10.02.08.00.a6-k1 BH 08/09/2022
- FCDXXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: if VL switchreduces the throughput below 50%, we would not throttle any further.

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix the FPIN parsing to take into account multiple descriptors.

- FCDXXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCDXXX: qla2xxx: USCM:Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..10

- 10.02.08.00.a5-k1 BH 07/29/2022
- FCD-XXX: qla2xxx: klocwork: Possible Null Pointer Dereference
Changes: Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: USCM: Fix mqueuecommand return code during throttle down request.

- FCD-XXX: qla2xxx: Revert klockwork: Fix buffer overrun

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
- FCD-2035: qla2xxx: Fix Task Mgmt Cmd fail due to unavailable resource
Changes: Limit TM commands to 8 per target.

- 10.02.08.00.a4-k1 BH 07/23/2022
- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: check for exchange availability before command submission

- FCD-XXX: qla2xxx: Remove unintended flag clearing
Changes: Remove unintended flag clearing.

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
Changes: Add wait for completion of Marker!

- FCD-XXX: Fix performance dip due to lock contention
Changes: Save the allocated memory for reuse and avoid the lock

- FCDXXX: qla2xxx: USCM: Do not send EDC and RDF for NPIV ports
Changes: Disable sending USCM ELS for vports

- FCDXXX: qla2xxx: USCM: VL: Do not set target speed to 1G for slow lane
Changes: Do not set the target speed while changing lanes.

- FCD-2012: qla2xxx: Throttling up messages seen when profile is changed
Changes: Set the new profile for each fcport (along with the host).

- FCD-XXX: qla2xxx: USCM: VL - Clean up FLOGI_ACC parsing
Changes: structure that could be used to parse the FLOGI_ACC by using offsets

- FCD-1990: qla2xxx: Fix nvram load config error
Changes: Remove re-definition of port flags while enabling virtual lane support

- FCD-XXX: qla2xxx: USCM:VL, I/O does not move back to the normal lane
Changes: Check if I/O throttling is being done, before deciding to move the normal lane.

- FCD-XXX: qla2xxx: Fix stall login
Changes: Reset session state to allow relogin logic to re-drive the connection.

- FCD-847: qla2xxx: Fix exchange over subscription for mgt cmd.
Changes: would check for exchange availability before command submission.

- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: would check for exchange availability before command submission.

- FCD-XXX: qla2xxx: relocate/rename vp map.
- FCD-XXX: qla2xxx: Klocwork: Fix for Unexpected type of a scan function parameter

- 10.02.08.00.a3-k1 BH 07/01/2022
- FCD-1818: qla2xxx: Fix call trace in debug kernel due to missing spinlock init
Changes: Fix the call trace by initializing trace lock.

- FCD-1923: qla2xxx: USCM: VL - After disabling VL via CLI, status shows "Non-operational"
Changes: Return VL status appropropriately

- FCD-1922: qla2xxx: Fix discovery issues in FC-AL topology
Changes: Checks FC loop map when Get ID list returns no device

- FCD-1831: qla2xxx: Fix link failure in NIPV environment.
Changes: Remove NPIV host from directly being able to chip reset.

- FCD-XXX: qla2xxx: Fix DMA-API call trace on NVME LS requests with debug kernel
Changes: Remove DMA mapping from the driver

- FCD-XXX: qla2xxx: Fix KASAN use-after-free warning in qla24xx_sp_unmap
Changes: Remove stale fcport access in qla2x00_rel_sp

- FCD-XXX: qla2xxx: Fix KASAN out-of-bounds warning in qla_update_sp
Changes: Size for memcpy was corrected to use the right length.

- FCD-XXX: qla2xxx: Fix imbalance vha-&gt;vref_count
Chnages: Add an extra ref count for the task management paths.

- FCD-XXX: qla2xxx: Tweak Latency measurement
Changes: Move the time read further ahead to the start of queuecommand and
later to the point where it is just before scsi_done.

- FCD-XXX: qla2xxx: klockwork: Silent superfluous warning.
Changes: Remove superfluous Null check.

- FCD-XXX: qla2xxx: klockwork: Fix buffer overrun
Changes: Replace structure name to allow proper size calculation

- FCD-XXX: qla2xxx: Remove dead code (GNN ID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code (GPNID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code.
Changes: Removing drport field and FCPORT_UPDATE_NEEDED, and EDIF_TICK_NEEDED signals

- FCD-XXX: qla2xxx: Do not select slow queue if USCM is enabled
Changes: Do not select slow queue whilie initializing cpu map

- FCD-XXX: Select HW queue depending on Tx CPU
Changes: Select qpair which is in correlation with Tx CPU

- FCD-XXX: qla2xxx: Add support for displaying I/O throttle information
Changes: Display the driver I/O throttle information along with VL information

- FCD-XXX: qla2xxx: USCM: Throttle only R/W commands for NVME
Changes: Throttle only read/write IOs.

- Bring back following reverted changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.


- 10.02.08.00.a2-k1 BH 06/19/2022
- FCD-XXX: qla2xxx: klockwork - Check valid rport returned by fc_bsg_to_rport
Changes: Check valid rport returned by fc_bsg_to_rport

- FCD-XXX: qla2xxx: klockwork - Check for a valid fcport pointer
Changes: Add a check for a valid fcport pointer at the time of exit

- FCD-XXX: qla2xxx: klockwork - Move fcport NULL check to avoid dereference
Changes: Move the fcport NULL check to avoid the dereference.

- FCD-1883: qla2xxx: USCM: Adapter shows "RDF Complete" when Link is down
Changes: Reset the flag, so that when USCM is negotiated, the CLI shows the correct status

- FCD-1846: qla2xxx: USCM: A log message while clearing stats
Changes: Add a log message while clearing USCM stats

- FCD-XXX: qla2xxx: USCM: VL-Reset FC device virtual lane priority to normal on a port flap
Changes: Reset the virtual lane to normal on a port flap, ISP reset

- FCD-XXX: qla2xxx: USCM: VL-Set target congestion before switching lanes
Changes: Set the target state before the lane switch.

- FCD-1752: qla2xxx: USCM: VL-Sysfs does not show Virtual Lane as enabled
Changes: extended flogi_acc can also be parsed correctly.

- FCD-1652: qla2xxx: Check if port is online before sending ELS
Changes: Check if port is online before sending ELS

- FCD-XXX: scsi: qla2xxx: Synchronize rport dev_loss_tmo setting

- 10.02.08.00.a1-k1 BH 05/27/2022
- FCD-XXX: qla2xxx: USCM: Virtual Lane, Fix PUN handling
Changes: Have a default priority range for each lane and ensure that the range is programmed correctly

- FCD-XXX: qla2xxx: USCM: Support for Virtual Lanes
Changes: Enable Virtual Lane support for Cisco switch

- 10.02.07.00-k1 BH 05/27/2022
- Non-alpha build

- 10.02.07.00.a19-k1 BH 05/21/2022
- FCD-XXX : qla2xxx: USCM: Throttling is not honored for NVMe
Changes: Enable NVMe READ/WRITE commands to be throttled

- FCD-XXX: qla2xxx: USCM: Add counters to track directional throttling
Changes: Add sysfs counters to have stats displayed for busy status returns.

- FCD-1801: qla2xxx: USCM: CP reads go to zero while doing directional throttling
Changes: Take into account the directional queue depth while returning a busy status to the stack.

- FCD-1809: qla2xxx: USCM: Restoring USCM Profile to default result in driver

- FCD-1798: qla2xxx: USCM: Profiles are not honored for peer congestion
Chnages: Apply the profile to each target (fcport) when the profile is changed.

Reverting the following changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- 10.02.07.00.a18-k1 BH 05/12/2022
- FCD-1484: qla2xxx: Manufacturer details should be "Marvell Semiconductor, Inc."
Changes: Update Manufacturer details to indicate Marvell Semiconductors

- FCD-XXX: qla2xxx: USCM: Throttle only read and write commands
Changes: Throttle only read and write commands.

- FCD-XXX: qla2xxx: USCM: Do not clear throttle for Clear Cong FPIN.
Changes: Do not clear throttle when Clear Congestion FPIN is received.

- FCD-XXX: qla2xxx: USCM: Change default profile to Monitor
Changes: Set the default throttle profile as Monitor.

- FCD-XXX: qla2xxx: Fix few issues reported by klocwork tool

- 10.02.07.00.a17-k1 BH 05/06/2022
- FCD-1522: qla2xxx: USCM: Throughput drops to zero in Monitor mode
Changes: Restore qdepth based on monitor mode

- FCD-1315: qla2xxx: Fix erroneous mailbox timeout after pci error inject.
Changes: Clear wait for MB interrupt flag to prevent stale MB completion arriving

- FCD-1424: Remove verbose IO debug messages
Changes: Remove the IOCB debug messages for every IO

- FCD-XXX: Support for NVMe parameters in Auxiliary Image Status
Changes: Added new structure member, bit define and image status check.

- 10.02.07.00.a16-k1 BH 04/08/2022
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- FCD-1221: qla2xxx: USCM: Switch does not send FPINs after a EDC re-negotiation
Changes: Send Link Service Request Information wih the EDC response, along with the other descriptors.

- 10.02.07.00.a15-k1 BH 03/25/2022
- FCD-1249: qla2xxx: edif: Fix dropped IKE message.
Changes: Fixes IKE message being dropped due to error in
processing Purex IOCB and Continuation IOCBs.

- FCD-1457: qla2xxx: Zero undefined mailbox IN registers
Changes: Set zero to unuse register's value while requesting a new MB command.

- FCD-1425: qla2xxx: USCM: Seconds since last event showing incorrect value
Changes: Calculate delta time correctly

- FCD-1287: qla2xxx: Fix incorrect display of max frame size.
Changes: Save off the field of interest into separate location and convert into words.

- FCD-XXX: qla2xxx: Fix memory leak when reading tgt_port_database debugfs file
- FCD-XXX: qla2xxx: USCM: Do not reset SCM stats on a link bounce/ISP reset

- 10.02.07.00.a14-k1 BH 03/14/2022
- FCD-XXX: qla2xxx: Fix losing FCP-2 targets on long port disable with IOs
Changes: Fix this by accepting RSCN when the device is not online.

- FCD-XXX: qla2xxx: Fix losing target when it reappears during delete
Changes: Fix the issue by adding state checks before proceeding.

- FCD-XXX: qla2xxx: Fix losing FCP-2 targets during port perturbation tests
Changes: Fix was to ignore delete for FCP-2 devices in certain sequence.

- FCD-119: qla2xxx: Fix crash due to stale srb access around IO timeouts
Changes: Ensure srb is either returned during error IO timeout error escalation.
If that is not possible fail the escalation path.

- FCD-1132: qla2xxx: HPE3PAR: Fix IOCB resource count leak
Changes: Decrement FW IOCB resource count.

- FCD-1132: qla2xxx: Turn off MQ for 8G adapter.
Changes: For 8G adapter, multi queue was enabled accidentally.

- FCD-1385: Wind down adapter after pcie error.
Changes: Detect the PCIE error and returns all IO's to upper layers.

- FCD-1412: qla2xxx: Reset Congestion Warning/Alarm signals count.
Changes: Reset signals at every signal check boundary (1 sec).

- 10.02.07.00.a13-k1 BH 02/17/2022
- FCD-1353: qla2xx: a12/a11 driver compilation gives warning messages
Changes: Fix the fall through warning
- FCD-1342: qla2xxx: SL12SP5 a12 driver compilation issue observed
Changes: fallthrough macro is defined based on gcc version.

- 10.02.07.00.a12-k1 BH 02/09/2022
- FCD-XXX: qla2xxx: Reset USCM stats/state and throttling on RSCN
Changes: Reset USCM stats on getting an RSCN indicating a target port down.

- FCD-XXX: qla2xxx: Increase max limit of ql2xnvme_queues
Changes: Increase max limit of ql2xnvme_queues to (max_qpair-1)

- FCD-478: qla2xxx: Fix missing devices on a LOGO from F-Port
Changes: A call to logo all ports is made upon a F-Port LOGO.

- FCD-XXX: qla2xxx: Move NVMe traffic to the slow queue on target congestion
Changes: Steer the NVMe traffic to the slow Q on encountering target congestion

- FCD-348: qla2xxx: edif: Fix slow session tear down.
Changes: As a work around, driver would trigger a session tear down where
it tell the local authentication application to also tear down.

- FCD-XXX: qla2xxx: edif: Tweak debug log.
Changes: Print AUTH ELS header to assist in debugging session's state of authentication app.

- FCD-207: qla2xxx: Fix stuck session of prli reject
Changes: Remove the stale code that cause the unintentional short cut.

- FCD-1197: qla2xxx: Throttling up is seen when port is down
Changes: Reset the stats/congestion state and the throttling algorithm on a link down event.

- FCD-348: qla2xxx: Reduce false trigger to login
Changes: Reduce the extra trigger to prevent multiple login to the same session.

- FCD-207: qla2xxx: edif : Reduce N2N thrashing at app_start time
Changes: make sure the old session is torn down before triggering a relogin.

- FCD-207: qla2xxx: Fix laggy FC remote port session recovery
Changes: allows the higher priority error recovery to run first before running
the lower priority heart beat check.

- FCD-XXX: qla2xxx: edif: Fix no logout on delete for n2n
Changes: Set a flag to turn on implicit logout early in the session recovery
to make sure it would go out in case of error.

- FCD-348: qla2xxx: edif: fix session thrash 2
Changes: prevents prli from going out before authentication app gives the ok

- FCD-348: qla2xxx: edif: tear down session if keys has been removed
Changes: If all keys for a session has been deleted then trigger a session tear down.

- FCD-348: qla2xxx: edif: fix no login after app start
Changes: Add a re-login trigger to relogin.

- FCD-207: qla2xxx: Fix hang due to session stuck
Changes: Break the requeue cycle and exit. The session deletion code will trigger a session relogin.

- FCD-348: qla2xxx: edif: reduce disruption due to multiple app start
Changes: Driver will skip over session tear down if app start is seen more than once.

- FCD-348: qla2xxx: edif: send logo for unexpected ike msg
Changes: Terminate/cleanup the AUTH ELS exchange.Follow with a pass through LOGO.

- FCD-348: qla2xxx: edif: Fix IO timeout due to over subscription
Changes: Track IOCB resources to prevent over subscription of IOCB resources

- FCD-207: qla2xxx: edif: fix n2n login retry for secure device
Changes: Add a few more login retries to revive the connection.

- FCD-1205: qla2xxx: Fix disk failure to rediscover
Changes: Set the online state before reporting to UL of the availability of the session.

- FCD-207: qla2xxx: Fix n2n inconsistent plogi
Changes: Delete the session to restart the connection, where ELS pass through
PLOGI would be used consistently.

- FCD-1267: qla2xxx: Fix crash during module load unload test
Changes: Driver correctly freeing a pre-allocated structure for purex packet handling

- FCD-XXX: qla2xxx: Fix missed DMA unmap for NVME ls requests.
Changes: Add an unmap call during ELS completion.

- FCD-1266: qla2xxx: Fix loss of NVME namespaces after driver reload test
Changes: Calling the localport registration under a mutex

- FCD-1212: qla2xxx: Host does not retry RDF when retries are exhausted and there is an incoming RDF
Changes: Reset the SCM ELS counters to zero once an RDF is received.

- FCD-XXX: qla2xxx: Restrict CPU-qpair mapping to work for NVMe only
- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
- FCD-XXX: qla2xxx: SCM: Add a bitmap for FPIN events.

- 10.02.07.00.a11-k1 BH 01/17/2022
- FCD-738: Fix T10 DIF performance on high end setup
Changes: Added high performing CRC-1 interface

- FCD-1182: qla2xxx: Fix initrd build error on RHEL 9
Changes: Updated the build script specific to RHEL 9

- FCD-XXX: qla2xxx: Fix incorrect latency counter display
Changes: Fix this by ignoring I/Os with unusually high latencies.

- FCD-207: qla2xxx: Fix n2n discovery issue with secure target
Changes: On app_start, driver will reset the login retry attempt count.

- FCD-1180: qla2xxx: Use correct feature type field during rffid processing
Changes: Driver sends RFF_ID for initiator type 28 i.e. NVMe insteads of SCSI two times

- FCD-1159: qla2xxx: Host doesn't retry the RDF/EDC when jammed with idle/CRC
Changes: Wake up the DPC thread from the timer context when EDC/RDF needs to be

- FCD-XXXX: qla2xxx: Build module with "-mindirect-branch=thunk-extern" option on RHEL 9

- 10.02.07.00.a10-k1 BH 01/06/2022
- FCD-XXX: qla2xxx: Support for changes in kernel 5.6 and above(rhel9.0)
Changes: Changes made specific to rhel9.0

- FCD-1136: qla2xxx: Throttling occurs even when USCM is disabled via CLI
Changes: Update flags that control USCM features, correctly on ISP reset

- FCD-1160: USCM continues to be active even if RDF response is jammed (and failed)
Changes: USCM flags are updated properly when port toggle and RDF completion happen

- 10.02.07.00.a9-k1 BH 01/03/2022
- FCD-1154: qla2xxx: Fix incorrect reporting of task management failure
Changes: Corrected endianness.

- 10.02.07.00.a8-k1 BH 12/23/2021
- FCD-814 : qla2xxx: Add a new v2 dport diagnostic feature.
Changes: Buffer size is increased to 1024 bytes and handle START/RESTART
command received from SDMAPI.

- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
Changes: Ramp up to faster initially, to get closer to the sweet spot quicker.
Be less prone to operating at lower bandwidth in case of a sudden workload spike.
Operate more conservatively (prioritize self over the network).

- FCD-XXX: qla2xxx: Do not track SCM stats for all ports in the zone
Changes: Track SCM stats just for the host and the target

- FCD-XXX: qla2xxx: Stats for FPIN with event type "Lost Credit" not incremented.
Changes: Add incrementing of "Lost Credit" stats.

- FCD-684: qla2xxx: Fix link down when connected to AG fabric with FAA enabled
Changes: Remove setting PUN and VL support bits in init control block.

- FCD-1004: qla2xxx: Debug message improvement when changing SCM profile.
Changes: Use profile names when changing profiles

- FCD-868: qla2xxx: lockdown: "Unsupported Firmware" message
Changes: checked different BITs for checking lockdown feature.

- FCD-682: qla2xxx: tcm_qla2xxx driver load fails with "Invalid argument" error
Changes: As tcm_qla2xxx is untested/unused, make it a dummy driver
and reduce unncessary noise created by this.

- FCD-886: qla2xxx: Hard Lockup on Unload/Load task with serial log enabled
Changes: Hard lockup is seen because serial console driver crashed because of
excessive logging. It was finalized to document this as known issues.

- FCD-XXX: qla2xxx: Apply USCM profile change immediately

- 10.02.07.00.a7-k1 BH 11/05/2021
- FCD-926: qla2xxx: lockdown: lower debug severity messages
- FCD-824: qla2xxx: lower debug severity message for fw lockdown
Changes: This patch lower the severity of various log messages.

- FCD-XXX: qla2xxx: Send LS_ACC for an incoming RDF
Changes: Send the LS_ACC and the new RDF separately

- FCD-721: qla2xxx: Set Max queue depth based on data direction.
Changes: Max q depth for Initiator tracks Reads (per port) and Fcport tracks Writes (per fcport).

- FCD-701: qla2xxx: Fix device reconnect in loop topology
Changes: Fix by taking the main login path that acquires device handle.

- FCD-XXX: qla2xxx: Add ql2xnvme_queues module parameter to configure number of NVME queues


- 10.02.07.00.a6-k1 BH 10/08/2021
- FCD-786: Shown wrong FDMI data for 64G adaptor
Changes: qla2xxx: Corrected transmission speed mask values for FC

- FCD-717: add retry for exe fw
Changes: qla2xxx: Driver will retry Exec FW command up to 4 retries

- FCD-XXX: qla2xxx: Compile out map queue changes if present in nvme-fc

- 10.02.07.00.a5-k1 BH 10/01/2021
- FCD-740: Fix scheduling while atomic
Changes: qla2xxx: schedule the call to fc_remote_port_delete in non-interrupt context

- FCD-691: Fix premature hw access after pci error
Changes: qla2xxx: Check error condition still persist and/or wait until the OS to give the resume signal

- FCD-756: Fix excessive messages during device logout
Changes: qla2xxx: disable printing IO error messages by default

- FCD-XXX: qla2xxx: abort fw dump if soft reset fail
- FCD-XXX: qla2xxx: USCM: Retry USCM ELS for Logical busy error code
- FCD-XXX: qla2xxx: USCM: USCM profile reset to Driver defaults
- FCD-XXX: qla2xxx: Fix warning message due to adisc is being flush at /var/log/messages

- 10.02.07.00.a4-k1 BH 09/20/2021
- FCD-721: Revert code that keeps track of queue-depth directionally.
Reason: Observing issue while q-depth accounting

- FCD-XXX: Cleanup stale code.
Changes: qla2xxx: Remove unused experimental code that uses
explicit PRLO as a way to tear down session.

- FCD-XXX: edif: remove old doorbell interface
Changes: qla2xxx:driver has implemented a new doorbell mechanism via bsg.

- FCD-348: edif: add retry for els pass through
Changes: qla2xxx: edif: Add additional retries to reduce higher level recovery.

- FCD-XXX: edif: Synchronize NPIV deletion with authentication application
Changes: qla2xxx: Notify authentication application of a NPIV deletion event is about to occur.

- FCD-XXX: edif: Fix potential stuck session in sa update
Changes: qla2xxx: Set flag properly for any attempt to relogin.

- FCD-704: The external flag for tcm_qla2xxx was not set.
qla2xxx: Add tcm_qla2xxx to externally supported module list.

- 10.02.07.00.a3-k1 BH 09/08/2021
- FCD-XXX: qla2xxx: edif: wait for app to ack on sess down
Changes: On session deletion, wait for app to acknowledge before moving on.

- FCD-XXX: qla2xxx: edif: fix edif bsg
Changes: Properly fill out the reply_payload_rcv_len field.

- FCD-XXX: qla2xxx: edif: fix inconsistent check of db_flags
Changes: Replace value check with bit flag check.

- FCD-XXX: qla2xxx: edif: increase ELS payload
Changes: Adjust memory buffer size to be able to handle max ELS payload.

- FCD-343: qla2xxx: turn off target reset during issue_lip
Changes: driver sends additional target reset to remote device before resetting the link.

- FCD-XXX: qla2xxx: edif: Reduce Initiator-Initiator thrashing.
Changes: Reduce unnecessary stress for authentication application to deal with unused connections.

- FCD-XXX: qla2xxx: fix gnl list corruption
Changes: move lock deletion behind lock.

- FCD-XXX: qla2xxx: edif: flush stale events and msgs on session down
Changes: Prevents authentication application from having to process stale data.

- FCD-XXX: qla2xxx: edif: reduces thrashing of the connection.
- FCD-XXX: qla2xxx: edif: tweak trace message
- FCD-XXX: qla2xxx: edif: fix app start delay
- FCD-XXX: qla2xxx: USCM: Handle SCM ELS from switch
- FCD-XXX: qla2xxx: edif: fix app start fail

- 10.02.07.00.a2-k1 BH 09/02/2021
- FCD-156: qla2xxx: 3PAR: Fix out of bound mem access
Changes: Add additional check to make sure the range of memory

- FCD-624: qla2xxx: Source driver gives compilation error on RHEL8.5
Changes: Offending code on tcm_qla2xxx module has been removed

- FCD-xxx: qla2xxx: Fix use after free
Changes: Would check for command is aborted / completed by FW before exiting the call.

- ER148553: qla2xxx: relogin during fabric disturbance
Changes : Set the scan_need flag to indicate a session

- FCD-464: qla2xxx: Fix race between timeout handler and completion handler
Changes: One reference is taken for the normal code path and one for the timeout path

- FCD-453: Fix FC-NVME register localport failure.
Changes: Module initialization is added to nvme_fc_port_template

- FCD-XXX: qla2xxx: Process responses in Tx path if any available for better performance
Changes: Call process_response_queue() in Tx path

- FCD-492: Kernel crashes when accessing port_speed sysfs file
Changes: CNA: Fix this by changing the lookup.

- FCD-XXX: qla2xxx: Refactor asynchronous command initialization
- FCD-XXX: qla2xxx: USCM - Add profile support for throttling IO
- FCD-XXX: qla2xxx: Move heart beat handling from dpc thread to workqueue
- FCD-XXX: USCM: Enhancement to throttle only read traffic during host congestion
and write traffic during target congestion.

- 10.02.07.00.a1-k1 BH 08/22/2021

- FCD-124: qla2xxx: edif: Use link event to wake up app
Changes: The link up event would notify app of the present of a new SCSI Host.

- FCD-299: qla2xxx: Fix crash in NVME abort path
Changes: Fixed the issue by removing stale access.

- FCD-XXX: qla2xxx: Display 16G only as supported speeds for 3830c card.
Changes: This card doesn't support lower speeds, hence,
update the fdmi and sysfs fields to display 16G only.

- FCD-226: qla2xxx: Update details for building kdump initrd in NVMe BFS.
Changes: Currently inbox driver doesn't support kdump/kexec kernel,
hence user need to update kdump initrd to have OOB driver part of it.

- FCD-372: qla2xxx: Anomaly in the congestion stats
Changes: Clear the signal counter on a qaucli clear

- FCD-279: Request QCC to check/report adapter's MCTP state
Changes: qla2xxx: Add support for mailbox passthru

- FCD-XXX: Perf improvement: Pick qpair such that Tx and Rx are processed on same CPU.
Changes: qla2xxx: Select qpair depending on which CPU post_cmd() gets called

- FCD-XXX: scsi: qla2xxx: Reserve extra IRQ vectors

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="337b6345509eb55badbd449f41d2ea77cf3d4503e31fc3d7e8a14cd36b679caf" name="kmod-qlgc-qla2xxx" arch="x86_64">
    <version epoch="0" ver="10.02.08.01_k1" rel="1.rhel9u1"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.08.01-k1-1" date="1666094400">- 10.02.08.01-k1 BH 09/28/2022
- FCD-2392: Fix initrd image creation failure in OpenEuler, Kylin and UOS
Changes: Add support for creating initrd image on openEuler, Kylin and UOS

- 10.02.08.00-k1 BH 09/16/2022
- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Residual under-run is not an interface error, hence no need to increment that count.

- FCD-2291: qla2xxx: Fix erroneous link down.
Changes: Allow adapter reset to complete before any scan can start.

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Add additional error check at various point

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced.

- 10.02.08.00.a7-k1 BH 08/22/2022
- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path.

- FCD-2164: qla2xxx: USCM: Fix stall session after app start
Changes: Prevent accidental clearing of flag that blocks re-login

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset.

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Heck fcport state before invoking mailbox

- FCDXXX: qla2xxx: USCM: Debug log message improvement

- 10.02.08.00.a6-k1 BH 08/09/2022
- FCDXXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: if VL switchreduces the throughput below 50%, we would not throttle any further.

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix the FPIN parsing to take into account multiple descriptors.

- FCDXXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCDXXX: qla2xxx: USCM:Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..10

- 10.02.08.00.a5-k1 BH 07/29/2022
- FCD-XXX: qla2xxx: klocwork: Possible Null Pointer Dereference
Changes: Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: USCM: Fix mqueuecommand return code during throttle down request.

- FCD-XXX: qla2xxx: Revert klockwork: Fix buffer overrun

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
- FCD-2035: qla2xxx: Fix Task Mgmt Cmd fail due to unavailable resource
Changes: Limit TM commands to 8 per target.

- 10.02.08.00.a4-k1 BH 07/23/2022
- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: check for exchange availability before command submission

- FCD-XXX: qla2xxx: Remove unintended flag clearing
Changes: Remove unintended flag clearing.

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
Changes: Add wait for completion of Marker!

- FCD-XXX: Fix performance dip due to lock contention
Changes: Save the allocated memory for reuse and avoid the lock

- FCDXXX: qla2xxx: USCM: Do not send EDC and RDF for NPIV ports
Changes: Disable sending USCM ELS for vports

- FCDXXX: qla2xxx: USCM: VL: Do not set target speed to 1G for slow lane
Changes: Do not set the target speed while changing lanes.

- FCD-2012: qla2xxx: Throttling up messages seen when profile is changed
Changes: Set the new profile for each fcport (along with the host).

- FCD-XXX: qla2xxx: USCM: VL - Clean up FLOGI_ACC parsing
Changes: structure that could be used to parse the FLOGI_ACC by using offsets

- FCD-1990: qla2xxx: Fix nvram load config error
Changes: Remove re-definition of port flags while enabling virtual lane support

- FCD-XXX: qla2xxx: USCM:VL, I/O does not move back to the normal lane
Changes: Check if I/O throttling is being done, before deciding to move the normal lane.

- FCD-XXX: qla2xxx: Fix stall login
Changes: Reset session state to allow relogin logic to re-drive the connection.

- FCD-847: qla2xxx: Fix exchange over subscription for mgt cmd.
Changes: would check for exchange availability before command submission.

- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: would check for exchange availability before command submission.

- FCD-XXX: qla2xxx: relocate/rename vp map.
- FCD-XXX: qla2xxx: Klocwork: Fix for Unexpected type of a scan function parameter

- 10.02.08.00.a3-k1 BH 07/01/2022
- FCD-1818: qla2xxx: Fix call trace in debug kernel due to missing spinlock init
Changes: Fix the call trace by initializing trace lock.

- FCD-1923: qla2xxx: USCM: VL - After disabling VL via CLI, status shows "Non-operational"
Changes: Return VL status appropropriately

- FCD-1922: qla2xxx: Fix discovery issues in FC-AL topology
Changes: Checks FC loop map when Get ID list returns no device

- FCD-1831: qla2xxx: Fix link failure in NIPV environment.
Changes: Remove NPIV host from directly being able to chip reset.

- FCD-XXX: qla2xxx: Fix DMA-API call trace on NVME LS requests with debug kernel
Changes: Remove DMA mapping from the driver

- FCD-XXX: qla2xxx: Fix KASAN use-after-free warning in qla24xx_sp_unmap
Changes: Remove stale fcport access in qla2x00_rel_sp

- FCD-XXX: qla2xxx: Fix KASAN out-of-bounds warning in qla_update_sp
Changes: Size for memcpy was corrected to use the right length.

- FCD-XXX: qla2xxx: Fix imbalance vha-&gt;vref_count
Chnages: Add an extra ref count for the task management paths.

- FCD-XXX: qla2xxx: Tweak Latency measurement
Changes: Move the time read further ahead to the start of queuecommand and
later to the point where it is just before scsi_done.

- FCD-XXX: qla2xxx: klockwork: Silent superfluous warning.
Changes: Remove superfluous Null check.

- FCD-XXX: qla2xxx: klockwork: Fix buffer overrun
Changes: Replace structure name to allow proper size calculation

- FCD-XXX: qla2xxx: Remove dead code (GNN ID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code (GPNID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code.
Changes: Removing drport field and FCPORT_UPDATE_NEEDED, and EDIF_TICK_NEEDED signals

- FCD-XXX: qla2xxx: Do not select slow queue if USCM is enabled
Changes: Do not select slow queue whilie initializing cpu map

- FCD-XXX: Select HW queue depending on Tx CPU
Changes: Select qpair which is in correlation with Tx CPU

- FCD-XXX: qla2xxx: Add support for displaying I/O throttle information
Changes: Display the driver I/O throttle information along with VL information

- FCD-XXX: qla2xxx: USCM: Throttle only R/W commands for NVME
Changes: Throttle only read/write IOs.

- Bring back following reverted changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.


- 10.02.08.00.a2-k1 BH 06/19/2022
- FCD-XXX: qla2xxx: klockwork - Check valid rport returned by fc_bsg_to_rport
Changes: Check valid rport returned by fc_bsg_to_rport

- FCD-XXX: qla2xxx: klockwork - Check for a valid fcport pointer
Changes: Add a check for a valid fcport pointer at the time of exit

- FCD-XXX: qla2xxx: klockwork - Move fcport NULL check to avoid dereference
Changes: Move the fcport NULL check to avoid the dereference.

- FCD-1883: qla2xxx: USCM: Adapter shows "RDF Complete" when Link is down
Changes: Reset the flag, so that when USCM is negotiated, the CLI shows the correct status

- FCD-1846: qla2xxx: USCM: A log message while clearing stats
Changes: Add a log message while clearing USCM stats

- FCD-XXX: qla2xxx: USCM: VL-Reset FC device virtual lane priority to normal on a port flap
Changes: Reset the virtual lane to normal on a port flap, ISP reset

- FCD-XXX: qla2xxx: USCM: VL-Set target congestion before switching lanes
Changes: Set the target state before the lane switch.

- FCD-1752: qla2xxx: USCM: VL-Sysfs does not show Virtual Lane as enabled
Changes: extended flogi_acc can also be parsed correctly.

- FCD-1652: qla2xxx: Check if port is online before sending ELS
Changes: Check if port is online before sending ELS

- FCD-XXX: scsi: qla2xxx: Synchronize rport dev_loss_tmo setting

- 10.02.08.00.a1-k1 BH 05/27/2022
- FCD-XXX: qla2xxx: USCM: Virtual Lane, Fix PUN handling
Changes: Have a default priority range for each lane and ensure that the range is programmed correctly

- FCD-XXX: qla2xxx: USCM: Support for Virtual Lanes
Changes: Enable Virtual Lane support for Cisco switch

- 10.02.07.00-k1 BH 05/27/2022
- Non-alpha build

- 10.02.07.00.a19-k1 BH 05/21/2022
- FCD-XXX : qla2xxx: USCM: Throttling is not honored for NVMe
Changes: Enable NVMe READ/WRITE commands to be throttled

- FCD-XXX: qla2xxx: USCM: Add counters to track directional throttling
Changes: Add sysfs counters to have stats displayed for busy status returns.

- FCD-1801: qla2xxx: USCM: CP reads go to zero while doing directional throttling
Changes: Take into account the directional queue depth while returning a busy status to the stack.

- FCD-1809: qla2xxx: USCM: Restoring USCM Profile to default result in driver

- FCD-1798: qla2xxx: USCM: Profiles are not honored for peer congestion
Chnages: Apply the profile to each target (fcport) when the profile is changed.

Reverting the following changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- 10.02.07.00.a18-k1 BH 05/12/2022
- FCD-1484: qla2xxx: Manufacturer details should be "Marvell Semiconductor, Inc."
Changes: Update Manufacturer details to indicate Marvell Semiconductors

- FCD-XXX: qla2xxx: USCM: Throttle only read and write commands
Changes: Throttle only read and write commands.

- FCD-XXX: qla2xxx: USCM: Do not clear throttle for Clear Cong FPIN.
Changes: Do not clear throttle when Clear Congestion FPIN is received.

- FCD-XXX: qla2xxx: USCM: Change default profile to Monitor
Changes: Set the default throttle profile as Monitor.

- FCD-XXX: qla2xxx: Fix few issues reported by klocwork tool

- 10.02.07.00.a17-k1 BH 05/06/2022
- FCD-1522: qla2xxx: USCM: Throughput drops to zero in Monitor mode
Changes: Restore qdepth based on monitor mode

- FCD-1315: qla2xxx: Fix erroneous mailbox timeout after pci error inject.
Changes: Clear wait for MB interrupt flag to prevent stale MB completion arriving

- FCD-1424: Remove verbose IO debug messages
Changes: Remove the IOCB debug messages for every IO

- FCD-XXX: Support for NVMe parameters in Auxiliary Image Status
Changes: Added new structure member, bit define and image status check.

- 10.02.07.00.a16-k1 BH 04/08/2022
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- FCD-1221: qla2xxx: USCM: Switch does not send FPINs after a EDC re-negotiation
Changes: Send Link Service Request Information wih the EDC response, along with the other descriptors.

- 10.02.07.00.a15-k1 BH 03/25/2022
- FCD-1249: qla2xxx: edif: Fix dropped IKE message.
Changes: Fixes IKE message being dropped due to error in
processing Purex IOCB and Continuation IOCBs.

- FCD-1457: qla2xxx: Zero undefined mailbox IN registers
Changes: Set zero to unuse register's value while requesting a new MB command.

- FCD-1425: qla2xxx: USCM: Seconds since last event showing incorrect value
Changes: Calculate delta time correctly

- FCD-1287: qla2xxx: Fix incorrect display of max frame size.
Changes: Save off the field of interest into separate location and convert into words.

- FCD-XXX: qla2xxx: Fix memory leak when reading tgt_port_database debugfs file
- FCD-XXX: qla2xxx: USCM: Do not reset SCM stats on a link bounce/ISP reset

- 10.02.07.00.a14-k1 BH 03/14/2022
- FCD-XXX: qla2xxx: Fix losing FCP-2 targets on long port disable with IOs
Changes: Fix this by accepting RSCN when the device is not online.

- FCD-XXX: qla2xxx: Fix losing target when it reappears during delete
Changes: Fix the issue by adding state checks before proceeding.

- FCD-XXX: qla2xxx: Fix losing FCP-2 targets during port perturbation tests
Changes: Fix was to ignore delete for FCP-2 devices in certain sequence.

- FCD-119: qla2xxx: Fix crash due to stale srb access around IO timeouts
Changes: Ensure srb is either returned during error IO timeout error escalation.
If that is not possible fail the escalation path.

- FCD-1132: qla2xxx: HPE3PAR: Fix IOCB resource count leak
Changes: Decrement FW IOCB resource count.

- FCD-1132: qla2xxx: Turn off MQ for 8G adapter.
Changes: For 8G adapter, multi queue was enabled accidentally.

- FCD-1385: Wind down adapter after pcie error.
Changes: Detect the PCIE error and returns all IO's to upper layers.

- FCD-1412: qla2xxx: Reset Congestion Warning/Alarm signals count.
Changes: Reset signals at every signal check boundary (1 sec).

- 10.02.07.00.a13-k1 BH 02/17/2022
- FCD-1353: qla2xx: a12/a11 driver compilation gives warning messages
Changes: Fix the fall through warning
- FCD-1342: qla2xxx: SL12SP5 a12 driver compilation issue observed
Changes: fallthrough macro is defined based on gcc version.

- 10.02.07.00.a12-k1 BH 02/09/2022
- FCD-XXX: qla2xxx: Reset USCM stats/state and throttling on RSCN
Changes: Reset USCM stats on getting an RSCN indicating a target port down.

- FCD-XXX: qla2xxx: Increase max limit of ql2xnvme_queues
Changes: Increase max limit of ql2xnvme_queues to (max_qpair-1)

- FCD-478: qla2xxx: Fix missing devices on a LOGO from F-Port
Changes: A call to logo all ports is made upon a F-Port LOGO.

- FCD-XXX: qla2xxx: Move NVMe traffic to the slow queue on target congestion
Changes: Steer the NVMe traffic to the slow Q on encountering target congestion

- FCD-348: qla2xxx: edif: Fix slow session tear down.
Changes: As a work around, driver would trigger a session tear down where
it tell the local authentication application to also tear down.

- FCD-XXX: qla2xxx: edif: Tweak debug log.
Changes: Print AUTH ELS header to assist in debugging session's state of authentication app.

- FCD-207: qla2xxx: Fix stuck session of prli reject
Changes: Remove the stale code that cause the unintentional short cut.

- FCD-1197: qla2xxx: Throttling up is seen when port is down
Changes: Reset the stats/congestion state and the throttling algorithm on a link down event.

- FCD-348: qla2xxx: Reduce false trigger to login
Changes: Reduce the extra trigger to prevent multiple login to the same session.

- FCD-207: qla2xxx: edif : Reduce N2N thrashing at app_start time
Changes: make sure the old session is torn down before triggering a relogin.

- FCD-207: qla2xxx: Fix laggy FC remote port session recovery
Changes: allows the higher priority error recovery to run first before running
the lower priority heart beat check.

- FCD-XXX: qla2xxx: edif: Fix no logout on delete for n2n
Changes: Set a flag to turn on implicit logout early in the session recovery
to make sure it would go out in case of error.

- FCD-348: qla2xxx: edif: fix session thrash 2
Changes: prevents prli from going out before authentication app gives the ok

- FCD-348: qla2xxx: edif: tear down session if keys has been removed
Changes: If all keys for a session has been deleted then trigger a session tear down.

- FCD-348: qla2xxx: edif: fix no login after app start
Changes: Add a re-login trigger to relogin.

- FCD-207: qla2xxx: Fix hang due to session stuck
Changes: Break the requeue cycle and exit. The session deletion code will trigger a session relogin.

- FCD-348: qla2xxx: edif: reduce disruption due to multiple app start
Changes: Driver will skip over session tear down if app start is seen more than once.

- FCD-348: qla2xxx: edif: send logo for unexpected ike msg
Changes: Terminate/cleanup the AUTH ELS exchange.Follow with a pass through LOGO.

- FCD-348: qla2xxx: edif: Fix IO timeout due to over subscription
Changes: Track IOCB resources to prevent over subscription of IOCB resources

- FCD-207: qla2xxx: edif: fix n2n login retry for secure device
Changes: Add a few more login retries to revive the connection.

- FCD-1205: qla2xxx: Fix disk failure to rediscover
Changes: Set the online state before reporting to UL of the availability of the session.

- FCD-207: qla2xxx: Fix n2n inconsistent plogi
Changes: Delete the session to restart the connection, where ELS pass through
PLOGI would be used consistently.

- FCD-1267: qla2xxx: Fix crash during module load unload test
Changes: Driver correctly freeing a pre-allocated structure for purex packet handling

- FCD-XXX: qla2xxx: Fix missed DMA unmap for NVME ls requests.
Changes: Add an unmap call during ELS completion.

- FCD-1266: qla2xxx: Fix loss of NVME namespaces after driver reload test
Changes: Calling the localport registration under a mutex

- FCD-1212: qla2xxx: Host does not retry RDF when retries are exhausted and there is an incoming RDF
Changes: Reset the SCM ELS counters to zero once an RDF is received.

- FCD-XXX: qla2xxx: Restrict CPU-qpair mapping to work for NVMe only
- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
- FCD-XXX: qla2xxx: SCM: Add a bitmap for FPIN events.

- 10.02.07.00.a11-k1 BH 01/17/2022
- FCD-738: Fix T10 DIF performance on high end setup
Changes: Added high performing CRC-1 interface

- FCD-1182: qla2xxx: Fix initrd build error on RHEL 9
Changes: Updated the build script specific to RHEL 9

- FCD-XXX: qla2xxx: Fix incorrect latency counter display
Changes: Fix this by ignoring I/Os with unusually high latencies.

- FCD-207: qla2xxx: Fix n2n discovery issue with secure target
Changes: On app_start, driver will reset the login retry attempt count.

- FCD-1180: qla2xxx: Use correct feature type field during rffid processing
Changes: Driver sends RFF_ID for initiator type 28 i.e. NVMe insteads of SCSI two times

- FCD-1159: qla2xxx: Host doesn't retry the RDF/EDC when jammed with idle/CRC
Changes: Wake up the DPC thread from the timer context when EDC/RDF needs to be

- FCD-XXXX: qla2xxx: Build module with "-mindirect-branch=thunk-extern" option on RHEL 9

- 10.02.07.00.a10-k1 BH 01/06/2022
- FCD-XXX: qla2xxx: Support for changes in kernel 5.6 and above(rhel9.0)
Changes: Changes made specific to rhel9.0

- FCD-1136: qla2xxx: Throttling occurs even when USCM is disabled via CLI
Changes: Update flags that control USCM features, correctly on ISP reset

- FCD-1160: USCM continues to be active even if RDF response is jammed (and failed)
Changes: USCM flags are updated properly when port toggle and RDF completion happen

- 10.02.07.00.a9-k1 BH 01/03/2022
- FCD-1154: qla2xxx: Fix incorrect reporting of task management failure
Changes: Corrected endianness.

- 10.02.07.00.a8-k1 BH 12/23/2021
- FCD-814 : qla2xxx: Add a new v2 dport diagnostic feature.
Changes: Buffer size is increased to 1024 bytes and handle START/RESTART
command received from SDMAPI.

- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
Changes: Ramp up to faster initially, to get closer to the sweet spot quicker.
Be less prone to operating at lower bandwidth in case of a sudden workload spike.
Operate more conservatively (prioritize self over the network).

- FCD-XXX: qla2xxx: Do not track SCM stats for all ports in the zone
Changes: Track SCM stats just for the host and the target

- FCD-XXX: qla2xxx: Stats for FPIN with event type "Lost Credit" not incremented.
Changes: Add incrementing of "Lost Credit" stats.

- FCD-684: qla2xxx: Fix link down when connected to AG fabric with FAA enabled
Changes: Remove setting PUN and VL support bits in init control block.

- FCD-1004: qla2xxx: Debug message improvement when changing SCM profile.
Changes: Use profile names when changing profiles

- FCD-868: qla2xxx: lockdown: "Unsupported Firmware" message
Changes: checked different BITs for checking lockdown feature.

- FCD-682: qla2xxx: tcm_qla2xxx driver load fails with "Invalid argument" error
Changes: As tcm_qla2xxx is untested/unused, make it a dummy driver
and reduce unncessary noise created by this.

- FCD-886: qla2xxx: Hard Lockup on Unload/Load task with serial log enabled
Changes: Hard lockup is seen because serial console driver crashed because of
excessive logging. It was finalized to document this as known issues.

- FCD-XXX: qla2xxx: Apply USCM profile change immediately

- 10.02.07.00.a7-k1 BH 11/05/2021
- FCD-926: qla2xxx: lockdown: lower debug severity messages
- FCD-824: qla2xxx: lower debug severity message for fw lockdown
Changes: This patch lower the severity of various log messages.

- FCD-XXX: qla2xxx: Send LS_ACC for an incoming RDF
Changes: Send the LS_ACC and the new RDF separately

- FCD-721: qla2xxx: Set Max queue depth based on data direction.
Changes: Max q depth for Initiator tracks Reads (per port) and Fcport tracks Writes (per fcport).

- FCD-701: qla2xxx: Fix device reconnect in loop topology
Changes: Fix by taking the main login path that acquires device handle.

- FCD-XXX: qla2xxx: Add ql2xnvme_queues module parameter to configure number of NVME queues


- 10.02.07.00.a6-k1 BH 10/08/2021
- FCD-786: Shown wrong FDMI data for 64G adaptor
Changes: qla2xxx: Corrected transmission speed mask values for FC

- FCD-717: add retry for exe fw
Changes: qla2xxx: Driver will retry Exec FW command up to 4 retries

- FCD-XXX: qla2xxx: Compile out map queue changes if present in nvme-fc

- 10.02.07.00.a5-k1 BH 10/01/2021
- FCD-740: Fix scheduling while atomic
Changes: qla2xxx: schedule the call to fc_remote_port_delete in non-interrupt context

- FCD-691: Fix premature hw access after pci error
Changes: qla2xxx: Check error condition still persist and/or wait until the OS to give the resume signal

- FCD-756: Fix excessive messages during device logout
Changes: qla2xxx: disable printing IO error messages by default

- FCD-XXX: qla2xxx: abort fw dump if soft reset fail
- FCD-XXX: qla2xxx: USCM: Retry USCM ELS for Logical busy error code
- FCD-XXX: qla2xxx: USCM: USCM profile reset to Driver defaults
- FCD-XXX: qla2xxx: Fix warning message due to adisc is being flush at /var/log/messages

- 10.02.07.00.a4-k1 BH 09/20/2021
- FCD-721: Revert code that keeps track of queue-depth directionally.
Reason: Observing issue while q-depth accounting

- FCD-XXX: Cleanup stale code.
Changes: qla2xxx: Remove unused experimental code that uses
explicit PRLO as a way to tear down session.

- FCD-XXX: edif: remove old doorbell interface
Changes: qla2xxx:driver has implemented a new doorbell mechanism via bsg.

- FCD-348: edif: add retry for els pass through
Changes: qla2xxx: edif: Add additional retries to reduce higher level recovery.

- FCD-XXX: edif: Synchronize NPIV deletion with authentication application
Changes: qla2xxx: Notify authentication application of a NPIV deletion event is about to occur.

- FCD-XXX: edif: Fix potential stuck session in sa update
Changes: qla2xxx: Set flag properly for any attempt to relogin.

- FCD-704: The external flag for tcm_qla2xxx was not set.
qla2xxx: Add tcm_qla2xxx to externally supported module list.

- 10.02.07.00.a3-k1 BH 09/08/2021
- FCD-XXX: qla2xxx: edif: wait for app to ack on sess down
Changes: On session deletion, wait for app to acknowledge before moving on.

- FCD-XXX: qla2xxx: edif: fix edif bsg
Changes: Properly fill out the reply_payload_rcv_len field.

- FCD-XXX: qla2xxx: edif: fix inconsistent check of db_flags
Changes: Replace value check with bit flag check.

- FCD-XXX: qla2xxx: edif: increase ELS payload
Changes: Adjust memory buffer size to be able to handle max ELS payload.

- FCD-343: qla2xxx: turn off target reset during issue_lip
Changes: driver sends additional target reset to remote device before resetting the link.

- FCD-XXX: qla2xxx: edif: Reduce Initiator-Initiator thrashing.
Changes: Reduce unnecessary stress for authentication application to deal with unused connections.

- FCD-XXX: qla2xxx: fix gnl list corruption
Changes: move lock deletion behind lock.

- FCD-XXX: qla2xxx: edif: flush stale events and msgs on session down
Changes: Prevents authentication application from having to process stale data.

- FCD-XXX: qla2xxx: edif: reduces thrashing of the connection.
- FCD-XXX: qla2xxx: edif: tweak trace message
- FCD-XXX: qla2xxx: edif: fix app start delay
- FCD-XXX: qla2xxx: USCM: Handle SCM ELS from switch
- FCD-XXX: qla2xxx: edif: fix app start fail

- 10.02.07.00.a2-k1 BH 09/02/2021
- FCD-156: qla2xxx: 3PAR: Fix out of bound mem access
Changes: Add additional check to make sure the range of memory

- FCD-624: qla2xxx: Source driver gives compilation error on RHEL8.5
Changes: Offending code on tcm_qla2xxx module has been removed

- FCD-xxx: qla2xxx: Fix use after free
Changes: Would check for command is aborted / completed by FW before exiting the call.

- ER148553: qla2xxx: relogin during fabric disturbance
Changes : Set the scan_need flag to indicate a session

- FCD-464: qla2xxx: Fix race between timeout handler and completion handler
Changes: One reference is taken for the normal code path and one for the timeout path

- FCD-453: Fix FC-NVME register localport failure.
Changes: Module initialization is added to nvme_fc_port_template

- FCD-XXX: qla2xxx: Process responses in Tx path if any available for better performance
Changes: Call process_response_queue() in Tx path

- FCD-492: Kernel crashes when accessing port_speed sysfs file
Changes: CNA: Fix this by changing the lookup.

- FCD-XXX: qla2xxx: Refactor asynchronous command initialization
- FCD-XXX: qla2xxx: USCM - Add profile support for throttling IO
- FCD-XXX: qla2xxx: Move heart beat handling from dpc thread to workqueue
- FCD-XXX: USCM: Enhancement to throttle only read traffic during host congestion
and write traffic during target congestion.

- 10.02.07.00.a1-k1 BH 08/22/2021

- FCD-124: qla2xxx: edif: Use link event to wake up app
Changes: The link up event would notify app of the present of a new SCSI Host.

- FCD-299: qla2xxx: Fix crash in NVME abort path
Changes: Fixed the issue by removing stale access.

- FCD-XXX: qla2xxx: Display 16G only as supported speeds for 3830c card.
Changes: This card doesn't support lower speeds, hence,
update the fdmi and sysfs fields to display 16G only.

- FCD-226: qla2xxx: Update details for building kdump initrd in NVMe BFS.
Changes: Currently inbox driver doesn't support kdump/kexec kernel,
hence user need to update kdump initrd to have OOB driver part of it.

- FCD-372: qla2xxx: Anomaly in the congestion stats
Changes: Clear the signal counter on a qaucli clear

- FCD-279: Request QCC to check/report adapter's MCTP state
Changes: qla2xxx: Add support for mailbox passthru

- FCD-XXX: Perf improvement: Pick qpair such that Tx and Rx are processed on same CPU.
Changes: qla2xxx: Select qpair depending on which CPU post_cmd() gets called

- FCD-XXX: scsi: qla2xxx: Reserve extra IRQ vectors

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="0ba4759727990984a5f1e17fe0a5604f09f3809f54e6c2e7f1c848eb3e8ea3dc" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="2.1.20" rel="035.rhel7u9"/>
  </package>
  <package pkgid="7dfebc4078ba3b346dda3808911f9a9cfa12b518269de6f14139fc275797aa56" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="2.1.20" rel="035.rhel8u5"/>
  </package>
  <package pkgid="15fb6020fa2588c6001e15f234f20e000135cfdca6676a329375cd3097b3e65a" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="2.1.20" rel="035.rhel8u6"/>
  </package>
  <package pkgid="ace56f086c7263e35f30e44d389b5c9f338fc4ad8002c1a7b80b6fb384cf1d86" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="2.1.20" rel="035.rhel9u0"/>
  </package>
  <package pkgid="60dac64bcd68e3a5e589f3d37460aec3deb3fd1815923d537437142c89d53411" name="kmod-tg3" arch="x86_64">
    <version epoch="0" ver="3.139j" rel="1.5.14.0.70.22.1.rhel9u0"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497441600">- Add workaround for 5762 MRRS  (Severity:Medium)
- Update copyright year to 2017 (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="6527a77a1f772caccb44c40df8b6cbcdaf01b4b109e2e7807d6a215c18f725b5" name="kmod-tg3" arch="x86_64">
    <version epoch="0" ver="3.139j" rel="1.rhel8u6"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497441600">- Add workaround for 5762 MRRS  (Severity:Medium)
- Update copyright year to 2017 (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="a7b1d1726e022f8abd2939d50ff11b333f1f4891594a05c7ed5981468ef14a22" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="224.0.157.0" rel="rhel8u6"/>
  </package>
  <package pkgid="33eed0600d2fa2aced792f596807c57f3f2cb07abce526f2db4b75e1ae043fa5" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="224.0.157.0" rel="rhel9u0"/>
  </package>
  <package pkgid="70a4916959b945d8a312634bebd746b85767e92c91ca72d64a71119cb5c63a2a" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="224.0.157.0" rel="sles12sp5"/>
  </package>
  <package pkgid="65e159c05b28735fdcaa7e2c0515c544197c80281233605ed6593c46d632e38a" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="224.0.157.0" rel="sles15sp3"/>
  </package>
  <package pkgid="4d835c17797f0c75a306b95090452b2ad208a7b6f3dacd2810c1e15cbd01702a" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="224.0.157.0" rel="sles15sp4"/>
  </package>
  <package pkgid="55ae6bce6792ee8059ba0f6890d1c71802b8a518058c9e5e69f93dceecd36700" name="lsi-megaraid_sas-kmp-default" arch="x86_64">
    <version epoch="0" ver="07.722.02.00_sles12sp4" rel="1"/>
  </package>
  <package pkgid="9fa96b33dcae7bc79c0c71ee5f489fa7aecea5ebc913584ab0ef9acf4648b7fe" name="lsi-megaraid_sas-kmp-default" arch="x86_64">
    <version epoch="0" ver="07.722.02.00_sles12sp5" rel="1"/>
  </package>
  <package pkgid="c4c91272ad1e6094e3ef623917d9cf864698d391524d5325ba7b336a76d99e46" name="lsi-megaraid_sas-kmp-default" arch="x86_64">
    <version epoch="0" ver="07.722.02.00_sles15sp3" rel="2"/>
  </package>
  <package pkgid="c445b0d77875d9a490a0fc52f69f5b824032596482ad158b15e1409bf39fdf31" name="mft" arch="x86_64">
    <version epoch="0" ver="4.22.1" rel="11.rhel7u9"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 4.22.1-11.rhel7u9</changelog>
  </package>
  <package pkgid="681f0aea55a981bc6d0455cd3a57332ba7fdd4cd853e5ec7f9c7621dd974fc8c" name="mft" arch="x86_64">
    <version epoch="0" ver="4.22.1" rel="11.rhel8u5"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 4.22.1-11.rhel8u5</changelog>
  </package>
  <package pkgid="1a6effdc14f56ce8825807b5d3201a60c5802bedc8758991017271ab1b79f9d0" name="mft" arch="x86_64">
    <version epoch="0" ver="4.22.1" rel="11.rhel8u6"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 4.22.1-11.rhel8u6</changelog>
  </package>
  <package pkgid="ddd9217cbdedb6df4cbd6c7a779219020e28a515cadfef38f0737f7c5c1dcb3d" name="mft" arch="x86_64">
    <version epoch="0" ver="4.22.1" rel="11.rhel8u7"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 4.22.1-11.rhel8u7</changelog>
  </package>
  <package pkgid="27f15bb13d0ae11f46b1d5dd4934f54c9bc062bf5cf85b361d1c385d9df8d893" name="mft" arch="x86_64">
    <version epoch="0" ver="4.22.1" rel="11.rhel9u0"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 4.22.1-11.rhel9u0</changelog>
  </package>
  <package pkgid="173d768e59292871e15005f8941ed417cd36ef1ac4f4fbd87adfcff1dbd6bdf9" name="mft" arch="x86_64">
    <version epoch="0" ver="4.22.1" rel="11.rhel9u1"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 4.22.1-11.rhel9u1</changelog>
  </package>
  <package pkgid="77ef38cd750568e888fd71dff3f91e223f1d8fe7814e47cf2b203ba99cf9bdf7" name="mft" arch="x86_64">
    <version epoch="0" ver="4.22.1" rel="11.sles12sp5"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 4.22.1-11.sles12sp5</changelog>
  </package>
  <package pkgid="45c827ccfe21a6e8dd1202bacb462c2f93e05df1542c6711e5ebfd81a9a0ce36" name="mft" arch="x86_64">
    <version epoch="0" ver="4.22.1" rel="11.sles15sp3"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 4.22.1-11.sles15sp3</changelog>
  </package>
  <package pkgid="df902b1648e0f819a86cf710b155d89a8dd5f2e65beafe9a28f27758e56a8e7a" name="mft" arch="x86_64">
    <version epoch="0" ver="4.22.1" rel="11.sles15sp4"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 4.22.1-11.sles15sp4</changelog>
  </package>
  <package pkgid="7ff4bfa559c13c2f9d5a18998542af40d30c74a9d88b14cd65633d62420cc825" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.9" rel="OFED.4.9.4.0.8.1.rhel7u9"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1632312000">- Release version 4.9-OFED.4.9.4.0.8.1.rhel7u9</changelog>
  </package>
  <package pkgid="4108fac550cc020157f46b9a9e190b78b690f016e38e976d352e9fae5ff73046" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.9" rel="OFED.4.9.4.0.8.1.sles12sp5"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1632312000">- Release version 4.9-OFED.4.9.4.0.8.1.sles12sp5</changelog>
  </package>
  <package pkgid="259432b7dabdae2a1df66983a11ba770c937361263a1c9d46fe6e84dffa1a94f" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="4.9" rel="OFED.4.9.4.0.8.1.sles15sp3"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1632312000">- Release version 4.9-OFED.4.9.4.0.8.1.sles15sp3</changelog>
  </package>
  <package pkgid="9264c93042b8d21eb47b16ebfaa5fb02fedfa1aac04c345a1796f0d222d9a783" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.8" rel="OFED.5.8.1.1.2.1.rhel7u9"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 5.8-OFED.5.8.1.1.2.1.rhel7u9</changelog>
  </package>
  <package pkgid="d4c2a3b4065da6bd7cd1616da042a99de69e743c3c9c0749d931792ab0159526" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.8" rel="OFED.5.8.1.1.2.1.rhel8u5"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 5.8-OFED.5.8.1.1.2.1.rhel8u5</changelog>
  </package>
  <package pkgid="46aa91c6d6c76f8ee06c787085cc436a5784cf253da7caa19ea48b0372e8949d" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.8" rel="OFED.5.8.1.1.2.1.rhel8u6"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 5.8-OFED.5.8.1.1.2.1.rhel8u6</changelog>
  </package>
  <package pkgid="16e1e66fd376310fa1157ecb0b97ace81eb890a1816d9c9e11fee10d4ed129a9" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.8" rel="OFED.5.8.1.1.2.1.rhel8u7"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 5.8-OFED.5.8.1.1.2.1.rhel8u7</changelog>
  </package>
  <package pkgid="fdf3a1a261cd31dd1dc88410c7a9a6c6ce6a45fc89dfbe74f5cc8203a09964cd" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.8" rel="OFED.5.8.1.1.2.1.rhel9u0"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 5.8-OFED.5.8.1.1.2.1.rhel9u0</changelog>
  </package>
  <package pkgid="8caa516497283e40871e7f760613ea0c8d61ea0dcdc29446137cdb39e075876d" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.8" rel="OFED.5.8.1.1.2.1.rhel9u1"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 5.8-OFED.5.8.1.1.2.1.rhel9u1</changelog>
  </package>
  <package pkgid="336cd054d6465419c86849f9386f53964579ca698fbed382bc82f7b6289f3dc2" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.8" rel="OFED.5.8.1.1.2.1.sles12sp5"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 5.8-OFED.5.8.1.1.2.1.sles12sp5</changelog>
  </package>
  <package pkgid="53f61e7973155ef9c18a60e4487344e194dae10c955085c17176af58b3d7fcbc" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.8" rel="OFED.5.8.1.1.2.1.sles15sp3"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 5.8-OFED.5.8.1.1.2.1.sles15sp3</changelog>
  </package>
  <package pkgid="bb6fc5f3d31e9502ff53af09c22b4d50648ace2b5755fdd876cf76a632d09a0d" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="5.8" rel="OFED.5.8.1.1.2.1.sles15sp4"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1669636800">- Release version 5.8-OFED.5.8.1.1.2.1.sles15sp4</changelog>
  </package>
  <package pkgid="3c4b9484871e8c3a44c434051e8856d97c65cc078c8d1414bddbd544ca1fd2b2" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.9_k4.12.14_120" rel="OFED.4.9.4.0.8.1.sles12sp5"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="872284fa6eb739fa6e67a9042f4da0024650aa1754770f17c6cbcdf68489bde4" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.9_k5.3.18_57" rel="OFED.4.9.4.0.8.1.sles15sp3"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="333c7ca7c66dad8ec4aba72b7515ae1a3d0fcb751cee80bc12a6dc094834e7cb" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.8_k4.12.14_120" rel="OFED.5.8.1.1.2.1.sles12sp5"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="d6f0ac875553d548358de3128c3ea080838a536c071b136444665494cca15d3a" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.8_k5.14.21_150400.22" rel="OFED.5.8.1.1.2.1.sles15sp4"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="92681bcdf0fd1cc6f1719ebcb6acb1a601c92c6293103f5671320e13d71e2c97" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.8_k5.3.18_57" rel="OFED.5.8.1.1.2.1.sles15sp3"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="4f54f54168d3e3c93fa8fde7e11e20b4cc5af7e574246856c1ab8bd403b9deeb" name="netxtreme2-kmp-default" arch="x86_64">
    <version epoch="0" ver="7.15.14_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="7b9edf8d78779f1b831fc00af56e222e053f4d5393ae7cb0055ce2008cd6002d" name="netxtreme2-kmp-default" arch="x86_64">
    <version epoch="0" ver="7.15.14_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="45c4bfa921dec4d1a9e12cba4e6164bc2a8e13935cd99ccb3b2ea54707801053" name="netxtreme2-kmp-default" arch="x86_64">
    <version epoch="0" ver="7.15.14_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="98313b41c8ab82575bd428165ca1e31b5d1f2b128437d1a4377fb5e72da7ebab" name="qlgc-fastlinq-kmp-default" arch="x86_64">
    <version epoch="0" ver="8.72.1.0_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="ade9ec038fee151b7ae2ab715614c57897c5e70252031a39917f9a276849691c" name="qlgc-fastlinq-kmp-default" arch="x86_64">
    <version epoch="0" ver="8.72.1.0_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="3a6dc6867eeced19a6997b3fbe64c4d533f4f5c45f9f6646f3419ccfe8289565" name="qlgc-fastlinq-kmp-default" arch="x86_64">
    <version epoch="0" ver="8.72.1.0_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="7e542e81443759d5617fded889245877e84fb0f551afa24c9699d86800c091af" name="qlgc-qla2xxx-kmp-default" arch="x86_64">
    <version epoch="0" ver="10.02.07.01_k1_k4.12.14_120" rel="2.sles12sp5"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.07.01-k1-2" date="1662552000">- 10.02.07.01-k1 BH 09/02/2022
- FCD-2035: qla2xxx: Fix task mgmt cmd failure
Changes: Wait for marker to be complete before issuing TM.
Ensure no more than 8 TM are submitted per target at any given time.
- FCD-847: qla2xxx: Fix exchange over subscription
Changes: Check for exchange availability at FW before submitting command.

- 10.02.07.00-k1 BH 05/27/2022
- Non-alpha build

- 10.02.07.00.a19-k1 BH 05/21/2022
- FCD-XXX : qla2xxx: USCM: Throttling is not honored for NVMe
Changes: Enable NVMe READ/WRITE commands to be throttled

- FCD-XXX: qla2xxx: USCM: Add counters to track directional throttling
Changes: Add sysfs counters to have stats displayed for busy status returns.

- FCD-1801: qla2xxx: USCM: CP reads go to zero while doing directional throttling
Changes: Take into account the directional queue depth while returning a busy status to the stack.

- FCD-1809: qla2xxx: USCM: Restoring USCM Profile to default result in driver

- FCD-1798: qla2xxx: USCM: Profiles are not honored for peer congestion
Chnages: Apply the profile to each target (fcport) when the profile is changed.

Reverting the following changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- 10.02.07.00.a18-k1 BH 05/12/2022
- FCD-1484: qla2xxx: Manufacturer details should be "Marvell Semiconductor, Inc."
Changes: Update Manufacturer details to indicate Marvell Semiconductors

- FCD-XXX: qla2xxx: USCM: Throttle only read and write commands
Changes: Throttle only read and write commands.

- FCD-XXX: qla2xxx: USCM: Do not clear throttle for Clear Cong FPIN.
Changes: Do not clear throttle when Clear Congestion FPIN is received.

- FCD-XXX: qla2xxx: USCM: Change default profile to Monitor
Changes: Set the default throttle profile as Monitor.

- FCD-XXX: qla2xxx: Fix few issues reported by klocwork tool

- 10.02.07.00.a17-k1 BH 05/06/2022
- FCD-1522: qla2xxx: USCM: Throughput drops to zero in Monitor mode
Changes: Restore qdepth based on monitor mode

- FCD-1315: qla2xxx: Fix erroneous mailbox timeout after pci error inject.
Changes: Clear wait for MB interrupt flag to prevent stale MB completion arriving

- FCD-1424: Remove verbose IO debug messages
Changes: Remove the IOCB debug messages for every IO

- FCD-XXX: Support for NVMe parameters in Auxiliary Image Status
Changes: Added new structure member, bit define and image status check.

- 10.02.07.00.a16-k1 BH 04/08/2022
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- FCD-1221: qla2xxx: USCM: Switch does not send FPINs after a EDC re-negotiation
Changes: Send Link Service Request Information wih the EDC response, along with the other descriptors.

- 10.02.07.00.a15-k1 BH 03/25/2022
- FCD-1249: qla2xxx: edif: Fix dropped IKE message.
Changes: Fixes IKE message being dropped due to error in
processing Purex IOCB and Continuation IOCBs.

- FCD-1457: qla2xxx: Zero undefined mailbox IN registers
Changes: Set zero to unuse register's value while requesting a new MB command.

- FCD-1425: qla2xxx: USCM: Seconds since last event showing incorrect value
Changes: Calculate delta time correctly

- FCD-1287: qla2xxx: Fix incorrect display of max frame size.
Changes: Save off the field of interest into separate location and convert into words.

- FCD-XXX: qla2xxx: Fix memory leak when reading tgt_port_database debugfs file
- FCD-XXX: qla2xxx: USCM: Do not reset SCM stats on a link bounce/ISP reset

- 10.02.07.00.a14-k1 BH 03/14/2022
- FCD-XXX: qla2xxx: Fix losing FCP-2 targets on long port disable with IOs
Changes: Fix this by accepting RSCN when the device is not online.

- FCD-XXX: qla2xxx: Fix losing target when it reappears during delete
Changes: Fix the issue by adding state checks before proceeding.

- FCD-XXX: qla2xxx: Fix losing FCP-2 targets during port perturbation tests
Changes: Fix was to ignore delete for FCP-2 devices in certain sequence.

- FCD-119: qla2xxx: Fix crash due to stale srb access around IO timeouts
Changes: Ensure srb is either returned during error IO timeout error escalation.
If that is not possible fail the escalation path.

- FCD-1132: qla2xxx: HPE3PAR: Fix IOCB resource count leak
Changes: Decrement FW IOCB resource count.

- FCD-1132: qla2xxx: Turn off MQ for 8G adapter.
Changes: For 8G adapter, multi queue was enabled accidentally.

- FCD-1385: Wind down adapter after pcie error.
Changes: Detect the PCIE error and returns all IO's to upper layers.

- FCD-1412: qla2xxx: Reset Congestion Warning/Alarm signals count.
Changes: Reset signals at every signal check boundary (1 sec).

- 10.02.07.00.a13-k1 BH 02/17/2022
- FCD-1353: qla2xx: a12/a11 driver compilation gives warning messages
Changes: Fix the fall through warning
- FCD-1342: qla2xxx: SL12SP5 a12 driver compilation issue observed
Changes: fallthrough macro is defined based on gcc version.

- 10.02.07.00.a12-k1 BH 02/09/2022
- FCD-XXX: qla2xxx: Reset USCM stats/state and throttling on RSCN
Changes: Reset USCM stats on getting an RSCN indicating a target port down.

- FCD-XXX: qla2xxx: Increase max limit of ql2xnvme_queues
Changes: Increase max limit of ql2xnvme_queues to (max_qpair-1)

- FCD-478: qla2xxx: Fix missing devices on a LOGO from F-Port
Changes: A call to logo all ports is made upon a F-Port LOGO.

- FCD-XXX: qla2xxx: Move NVMe traffic to the slow queue on target congestion
Changes: Steer the NVMe traffic to the slow Q on encountering target congestion

- FCD-348: qla2xxx: edif: Fix slow session tear down.
Changes: As a work around, driver would trigger a session tear down where
it tell the local authentication application to also tear down.

- FCD-XXX: qla2xxx: edif: Tweak debug log.
Changes: Print AUTH ELS header to assist in debugging session's state of authentication app.

- FCD-207: qla2xxx: Fix stuck session of prli reject
Changes: Remove the stale code that cause the unintentional short cut.

- FCD-1197: qla2xxx: Throttling up is seen when port is down
Changes: Reset the stats/congestion state and the throttling algorithm on a link down event.

- FCD-348: qla2xxx: Reduce false trigger to login
Changes: Reduce the extra trigger to prevent multiple login to the same session.

- FCD-207: qla2xxx: edif : Reduce N2N thrashing at app_start time
Changes: make sure the old session is torn down before triggering a relogin.

- FCD-207: qla2xxx: Fix laggy FC remote port session recovery
Changes: allows the higher priority error recovery to run first before running
the lower priority heart beat check.

- FCD-XXX: qla2xxx: edif: Fix no logout on delete for n2n
Changes: Set a flag to turn on implicit logout early in the session recovery
to make sure it would go out in case of error.

- FCD-348: qla2xxx: edif: fix session thrash 2
Changes: prevents prli from going out before authentication app gives the ok

- FCD-348: qla2xxx: edif: tear down session if keys has been removed
Changes: If all keys for a session has been deleted then trigger a session tear down.

- FCD-348: qla2xxx: edif: fix no login after app start
Changes: Add a re-login trigger to relogin.

- FCD-207: qla2xxx: Fix hang due to session stuck
Changes: Break the requeue cycle and exit. The session deletion code will trigger a session relogin.

- FCD-348: qla2xxx: edif: reduce disruption due to multiple app start
Changes: Driver will skip over session tear down if app start is seen more than once.

- FCD-348: qla2xxx: edif: send logo for unexpected ike msg
Changes: Terminate/cleanup the AUTH ELS exchange.Follow with a pass through LOGO.

- FCD-348: qla2xxx: edif: Fix IO timeout due to over subscription
Changes: Track IOCB resources to prevent over subscription of IOCB resources

- FCD-207: qla2xxx: edif: fix n2n login retry for secure device
Changes: Add a few more login retries to revive the connection.

- FCD-1205: qla2xxx: Fix disk failure to rediscover
Changes: Set the online state before reporting to UL of the availability of the session.

- FCD-207: qla2xxx: Fix n2n inconsistent plogi
Changes: Delete the session to restart the connection, where ELS pass through
PLOGI would be used consistently.

- FCD-1267: qla2xxx: Fix crash during module load unload test
Changes: Driver correctly freeing a pre-allocated structure for purex packet handling

- FCD-XXX: qla2xxx: Fix missed DMA unmap for NVME ls requests.
Changes: Add an unmap call during ELS completion.

- FCD-1266: qla2xxx: Fix loss of NVME namespaces after driver reload test
Changes: Calling the localport registration under a mutex

- FCD-1212: qla2xxx: Host does not retry RDF when retries are exhausted and there is an incoming RDF
Changes: Reset the SCM ELS counters to zero once an RDF is received.

- FCD-XXX: qla2xxx: Restrict CPU-qpair mapping to work for NVMe only
- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
- FCD-XXX: qla2xxx: SCM: Add a bitmap for FPIN events.

- 10.02.07.00.a11-k1 BH 01/17/2022
- FCD-738: Fix T10 DIF performance on high end setup
Changes: Added high performing CRC-1 interface

- FCD-1182: qla2xxx: Fix initrd build error on RHEL 9
Changes: Updated the build script specific to RHEL 9

- FCD-XXX: qla2xxx: Fix incorrect latency counter display
Changes: Fix this by ignoring I/Os with unusually high latencies.

- FCD-207: qla2xxx: Fix n2n discovery issue with secure target
Changes: On app_start, driver will reset the login retry attempt count.

- FCD-1180: qla2xxx: Use correct feature type field during rffid processing
Changes: Driver sends RFF_ID for initiator type 28 i.e. NVMe insteads of SCSI two times

- FCD-1159: qla2xxx: Host doesn't retry the RDF/EDC when jammed with idle/CRC
Changes: Wake up the DPC thread from the timer context when EDC/RDF needs to be

- FCD-XXXX: qla2xxx: Build module with "-mindirect-branch=thunk-extern" option on RHEL 9

- 10.02.07.00.a10-k1 BH 01/06/2022
- FCD-XXX: qla2xxx: Support for changes in kernel 5.6 and above(rhel9.0)
Changes: Changes made specific to rhel9.0

- FCD-1136: qla2xxx: Throttling occurs even when USCM is disabled via CLI
Changes: Update flags that control USCM features, correctly on ISP reset

- FCD-1160: USCM continues to be active even if RDF response is jammed (and failed)
Changes: USCM flags are updated properly when port toggle and RDF completion happen

- 10.02.07.00.a9-k1 BH 01/03/2022
- FCD-1154: qla2xxx: Fix incorrect reporting of task management failure
Changes: Corrected endianness.

- 10.02.07.00.a8-k1 BH 12/23/2021
- FCD-814 : qla2xxx: Add a new v2 dport diagnostic feature.
Changes: Buffer size is increased to 1024 bytes and handle START/RESTART
command received from SDMAPI.

- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
Changes: Ramp up to faster initially, to get closer to the sweet spot quicker.
Be less prone to operating at lower bandwidth in case of a sudden workload spike.
Operate more conservatively (prioritize self over the network).

- FCD-XXX: qla2xxx: Do not track SCM stats for all ports in the zone
Changes: Track SCM stats just for the host and the target

- FCD-XXX: qla2xxx: Stats for FPIN with event type "Lost Credit" not incremented.
Changes: Add incrementing of "Lost Credit" stats.

- FCD-684: qla2xxx: Fix link down when connected to AG fabric with FAA enabled
Changes: Remove setting PUN and VL support bits in init control block.

- FCD-1004: qla2xxx: Debug message improvement when changing SCM profile.
Changes: Use profile names when changing profiles

- FCD-868: qla2xxx: lockdown: "Unsupported Firmware" message
Changes: checked different BITs for checking lockdown feature.

- FCD-682: qla2xxx: tcm_qla2xxx driver load fails with "Invalid argument" error
Changes: As tcm_qla2xxx is untested/unused, make it a dummy driver
and reduce unncessary noise created by this.

- FCD-886: qla2xxx: Hard Lockup on Unload/Load task with serial log enabled
Changes: Hard lockup is seen because serial console driver crashed because of
excessive logging. It was finalized to document this as known issues.

- FCD-XXX: qla2xxx: Apply USCM profile change immediately

- 10.02.07.00.a7-k1 BH 11/05/2021
- FCD-926: qla2xxx: lockdown: lower debug severity messages
- FCD-824: qla2xxx: lower debug severity message for fw lockdown
Changes: This patch lower the severity of various log messages.

- FCD-XXX: qla2xxx: Send LS_ACC for an incoming RDF
Changes: Send the LS_ACC and the new RDF separately

- FCD-721: qla2xxx: Set Max queue depth based on data direction.
Changes: Max q depth for Initiator tracks Reads (per port) and Fcport tracks Writes (per fcport).

- FCD-701: qla2xxx: Fix device reconnect in loop topology
Changes: Fix by taking the main login path that acquires device handle.

- FCD-XXX: qla2xxx: Add ql2xnvme_queues module parameter to configure number of NVME queues


- 10.02.07.00.a6-k1 BH 10/08/2021
- FCD-786: Shown wrong FDMI data for 64G adaptor
Changes: qla2xxx: Corrected transmission speed mask values for FC

- FCD-717: add retry for exe fw
Changes: qla2xxx: Driver will retry Exec FW command up to 4 retries

- FCD-XXX: qla2xxx: Compile out map queue changes if present in nvme-fc

- 10.02.07.00.a5-k1 BH 10/01/2021
- FCD-740: Fix scheduling while atomic
Changes: qla2xxx: schedule the call to fc_remote_port_delete in non-interrupt context

- FCD-691: Fix premature hw access after pci error
Changes: qla2xxx: Check error condition still persist and/or wait until the OS to give the resume signal

- FCD-756: Fix excessive messages during device logout
Changes: qla2xxx: disable printing IO error messages by default

- FCD-XXX: qla2xxx: abort fw dump if soft reset fail
- FCD-XXX: qla2xxx: USCM: Retry USCM ELS for Logical busy error code
- FCD-XXX: qla2xxx: USCM: USCM profile reset to Driver defaults
- FCD-XXX: qla2xxx: Fix warning message due to adisc is being flush at /var/log/messages

- 10.02.07.00.a4-k1 BH 09/20/2021
- FCD-721: Revert code that keeps track of queue-depth directionally.
Reason: Observing issue while q-depth accounting

- FCD-XXX: Cleanup stale code.
Changes: qla2xxx: Remove unused experimental code that uses
explicit PRLO as a way to tear down session.

- FCD-XXX: edif: remove old doorbell interface
Changes: qla2xxx:driver has implemented a new doorbell mechanism via bsg.

- FCD-348: edif: add retry for els pass through
Changes: qla2xxx: edif: Add additional retries to reduce higher level recovery.

- FCD-XXX: edif: Synchronize NPIV deletion with authentication application
Changes: qla2xxx: Notify authentication application of a NPIV deletion event is about to occur.

- FCD-XXX: edif: Fix potential stuck session in sa update
Changes: qla2xxx: Set flag properly for any attempt to relogin.

- FCD-704: The external flag for tcm_qla2xxx was not set.
qla2xxx: Add tcm_qla2xxx to externally supported module list.

- 10.02.07.00.a3-k1 BH 09/08/2021
- FCD-XXX: qla2xxx: edif: wait for app to ack on sess down
Changes: On session deletion, wait for app to acknowledge before moving on.

- FCD-XXX: qla2xxx: edif: fix edif bsg
Changes: Properly fill out the reply_payload_rcv_len field.

- FCD-XXX: qla2xxx: edif: fix inconsistent check of db_flags
Changes: Replace value check with bit flag check.

- FCD-XXX: qla2xxx: edif: increase ELS payload
Changes: Adjust memory buffer size to be able to handle max ELS payload.

- FCD-343: qla2xxx: turn off target reset during issue_lip
Changes: driver sends additional target reset to remote device before resetting the link.

- FCD-XXX: qla2xxx: edif: Reduce Initiator-Initiator thrashing.
Changes: Reduce unnecessary stress for authentication application to deal with unused connections.

- FCD-XXX: qla2xxx: fix gnl list corruption
Changes: move lock deletion behind lock.

- FCD-XXX: qla2xxx: edif: flush stale events and msgs on session down
Changes: Prevents authentication application from having to process stale data.

- FCD-XXX: qla2xxx: edif: reduces thrashing of the connection.
- FCD-XXX: qla2xxx: edif: tweak trace message
- FCD-XXX: qla2xxx: edif: fix app start delay
- FCD-XXX: qla2xxx: USCM: Handle SCM ELS from switch
- FCD-XXX: qla2xxx: edif: fix app start fail

- 10.02.07.00.a2-k1 BH 09/02/2021
- FCD-156: qla2xxx: 3PAR: Fix out of bound mem access
Changes: Add additional check to make sure the range of memory

- FCD-624: qla2xxx: Source driver gives compilation error on RHEL8.5
Changes: Offending code on tcm_qla2xxx module has been removed

- FCD-xxx: qla2xxx: Fix use after free
Changes: Would check for command is aborted / completed by FW before exiting the call.

- ER148553: qla2xxx: relogin during fabric disturbance
Changes : Set the scan_need flag to indicate a session

- FCD-464: qla2xxx: Fix race between timeout handler and completion handler
Changes: One reference is taken for the normal code path and one for the timeout path

- FCD-453: Fix FC-NVME register localport failure.
Changes: Module initialization is added to nvme_fc_port_template

- FCD-XXX: qla2xxx: Process responses in Tx path if any available for better performance
Changes: Call process_response_queue() in Tx path

- FCD-492: Kernel crashes when accessing port_speed sysfs file
Changes: CNA: Fix this by changing the lookup.

- FCD-XXX: qla2xxx: Refactor asynchronous command initialization
- FCD-XXX: qla2xxx: USCM - Add profile support for throttling IO
- FCD-XXX: qla2xxx: Move heart beat handling from dpc thread to workqueue
- FCD-XXX: USCM: Enhancement to throttle only read traffic during host congestion
and write traffic during target congestion.

- 10.02.07.00.a1-k1 BH 08/22/2021

- FCD-124: qla2xxx: edif: Use link event to wake up app
Changes: The link up event would notify app of the present of a new SCSI Host.

- FCD-299: qla2xxx: Fix crash in NVME abort path
Changes: Fixed the issue by removing stale access.

- FCD-XXX: qla2xxx: Display 16G only as supported speeds for 3830c card.
Changes: This card doesn't support lower speeds, hence,
update the fdmi and sysfs fields to display 16G only.

- FCD-226: qla2xxx: Update details for building kdump initrd in NVMe BFS.
Changes: Currently inbox driver doesn't support kdump/kexec kernel,
hence user need to update kdump initrd to have OOB driver part of it.

- FCD-372: qla2xxx: Anomaly in the congestion stats
Changes: Clear the signal counter on a qaucli clear

- FCD-279: Request QCC to check/report adapter's MCTP state
Changes: qla2xxx: Add support for mailbox passthru

- FCD-XXX: Perf improvement: Pick qpair such that Tx and Rx are processed on same CPU.
Changes: qla2xxx: Select qpair depending on which CPU post_cmd() gets called

- FCD-XXX: scsi: qla2xxx: Reserve extra IRQ vectors

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="89bf8cc0d6dd09148b3ce4870c289bead4f11711a7ab53203f564a34383630d7" name="qlgc-qla2xxx-kmp-default" arch="x86_64">
    <version epoch="0" ver="10.02.07.01_k1_k5.14.21_150400.22" rel="2.sles15sp4"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.07.01-k1-2" date="1662638400">- 10.02.07.01-k1 BH 09/02/2022
- FCD-2035: qla2xxx: Fix task mgmt cmd failure
Changes: Wait for marker to be complete before issuing TM.
Ensure no more than 8 TM are submitted per target at any given time.
- FCD-847: qla2xxx: Fix exchange over subscription
Changes: Check for exchange availability at FW before submitting command.

- 10.02.07.00-k1 BH 05/27/2022
- Non-alpha build

- 10.02.07.00.a19-k1 BH 05/21/2022
- FCD-XXX : qla2xxx: USCM: Throttling is not honored for NVMe
Changes: Enable NVMe READ/WRITE commands to be throttled

- FCD-XXX: qla2xxx: USCM: Add counters to track directional throttling
Changes: Add sysfs counters to have stats displayed for busy status returns.

- FCD-1801: qla2xxx: USCM: CP reads go to zero while doing directional throttling
Changes: Take into account the directional queue depth while returning a busy status to the stack.

- FCD-1809: qla2xxx: USCM: Restoring USCM Profile to default result in driver

- FCD-1798: qla2xxx: USCM: Profiles are not honored for peer congestion
Chnages: Apply the profile to each target (fcport) when the profile is changed.

Reverting the following changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- 10.02.07.00.a18-k1 BH 05/12/2022
- FCD-1484: qla2xxx: Manufacturer details should be "Marvell Semiconductor, Inc."
Changes: Update Manufacturer details to indicate Marvell Semiconductors

- FCD-XXX: qla2xxx: USCM: Throttle only read and write commands
Changes: Throttle only read and write commands.

- FCD-XXX: qla2xxx: USCM: Do not clear throttle for Clear Cong FPIN.
Changes: Do not clear throttle when Clear Congestion FPIN is received.

- FCD-XXX: qla2xxx: USCM: Change default profile to Monitor
Changes: Set the default throttle profile as Monitor.

- FCD-XXX: qla2xxx: Fix few issues reported by klocwork tool

- 10.02.07.00.a17-k1 BH 05/06/2022
- FCD-1522: qla2xxx: USCM: Throughput drops to zero in Monitor mode
Changes: Restore qdepth based on monitor mode

- FCD-1315: qla2xxx: Fix erroneous mailbox timeout after pci error inject.
Changes: Clear wait for MB interrupt flag to prevent stale MB completion arriving

- FCD-1424: Remove verbose IO debug messages
Changes: Remove the IOCB debug messages for every IO

- FCD-XXX: Support for NVMe parameters in Auxiliary Image Status
Changes: Added new structure member, bit define and image status check.

- 10.02.07.00.a16-k1 BH 04/08/2022
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- FCD-1221: qla2xxx: USCM: Switch does not send FPINs after a EDC re-negotiation
Changes: Send Link Service Request Information wih the EDC response, along with the other descriptors.

- 10.02.07.00.a15-k1 BH 03/25/2022
- FCD-1249: qla2xxx: edif: Fix dropped IKE message.
Changes: Fixes IKE message being dropped due to error in
processing Purex IOCB and Continuation IOCBs.

- FCD-1457: qla2xxx: Zero undefined mailbox IN registers
Changes: Set zero to unuse register's value while requesting a new MB command.

- FCD-1425: qla2xxx: USCM: Seconds since last event showing incorrect value
Changes: Calculate delta time correctly

- FCD-1287: qla2xxx: Fix incorrect display of max frame size.
Changes: Save off the field of interest into separate location and convert into words.

- FCD-XXX: qla2xxx: Fix memory leak when reading tgt_port_database debugfs file
- FCD-XXX: qla2xxx: USCM: Do not reset SCM stats on a link bounce/ISP reset

- 10.02.07.00.a14-k1 BH 03/14/2022
- FCD-XXX: qla2xxx: Fix losing FCP-2 targets on long port disable with IOs
Changes: Fix this by accepting RSCN when the device is not online.

- FCD-XXX: qla2xxx: Fix losing target when it reappears during delete
Changes: Fix the issue by adding state checks before proceeding.

- FCD-XXX: qla2xxx: Fix losing FCP-2 targets during port perturbation tests
Changes: Fix was to ignore delete for FCP-2 devices in certain sequence.

- FCD-119: qla2xxx: Fix crash due to stale srb access around IO timeouts
Changes: Ensure srb is either returned during error IO timeout error escalation.
If that is not possible fail the escalation path.

- FCD-1132: qla2xxx: HPE3PAR: Fix IOCB resource count leak
Changes: Decrement FW IOCB resource count.

- FCD-1132: qla2xxx: Turn off MQ for 8G adapter.
Changes: For 8G adapter, multi queue was enabled accidentally.

- FCD-1385: Wind down adapter after pcie error.
Changes: Detect the PCIE error and returns all IO's to upper layers.

- FCD-1412: qla2xxx: Reset Congestion Warning/Alarm signals count.
Changes: Reset signals at every signal check boundary (1 sec).

- 10.02.07.00.a13-k1 BH 02/17/2022
- FCD-1353: qla2xx: a12/a11 driver compilation gives warning messages
Changes: Fix the fall through warning
- FCD-1342: qla2xxx: SL12SP5 a12 driver compilation issue observed
Changes: fallthrough macro is defined based on gcc version.

- 10.02.07.00.a12-k1 BH 02/09/2022
- FCD-XXX: qla2xxx: Reset USCM stats/state and throttling on RSCN
Changes: Reset USCM stats on getting an RSCN indicating a target port down.

- FCD-XXX: qla2xxx: Increase max limit of ql2xnvme_queues
Changes: Increase max limit of ql2xnvme_queues to (max_qpair-1)

- FCD-478: qla2xxx: Fix missing devices on a LOGO from F-Port
Changes: A call to logo all ports is made upon a F-Port LOGO.

- FCD-XXX: qla2xxx: Move NVMe traffic to the slow queue on target congestion
Changes: Steer the NVMe traffic to the slow Q on encountering target congestion

- FCD-348: qla2xxx: edif: Fix slow session tear down.
Changes: As a work around, driver would trigger a session tear down where
it tell the local authentication application to also tear down.

- FCD-XXX: qla2xxx: edif: Tweak debug log.
Changes: Print AUTH ELS header to assist in debugging session's state of authentication app.

- FCD-207: qla2xxx: Fix stuck session of prli reject
Changes: Remove the stale code that cause the unintentional short cut.

- FCD-1197: qla2xxx: Throttling up is seen when port is down
Changes: Reset the stats/congestion state and the throttling algorithm on a link down event.

- FCD-348: qla2xxx: Reduce false trigger to login
Changes: Reduce the extra trigger to prevent multiple login to the same session.

- FCD-207: qla2xxx: edif : Reduce N2N thrashing at app_start time
Changes: make sure the old session is torn down before triggering a relogin.

- FCD-207: qla2xxx: Fix laggy FC remote port session recovery
Changes: allows the higher priority error recovery to run first before running
the lower priority heart beat check.

- FCD-XXX: qla2xxx: edif: Fix no logout on delete for n2n
Changes: Set a flag to turn on implicit logout early in the session recovery
to make sure it would go out in case of error.

- FCD-348: qla2xxx: edif: fix session thrash 2
Changes: prevents prli from going out before authentication app gives the ok

- FCD-348: qla2xxx: edif: tear down session if keys has been removed
Changes: If all keys for a session has been deleted then trigger a session tear down.

- FCD-348: qla2xxx: edif: fix no login after app start
Changes: Add a re-login trigger to relogin.

- FCD-207: qla2xxx: Fix hang due to session stuck
Changes: Break the requeue cycle and exit. The session deletion code will trigger a session relogin.

- FCD-348: qla2xxx: edif: reduce disruption due to multiple app start
Changes: Driver will skip over session tear down if app start is seen more than once.

- FCD-348: qla2xxx: edif: send logo for unexpected ike msg
Changes: Terminate/cleanup the AUTH ELS exchange.Follow with a pass through LOGO.

- FCD-348: qla2xxx: edif: Fix IO timeout due to over subscription
Changes: Track IOCB resources to prevent over subscription of IOCB resources

- FCD-207: qla2xxx: edif: fix n2n login retry for secure device
Changes: Add a few more login retries to revive the connection.

- FCD-1205: qla2xxx: Fix disk failure to rediscover
Changes: Set the online state before reporting to UL of the availability of the session.

- FCD-207: qla2xxx: Fix n2n inconsistent plogi
Changes: Delete the session to restart the connection, where ELS pass through
PLOGI would be used consistently.

- FCD-1267: qla2xxx: Fix crash during module load unload test
Changes: Driver correctly freeing a pre-allocated structure for purex packet handling

- FCD-XXX: qla2xxx: Fix missed DMA unmap for NVME ls requests.
Changes: Add an unmap call during ELS completion.

- FCD-1266: qla2xxx: Fix loss of NVME namespaces after driver reload test
Changes: Calling the localport registration under a mutex

- FCD-1212: qla2xxx: Host does not retry RDF when retries are exhausted and there is an incoming RDF
Changes: Reset the SCM ELS counters to zero once an RDF is received.

- FCD-XXX: qla2xxx: Restrict CPU-qpair mapping to work for NVMe only
- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
- FCD-XXX: qla2xxx: SCM: Add a bitmap for FPIN events.

- 10.02.07.00.a11-k1 BH 01/17/2022
- FCD-738: Fix T10 DIF performance on high end setup
Changes: Added high performing CRC-1 interface

- FCD-1182: qla2xxx: Fix initrd build error on RHEL 9
Changes: Updated the build script specific to RHEL 9

- FCD-XXX: qla2xxx: Fix incorrect latency counter display
Changes: Fix this by ignoring I/Os with unusually high latencies.

- FCD-207: qla2xxx: Fix n2n discovery issue with secure target
Changes: On app_start, driver will reset the login retry attempt count.

- FCD-1180: qla2xxx: Use correct feature type field during rffid processing
Changes: Driver sends RFF_ID for initiator type 28 i.e. NVMe insteads of SCSI two times

- FCD-1159: qla2xxx: Host doesn't retry the RDF/EDC when jammed with idle/CRC
Changes: Wake up the DPC thread from the timer context when EDC/RDF needs to be

- FCD-XXXX: qla2xxx: Build module with "-mindirect-branch=thunk-extern" option on RHEL 9

- 10.02.07.00.a10-k1 BH 01/06/2022
- FCD-XXX: qla2xxx: Support for changes in kernel 5.6 and above(rhel9.0)
Changes: Changes made specific to rhel9.0

- FCD-1136: qla2xxx: Throttling occurs even when USCM is disabled via CLI
Changes: Update flags that control USCM features, correctly on ISP reset

- FCD-1160: USCM continues to be active even if RDF response is jammed (and failed)
Changes: USCM flags are updated properly when port toggle and RDF completion happen

- 10.02.07.00.a9-k1 BH 01/03/2022
- FCD-1154: qla2xxx: Fix incorrect reporting of task management failure
Changes: Corrected endianness.

- 10.02.07.00.a8-k1 BH 12/23/2021
- FCD-814 : qla2xxx: Add a new v2 dport diagnostic feature.
Changes: Buffer size is increased to 1024 bytes and handle START/RESTART
command received from SDMAPI.

- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
Changes: Ramp up to faster initially, to get closer to the sweet spot quicker.
Be less prone to operating at lower bandwidth in case of a sudden workload spike.
Operate more conservatively (prioritize self over the network).

- FCD-XXX: qla2xxx: Do not track SCM stats for all ports in the zone
Changes: Track SCM stats just for the host and the target

- FCD-XXX: qla2xxx: Stats for FPIN with event type "Lost Credit" not incremented.
Changes: Add incrementing of "Lost Credit" stats.

- FCD-684: qla2xxx: Fix link down when connected to AG fabric with FAA enabled
Changes: Remove setting PUN and VL support bits in init control block.

- FCD-1004: qla2xxx: Debug message improvement when changing SCM profile.
Changes: Use profile names when changing profiles

- FCD-868: qla2xxx: lockdown: "Unsupported Firmware" message
Changes: checked different BITs for checking lockdown feature.

- FCD-682: qla2xxx: tcm_qla2xxx driver load fails with "Invalid argument" error
Changes: As tcm_qla2xxx is untested/unused, make it a dummy driver
and reduce unncessary noise created by this.

- FCD-886: qla2xxx: Hard Lockup on Unload/Load task with serial log enabled
Changes: Hard lockup is seen because serial console driver crashed because of
excessive logging. It was finalized to document this as known issues.

- FCD-XXX: qla2xxx: Apply USCM profile change immediately

- 10.02.07.00.a7-k1 BH 11/05/2021
- FCD-926: qla2xxx: lockdown: lower debug severity messages
- FCD-824: qla2xxx: lower debug severity message for fw lockdown
Changes: This patch lower the severity of various log messages.

- FCD-XXX: qla2xxx: Send LS_ACC for an incoming RDF
Changes: Send the LS_ACC and the new RDF separately

- FCD-721: qla2xxx: Set Max queue depth based on data direction.
Changes: Max q depth for Initiator tracks Reads (per port) and Fcport tracks Writes (per fcport).

- FCD-701: qla2xxx: Fix device reconnect in loop topology
Changes: Fix by taking the main login path that acquires device handle.

- FCD-XXX: qla2xxx: Add ql2xnvme_queues module parameter to configure number of NVME queues


- 10.02.07.00.a6-k1 BH 10/08/2021
- FCD-786: Shown wrong FDMI data for 64G adaptor
Changes: qla2xxx: Corrected transmission speed mask values for FC

- FCD-717: add retry for exe fw
Changes: qla2xxx: Driver will retry Exec FW command up to 4 retries

- FCD-XXX: qla2xxx: Compile out map queue changes if present in nvme-fc

- 10.02.07.00.a5-k1 BH 10/01/2021
- FCD-740: Fix scheduling while atomic
Changes: qla2xxx: schedule the call to fc_remote_port_delete in non-interrupt context

- FCD-691: Fix premature hw access after pci error
Changes: qla2xxx: Check error condition still persist and/or wait until the OS to give the resume signal

- FCD-756: Fix excessive messages during device logout
Changes: qla2xxx: disable printing IO error messages by default

- FCD-XXX: qla2xxx: abort fw dump if soft reset fail
- FCD-XXX: qla2xxx: USCM: Retry USCM ELS for Logical busy error code
- FCD-XXX: qla2xxx: USCM: USCM profile reset to Driver defaults
- FCD-XXX: qla2xxx: Fix warning message due to adisc is being flush at /var/log/messages

- 10.02.07.00.a4-k1 BH 09/20/2021
- FCD-721: Revert code that keeps track of queue-depth directionally.
Reason: Observing issue while q-depth accounting

- FCD-XXX: Cleanup stale code.
Changes: qla2xxx: Remove unused experimental code that uses
explicit PRLO as a way to tear down session.

- FCD-XXX: edif: remove old doorbell interface
Changes: qla2xxx:driver has implemented a new doorbell mechanism via bsg.

- FCD-348: edif: add retry for els pass through
Changes: qla2xxx: edif: Add additional retries to reduce higher level recovery.

- FCD-XXX: edif: Synchronize NPIV deletion with authentication application
Changes: qla2xxx: Notify authentication application of a NPIV deletion event is about to occur.

- FCD-XXX: edif: Fix potential stuck session in sa update
Changes: qla2xxx: Set flag properly for any attempt to relogin.

- FCD-704: The external flag for tcm_qla2xxx was not set.
qla2xxx: Add tcm_qla2xxx to externally supported module list.

- 10.02.07.00.a3-k1 BH 09/08/2021
- FCD-XXX: qla2xxx: edif: wait for app to ack on sess down
Changes: On session deletion, wait for app to acknowledge before moving on.

- FCD-XXX: qla2xxx: edif: fix edif bsg
Changes: Properly fill out the reply_payload_rcv_len field.

- FCD-XXX: qla2xxx: edif: fix inconsistent check of db_flags
Changes: Replace value check with bit flag check.

- FCD-XXX: qla2xxx: edif: increase ELS payload
Changes: Adjust memory buffer size to be able to handle max ELS payload.

- FCD-343: qla2xxx: turn off target reset during issue_lip
Changes: driver sends additional target reset to remote device before resetting the link.

- FCD-XXX: qla2xxx: edif: Reduce Initiator-Initiator thrashing.
Changes: Reduce unnecessary stress for authentication application to deal with unused connections.

- FCD-XXX: qla2xxx: fix gnl list corruption
Changes: move lock deletion behind lock.

- FCD-XXX: qla2xxx: edif: flush stale events and msgs on session down
Changes: Prevents authentication application from having to process stale data.

- FCD-XXX: qla2xxx: edif: reduces thrashing of the connection.
- FCD-XXX: qla2xxx: edif: tweak trace message
- FCD-XXX: qla2xxx: edif: fix app start delay
- FCD-XXX: qla2xxx: USCM: Handle SCM ELS from switch
- FCD-XXX: qla2xxx: edif: fix app start fail

- 10.02.07.00.a2-k1 BH 09/02/2021
- FCD-156: qla2xxx: 3PAR: Fix out of bound mem access
Changes: Add additional check to make sure the range of memory

- FCD-624: qla2xxx: Source driver gives compilation error on RHEL8.5
Changes: Offending code on tcm_qla2xxx module has been removed

- FCD-xxx: qla2xxx: Fix use after free
Changes: Would check for command is aborted / completed by FW before exiting the call.

- ER148553: qla2xxx: relogin during fabric disturbance
Changes : Set the scan_need flag to indicate a session

- FCD-464: qla2xxx: Fix race between timeout handler and completion handler
Changes: One reference is taken for the normal code path and one for the timeout path

- FCD-453: Fix FC-NVME register localport failure.
Changes: Module initialization is added to nvme_fc_port_template

- FCD-XXX: qla2xxx: Process responses in Tx path if any available for better performance
Changes: Call process_response_queue() in Tx path

- FCD-492: Kernel crashes when accessing port_speed sysfs file
Changes: CNA: Fix this by changing the lookup.

- FCD-XXX: qla2xxx: Refactor asynchronous command initialization
- FCD-XXX: qla2xxx: USCM - Add profile support for throttling IO
- FCD-XXX: qla2xxx: Move heart beat handling from dpc thread to workqueue
- FCD-XXX: USCM: Enhancement to throttle only read traffic during host congestion
and write traffic during target congestion.

- 10.02.07.00.a1-k1 BH 08/22/2021

- FCD-124: qla2xxx: edif: Use link event to wake up app
Changes: The link up event would notify app of the present of a new SCSI Host.

- FCD-299: qla2xxx: Fix crash in NVME abort path
Changes: Fixed the issue by removing stale access.

- FCD-XXX: qla2xxx: Display 16G only as supported speeds for 3830c card.
Changes: This card doesn't support lower speeds, hence,
update the fdmi and sysfs fields to display 16G only.

- FCD-226: qla2xxx: Update details for building kdump initrd in NVMe BFS.
Changes: Currently inbox driver doesn't support kdump/kexec kernel,
hence user need to update kdump initrd to have OOB driver part of it.

- FCD-372: qla2xxx: Anomaly in the congestion stats
Changes: Clear the signal counter on a qaucli clear

- FCD-279: Request QCC to check/report adapter's MCTP state
Changes: qla2xxx: Add support for mailbox passthru

- FCD-XXX: Perf improvement: Pick qpair such that Tx and Rx are processed on same CPU.
Changes: qla2xxx: Select qpair depending on which CPU post_cmd() gets called

- FCD-XXX: scsi: qla2xxx: Reserve extra IRQ vectors

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="5f20028527ee845a3cad9a034eaeeeed452334fdc56b8d293e34b904ea28c2a4" name="qlgc-qla2xxx-kmp-default" arch="x86_64">
    <version epoch="0" ver="10.02.07.01_k1_k5.3.18_57" rel="2.sles15sp3"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.07.01-k1-2" date="1662552000">- 10.02.07.01-k1 BH 09/02/2022
- FCD-2035: qla2xxx: Fix task mgmt cmd failure
Changes: Wait for marker to be complete before issuing TM.
Ensure no more than 8 TM are submitted per target at any given time.
- FCD-847: qla2xxx: Fix exchange over subscription
Changes: Check for exchange availability at FW before submitting command.

- 10.02.07.00-k1 BH 05/27/2022
- Non-alpha build

- 10.02.07.00.a19-k1 BH 05/21/2022
- FCD-XXX : qla2xxx: USCM: Throttling is not honored for NVMe
Changes: Enable NVMe READ/WRITE commands to be throttled

- FCD-XXX: qla2xxx: USCM: Add counters to track directional throttling
Changes: Add sysfs counters to have stats displayed for busy status returns.

- FCD-1801: qla2xxx: USCM: CP reads go to zero while doing directional throttling
Changes: Take into account the directional queue depth while returning a busy status to the stack.

- FCD-1809: qla2xxx: USCM: Restoring USCM Profile to default result in driver

- FCD-1798: qla2xxx: USCM: Profiles are not honored for peer congestion
Chnages: Apply the profile to each target (fcport) when the profile is changed.

Reverting the following changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- 10.02.07.00.a18-k1 BH 05/12/2022
- FCD-1484: qla2xxx: Manufacturer details should be "Marvell Semiconductor, Inc."
Changes: Update Manufacturer details to indicate Marvell Semiconductors

- FCD-XXX: qla2xxx: USCM: Throttle only read and write commands
Changes: Throttle only read and write commands.

- FCD-XXX: qla2xxx: USCM: Do not clear throttle for Clear Cong FPIN.
Changes: Do not clear throttle when Clear Congestion FPIN is received.

- FCD-XXX: qla2xxx: USCM: Change default profile to Monitor
Changes: Set the default throttle profile as Monitor.

- FCD-XXX: qla2xxx: Fix few issues reported by klocwork tool

- 10.02.07.00.a17-k1 BH 05/06/2022
- FCD-1522: qla2xxx: USCM: Throughput drops to zero in Monitor mode
Changes: Restore qdepth based on monitor mode

- FCD-1315: qla2xxx: Fix erroneous mailbox timeout after pci error inject.
Changes: Clear wait for MB interrupt flag to prevent stale MB completion arriving

- FCD-1424: Remove verbose IO debug messages
Changes: Remove the IOCB debug messages for every IO

- FCD-XXX: Support for NVMe parameters in Auxiliary Image Status
Changes: Added new structure member, bit define and image status check.

- 10.02.07.00.a16-k1 BH 04/08/2022
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- FCD-1221: qla2xxx: USCM: Switch does not send FPINs after a EDC re-negotiation
Changes: Send Link Service Request Information wih the EDC response, along with the other descriptors.

- 10.02.07.00.a15-k1 BH 03/25/2022
- FCD-1249: qla2xxx: edif: Fix dropped IKE message.
Changes: Fixes IKE message being dropped due to error in
processing Purex IOCB and Continuation IOCBs.

- FCD-1457: qla2xxx: Zero undefined mailbox IN registers
Changes: Set zero to unuse register's value while requesting a new MB command.

- FCD-1425: qla2xxx: USCM: Seconds since last event showing incorrect value
Changes: Calculate delta time correctly

- FCD-1287: qla2xxx: Fix incorrect display of max frame size.
Changes: Save off the field of interest into separate location and convert into words.

- FCD-XXX: qla2xxx: Fix memory leak when reading tgt_port_database debugfs file
- FCD-XXX: qla2xxx: USCM: Do not reset SCM stats on a link bounce/ISP reset

- 10.02.07.00.a14-k1 BH 03/14/2022
- FCD-XXX: qla2xxx: Fix losing FCP-2 targets on long port disable with IOs
Changes: Fix this by accepting RSCN when the device is not online.

- FCD-XXX: qla2xxx: Fix losing target when it reappears during delete
Changes: Fix the issue by adding state checks before proceeding.

- FCD-XXX: qla2xxx: Fix losing FCP-2 targets during port perturbation tests
Changes: Fix was to ignore delete for FCP-2 devices in certain sequence.

- FCD-119: qla2xxx: Fix crash due to stale srb access around IO timeouts
Changes: Ensure srb is either returned during error IO timeout error escalation.
If that is not possible fail the escalation path.

- FCD-1132: qla2xxx: HPE3PAR: Fix IOCB resource count leak
Changes: Decrement FW IOCB resource count.

- FCD-1132: qla2xxx: Turn off MQ for 8G adapter.
Changes: For 8G adapter, multi queue was enabled accidentally.

- FCD-1385: Wind down adapter after pcie error.
Changes: Detect the PCIE error and returns all IO's to upper layers.

- FCD-1412: qla2xxx: Reset Congestion Warning/Alarm signals count.
Changes: Reset signals at every signal check boundary (1 sec).

- 10.02.07.00.a13-k1 BH 02/17/2022
- FCD-1353: qla2xx: a12/a11 driver compilation gives warning messages
Changes: Fix the fall through warning
- FCD-1342: qla2xxx: SL12SP5 a12 driver compilation issue observed
Changes: fallthrough macro is defined based on gcc version.

- 10.02.07.00.a12-k1 BH 02/09/2022
- FCD-XXX: qla2xxx: Reset USCM stats/state and throttling on RSCN
Changes: Reset USCM stats on getting an RSCN indicating a target port down.

- FCD-XXX: qla2xxx: Increase max limit of ql2xnvme_queues
Changes: Increase max limit of ql2xnvme_queues to (max_qpair-1)

- FCD-478: qla2xxx: Fix missing devices on a LOGO from F-Port
Changes: A call to logo all ports is made upon a F-Port LOGO.

- FCD-XXX: qla2xxx: Move NVMe traffic to the slow queue on target congestion
Changes: Steer the NVMe traffic to the slow Q on encountering target congestion

- FCD-348: qla2xxx: edif: Fix slow session tear down.
Changes: As a work around, driver would trigger a session tear down where
it tell the local authentication application to also tear down.

- FCD-XXX: qla2xxx: edif: Tweak debug log.
Changes: Print AUTH ELS header to assist in debugging session's state of authentication app.

- FCD-207: qla2xxx: Fix stuck session of prli reject
Changes: Remove the stale code that cause the unintentional short cut.

- FCD-1197: qla2xxx: Throttling up is seen when port is down
Changes: Reset the stats/congestion state and the throttling algorithm on a link down event.

- FCD-348: qla2xxx: Reduce false trigger to login
Changes: Reduce the extra trigger to prevent multiple login to the same session.

- FCD-207: qla2xxx: edif : Reduce N2N thrashing at app_start time
Changes: make sure the old session is torn down before triggering a relogin.

- FCD-207: qla2xxx: Fix laggy FC remote port session recovery
Changes: allows the higher priority error recovery to run first before running
the lower priority heart beat check.

- FCD-XXX: qla2xxx: edif: Fix no logout on delete for n2n
Changes: Set a flag to turn on implicit logout early in the session recovery
to make sure it would go out in case of error.

- FCD-348: qla2xxx: edif: fix session thrash 2
Changes: prevents prli from going out before authentication app gives the ok

- FCD-348: qla2xxx: edif: tear down session if keys has been removed
Changes: If all keys for a session has been deleted then trigger a session tear down.

- FCD-348: qla2xxx: edif: fix no login after app start
Changes: Add a re-login trigger to relogin.

- FCD-207: qla2xxx: Fix hang due to session stuck
Changes: Break the requeue cycle and exit. The session deletion code will trigger a session relogin.

- FCD-348: qla2xxx: edif: reduce disruption due to multiple app start
Changes: Driver will skip over session tear down if app start is seen more than once.

- FCD-348: qla2xxx: edif: send logo for unexpected ike msg
Changes: Terminate/cleanup the AUTH ELS exchange.Follow with a pass through LOGO.

- FCD-348: qla2xxx: edif: Fix IO timeout due to over subscription
Changes: Track IOCB resources to prevent over subscription of IOCB resources

- FCD-207: qla2xxx: edif: fix n2n login retry for secure device
Changes: Add a few more login retries to revive the connection.

- FCD-1205: qla2xxx: Fix disk failure to rediscover
Changes: Set the online state before reporting to UL of the availability of the session.

- FCD-207: qla2xxx: Fix n2n inconsistent plogi
Changes: Delete the session to restart the connection, where ELS pass through
PLOGI would be used consistently.

- FCD-1267: qla2xxx: Fix crash during module load unload test
Changes: Driver correctly freeing a pre-allocated structure for purex packet handling

- FCD-XXX: qla2xxx: Fix missed DMA unmap for NVME ls requests.
Changes: Add an unmap call during ELS completion.

- FCD-1266: qla2xxx: Fix loss of NVME namespaces after driver reload test
Changes: Calling the localport registration under a mutex

- FCD-1212: qla2xxx: Host does not retry RDF when retries are exhausted and there is an incoming RDF
Changes: Reset the SCM ELS counters to zero once an RDF is received.

- FCD-XXX: qla2xxx: Restrict CPU-qpair mapping to work for NVMe only
- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
- FCD-XXX: qla2xxx: SCM: Add a bitmap for FPIN events.

- 10.02.07.00.a11-k1 BH 01/17/2022
- FCD-738: Fix T10 DIF performance on high end setup
Changes: Added high performing CRC-1 interface

- FCD-1182: qla2xxx: Fix initrd build error on RHEL 9
Changes: Updated the build script specific to RHEL 9

- FCD-XXX: qla2xxx: Fix incorrect latency counter display
Changes: Fix this by ignoring I/Os with unusually high latencies.

- FCD-207: qla2xxx: Fix n2n discovery issue with secure target
Changes: On app_start, driver will reset the login retry attempt count.

- FCD-1180: qla2xxx: Use correct feature type field during rffid processing
Changes: Driver sends RFF_ID for initiator type 28 i.e. NVMe insteads of SCSI two times

- FCD-1159: qla2xxx: Host doesn't retry the RDF/EDC when jammed with idle/CRC
Changes: Wake up the DPC thread from the timer context when EDC/RDF needs to be

- FCD-XXXX: qla2xxx: Build module with "-mindirect-branch=thunk-extern" option on RHEL 9

- 10.02.07.00.a10-k1 BH 01/06/2022
- FCD-XXX: qla2xxx: Support for changes in kernel 5.6 and above(rhel9.0)
Changes: Changes made specific to rhel9.0

- FCD-1136: qla2xxx: Throttling occurs even when USCM is disabled via CLI
Changes: Update flags that control USCM features, correctly on ISP reset

- FCD-1160: USCM continues to be active even if RDF response is jammed (and failed)
Changes: USCM flags are updated properly when port toggle and RDF completion happen

- 10.02.07.00.a9-k1 BH 01/03/2022
- FCD-1154: qla2xxx: Fix incorrect reporting of task management failure
Changes: Corrected endianness.

- 10.02.07.00.a8-k1 BH 12/23/2021
- FCD-814 : qla2xxx: Add a new v2 dport diagnostic feature.
Changes: Buffer size is increased to 1024 bytes and handle START/RESTART
command received from SDMAPI.

- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
Changes: Ramp up to faster initially, to get closer to the sweet spot quicker.
Be less prone to operating at lower bandwidth in case of a sudden workload spike.
Operate more conservatively (prioritize self over the network).

- FCD-XXX: qla2xxx: Do not track SCM stats for all ports in the zone
Changes: Track SCM stats just for the host and the target

- FCD-XXX: qla2xxx: Stats for FPIN with event type "Lost Credit" not incremented.
Changes: Add incrementing of "Lost Credit" stats.

- FCD-684: qla2xxx: Fix link down when connected to AG fabric with FAA enabled
Changes: Remove setting PUN and VL support bits in init control block.

- FCD-1004: qla2xxx: Debug message improvement when changing SCM profile.
Changes: Use profile names when changing profiles

- FCD-868: qla2xxx: lockdown: "Unsupported Firmware" message
Changes: checked different BITs for checking lockdown feature.

- FCD-682: qla2xxx: tcm_qla2xxx driver load fails with "Invalid argument" error
Changes: As tcm_qla2xxx is untested/unused, make it a dummy driver
and reduce unncessary noise created by this.

- FCD-886: qla2xxx: Hard Lockup on Unload/Load task with serial log enabled
Changes: Hard lockup is seen because serial console driver crashed because of
excessive logging. It was finalized to document this as known issues.

- FCD-XXX: qla2xxx: Apply USCM profile change immediately

- 10.02.07.00.a7-k1 BH 11/05/2021
- FCD-926: qla2xxx: lockdown: lower debug severity messages
- FCD-824: qla2xxx: lower debug severity message for fw lockdown
Changes: This patch lower the severity of various log messages.

- FCD-XXX: qla2xxx: Send LS_ACC for an incoming RDF
Changes: Send the LS_ACC and the new RDF separately

- FCD-721: qla2xxx: Set Max queue depth based on data direction.
Changes: Max q depth for Initiator tracks Reads (per port) and Fcport tracks Writes (per fcport).

- FCD-701: qla2xxx: Fix device reconnect in loop topology
Changes: Fix by taking the main login path that acquires device handle.

- FCD-XXX: qla2xxx: Add ql2xnvme_queues module parameter to configure number of NVME queues


- 10.02.07.00.a6-k1 BH 10/08/2021
- FCD-786: Shown wrong FDMI data for 64G adaptor
Changes: qla2xxx: Corrected transmission speed mask values for FC

- FCD-717: add retry for exe fw
Changes: qla2xxx: Driver will retry Exec FW command up to 4 retries

- FCD-XXX: qla2xxx: Compile out map queue changes if present in nvme-fc

- 10.02.07.00.a5-k1 BH 10/01/2021
- FCD-740: Fix scheduling while atomic
Changes: qla2xxx: schedule the call to fc_remote_port_delete in non-interrupt context

- FCD-691: Fix premature hw access after pci error
Changes: qla2xxx: Check error condition still persist and/or wait until the OS to give the resume signal

- FCD-756: Fix excessive messages during device logout
Changes: qla2xxx: disable printing IO error messages by default

- FCD-XXX: qla2xxx: abort fw dump if soft reset fail
- FCD-XXX: qla2xxx: USCM: Retry USCM ELS for Logical busy error code
- FCD-XXX: qla2xxx: USCM: USCM profile reset to Driver defaults
- FCD-XXX: qla2xxx: Fix warning message due to adisc is being flush at /var/log/messages

- 10.02.07.00.a4-k1 BH 09/20/2021
- FCD-721: Revert code that keeps track of queue-depth directionally.
Reason: Observing issue while q-depth accounting

- FCD-XXX: Cleanup stale code.
Changes: qla2xxx: Remove unused experimental code that uses
explicit PRLO as a way to tear down session.

- FCD-XXX: edif: remove old doorbell interface
Changes: qla2xxx:driver has implemented a new doorbell mechanism via bsg.

- FCD-348: edif: add retry for els pass through
Changes: qla2xxx: edif: Add additional retries to reduce higher level recovery.

- FCD-XXX: edif: Synchronize NPIV deletion with authentication application
Changes: qla2xxx: Notify authentication application of a NPIV deletion event is about to occur.

- FCD-XXX: edif: Fix potential stuck session in sa update
Changes: qla2xxx: Set flag properly for any attempt to relogin.

- FCD-704: The external flag for tcm_qla2xxx was not set.
qla2xxx: Add tcm_qla2xxx to externally supported module list.

- 10.02.07.00.a3-k1 BH 09/08/2021
- FCD-XXX: qla2xxx: edif: wait for app to ack on sess down
Changes: On session deletion, wait for app to acknowledge before moving on.

- FCD-XXX: qla2xxx: edif: fix edif bsg
Changes: Properly fill out the reply_payload_rcv_len field.

- FCD-XXX: qla2xxx: edif: fix inconsistent check of db_flags
Changes: Replace value check with bit flag check.

- FCD-XXX: qla2xxx: edif: increase ELS payload
Changes: Adjust memory buffer size to be able to handle max ELS payload.

- FCD-343: qla2xxx: turn off target reset during issue_lip
Changes: driver sends additional target reset to remote device before resetting the link.

- FCD-XXX: qla2xxx: edif: Reduce Initiator-Initiator thrashing.
Changes: Reduce unnecessary stress for authentication application to deal with unused connections.

- FCD-XXX: qla2xxx: fix gnl list corruption
Changes: move lock deletion behind lock.

- FCD-XXX: qla2xxx: edif: flush stale events and msgs on session down
Changes: Prevents authentication application from having to process stale data.

- FCD-XXX: qla2xxx: edif: reduces thrashing of the connection.
- FCD-XXX: qla2xxx: edif: tweak trace message
- FCD-XXX: qla2xxx: edif: fix app start delay
- FCD-XXX: qla2xxx: USCM: Handle SCM ELS from switch
- FCD-XXX: qla2xxx: edif: fix app start fail

- 10.02.07.00.a2-k1 BH 09/02/2021
- FCD-156: qla2xxx: 3PAR: Fix out of bound mem access
Changes: Add additional check to make sure the range of memory

- FCD-624: qla2xxx: Source driver gives compilation error on RHEL8.5
Changes: Offending code on tcm_qla2xxx module has been removed

- FCD-xxx: qla2xxx: Fix use after free
Changes: Would check for command is aborted / completed by FW before exiting the call.

- ER148553: qla2xxx: relogin during fabric disturbance
Changes : Set the scan_need flag to indicate a session

- FCD-464: qla2xxx: Fix race between timeout handler and completion handler
Changes: One reference is taken for the normal code path and one for the timeout path

- FCD-453: Fix FC-NVME register localport failure.
Changes: Module initialization is added to nvme_fc_port_template

- FCD-XXX: qla2xxx: Process responses in Tx path if any available for better performance
Changes: Call process_response_queue() in Tx path

- FCD-492: Kernel crashes when accessing port_speed sysfs file
Changes: CNA: Fix this by changing the lookup.

- FCD-XXX: qla2xxx: Refactor asynchronous command initialization
- FCD-XXX: qla2xxx: USCM - Add profile support for throttling IO
- FCD-XXX: qla2xxx: Move heart beat handling from dpc thread to workqueue
- FCD-XXX: USCM: Enhancement to throttle only read traffic during host congestion
and write traffic during target congestion.

- 10.02.07.00.a1-k1 BH 08/22/2021

- FCD-124: qla2xxx: edif: Use link event to wake up app
Changes: The link up event would notify app of the present of a new SCSI Host.

- FCD-299: qla2xxx: Fix crash in NVME abort path
Changes: Fixed the issue by removing stale access.

- FCD-XXX: qla2xxx: Display 16G only as supported speeds for 3830c card.
Changes: This card doesn't support lower speeds, hence,
update the fdmi and sysfs fields to display 16G only.

- FCD-226: qla2xxx: Update details for building kdump initrd in NVMe BFS.
Changes: Currently inbox driver doesn't support kdump/kexec kernel,
hence user need to update kdump initrd to have OOB driver part of it.

- FCD-372: qla2xxx: Anomaly in the congestion stats
Changes: Clear the signal counter on a qaucli clear

- FCD-279: Request QCC to check/report adapter's MCTP state
Changes: qla2xxx: Add support for mailbox passthru

- FCD-XXX: Perf improvement: Pick qpair such that Tx and Rx are processed on same CPU.
Changes: qla2xxx: Select qpair depending on which CPU post_cmd() gets called

- FCD-XXX: scsi: qla2xxx: Reserve extra IRQ vectors

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="6147ad2e40cd584d2c01345bfcfa568d09a9e6ad350810f24d72b56678a9ded9" name="smartpqi-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.1.20" rel="035.sles12sp5"/>
  </package>
  <package pkgid="cc08b942ae57912173caa6bcd4a479f8ad610e2a1d028d1e7ade836ba7436883" name="smartpqi-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.1.20" rel="035.sles15sp3"/>
  </package>
  <package pkgid="0469ce51ad413eec2d3e9c5a7d8b746587e39d7fccec54d297648fb5832fea53" name="smartpqi-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.1.20" rel="035.sles15sp4"/>
  </package>
  <package pkgid="98b8eca7d973afe24c8ca4a9e3cad98d819424669c7d4ba6975ab8dde5500152" name="ssa" arch="x86_64">
    <version epoch="0" ver="6.15" rel="11.0"/>
    <changelog author="Ver:6.15-11.0" date="1667304000">- Please see user documentation for details. (Severity: Low)</changelog>
  </package>
  <package pkgid="0581b7774647260a71ed7261ce85ebf96bbac6d895689be974b2d0a718db8255" name="ssacli" arch="x86_64">
    <version epoch="0" ver="6.15" rel="11.0"/>
    <changelog author="Ver:6.15-11.0" date="1667304000">- Please see user documentation for details. (Severity: Low)</changelog>
  </package>
  <package pkgid="7b663cc14f225df06ecbf85c6968714ffff1ac4aa199e9aea74bbf2d9766719d" name="ssaducli" arch="x86_64">
    <version epoch="0" ver="6.15" rel="11.0"/>
    <changelog author="Ver:6.15-11.0" date="1667304000">- Please see user documentation for details. (Severity: Low)</changelog>
  </package>
  <package pkgid="48936abb17686fdfd0df78b8467a87c051d80225548a53bfdd37931ecef5ecab" name="storcli" arch="noarch">
    <version epoch="0" ver="007.2207.0000.0000" rel="1"/>
  </package>
  <package pkgid="056fb8ff849ee32d9d430a02b160a4b271ad2e2e5de2ccd24b8666eee376028a" name="sut" arch="x86_64">
    <version epoch="0" ver="4.1.0" rel="17.linux"/>
  </package>
  <package pkgid="ed196e4a2c1720411adcff3c509d7791a12dd7e030610c8a0b573f0ca35f34e1" name="tg3-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.139j_k4.12.14_120" rel="2.sles12sp5"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497355200">- Add workaround for MRRS of 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="393fd30c1d4313df3886c903da5cc18a130f59ce6508a5b880e1c03f431a7800" name="tg3-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.139j_k5.14.21_150400.22" rel="2.sles15sp4"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497355200">- Add workaround for MRRS of 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="f6fb5c9fef5ecd4d2f5a99cd73c835e777381709cab0021d37205c8e563ef2e6" name="tg3-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.139j_k5.3.18_57" rel="2.sles15sp3"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497355200">- Add workaround for MRRS of 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
</otherdata>
</manifest>
